OS6400 AOS 6 4.5 R02 Network Configurati PDF
OS6400 AOS 6 4.5 R02 Network Configurati PDF
E
January 2013
www.alcatel-lucent.com
This user guide documents release 6.4.5 of the OmniSwitch 6400 Series,
OmniSwitch 6850E Series, OmniSwitch 6855 Series, and OmniSwitch 9000E Series.
The functionality described in this guide is subject to change without notice.
Copyright © 2013 by Alcatel-Lucent. All rights reserved. This document may not be reproduced in whole
or in part without the express written permission of Alcatel-Lucent.
Alcatel-Lucent® and the Alcatel-Lucent logo are registered trademarks of Alcatel-Lucent. Xylan®,
OmniSwitch®, OmniStack®, and Alcatel-Lucent OmniVista® are registered trademarks of Alcatel-Lucent.
OmniAccess™, Omni Switch/Router™, PolicyView™, RouterView™, SwitchManager™, VoiceView™,
WebView™, X-Cell™, X-Vision™, and the Xylan logo are trademarks of Alcatel-Lucent.
This OmniSwitch product contains components which may be covered by one or more of the following
U.S. Patents:
•U.S. Patent No. 6,339,830
•U.S. Patent No. 6,070,243
•U.S. Patent No. 6,061,368
•U.S. Patent No. 5,394,402
•U.S. Patent No. 6,047,024
•U.S. Patent No. 6,314,106
•U.S. Patent No. 6,542,507
•U.S. Patent No. 6,874,090
This OmniSwitch AOS Release 6 Network Configuration Guide describes how to set up and monitor
the software features that allow your switch to operate in a live network environment. The software
features described in this manual are shipped standard with your OmniSwitch 6400 Series, OmniSwitch
6850E, OmniSwitch 6855 Series, and OmniSwitch 9000E Series switches. These features are used when
setting up your OmniSwitch in a network of switches and routers.
Supported Platforms
The information in this guide applies to the following products:
• OmniSwitch 9000E Series (9700E and 9800E switches)
• OmniSwitch 6850E
Note. This OmniSwitch AOS Release 6 Network Configuration Guide covers Release 6.4.5, which is
supported on the OmniSwitch 6400 Series, OmniSwitch 6850E Series, OmniSwitch 6855 Series, and
OmniSwitch 9000E Series.
Unsupported Platforms
The information in this guide does not apply to the following products:
• OmniSwitch (original version with no numeric model name)
• OmniSwitch 6850
• OmniSwitch 7700/7800
• OmniSwitch 8800
• OmniSwitch 9000
• Omni Switch/Router
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page -li
Who Should Read this Manual?
The audience for this user guide is network administrators and IT support personnel who need to
configure, maintain, and monitor switches and routers in a live network. However, anyone wishing to gain
knowledge on how fundamental software features are implemented in the OmniSwitch 6400 Series,
OmniSwitch 6850E Series, OmniSwitch 6855 Series, and OmniSwitch 9000E Series will benefit from the
material in this configuration guide.
• Basic Layer 2 functions, such as Ethernet port parameters, source learning, Spanning Tree, and
Alcatel-Lucent interswitch protocols (AMAP and GMAP).
• Advanced Layer 2 functions, such as 802.1Q tagging, Link Aggregation, and IP Multicast Switching.
• Basic routing protocols and functions, such as static IP routes, RIP, DHCP Relay, and Virtual Router
Redundancy Protocol (VRRP).
• Security features, such as switch access control, Authenticated VLANs (AVLANs), authentication
servers, and policy management.
• Quality of Service (QoS) and Access Control Lists (ACLs) features, such as policy rules for
prioritizing and filtering traffic, and remapping packet headers.
• Diagnostic tools, such as RMON, port mirroring, and switch logging.
page -lii OmniSwitch AOS Release 6 Network Configuration Guide January 2013
What is Not in this Manual?
The configuration procedures in this manual use Command Line Interface (CLI) commands in all exam-
ples. CLI commands are text-based commands used to manage the switch through serial (console port)
connections or via Telnet sessions. Procedures for other switch management methods, such as web-based
(WebView or OmniVista) or SNMP, are outside the scope of this guide.
For information on WebView and SNMP switch management methods consult the OmniSwitch AOS
Release 6 Switch Management Guide. Information on using WebView and OmniVista can be found in the
context-sensitive on-line help available with those network management applications.
This guide provides overview material on software features, how-to procedures, and application examples
that will enable you to begin configuring your OmniSwitch. It is not intended as a comprehensive
reference to all CLI commands available in the OmniSwitch. For such a reference to all OmniSwitch AOS
Release 6 CLI commands, consult the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page -liii
Documentation Roadmap
The OmniSwitch user documentation suite was designed to supply you with information at several critical
junctures of the configuration process. The following section outlines a roadmap of the manuals that will
help you at each stage of the configuration process. Under each stage, we point you to the manual or
manuals that will be most helpful to you.
page -liv OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Anytime
The OmniSwitch AOS Release 6 CLI Reference Guide contains comprehensive information on all CLI
commands supported by the switch. This guide includes syntax, default, usage, example, related CLI
command, and CLI-to-MIB variable mapping information for all CLI commands supported by the switch.
This guide can be consulted anytime during the configuration process to find detailed and specific
information on each CLI command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page -lv
Related Documentation
The following are the titles and descriptions of all the related OmniSwitch AOS Release 6 user manuals:
• OmniSwitch 6400 Series Getting Started Guide
Describes the hardware and software procedures for getting an OmniSwitch 6400 Series switch up and
running. Also provides information on fundamental aspects of OmniSwitch software and stacking
architecture.
• OmniSwitch 6850E Series Getting Started Guide
Describes the hardware and software procedures for getting an OmniSwitch 6850E Series switch up
and running. Also provides information on fundamental aspects of OmniSwitch software and stacking
architecture.
• OmniSwitch 6855 Series Getting Started Guide
Describes the basic information you need to unpack and identify the components of your OmniSwitch
6855 shipment. Also provides information on the initial configuration of the switch.
• OmniSwitch 9000E Series Getting Started Guide
Describes the hardware and software procedures for getting an OmniSwitch 9000E Series switch up
and running. Also provides information on fundamental aspects of OmniSwitch software architecture
• OmniSwitch 6400 Series Hardware User Guide
Complete technical specifications and procedures for all OmniSwitch 6400 Series chassis, power
supplies, and fans. Also includes comprehensive information on assembling and managing stacked
configurations.
• OmniSwitch 6850E Series Hardware User Guide
Complete technical specifications and procedures for all OmniSwitch 6850E Series chassis, power
supplies, and fans. Also includes comprehensive information on assembling and managing stacked
configurations.
• OmniSwitch 6855 Series Hardware User Guide
Complete technical specifications and procedures for all OmniSwitch 6855 Series chassis, power
supplies, and fans.
• OmniSwitch 9000E Series Hardware User Guide
Complete technical specifications and procedures for all OmniSwitch 9000E Series chassis, power
supplies, and fans.
page -lvi OmniSwitch AOS Release 6 Network Configuration Guide January 2013
• OmniSwitch AOS Release 6 CLI Reference Guide
Complete reference to all CLI commands supported on the OmniSwitch 6400, 6855, 6850E, and
9000E. Includes syntax definitions, default values, examples, usage guidelines and CLI-to-MIB vari-
able mappings.
• OmniSwitch AOS Release 6 Switch Management Guide
Includes procedures for readying an individual switch for integration into a network. Topics include
the software directory architecture, image rollback protections, authenticated switch access, managing
switch files, system configuration, using SNMP, and using web management software (WebView).
• OmniSwitch AOS Release 6 Network Configuration Guide
Includes network configuration procedures and descriptive information on all the major software
features and protocols included in the base software package. Chapters cover Layer 2 information
(Ethernet and VLAN configuration), Layer 3 information (routing protocols, such as RIP), security
options (authenticated VLANs), Quality of Service (QoS), and link aggregation.
• OmniSwitch AOS Release 6 Advanced Routing Configuration Guide
Includes network configuration procedures and descriptive information on all the software features and
protocols included in the advanced routing software package. Chapters cover multicast routing
(DVMRP and PIM-SM), and OSPF.
• OmniSwitch AOS Release 6 Transceivers Guide
Includes information on Small Form Factor Pluggable (SFPs) and 10 Gbps Small Form Factor
Pluggables (XFPs) transceivers.
• Technical Tips, Field Notices
Includes critical Open Problem Reports, feature exceptions, and other important information on the
features supported in the current release and any limitations to their support.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page -lvii
User Manual CD
Some products are shipped with documentation included on a User Manual CD that accompanies the
switch. This CD also includes documentation for other Alcatel-Lucent data enterprise products.
All products are shipped with a Product Documentation Card that provides details for downloading
documentation for all OmniSwitch and other Alcatel-Lucent data enterprise products.
All documentation is in PDF format and requires the Adobe Acrobat Reader program for viewing.
Acrobat Reader freeware is available at www.adobe.com.
Note. In order to take advantage of the documentation CD’s global search feature, it is recommended that
you select the option for searching PDF files before downloading Acrobat Reader freeware.
To verify that you are using Acrobat Reader with the global search option, look for the following button in
the toolbar:
Note. When printing pages from the documentation PDFs, de-select Fit to Page if it is selected in your
print dialog. Otherwise pages may print with slightly smaller margins.
Technical Support
An Alcatel-Lucent service agreement brings your company the assurance of 7x24 no-excuses technical
support. You will also receive regular software updates to maintain and maximize your Alcatel-Lucent
product features and functionality and on-site hardware replacement through our global network of highly
qualified service delivery partners. Additionally, with 24-hour-a-day access to Alcatel-Lucent Service and
Support web page, you can view and update any case (open or closed) that you have reported to
Alcatel-Lucent’s technical support, open a new case or access helpful release notes, technical bulletins,
and manuals. For more information on Alcatel-Lucent’s Service Programs, see our web page at eser-
vice.ind.alcatel.com, call us at 1-800-995-2696, or email us at esd.support@alcatel-lucent.com.
page -lviii OmniSwitch AOS Release 6 Network Configuration Guide January 2013
1 Configuring Ethernet Ports
The Ethernet software is responsible for a variety of functions that support Ethernet, Gigabit Ethernet, and
10 Gigabit Ethernet ports on OmniSwitch Series switches. These functions include diagnostics, software
loading, initialization, configuration of line parameters, gathering statistics, and responding to administra-
tive requests from SNMP or CLI.
In This Chapter
This chapter describes Ethernet port parameters of the OmniSwitch and how to configure them through the
Command Line Interface (CLI). CLI Commands are used in the configuration examples. For more details
about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• “Setting Ethernet Parameters for All Port Types” on page 1-9
For information about CLI commands that can be used to view Ethernet port parameters, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-1
Ethernet Specifications Configuring Ethernet Ports
Ethernet Specifications
IEEE Standards Supported 802.3 Carrier Sense Multiple Access with Collision Detection
(CSMA/CD)
802.3u (100BaseTX)
802.3ab (1000BaseT)
802.3z (1000Base-X)
802.3ae (10GBase-X)
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Ports Supported Ethernet (10 Mbps)
Fast Ethernet (100 Mbps)
Gigabit Ethernet (1 Gb/1000 Mbps)
10 Gigabit Ethernet (10 Gb/10000 Mbps)
Switching/Routing Support Layer 2 Switching/Layer 3 Routing
Backbone Support Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet ports
Port Mirroring Support Fast Ethernet and Gigabit Ethernet ports
802.1Q Hardware Tagging Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet ports
Jumbo Frame Configuration Supported on Gigabit Ethernet and 10 Gigabit Ethernet ports
Maximum Frame Size 1553 bytes (10/100 Mbps)
9216 bytes (1/10 Gbps)
Note: A port’s TX and RX must be active for the port to be considered operationally enabled.
page 1-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Non-Combo Port Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-3
Ethernet Ports Overview Configuring Ethernet Ports
Note. See “Valid Port Settings on OmniSwitch 6400 Series Switches” on page 1-5, “Valid Port Settings on
OmniSwitch 6850E Series Switches” on page 1-5, and “Valid Port Settings on OmniSwitch 6855 Series
Switches” on page 1-6 for more information on combo ports. In addition, refer to the specific Hardware
Users Guide for each type of switch.
See “Setting Interface Line Speed for Combo Ports” on page 1-22 for more information on configuring
combo ports.
Note: Settings for SFPs are dependent upon the type of transceiver being used. Refer to the OmniSwitch
AOS Release 6 Transceivers Guide for information on supported SFPs.
page 1-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Ethernet Ports Overview
See the OmniSwitch 6400 Series Hardware Users Guide for more information about the OmniSwitch
6400 hardware and port numbering for specific models.
See the OmniSwitch 6850E Series Hardware Users Guide for more information about the hardware and
port numbering for specific models.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-5
Ethernet Ports Overview Configuring Ethernet Ports
See the OmniSwitch 6855 Series Hardware Users Guide for more information about the OmniSwitch 6855
hardware and port numbering for specific models.
Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet switching modules can be used as backbone links,
with Gigabit Ethernet and 10 Gigabit Ethernet modules offering additional support for high-speed servers.
All modules support 802.1Q hardware tagging for enhanced compatibility. And all Gigabit and 10 Gigabit
modules support jumbo frame configuration.
See the OmniSwitch 9000E Series Hardware Users Guide for more information about the hardware and
port numbering for specific NIs.
page 1-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Ethernet Ports Overview
Autonegotiation Guidelines
Please note a link will not be established on any copper Ethernet port if any one of the following is true:
• The local port advertises 100 Mbps full duplex and the remote link partner is forced to 100 Mbps full
duplex.
• The local port advertises 100 Mbps full duplex and the remote link partner is forced to 100 Mbps half
duplex.
• The local port advertises 10 Mbps full duplex and the remote link partner is forced to 10 Mbps full
duplex.
• The local port advertises 10 Mbps full duplex and the remote link partner is forced to 10 Mbps half
duplex.
This is due to the fact that when the local device is set to auto negotiating 10/100 full duplex it senses the
remote device is not auto negotiating. Therefore it resolves to Parallel Detect with Highest Common
Denominator (HCD), which is “10/100 Half” according to IEEE 802.3 Clause 28.2.3.1.
However, since the local device is set to auto negotiating at 10/100 full duplex it cannot form a 10/100
Mbps half duplex link in any of the above mentioned cases. One solution is to configure the local device
to autonegotiation, 10/100 Mbps, with auto or half duplex.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-7
Ethernet Ports Overview Configuring Ethernet Ports
If autonegotiation is disabled, the configured flow control settings are applied to the local interface. See
“Configuring Flow Control on Non-Combo Ports” on page 1-20 and “Configuring Flow Control on
Combo Ports” on page 1-26 for more information.
page 1-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Parameters for All Port Types
To enable trap port link messages on a single port, enter trap followed by the slot number, a slash (/), the
port number, and port link enable. For example, to enable trap port link messages on slot 2 port 3, enter:
-> trap 2/3 port link enable
To enable trap port link messages on a range of ports, enter trap followed by the slot number, a
slash (/), the first port number, a hyphen (-), the last port number, and port link enable. For example, to
enable trap port link messages ports 3 through 5 on slot 2, enter:
-> trap 2/3-5 port link enable
To disable trap port link messages on a single port, enter trap followed by the slot number, a slash (/), the
port number, and port link disable. For example, to disable trap port link messages on slot 2 port 3, enter:
-> trap 2/3 port link disable
To disable trap port link messages on a range of ports, enter trap followed by the slot number, a
slash (/), the first port number, a hyphen (-), the last port number, and port link disable. For example, to
disable trap port link messages ports 3 through 5 on slot 2, enter:
-> trap 2/3-5 port link disable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-9
Setting Ethernet Parameters for All Port Types Configuring Ethernet Ports
To reset Layer 2 statistics on a single port, enter interfaces followed by the slot number, a slash (/), the
port number, and no l2 statistics. For example, to reset all Layer 2 statistics counters on port 3 on slot 2,
enter:
-> interfaces 2/3 no l2 statistics
To reset Layer 2 statistics on a range of ports, enter interfaces followed by the slot number, a slash (/), the
first port number, a hyphen (-), the last port number, and no l2 statistics. For example, to reset all Layer 2
statistics counters on ports 1 through 3 on slot 2, enter:
-> interfaces 2/1-3 no l2 statistics
The interfaces no l2 statistics command also includes an optional cli parameter. When this parameter is
specified, only those statistics that are maintained by the switch CLI are cleared; SNMP values are not
cleared and continue to maintain cumulative totals. For example:
-> interfaces 2/1-3 no l2 statistics cli
Note that when the cli parameter is not specified (the default), both CLI and SNMP statistics are cleared.
Note. The show interfaces, show interfaces accounting, and show interfaces counters commands can
be used to display Layer 2 statistics (e.g., input and output errors, deferred frames received, unicast pack-
ets transmitted). For information on using these commands, see the OmniSwitch AOS Release 6 CLI Refer-
ence Guide.
To enable or disable a single port, enter interfaces followed by the slot number, a slash (/), the port
number, admin, and the desired administrative setting (either up or down). For example, to administra-
tively disable port 3 on slot 2, enter:
-> interfaces 2/3 admin down
To enable or disable a range of ports, enter interfaces followed by the slot number, a slash (/), the first
port number, a hyphen (-), the last port number, admin, and the desired administrative setting (either up or
down). For example, to administratively disable ports 1 through 3 on slot 2, enter:
-> interfaces 2/1-3 admin down
page 1-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Parameters for All Port Types
Note. The interfaces flood multicast command can also disable multicast flood rate limiting and is avail-
able on all the OmniSwitch Series switches.
To specify flood only rate limiting for a single port, enter interfaces followed by the slot number, a
slash (/), the port number, and flood. For example, the following command applies flood only rate limit-
ing to port 2/3:
-> interfaces 2/3 flood
To specify flood only rate limiting for a range of ports, enter interfaces followed by the slot number, a
slash (/), the first port number, a hyphen (-), the last port number, and flood. For example, the following
command applies flood only rate limiting to ports 3 through 4 on slot 2:
-> interfaces 2/3-4 flood
To configure the peak rate value used for flood only rate limiting, see “Configuring the Peak Flood Rate
Value” on page 1-12 for more information.
To apply the peak flood rate value to multicast traffic on a single port, enter interfaces followed by the
slot number, a slash (/), the port number, and flood multicast. For example, to enable the maximum flood
rate for multicast traffic on port 3 on slot 2, enter:
-> interfaces 2/3 flood multicast
To apply the peak flood rate value to multicast traffic on a range of ports, enter interfaces followed by the
slot number, a slash (/), the first port number, a hyphen (-), the last port number, and flood multicast. For
example, to enable the maximum flood rate for multicast traffic on ports 3 through 4 on slot 2, enter:
-> interfaces 2/3-4 flood multicast
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-11
Setting Ethernet Parameters for All Port Types Configuring Ethernet Ports
Note. Enabling multicast flood rate limiting with the interfaces flood multicast command will limit IP
Multicast Switching (IPMS) and non-IPMS multicast traffic.
• It is possible to configure flood rate equal to the line speed. But it is recommended that you always
configure the flood rate less than the line speed.
• The incoming traffic level is monitored and compared with the configured high (rate limit) and low
threshold values. This comparison is per port per traffic basis.This will be an average value for a span
of five seconds.
• When the incoming traffic flow on a port exceeds the configured high threshold value, the storm has to
be controlled. This can be done by either rate limiting the traffic or blocking the traffic on that port.
The traffic storm control continues to monitor the incoming traffic level even for the blocked/violated
port. When the traffic on the violated port reaches the configured low threshold value, the port state is
reset to normal state. If the low threshold is not configured, the port remains in violated state.
• By default, the following peak flood rate values are used for limiting the rate at which traffic is flooded
on a switch port:
parameter default
Mbps (10 Ethernet) 4
Mbps (100 Fast Ethernet) 49
Mbps (Gigabit Ethernet) 496
Mbps (10 Gigabit Ethernet) 997
page 1-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Parameters for All Port Types
To change the peak flood rate for broadcast traffic for an entire slot, enter interfaces followed by the slot
number, flood broadcast rate, and the flood rate in megabits. For example, to configure the peak flood
rate on slot 2 as 49 megabits, enter:
-> interfaces 2 flood broadcast rate mbps 49
To change the peak flood rate for all traffic types for a single port, enter interfaces followed by the slot
number, a slash (/), the port number, flood all rate, and the flood rate in megabits. For example, to config-
ure the peak flood rate on port 3 on slot 2 as 49 megabits, enter:
-> interfaces 2/3 flood all rate mbps 49
To change the peak flood rate for all traffic types for a range of ports, enter interfaces followed by the slot
number, a slash (/), the first port number, a hyphen (-), the last port number, flood all rate, and the flood
rate in megabits. For example, to configure the peak flood rate on ports 1 through 3 on slot 2 as 49 mega-
bits, enter:
-> interfaces 2/1-3 flood all rate mbps 42
To change the peak flood rate and low threshold for all traffic types for an entire slot, enter interfaces
followed by the slot number, flood all rate, peak flood rate value and low-threshold value in megabits.
For example, to configure the peak flood rate on slot 2 with peak flood rate and low threshold values as 49
megabits and 40 megabits, enter:
-> interfaces 2 flood all rate mbps 49 low-threshold 40
Note.
• The peak rate limit and low threshold (if) configured will have same threshold type [Mbps or PPS or
percentage].
• Low threshold cannot be configured for unknown unicast traffic.
• The storm traffic is compared with high or low threshold for every five seconds. The traffic burst will
not be reflected. The traffic monitoring window is not user configurable.
• The global interface violation recovery timer is not applicable for storm threshold violation.
To specify the type of traffic eligible for rate limiting, see “Flood Only Rate Limiting” on page 1-11 and
“Multicast Flood Rate Limiting” on page 1-11 for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-13
Setting Ethernet Parameters for All Port Types Configuring Ethernet Ports
Lower
Configured
Threshold Port Status Auto Recovery
Flood Action
Configured
Shutdown Yes The port goes in to storm violated When the ingress traffic reaches
state when the ingress traffic the configured low threshold, a
reaches the configured peak thresh- trap is generated and the port
old value, and a trap is generated. comes back to normal state.
Trap Yes When the ingress traffic reaches the N/A
configured peak threshold value,
storm is controlled by rate limiting
and the port remains in normal
state.
A trap is generated when traffic
reaches peak and low threshold
value.
Default Yes Storm is controlled by rate limiting, N/A
and the port remains in normal
state.
page 1-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Parameters for All Port Types
Note. Spaces must be contained within quotes (e.g., “IP Phone 1”).
To configure the maximum frame size on a single port, enter interfaces followed by the slot number, a
slash (/), the port number, max frame, and the frame size in bytes. For example, to set the maximum
frame size on port 3 on slot 2 to 9216 bytes, enter:
-> interfaces 2/3 max frame 9216
To configure the maximum frame size on a range of ports, enter interfaces followed by the slot number, a
slash (/), the first port number, a hyphen (-), the last port number, max frame, and the frame size in bytes.
For example, to set the maximum frame size on ports 1 through 3 on slot 2 to 9216 bytes, enter:
-> interfaces 2/1-3 max frame 9216
• Supply Voltage
• Current
• Output Power
• Input Power
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-15
Setting Ethernet Parameters for All Port Types Configuring Ethernet Ports
To enable the DDM capability on the switch use the interfaces transceiver ddm command. For example,
enter:
-> interfaces transceiver ddm enable
Traps can be enabled if any of these above values crosses the pre-defined low or high thresholds of the
transceiver. For example, to set the maximum frame size on port 3 on slot 2 to 9216 bytes, enter:
-> interfaces transceiver ddm trap enable
Note. In order to take advantage of the DDM capability, the transceiver must support the DDM functional-
ity. Not all transceivers support DDM, refer to the Transceivers Guide for additional DDM information.
page 1-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Parameters for Non-Combo Ports
• auto (auto-sensing, which is the default)—The auto setting automatically detects and matches the line
speed of the attached device.
Note that available settings for the interfaces speed command depend on the available line speeds of your
hardware interface. See “Valid Port Settings on OmniSwitch 6400 Series Switches” on page 1-5, “Valid
Port Settings on OmniSwitch 6850E Series Switches” on page 1-5, “Valid Port Settings on OmniSwitch
6855 Series Switches” on page 1-6, or “Valid Port Settings on Chassis Based Switches” on page 1-6 for
more information.
To set the line speed on an entire switch, enter interfaces followed by the slot number and the desired
speed. For example, to set slot 2 to 100 Mbps, enter:
-> interfaces 2 speed 100
To set the line speed on a single port, enter interfaces followed by the slot number, a slash (/), the port
number, and the desired speed. For example, to set the line speed on slot 2 port 3 at 100 Mbps, enter:
-> interfaces 2/3 speed 100
To set the line speed on a range of ports, enter interfaces followed by the slot number, a slash (/), the first
port number, a hyphen (-), the last port number, and the desired speed. For example, to set the line speed
on ports 1 through 3 on slot 2 at 100 Mbps, enter:
-> interfaces 2/1-3 speed 100
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-17
Setting Ethernet Parameters for Non-Combo Ports Configuring Ethernet Ports
Note. The Auto option sets both the duplex mode and line speed settings to autonegotiation.
To configure the duplex mode on an entire slot, enter interfaces followed by the slot number, duplex, and
the desired duplex setting (auto, full, or half). For example, to set the duplex mode on slot 2 to full, enter:
-> interfaces 2 duplex full
To configure the duplex mode on a single port, enter interfaces followed by the slot number, a slash (/),
the port number, duplex, and the desired duplex setting (auto, full, or half). For example, to set the duplex
mode on port 3 on slot 2 to full, enter:
-> interfaces 2/3 duplex full
To configure the duplex mode on a range of ports, enter interfaces followed by the slot number, a slash (/
), the first port number, a hyphen (-), the last port number, duplex, and the desired duplex setting (auto,
full, or half). For example, to set the duplex mode on ports 1 through 3 on slot 2 to full, enter:
-> interfaces 2/1-3 duplex full
To configure the inter-frame gap on an entire slot, enter interfaces, followed by the slot number, ifg, and
the desired inter-frame gap value. For example, to set the inter-frame gap value on slot 2 to 10 bytes, enter:
-> interfaces 2 ifg 10
To configure the inter-frame gap on a single port, enter interfaces, followed by the slot number, a slash (/
), the port number, ifg, and the desired inter-frame gap value. For example, to set the inter-frame gap value
on port 20 on slot 2 to 10 bytes, enter:
-> interfaces 2/20 ifg 10
page 1-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Parameters for Non-Combo Ports
To configure the inter-frame gap on a range of ports, enter interfaces, followed by the slot number, a slash
(/), the first port number, a hyphen (-), the last port number, ifg, and the desired inter-frame gap value. For
example, to set the inter-frame gap value on ports 20 through 22 on slot 2 to 10 bytes, enter:
-> interfaces 2/20-22 ifg 10
Note. Since the interfaces ifg command is only supported on Gigabit interfaces, only the gigaethernet
keyword should be used.
To enable or disable autonegotiation on a single port, enter interfaces, followed by the slot number, a
slash (/), the port number, autoneg, and either enable or disable. For example, to enable autonegotiation
on port 3 on slot 2, enter:
-> interfaces 2/3 autoneg enable
To enable or disable autonegotiation on a range of ports, enter interfaces, followed by the slot number, a
slash (/), the first port number, a hyphen (-), the last port number, autoneg, and either enable or disable.
For example, to enable autonegotiation on ports 1 through 3 on slot 2, enter:
-> interfaces 2/1-3 autoneg enable
Note. Please refer to “Autonegotiation Guidelines” on page 1-7 for guidelines on configuring autonegotia-
tion.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-19
Setting Ethernet Parameters for Non-Combo Ports Configuring Ethernet Ports
To configure crossover settings on a single port, enter interfaces, followed by the slot number, a slash (/),
the port number, crossover, and the desired setting. For example, to set the crossover configuration to auto
on port 3 on slot 2, enter:
-> interfaces 2/3 crossover auto
To configure crossover settings on a range of ports, enter interfaces, followed by the slot number, a slash
(/), the first port number, a hyphen (-), the last port number, crossover, and the desired setting. For exam-
ple, to set the crossover configuration to auto on ports 1 through 3 on slot 2, enter:
-> interfaces 2/1-3 crossover auto
page 1-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Parameters for Non-Combo Ports
• rx—Allow the interface to honor PAUSE frames from peer switches and temporarily stop sending traf-
fic to the peer. Do not transmit PAUSE frames to peer switches.
• tx-and-rx—Transmit and honor PAUSE frames when traffic congestion occurs between peer switches.
For example, the following command configures ports 1/1 through 1/10 to transmit and honor PAUSE
frames:
-> interfaces 1/1-10 pause tx-and-rx
To disable flow control for one or more ports, specify the disable parameter with the interfaces pause
command. For example:
-> interfaces 1/10 pause disable
If the interfaces pause command is used to configure E2E flow control on a 48-port standalone
OmniSwitch 6400, then configuring a flow control VLAN is also required. For example, the following
command configures VLAN 700 as a flow control VLAN:
-> interfaces e2e-flow-vlan 700
Note that the VLAN specified with the above command must already exist in the switch configuration. In
addition, flow control VLANs are not configurable using standard VLAN management commands.
There is only one flow control VLAN configured per switch. To remove this type of VLAN, use the no
form of the interfaces e2e-flow-vlan command. Note that specifying a VLAN ID is not necessary. For
example, the following command removes the flow control VLAN from the switch configuration:
-> interfaced no e2e-flow-vlan
For more information about the interfaces pause and interfaces e2e-flow-vlan command syntax, see the
“Ethernet Port Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-21
Setting Ethernet Combo Port Parameters Configuring Ethernet Ports
Note. The commands used in this section are examples, please refer to page 1-5 for the combo port
numbering.
• 1000 (1000 Mbps Gigabit Ethernet, which is the default for combo SFP connectors)
• 10000 (10000 Mbps Gigabit Ethernet, which is the default for 10 Gigabit ports)
• auto (auto-sensing, which is the default for combo 10/100/1000 ports)—The auto setting automati-
cally detects and matches the line speed of the attached device.
Available settings for the interfaces hybrid speed command depend on the available line speeds of your
hardware interface. See “Valid Port Settings on OmniSwitch 6400 Series Switches” on page 1-5, “Valid
Port Settings on OmniSwitch 6850E Series Switches” on page 1-5, and “Valid Port Settings on
OmniSwitch 6855 Series Switches” on page 1-6 for more information.
Note. In the interfaces hybrid speed command, the copper keyword is used to configure the copper RJ-
45 10/100/1000 port while the fiber keyword is used to configure the fiber SFP connectors.
To set the line speed for all combo ports on an entire switch, enter interfaces, followed by the slot
number, hybrid, either fiber or copper, and the desired speed. For example, to set all combo copper ports
on slot 2 to 100 Mbps, enter:
-> interfaces 2 hybrid copper speed 100
Note. using the interfaces hybrid speed command to set all combo ports on a switch, will not affect the
configurations of the non-combo ports.
To set the line speed on a single combo port, enter interfaces, followed by the slot number, a slash (/), the
combo port number, hybrid, either fiber or copper, and the desired speed. For example, to set the line
speed on slot 2 combo copper RJ-45 port 23 to 100 Mbps, enter:
-> interfaces 2/23 hybrid copper speed 100
To set the line speed on a range of combo ports, enter interfaces, followed by the slot number, a slash (/),
the first combo port number, a hyphen (-), the last combo port number, hybrid, either fiber or copper, and
page 1-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Combo Port Parameters
the desired speed. For example, to set the line speed on combo copper ports 21 through 24 on slot 2 to 100
Mbps, enter:
-> interfaces 2/21-24 hybrid copper speed 100
Note. In the interfaces hybrid duplex command the copper keyword is used to configure the copper RJ-
45 10/100/1000 port while the fiber keyword is used to configure the fiber SFP connector.
To configure the duplex mode on an entire slot, enter interfaces, followed by the slot number, hybrid,
either fiber or copper, duplex, and the desired duplex setting (auto, full, or half). For example, to set the
duplex mode on all fiber combo ports on slot 2 to full, enter:
-> interfaces 2 hybrid fiber duplex full
Note. using the interfaces hybrid duplex command to set all combo ports on a switch, will not affect the
configurations of the non-combo ports.
To configure the duplex mode on a single combo port, enter interfaces, followed by the slot number, a
slash (/), the combo port number, hybrid, either fiber or copper, duplex, and the desired duplex setting
(auto, full, or half). For example, to set the duplex mode on the fiber combo port 23 on slot 2 to full,
enter:
-> interfaces 2/23 hybrid fiber duplex full
To configure the duplex mode on a range of combo ports, enter interfaces, followed by the slot number, a
slash (/), the first combo port number, a hyphen (-), the last combo port number, hybrid, either fiber or
copper, duplex, and the desired duplex setting (auto, full, or half). For example, to set the duplex mode
on fiber combo ports 21 through 24 on slot 2 to full, enter:
-> interfaces 2/21-24 hybrid fiber duplex full
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-23
Setting Ethernet Combo Port Parameters Configuring Ethernet Ports
Note. In the interfaces hybrid autoneg command, the copper keyword is used to configure the copper
RJ-45 10/100/1000 port while the fiber keyword is used to configure the fiber SFP connector.
To enable or disable autonegotiation on all combo ports in an entire switch, enter interfaces, followed by
the slot number, hybrid, either fiber or copper, autoneg, and either enable or disable. For example, to
enable autonegotiation on all copper combo ports on slot 2, enter:
-> interfaces 2 hybrid copper autoneg enable
Note. using the interface hybrid autoneg command to set all combo ports on a switch will not affect the
configurations of the non-combo ports.
To enable or disable autonegotiation on a single combo port, enter interfaces, followed by the slot
number, a slash (/), the combo port number, hybrid, either fiber or copper, autoneg, and either enable or
disable. For example, to enable autonegotiation on copper combo port 23 on slot 2, enter:
-> interfaces 2/23 hybrid copper autoneg enable
To enable or disable autonegotiation on a range of combo ports, enter interfaces, followed by the slot
number, a slash (/), the first combo port number, a hyphen (-), the last combo port number, hybrid, either
fiber or copper, autoneg, and either enable or disable. For example, to enable autonegotiation on copper
combo ports 21 through 24 on slot 2, enter:
-> interfaces 2/21-24 hybrid copper autoneg enable
As an option, you can document the interface type by entering ethernet, fastethernet, or gigaethernet
before the slot number. For example, to enable autonegotiation on copper combo port 23 on slot 2 and
document the combo port as Gigabit Ethernet, enter:
-> interfaces gigaethernet 2/23 hybrid copper autoneg enable
Note. Please refer to “Autonegotiation Guidelines” on page 1-7 for guidelines on configuring autonegotia-
tion.
page 1-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Combo Port Parameters
Note. In the interfaces hybrid crossover command, the copper keyword is used to configure the copper
RJ-45 10/100/1000 port.
Setting the crossover configuration to auto will configure the interface or interfaces to automatically
detect crossover settings. Setting crossover configuration to mdix will configure the interface or inter-
faces for MDIX (Media Dependent Interface with Crossover), which is the standard for hubs and switches.
Setting crossover to mdi will configure the interface or interfaces for MDI (Media Dependent Interface),
which is the standard for end stations.
To configure crossover settings for all combo ports on an entire switch, enter interfaces, followed by the
slot number, hybrid, copper, crossover, and the desired setting. For example, to set the crossover config-
uration to auto on for all copper combo ports slot 2, enter:
-> interfaces 2 hybrid copper crossover auto
Note. using the interface hybrid crossover command to set all combo ports on a switch will not affect
the configurations of the non-combo ports.
To configure crossover settings on a single combo port, enter interfaces, followed by the slot number, a
slash (/), the combo port number, hybrid, copper, crossover, and the desired setting. For example, to set
the crossover configuration to auto on copper combo port 23 on slot 2, enter:
-> interfaces 2/23 hybrid copper crossover auto
To configure crossover settings on a range of combo ports, enter interfaces, followed by the slot number,
a slash (/), the first combo port number, a hyphen (-), the last combo port number, hybrid, copper, cross-
over, and the desired setting. For example, to set the crossover configuration to auto on copper combo
ports 21 through 24 on slot 2, enter:
-> interfaces 2/21-24 hybrid copper crossover auto
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-25
Setting Ethernet Combo Port Parameters Configuring Ethernet Ports
Note. In the interfaces hybrid pause command, the copper keyword is used to configure the copper RJ-
45 10/100/1000 port while the fiber keyword is used to configure the fiber SFP connector.
For example, the following command configures port 1/23 to transmit and honor PAUSE frames:
-> interfaces 1/23 hybrid fiber pause tx-and-rx
page 1-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Setting Ethernet Combo Port Parameters
To disable flow control, use the disable parameter with the interfaces hybrid pause command.
For example:
-> interfaces 1/23 hybrid fiber pause disable
If the interfaces hybrid pause command is used to configure E2E flow control on a 48-port standalone
OmniSwitch 6400, then configuring a flow control VLAN is also required. For example, the following
command configures VLAN 700 as a flow control VLAN:
-> interfaces e2e-flow-vlan 700
The VLAN specified with the above command must already exist in the switch configuration. In addition,
flow control VLANs are not configurable using standard VLAN management commands.
There is only one flow control VLAN configured per switch. To remove this type of VLAN, use the no
form of the interfaces e2e-flow-vlan command. Note that specifying a VLAN ID is not necessary. For
example, the following command removes the flow control VLAN from the switch configuration:
-> interfaced no e2e-flow-vlan
For more information about the interfaces hybrid pause and interfaces e2e-flow-vlan command syntax,
see the “Ethernet Port Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-27
Using TDR Cable Diagnostics Configuring Ethernet Ports
• The TDR test runs an “out-of-service” test; other data and protocol traffic on the port is interrupted
when the test is active.
• TDR is supported only on copper ports and not on fiber or stacking ports.
• Each time a TDR test is run, statistics from a test previously run on the same port are cleared.
A TDR test is initiated using the interfaces tdr-test-start CLI command For example, the following
command starts the test on port 2/1:
-> interfaces 2/1 tdr-test-start
Slot/ No of Cable Fuzzy Pair1 Pair1 Pair2 Pair2 Pair3 Pair3 Pair4 Pair4 Test
port pairs State Length State Length State Length State Length State Length Result
-----+-----+------+-----+-----+-----+------+------+-----+------+-----+------+------
1/3 4 ok 0 ok 3 ok 3 ok 3 ok 3 success
The following cable states are indicated in the show interfaces tdr-statistics command output:
• OK—Wire is working properly
• Open:—Wire is broken
• Crosstalk—Signal transmitted on one pair of wire creates an undesired effect in another wire.
page 1-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Using TDR Cable Diagnostics
TDR statistics from a previous test are also cleared when a new test starts on the same port.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-29
Interfaces Violation Recovery Configuring Ethernet Ports
• An automatic recovery timer that indicates how much time a port remains shut down before the switch
automatically brings the port back up (see “Configuring the Violation Recovery Time” on page 1-32).
• A maximum number of recovery attempts setting that specifies how many recoveries can occur before
a port is permanently shutdown (see “Configuring the Violation Recovery Time” on page 1-32).
• A wait-to-restore timer that indicates the amount of time the switch waits to notify features that the port
is back up (see “Configuring the Wait-to-Restore Timer” on page 1-33).
• An SNMP trap that is generated each time an interface is shutdown by a feature. This can occur even
when the interface is already shutdown by another feature. The trap also indicates the reason for the
violation.
• An SNMP trap that is generated when a port is recovered. The trap also includes information about
how the port was recovered. Enabling or disabling this type of trap is allowed using the interfaces
violation-recovery-trap command.
• Using the interfaces admin command to administratively disable and enable the interface.
Administratively – A port is administratively disabled. With this method the LED does not remain ON. A
port in this state can be recovered using only the following methods:
• Using the interfaces clear-violation-all command to manually clear the violation.
• Using the interfaces admin command to administratively disable and enable the interface.
Disconnecting/reconnecting the interface link or a link down/up event will not recover a port that was
administratively disabled.
page 1-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Interfaces Violation Recovery
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-31
Interfaces Violation Recovery Configuring Ethernet Ports
The violation recovery time value configured for a specific interface overrides the global value configured
for all switch interfaces. To set the port-level value back to the global value, use the default parameter
with the interfaces violation-recovery-time command. For example, the following command sets the
violation recovery time for port 2/1 back to the global value of 600:
-> interfaces 2/1 violation-recovery-time default
To disable the violation recovery timer mechanism, set the recovery time to zero. For example:
page 1-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Interfaces Violation Recovery
The maximum recovery attempts value configured for a specific interface overrides the global value
configured for all switch interfaces. To set the port-level value back to the global value, use the default
parameter with the interfaces violation-recovery-maximum command. For example, the following
command sets the number of recovery attempts for port 2/1 back to the global value of 3:
-> interfaces 2/1 violation-recovery-maximum default
To disable the violation recovery maximum attempts mechanism, set the number of attempts to zero. For
example:
• An interface recovers from a violation due to the automatic recovery timer mechanism.
• When the WTR timer is running, the interface is physically up but the link status is down.
The interfaces wait-to-restore command is used to configure the WTR timer value, in multiples of 5. For
example, the following commands set the WTR timer value to 300 seconds:
To disable the WTR timer mechanism, set the timer value to zero. For example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-33
Interfaces Violation Recovery Configuring Ethernet Ports
show interfaces port Displays the administrative status, link status, violations, recovery
time, maximum recovery attempts and the value of the wait-to-restore
timer.
show interfaces violation- Displays the globally configured recovery time, SNMP recovery trap
recovery enable/disable status and maximum recovery attempts.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide.
page 1-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Link Monitoring
Link Monitoring
The Link Monitoring feature is used to monitor interface status to minimize the network protocol re-
convergence that can occur when an interface becomes unstable. To track the stability of an interface, this
feature monitors link errors and link flaps during a configured timeframe. If the number of errors or link
flaps exceeds configured thresholds during this time frame, the interface is shut down.
There are no explicit Link Monitoring commands to recover a port from a Link Monitoring shutdown;
such ports are subject to the interfaces violation recovery mechanisms configured for the switch. See
“Interfaces Violation Recovery” on page 1-30 for more information.
In this example, the port is shutdown if the number of link errors exceeds the threshold value of 50 during
the link monitoring window timeframe.
• Whenever an interface comes up and it is not an administrative action (admin-up), the link flap counter
is incremented.
The interfaces link-monitoring link-flap-threshold command is used to configure the number of flaps
allowed before the interface is shutdown. For example:
-> interfaces 1/1 link-monitoring link-flap-threshold 5
In this example, the port is shutdown if the number of link flaps exceeds the threshold value of five during
the link monitoring window timeframe.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-35
Link Monitoring Configuring Ethernet Ports
Monitoring Window
The Link Monitoring window is a per-port configurable timer that is started whenever link-monitoring is
enabled on a port. During this time frame interface receive errors and interface flaps are counted. If either
of the values exceeds the configured thresholds the interface is shut down.
• The timer value can be modified even when the Link Monitoring timer is running and the new value of
timer will take effect after the current running timer expires.
• The threshold values for link errors and link flaps can also be modified when link-monitoring timer is
running; if the new threshold value is less than the current link-flap or link-error counter value, then the
interface will be shutdown immediately.
The interfaces link-monitoring time-window command is used to configure the monitoring window
timer. For example:
-> interfaces 1/1 link-monitoring time-window 500
In this example, link monitoring will monitor port 1/1 for 500 seconds.
All the statistics (link errors and link flaps) for a port are reset to zero when Link Monitoring is enabled on
that port.
• The port is shutdown by any feature, such as Link Monitoring, UDLD, or Link Fault Propagation.
• The port is permanently shut down by an interfaces violation recovery mechanism. Refer to “Inter-
faces Violation Recovery” on page 1-30 for more information.
page 1-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Link Fault Propagation
show interfaces link- Displays Link Monitoring statistics, such as the link flap and error
monitoring statistics counts and the port state (shutdown, down, up).
show interfaces link- Displays the Link Monitoring configuration, such as the monitoring
monitoring config status, monitoring window time, and the link flap and error thresholds.
show interfaces port Displays the administrative status, link status, violations, recovery
time, maximum recovery attempts and the value of the wait-to-restore
timer.
For more information about the resulting displays from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
• If all the source ports in the group go down, LFP waits a configured amount of time then shuts down
another set of interfaces (configured as destination ports) that are associated with the same group.
• When any one of the source ports comes back up, all of the destination ports are brought back up and
network connectivity is restored.
The LFP source and destination ports can be physical or link aggregation ports. If the destination port is a
link aggregation port the shutdown consists of shutting down all members of the link aggregation group
(physically down). However, the link aggregation group remains administratively enabled.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-37
Link Fault Propagation Configuring Ethernet Ports
• If a port that is not a member of a link aggregate at the time a violation occurred is added to a link
aggregate, the switch will not shut down the port.
• SNMP traps cannot be configured for LFP. The interface violation recovery mechanism will be respon-
sible for sending traps when a port is shutdown or recovered by LFP.
• If the wait-to-restore (WTR) timer is configured on the source ports of a LFP group with link monitor-
ing enabled, the state of the destination ports of the group will be determined by the link state of the
ports after the WTR timer has expired.
See “Interfaces Violation Recovery” on page 1-30 for more information.
page 1-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Link Fault Propagation
1 Create an LFP group. This type of group identifies the source ports to monitor and the destination
ports to bring down when all of the source ports go down. To create an LFP group, use the link-fault-
propagation group command. For example:
-> link-fault-propagation group 1
2 Associate source ports with the LFP group. To associate source ports to an LFP group, use the link-
fault-propagation group source command. For example:
-> link-fault-propagation group 1 source port 1/2-5 2/3
3 Associate destination ports with the LFP group. To associate destination ports with an LFP group,
use the link-fault-propagation group destination command. For example:
-> link-fault-propagation group 1 destination port 1/5-8 2/3
4 Configure the LFP wait-to-shutdown timer. This timer specifies the amount of time that LFP will
wait before shutting down all the destination ports. To configure this timer value, use the link-fault-prop-
agation group wait-to-shutdown command. For example:
-> link-fault-propagation group 3 wait-to-shutdown 70
Note. Optional. To verify the LFP configuration, use the show link-fault-propagation group command.
For example:
Group Id : 6
Source Port(s) : 1/2 1/6 1/9,
Destination Port(s) : 1/10-11 1/13,
Group-Src-Ports Status : down,
Admin Status : disable,
Wait To Shutdown : 5
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about LFP commands.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-39
Link Fault Propagation Configuring Ethernet Ports
OS-1
2/1
1
1/1 3/1
DHL L2 Network
1
Access LACP 1
Stby 1
OS-2
page 1-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet Ports Verifying Ethernet Port Configuration
show interfaces flow control Displays interface flow control wait time settings in nanoseconds.
show interfaces pause Displays the flow control pause configuration for switch interfaces.
show interfaces e2e-flow-vlan Displays the flow control VLAN configuration for the switch.
show interfaces Displays general interface information, such as hardware, MAC
address, input and output errors.
show interfaces accounting Displays interface accounting information.
show interfaces counters Displays interface counters information.
show interfaces counters Displays interface error frame information for Ethernet and Fast
errors Ethernet ports.
show interfaces collisions Displays collision statistics information for Ethernet and Fast Ethernet
ports.
show interfaces status Displays line status information.
show interfaces port Displays port status information.
show interfaces ifg Displays inter-frame gap values.
show interfaces flood rate Displays peak flood rate settings.
show interfaces traffic Displays interface traffic statistics.
show interfaces capability Displays autonegotiation, flow, speed, duplex, and crossover settings.
show interfaces hybrid Displays general interface information (e.g., hardware, MAC address,
input errors, output errors) for combo ports.
show interfaces hybrid status Displays line status information for combo ports.
show interfaces hybrid pause Displays the flow control pause configuration for combo ports.
show interfaces hybrid Displays autonegotiation, flow, speed, duplex, and crossover settings
capability for combo ports.
show interfaces hybrid Displays interface accounting information (e.g., packets received/trans-
accounting mitted, deferred frames received) for combo ports.
show interfaces hybrid Displays interface counters information (e.g., unicast, broadcast, multi-
counters cast packets received/transmitted) for combo ports.
show interfaces hybrid Displays interface error frame information (e.g., CRC errors, transit
counters errors errors, receive errors) for combo ports.
show interfaces hybrid Displays interface collision information (e.g., number of collisions,
collisions number of retries) for combo ports.
show interfaces hybrid traffic Displays interface traffic statistics for combo ports.
show interfaces hybrid port Displays interface port status (up or down) for combo ports.
show interfaces hybrid flood Displays interface peak flood rate settings for combo ports.
rate
show interfaces hybrid ifg Displays interface inter-frame gap values for combo ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 1-41
Verifying Ethernet Port Configuration Configuring Ethernet Ports
These commands can be quite useful in troubleshooting and resolving potential configuration issues or
problems on your switch. For more information about the resulting displays from these commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 1-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
2 Configuring UDLD
UniDirectional Link Detection (UDLD) is a protocol for detecting and disabling unidirectional Ethernet
fiber or copper links caused by mis-wiring of fiber strands, interface malfunctions, media converter faults,
and so on. The UDLD operates at Layer 2 in conjunction with IEEE 802.3's existing Layer 1 fault
detection mechanisms.
UDLD is a lightweight protocol that can be used to detect and disable one-way connections before they
create dangerous situations such as Spanning Tree loops or other protocol malfunctions. The protocol is
mainly used to advertise the identities of all the UDLD-capable devices attached to the same LAN
segment and to collect the information received on the ports of each device to determine whether the Layer
2 communication is functioning properly. All connected devices must support UDLD for the
protocol to successfully identify and disable unidirectional links. When UDLD detects a unidirectional
link, the protocol administratively shuts down the affected port and generates a trap to alert the user.
In This Chapter
This chapter describes how to configure UDLD parameters through the Command Line Interface (CLI).
CLI commands are used in the configuration examples; for more details about the syntax of commands,
see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include the following:
• Configuring UDLD on page 2-6.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 2-1
UDLD Specifications Configuring UDLD
UDLD Specifications
RFCs supported Not applicable at this time
IEEE Standards supported Not applicable at this time
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Probe-message advertisement timer 7 to 90 in seconds
Echo-based detection timer 4 to 15 in seconds
Maximum neighbors per UDLD port 32
Maximum number of UDLD ports per system 128
UDLD Defaults
Parameter Description Command Default
UDLD administrative state udld Disabled
UDLD status of a port udld port Disabled
UDLD operational mode udld mode Normal
Probe-message advertisement timer udld probe-timer 15 seconds
Echo-based detection timer udld echo-wait-timer 8 seconds
page 2-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring UDLD Quick Steps for Configuring UDLD
2 To enable the UDLD protocol on a port, use the udld port command by entering udld port, followed
by the slot and port number, and enable. For example:
-> udld port 1/6 enable
3 Configure the operational mode of UDLD by entering udld port, followed by the slot and port
number, mode, and the operational mode. For example:
-> udld port 1/6 mode aggressive
4 Configure the probe-message advertisement timer on port 6 of slot 1 as 17 seconds using the following
command:
-> udld port 1/6 probe-timer 17
Note. Optional. Verify the UDLD global configuration by entering the show udld configuration
command or verify the UDLD configuration on a port by entering the show udld configuration port
command. For example:
To verify the UDLD statistics of a port, use the show udld statistics port command. For example:
-> show udld statistics port 1/42
UDLD Port Statistics
Hello Packet Send :8,
Echo Packet Send :8,
Flush Packet Recvd :0
UDLD Neighbor Statistics
Neighbor ID Hello Pkts Recv Echo Pkts Recv
--------------+--------------------+--------------
1 8 15
2 8 15
3 8 21
4 8 14
5 8 15
6 8 20
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 2-3
UDLD Overview Configuring UDLD
UDLD Overview
UDLD is a Layer 2 protocol used to examine the physical configuration connected through fiber-optic or
twisted-pair Ethernet cables. UDLD detects and administratively shuts down the affected port, and alerts
the user when a unidirectional link exists. Unidirectional links can create hazardous situations such as
Spanning-Tree topology loops caused, for instance, by unwiring of fiber strands, interface malfunctions,
media converter’s faults, and so on.
The UDLD feature is supported on the following port types:
• Copper ports
• Fiber ports
Normal Mode
In this mode, the protocol depends on explicit information instead of implicit information. If the protocol
is unable to retrieve any explicit information, the port is not put in the shutdown state; instead, it is marked
as Undetermined. The port is put in the shutdown state only when it is explicitly determined that the link is
defective when it is determined on the basis of UDLD-PDU processing that link has become unidirec-
tional. In any such state transition, a trap is raised.
Aggressive Mode
In this mode, UDLD checks whether the connections are correct and the traffic is flowing bidirectionally
between the respective neighbors. The loss of communication with the neighbor is considered an event to
put the port in shutdown state. Thus, if the UDLD PDUs are not received before the expiry of a timer, the
port is put in the UDLD-shutdown state. Since the lack of information is not always due to a defective
link, this mode is optional and is recommended only for point-to-point links.
UDLD shuts down the affected interface when one of these problems occurs:
• On fiber-optic or twisted-pair links, one of the interfaces cannot send or receive traffic.
• On fiber-optic or twisted-pair links, one of the interfaces is down while the other is up.
page 2-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring UDLD UDLD Overview
Echo detection
UDLD depends on an echo-detection mechanism. UDLD restarts the detection window on its side of the
connection and sends echo messages in response to the request, whenever a UDLD device learns about a
new neighbor or receives a re-synchronization request from an out-of-sync neighbor. This behavior is the
same on all UDLD neighbors because the sender of the echoes expects to receive an echo as a response.
If the detection window ends and no valid response is received, the link will be shut down, depending on
the UDLD mode. When UDLD is in normal mode, the link is considered to be undetermined and will not
be shut down. When UDLD is in aggressive mode, the link is considered to be unidirectional, and the
interface is shut down.
In normal mode, if UDLD is in the advertisement or in the detection phase and all the neighbor cache
entries are aged out, UDLD restarts the link-up sequence to re-synchronize with potentially out-of-sync
neighbors.
In aggressive mode, if UDLD is in the advertisement or in the detection phase and all the neighbors of a
port are aged out, UDLD restarts the link-up sequence to re-synchronize with potentially out-of-sync
neighbors. UDLD shuts down the port, after the continuous messages, if the link state is undetermined.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 2-5
Configuring UDLD Configuring UDLD
Configuring UDLD
This section describes how to use Command Line Interface (CLI) commands to do the following:
• Enable and disable UDLD on a switch or port (see “Enabling and Disabling UDLD” on page 2-6).
• Configure the operational mode (see “Configuring the Operational Mode” on page 2-7).
• Configure the probe-message advertisement timer (see “Configuring the Probe-Timer” on page 2-7).
• Configure the echo-based detection timer (see “Configuring the Echo-Wait-Timer” on page 2-8).
• Clear the UDLD statistics on a switch or port (see “Clearing UDLD Statistics” on page 2-8).
• Recover a port from UDLD shutdown (see ““Recovering a Port from UDLD Shutdown” on page 2-8).
Note. See the “UDLD Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for
complete documentation of UDLD CLI commands.
To disable UDLD on a switch, use the udld command with the disable parameter. For example, the
following command disables UDLD on a switch:
-> udld disable
To disable UDLD on a port, use the udld port command with the disable parameter. For example, the
following command disables UDLD on a range of ports:
-> udld port 5/21-24 disable
page 2-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring UDLD Configuring UDLD
To configure the mode for multiple ports, specify a range of ports. For example:
-> udld port 2/7-18 mode normal
To configure the probe-timer for multiple ports, specify a range of ports. For example:
-> udld port 1/8-21 probe-timer 18
Use the no form of this command to reset the timer. For example, the following command resets the timer
for port 4 of slot 6:
-> no udld port 6/4 probe-timer
Note that when a timer is reset, the default value of 15 seconds is set.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 2-7
Configuring UDLD Configuring UDLD
To configure the echo-wait-timer for multiple ports, specify a range of ports. For example:
-> udld port 1/8-21 echo-wait-timer 9
Use the no form of this command to reset the timer. For example, the following command resets the timer
for port 6 of slot 4:
-> no udld port 4/6 echo-wait-timer
Note that when a timer is reset, the default value of 8 seconds is set.
page 2-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring UDLD Verifying the UDLD Configuration
For more information about the resulting display from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide. An example of the output for the show udld configuration port and show udld
statistics port commands is also given in “Quick Steps for Configuring UDLD” on page 2-3.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 2-9
Verifying the UDLD Configuration Configuring UDLD
page 2-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
3 Managing Source
Learning
Transparent bridging relies on a process referred to as source learning to handle traffic flow. Network
devices communicate by sending and receiving data packets that each contain a source MAC address and a
destination MAC address. When packets are received on switch network interface (NI) module ports,
source learning examines each packet and compares the source MAC address to entries in a MAC address
database table. If the table does not contain an entry for the source address, then a new record is created
associating the address with the port it was learned on. If an entry for the source address already exists in
the table, a new one is not created.
Packets are also filtered to determine if the source and destination address are on the same LAN segment.
If the destination address is not found in the MAC address table, then the packet is forwarded to all other
switches that are connected to the same LAN. If the MAC address table does contain a matching entry for
the destination address, then there is no need to forward the packet to the rest of the network.
In This Chapter
This chapter describes how to manage source learning entries in the switch MAC address table (often
referred to as the forwarding or filtering database) through the Command Line Interface (CLI). CLI
commands are used in the configuration examples; for more details about the syntax of commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• “Using Static MAC Addresses” on page 3-5.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 3-1
Source Learning Specifications Managing Source Learning
page 3-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Source Learning Sample MAC Address Table Configuration
Note. Optional. Creating a static MAC address involves specifying an address that is not already used in
another static entry or already dynamically learned by the switch. To determine if the address is already
known to the MAC address table, enter show mac-address-table. If the address does not appear in the
show mac-address-table output, then it is available to use for configuring a static MAC address entry.
For example,
-> show mac-address-table
Legend: Mac Address: * = address not valid
The show mac-address-table command is also useful for monitoring general source learning activity and
verifying dynamic VLAN assignments of addresses received on mobile ports.
1 Create VLAN 200, if it does not already exist, using the following command:
2 Assign switch ports 2 through 5 on slot 3 to VLAN 200–if they are not already associated with VLAN
200–using the following command:
-> vlan 200 port default 3/2-5
3 Create a static MAC address entry using the following command to assign address 002D95:5BF30E to
port 3/4 associated with VLAN 200 and to specify a permanent management status for the static address:
-> mac-address-table permanent 00:2d:95:5B:F3:0E 3/4 200
4 Change the MAC address aging time to 1200 seconds (the default is 300 seconds) using the following
command:
-> mac-address-table aging-time 1200
Note. Optional. To verify the static MAC address configuration, enter show mac-address-table. For
example:
-> show mac-address-table
Legend: Mac Address: * = address not valid
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 3-3
Sample MAC Address Table Configuration Managing Source Learning
To verify the new aging time value, enter show mac-address-table aging-time. For example,
page 3-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Source Learning MAC Address Table Overview
• The specified slot/port must already belong to the specified VLAN. Use the vlan port default
command to assign a port to a VLAN before you configure the static MAC address.
• Only traffic from other ports associated with the same VLAN is directed to the static MAC address
slot/port.
• Static MAC addresses are permanent addresses. This means that a static MAC address remains in use
even if the MAC ages out or the switch is rebooted.
• There are two types of static MAC address behavior supported: bridging (default) or filtering. Enter
filtering to set up a denial of service to block potential hostile attacks. Traffic sent to or from a filtered
MAC address is dropped. Enter bridging for regular traffic flow to or from the MAC address. For
more information about Layer 2 filtering, see Chapter 36, “Configuring QoS.”
• If a packet received on a port associated with the same VLAN contains a source address that matches a
static MAC address, the packet is discarded. The same source address on different ports within the
same VLAN is not supported.
• If a static MAC address is configured on a port link that is down or disabled, an asterisk appears to the
right of the MAC address in the show mac-address-table command display. The asterisk indicates
that this is an invalid MAC address. When the port link comes up, however, the MAC address is then
considered valid and the asterisk no longer appears next to the address in the display.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 3-5
Using Static MAC Addresses Managing Source Learning
Since permanent and bridging options for a static MAC are default settings, it is not necessary to enter
them as part of the command.
Use the no form of this command to clear MAC address entries from the table. If the MAC address status
type (permanent or learned) is not specified, then only permanent addresses are removed from the table.
The following example removes a MAC address entry that is assigned on port 2 of slot 3 for VLAN 855
from the MAC address table:
-> no mac-address-table 00:00:02:CE:10:37 3/2 855
If a slot/port and VLAN ID are not specified when removing MAC address table entries, then all MACs
defined with the specified status are removed. For example, the following command removes all learned
MAC addresses from the table, regardless of their slot/port or VLAN assignments:
-> no mac-address-table learned
To verify static MAC address configuration and other table entries, use the show mac-address-table
command. For more information about this command, see the OmniSwitch AOS Release 6 CLI Reference
Guide.
For more information about configuring a link aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation” and Chapter 10, “Configuring Dynamic Link Aggregation.”
page 3-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Source Learning Using Static Multicast MAC Addresses
01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF
01:80:C2:XX.XX.XX
33:33:XX:XX:XX:XX
• Configuring static multicast addresses is only supported on non-mobile ports.
• In addition to configuring the same static multicast address for multiple ports within a given VLAN, it
is also possible to use the same multicast address across multiple VLANs.
• The specified port or link aggregate ID must already belong to the specified VLAN. Use the
vlan port default command to assign a port or link aggregate to a VLAN before you configure the
static multicast address.
To assign a multicast address to more than one port, enter a range of ports and/or multiple port entries on
the same command line separated by a space. For example, the following command assigns the multicast
address 01:25:9a:5c:2f:10 to port 1/24 and ports 2/1 through 2/6 in VLAN 20:
-> mac-address-table static-multicast 01:25:9a:5c:2f:10 1/24 2/1-6 20
Use the no form of the mac-address-table static-multicast command to delete static multicast MAC
address entries. For example, the following command deletes a static multicast address that is assigned to
port 2 on slot 3 for VLAN 855:
-> no mac-address-table static-multicast 01:00:02:CE:10:37 3/2 855
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 3-7
Using Static Multicast MAC Addresses Managing Source Learning
If a a MAC address, slot/port and VLAN ID are not specified with this form of the command, then all
static multicast addresses are deleted. For example, the following command deletes all static MAC
addresses, regardless of their slot/port or VLAN assignments:
-> no mac-address-table static-multicast
To verify the static MAC address configuration and other table entries, use the show mac-address-table
and show mac-address-table static-multicast commands. For more information about these commands,
see the OmniSwitch AOS Release 6 CLI Reference Guide.
For more information about configuring a link aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation” and Chapter 10, “Configuring Dynamic Link Aggregation.”
ASCII-File-Only Syntax
When a static multicast MAC address is configured and saved (typically through the snapshot or write
memory commands), the mac-address-table static-multicast command captured in the ASCII text file or
boot.cfg file includes an additional group parameter. This parameter indicates the number of the
multicast group that the switch has assigned to the multicast MAC address for the given VLAN
association. For example:
-> mac-address-table static-multicast 01:25:9a:5c:2f:10 1/24 2/1-6 20 group 1
In this example, the multicast MAC address, 01:25:9a:5c:2f:10, is associated with ports 1/24 and 2/1
through 2/6 in VLAN 20. The additional group parameter value shown in the example indicates that the
switch assigns the multicast-VLAN association created with the mac-address-table static-multicast to
multicast group one.
Note that if the port assigned to a multicast MAC address is down or administratively disabled when the
configuration snapshot or write memory command is used, the multicast MAC address is not saved to
the resulting ASCII file or boot.cfg file.
Each multicast MAC address association with a VLAN is treated as a unique instance and is assigned a
multicast group number specific to that instance. This is also the case when the same multicast address is
associated with more than one VLAN; each VLAN association is assigned a multicast group number even
though the MAC address is the same for each instance.
page 3-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Source Learning Configuring MAC Address Table Aging Time
A MAC address learned on any VLAN port ages out if the time since a packet with that address was last
seen on the port exceeds 1200 seconds.
Note. An inactive MAC address may take up to twice as long as the aging time value specified to age out
of the MAC address table. For example, if an aging time of 60 seconds is specified, the MAC ages out any
time between 60 and 120 seconds of inactivity.
When using the mac-address-table aging-time command in a switch configuration file (for example,
boot.cfg), include an instance of this command specifying the VLAN ID for each VLAN configured on
the switch. This is necessary even though all VLANs have the same aging time value.
To set the aging time back to the default value, use the no form of the mac-address-table aging-time
command. For example, the following sets the aging time for all VLANs back to the default of 300
seconds:
-> no mac-address-table aging-time
Note. The MAC address table aging time is also used as the timeout value for the Address Resolution
Protocol (ARP) table. This timeout value determines how long the switch retains dynamically learned
ARP table entries. See Chapter 21, “Configuring IP,” for more information.
To display the aging time value for one or all VLANs, use the show mac-address-table aging-time
command. For more information about this command, see the OmniSwitch AOS Release 6 CLI Reference
Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 3-9
Configuring the Source Learning Status Managing Source Learning
To enable the source learning status for a port or link aggregate, use the source-learning command with
the enable option. For example:
Disabling source learning on a port or link aggregate is useful on a ring configuration, where a switch
within the ring does not need to learn the MAC addresses that the same switch is forwarding to another
switch within the ring,. This functionality is also useful in Transparent LAN Service configurations, where
the service provider device does not need to learn the MAC addresses of the customer network.
Configuring the source learning status is not allowed on the following types of switch ports:
• Mobile ports, including 802.1X ports (802.1X is enabled on mobile ports only).
• Ports enabled with Learned Port Security (LPS).
• Member ports of a link aggregate.
Consider the following guidelines when changing the source learning status for a port or link aggregate:
• Disabling source learning on a link aggregate disables MAC address learning on all member ports of
the link aggregate.
• MAC addresses dynamically learned on a port or aggregate are cleared when source learning is
disabled.
• Statically configured MAC addresses are not cleared when source learning is disabled for the port or
aggregate. In addition, configuring a new static MAC address is allowed even when source learning is
disabled.
page 3-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Source Learning Increasing the MAC Address Table Size
Note. All three of the above configuration steps are required to enable or disable the distributed MAC
mode. If any of the above steps are skipped, the status of the mode is not changed.
The following limitations apply when the switch is operating in the distributed MAC source learning
mode:
• MAC addresses learned on link aggregates are still synchronized across all NIs.
• Link aggregates have to span the same ASIC. This usually means the same NI, with the exception of
the U6-XNI where the first three ports are on one ASIC while the other three ports are on a separate
ASIC.
Note that increasing the maximum number of learned MAC addresses allowed is not supported on
OmniSwitch 6400 and 6855 switches.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 3-11
Displaying Source Learning Information Managing Source Learning
show mac-address-table Displays a list of all MAC addresses known to the MAC address
table, including static MAC addresses.
show mac-address-table static- Displays a list of all static multicast MAC addresses known to the
multicast MAC address table. Note that only static multicast addresses
assigned to ports that are up and enabled are displayed with this
command.
show mac-address-table count Displays a count of the different types of MAC addresses (learned,
permanent, reset, and timeout). Also includes a total count of all
addresses known to the MAC address table.
show mac-address-table aging-time Displays the current MAC address aging timer value by switch or
VLAN.
show source-learning chassis- Displays the current status of the distributed MAC source learning
distributed mode.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide. An example of the output for the show mac-address-table and show mac-
address-table aging-time commands is also given in “Sample MAC Address Table Configuration” on
page 3-3.
page 3-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
4 Configuring VLANs
In a flat bridged network, a broadcast domain is confined to a single LAN segment or even a specific
physical location, such as a department or building floor. In a switch-based network, such as one
comprised of Alcatel-Lucent switching systems, a broadcast domain—or VLAN— can span multiple
physical switches and can include ports from a variety of media types. For example, a single VLAN could
span three different switches located in different buildings and include 10/100 Ethernet, Gigabit Ethernet,
802.1q tagged ports and/or a link aggregate of ports.
In This Chapter
This chapter describes how to define and manage VLAN configurations through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• “Creating/Modifying VLANs” on page 4-5.
For information about statically and dynamically assigning switch ports to VLANs, see Chapter 5,
“Assigning Ports to VLANs.”
For information about defining VLAN rules that allow dynamic assignment of mobile ports to a VLAN,
see Chapter 45, “Defining VLAN Rules.”
For information about Spanning Tree, see Chapter 8, “Configuring Spanning Tree Parameters.”
For information about routing, see Chapter 21, “Configuring IP.”
For information about Layer 2 VLAN authentication, see Chapter 44, “Configuring Authenticated
VLANs.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 4-1
VLAN Specifications Configuring VLANs
VLAN Specifications
Note that the maximum limit values provided in the following Specifications table are subject to available
system resources:
VLAN Defaults
Parameter Description Command Default
VLAN identifier (VLAN ID) vlan VLAN 1 predefined on each
switch.
VLAN administrative state vlan Enabled
VLAN description vlan name VLAN identifier (VLAN ID)
VLAN Spanning Tree state vlan stp Enabled (Disabled if VLAN
count exceeds 254)
VLAN mobile tag status vlan mobile-tag Disabled
VLAN IP router interface ip interface VLAN 1 router interface.
VLAN authentication status vlan authentication Disabled
VLAN port associations vlan port default All ports initially associated
with default VLAN 1.
page 4-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLANs Sample VLAN Configuration
Note. Optional. Creating a new VLAN involves specifying a VLAN ID that is not already assigned to an
existing VLAN. To determine if a VLAN already exists in the switch configuration, enter show vlan. If
VLAN 255 does not appear in the show vlan output, then it does not exist on the switch. For example:
1 Create VLAN 255 with a description (e.g., Finance IP Network) using the following command:
2 Define an IP router interface using the following command to assign an IP host address of 21.0.0.10 to
VLAN 255 that will enable routing of VLAN traffic to other subnets:
-> ip interface vlan-255 address 21.0.0.10 vlan 255
3 Assign switch ports 2 through 4 on slot 3 to VLAN 255 using the following command:
Note. Optional. To verify the VLAN 255 configuration, use the show vlan command. For example:
To verify that ports 3/2-4 were assigned to VLAN 255, use the show vlan port command. For example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 4-3
VLAN Management Overview Configuring VLANs
• Enabling or disabling classification of mobile port traffic by 802.1Q tagged VLAN ID.
• Enabling or disabling unique MAC address assignments for each router VLAN defined.
In addition to the above tasks, VLAN management software tracks and reports the following information
to other switch software applications:
• VLAN configuration changes, such as adding or deleting VLANs, modifying the status of VLAN prop-
erties (e.g., administrative, Spanning Tree, and authentication status), changing the VLAN description,
or configuring VLAN router interfaces.
• VLAN port associations triggered by VLAN management and other switch software applications, such
as 802.1Q VLAN tagging and dynamic mobile port assignment.
• The VLAN operational state, which is inactive until at least one active switch port is associated with
the VLAN.
page 4-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLANs Creating/Modifying VLANs
Creating/Modifying VLANs
The initial configuration for all Alcatel-Lucent switches consists of a default VLAN 1 and all switch ports
are initially assigned to this VLAN. When a switching module is added to the switch, the module’s physi-
cal ports are also assigned to VLAN 1. If additional VLANs are not configured on the switch, then the
entire switch is treated as one large broadcast domain. All ports will receive all traffic from all other ports.
Up to 4094 VLANs are supported per switch, including default VLAN 1. In compliance with the IEEE
802.1Q standard, each VLAN is identified by a unique number, referred to as the VLAN ID. The user
specifies a VLAN ID to create, modify or remove a VLAN and to assign switch ports to a VLAN. When a
packet is received on a port, the port’s VLAN ID is inserted into the packet. The packet is then bridged to
other ports that are assigned to the same VLAN ID. In essence, the VLAN broadcast domain is defined by
a collection of ports and packets assigned to its VLAN ID.
The operational status of a VLAN remains inactive until at least one active switch port is assigned to the
VLAN. This means that VLAN properties, such as Spanning Tree or router interfaces, also remain inac-
tive. Ports are considered active if they are connected to an active network device. Non-active port assign-
ments are allowed, but do not change the VLAN’s operational state.
Ports are either statically or dynamically assigned to VLANs. When a port is assigned to a VLAN, a
VLAN port association (VPA) is created and tracked by VLAN management switch software. For more
information about VPAs, see “Defining VLAN Port Assignments” on page 4-7 and Chapter 5, “Assigning
Ports to VLANs.”
Adding/Removing a VLAN
To add a VLAN to the switch configuration, enter vlan followed by a unique VLAN ID number between
2 and 4094, an optional administrative status, and an optional description. For example, the following
command creates VLAN 755 with a description:
-> vlan 755 enable name “IP Finance Network”
By default, administrative status and Spanning Tree are enabled when the VLAN is created and the VLAN
ID is used for the description if one is not specified. Note that quotation marks are required if the descrip-
tion contains multiple words separated by spaces. If the description consists of only one word or multiple
words separated by another character, such as a hyphen, then quotes are not required.
You can also specify a range of VLAN IDs with the vlan command. Use a hyphen to indicate a contigu-
ous range and a space to separate multiple VLAN ID entries. For example, the following command creates
VLANs 10 through 15, 100 through 105, and VLAN 200 on the switch:
-> vlan 10-15 100-105 200 name “Marketing Network”
To remove a VLAN from the switch configuration, use the no form of the vlan command.
-> no vlan 755
-> no vlan 100-105
-> no vlan 10-15 200
When a VLAN is deleted, any router interfaces defined for the VLAN are removed and all VLAN port
associations are dropped. For more information about VLAN router interfaces, see “Configuring VLAN
Router Interfaces” on page 4-11.
Note that up to 253 Spanning Tree instances per switch are supported in the 1x1 Spanning Tree mode.
Since each VLAN with Spanning Tree enabled uses one of these instances, only 253 VLANs can have an
active Spanning Tree instance at any given time.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 4-5
Creating/Modifying VLANs Configuring VLANs
To create more than 253 VLANs on a switch running in the 1x1 Spanning Tree mode, use the vlan stp
disable, vlan 1x1 stp disable, or vlan flat stp disable command to create a VLAN with Spanning Tree
disabled. See “Enabling/Disabling Spanning Tree for a VLAN” on page 4-10 for more information.
To view a list of VLANs already configured on the switch, use the show vlan command. See “Verifying
the VLAN Configuration” on page 4-14 for more information.
When the administrative status for a VLAN is disabled, VLAN port assignments are retained but traffic is
not forwarded on these ports. If any rules were defined for the VLAN, they are also retained and continue
to classify mobile port traffic. See Chapter 45, “Defining VLAN Rules,” for more information.
Note that quotation marks are required if the description consists of multiple words separated by spaces. If
the description consists of only one word or words are separated by another character, such as a hyphen,
then quotes are not required. For example,
-> vlan 455 name Marketing-IP-Network
page 4-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLANs Defining VLAN Port Assignments
All ports initially belong to default VLAN 1. When the vlan port default command is used, the port’s
default VLAN assignment is changed to the specified VLAN. In the above example, VLAN 955 is now
the default VLAN for port 5 on slot 2 and this port is no longer associated with VLAN 1.
The vlan port default command is also used to change the default VLAN assignment for an aggregate of
ports. The link aggregate control number is specified instead of a slot and port. For example, the follow-
ing command assigns link aggregate 10 to VLAN 755:
-> vlan 755 port default 10
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
Use the no form of the vlan port default command to remove a default VPA. When this is done, VLAN 1
is restored as the port’s default VLAN.
-> vlan 955 no port default 2/5
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 4-7
Defining VLAN Port Assignments Configuring VLANs
1 Use the vlan port mobile command to enable mobility on switch ports that will participate in dynamic
VLAN assignment. See Chapter 5, “Assigning Ports to VLANs,”for detailed procedures.
2 Enable/disable mobile port properties that determine mobile port behavior. See Chapter 5, “Assigning
Ports to VLANs,” for detailed procedures.
3 Create VLANs that will receive and forward mobile port traffic. See “Adding/Removing a VLAN” on
page 4-5 for more information.
4 Configure the method of traffic classification (VLAN rules or tagged VLAN ID) that will trigger
dynamic assignment of mobile ports to the VLANs created in Step 3. See “Configuring VLAN Rule Clas-
sification” on page 4-8 and “Enabling/Disabling VLAN Mobile Tag Classification” on page 4-9.
Once the above configuration steps are completed, dynamic VLAN assignment occurs when a device
connected to a mobile port starts to send traffic. This traffic is examined by switch software to determine
which VLAN should carry the traffic based on the type of classification, if any, defined for a particular
VLAN.
Note that VLAN mobile tag classification takes precedence over VLAN rule classification. If a mobile
port receives traffic that matches a VLAN rule and also has an 802.1Q VLAN ID tag for a VLAN with
mobile tagging enabled, the port is dynamically assigned to the mobile tag VLAN and not the matching
rule VLAN.
See Chapter 5, “Assigning Ports to VLANs,” and Chapter 45, “Defining VLAN Rules,” for more informa-
tion and examples of dynamic VLAN port assignment.
page 4-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLANs Defining VLAN Port Assignments
If a mobile port that is statically assigned to VLAN 10 receives an 802.1Q tagged packet with a VLAN ID
of 1525, the port and packet are dynamically assigned to VLAN 1525. In this case, the mobile port now
has a VLAN port association defined for VLAN 10 and for VLAN 1525. If a mobile port, however,
receives a tagged packet containing a VLAN ID tag of 224, the packet is discarded because the VLAN
mobile tag classification attribute is disabled on VLAN 224.
In essence, the VLAN mobile tag attribute provides a dynamic 802.1Q tagging capability. Mobile ports
can now receive and process 802.1Q tagged packets destined for a VLAN that has this attribute enabled.
This feature also allows the dynamic assignment of mobile ports to more than one VLAN at the same
time, as discussed in the above example.
VLAN mobile tagging differs from 802.1Q tagging as follows:
If 802.1Q tagging is required on a fixed (non-mobile) port, then the vlan 802.1q command is still used to
statically tag VLANs for the port. See Chapter 6, “Configuring 802.1Q,” for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 4-9
Enabling/Disabling Spanning Tree for a VLAN Configuring VLANs
Note the following when using the vlan stp command. For more information about the vlan stp command,
see the OmniSwitch AOS Release 6 CLI Reference Guide:
• If the VLAN ID specified with this command is that of a VLAN that does not exist, the VLAN is auto-
matically created.
• This command configures the VLAN STP status for both the 1x1 and flat Spanning Tree modes. Using
the 1x1 or flat parameter with this command, configures the STP status only for the mode specified by
the parameter.
• Up to 253 Spanning Tree instances per switch are supported in the 1x1 Spanning Tree mode. Since
each VLAN with Spanning Tree enabled uses one of these instances, only 253 VLANs can have an
active Spanning Tree instance at any given time.
• To create more than 253 VLANs on a switch running in the 1x1 Spanning Tree mode, use the vlan stp
disable, vlan 1x1 stp disable, or vlan flat stp disable form of this command to create a VLAN with
Spanning Tree disabled.
STP does not become operationally active on a VLAN unless the VLAN is operationally active, which
occurs when at least one active port is assigned to the VLAN. Also, STP is enabled/disabled on individual
ports. So even if STP is enabled for the VLAN, a port assigned to that VLAN must also have STP enabled.
See Chapter 8, “Configuring Spanning Tree Parameters.”
page 4-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLANs Enabling/Disabling VLAN Authentication
Once authentication is enabled on a VLAN, then only authenticated mobile port devices can join the
VLAN after completing the appropriate log-in process. To enable authentication on a mobile port, use the
vlan port authenticate command. For more information about mobile port commands and Layer 2
authentication for Alcatel-Lucent switches, see Chapter 5, “Assigning Ports to VLANs,” and Chapter 44,
“Configuring Authenticated VLANs.”
Disabling source learning on a VLAN will cause all traffic in that VLAN to be flooded as all traffic would
be considered unknown unicast.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 4-11
Configuring VLAN Router Interfaces Configuring VLANs
To determine the total number of VLANs configured on the switch, and the number of VLANs with IP
router interfaces configured, use the show vlan router mac status command. For more information about
this command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 4-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLANs Bridging VLANs Across Multiple Switches
1 Create a VLAN on each switch with the same VLAN ID number (e.g., VLAN 10).
2 If using mobile ports for end user device connections, define VLAN rules that will classify mobile port
traffic into the VLAN created in Step 1.
3 On each switch, assign the ports that will provide connections to other switches to the VLAN created
in Step 1.
4 On each switch, assign the ports that will provide connections to end user devices (e.g., workstations)
to the VLAN created in Step 1. (If using mobile ports, this step will occur automatically when the device
connected to the mobile port starts to send traffic.)
5 Connect switches and end user devices to the assigned ports.
The following diagram shows the physical configuration of an example VLAN bridging domain:
Switch B Switch C
138.0.0.3 138.0.0.4
2/2 3/10
VLAN 10 VLAN 10
2/3 3/9
2/10 3/2
VLAN 10 VLAN 10
2/9 3/1
VLAN 10 VLAN 10 VLAN 10 VLAN 10
3/8 3/3
Switch A Switch D
138.0.0.5
138.0.0.2
In the above diagram, VLAN 10 exists on all four switches and the connection ports between these
switches are assigned to VLAN 10. The workstations can communicate with each other because the ports
to which they are connected are also assigned to VLAN 10. It is important to note that connection cables
do not have to connect to the same port on each switch. The key is that the port must belong to the same
VLAN on each switch. To carry multiple VLANs between switches across a single physical connection
cable, use the 802.1Q tagging feature (see Chapter 6, “Configuring 802.1Q”).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 4-13
Verifying the VLAN Configuration Configuring VLANs
The connection between Switch C and D is shown with a broken line because the ports that provide this
connection are in a blocking state. Spanning Tree is active by default on all switches, VLANs and ports.
The Spanning Tree algorithm determined that if all connections between switches were active, a network
loop would exist that could cause unnecessary broadcast traffic on the network. The path between Switch
C and D was shut down to avoid such a loop. See Chapter 8, “Configuring Spanning Tree Parameters,” for
information about how Spanning Tree configures network topologies that are loop free.
The following diagram shows the same bridging domain example as seen by the end user workstations.
Because traffic between these workstations is bridged across physical switch connections within the
VLAN 10 domain, the workstations are basically unaware that the switches even exist. Each workstation
believes that the others are all part of the same VLAN, even though they are physically connected to
different switches.
VLAN 10
138.0.0.3
138.0.0.4
138.0.0.2
138.0.0.5
Creating a VLAN bridging domain across multiple switches and/or stacks of switches allows VLAN
members to communicate with each other, even if they are not connected to the same physical switch. This
is how a logical grouping of users can traverse a physical network setup without routing and is one of the
many benefits of using VLANs.
show vlan Displays a list of all VLANs configured on the switch and the status of
related VLAN properties (e.g., admin and Spanning Tree status and
router port definitions).
show vlan port Displays a list of VLAN port assignments.
show ip interface Displays VLAN IP router interface information.
show vlan router mac status Displays the current MAC router operating mode (single or multiple)
and VLAN router port statistics.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide. An example of the output for the show vlan and show vlan port commands is
also given in “Sample VLAN Configuration” on page 4-3.
page 4-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
5 Assigning Ports
to VLANs
Initially all switch ports are non-mobile (fixed) and are assigned to VLAN 1, which is also their
configured default VLAN. When additional VLANs are created on the switch, ports are assigned to the
VLANs so that traffic from devices connected to these ports is bridged within the VLAN domain. Switch
ports are either statically or dynamically assigned to VLANs.
Methods for statically assigning ports to VLANs include the following:
• Using the vlan port default command to define a new configured default VLAN for both non-mobile
(fixed) and mobile ports. (See “Statically Assigning Ports to VLANs” on page 5-4.)
• Using the vlan 802.1q command to define tagged VLANs for non-mobile ports. This method allows
the switch to bridge traffic for multiple VLANs over one physical port connection. (See Chapter 6,
“Configuring 802.1Q.”)
• Configuring ports as members of a link aggregate that is assigned to a configured default VLAN. (See
Chapter 9, “Configuring Static Link Aggregation,” and Chapter 10, “Configuring Dynamic Link
Aggregation.”)
Dynamic assignment applies only to mobile ports. When traffic is received on a mobile port, the packets
are classified using one of the following methods to determine VLAN assignment (see “Dynamically
Assigning Ports to VLANs” on page 5-4 for more information):
• Packet is tagged with a VLAN ID that matches the ID of another VLAN that has mobile tagging
enabled.
• Packet contents matches criteria defined in a VLAN rule.
Regardless of how a port is assigned to a VLAN, once the assignment occurs, a VLAN port association
(VPA) is created and tracked by VLAN management software on each switch.
In This Chapter
This chapter describes how to statically assign ports to a new default VLAN and configure mobile ports
for dynamic assignment through the Command Line Interface (CLI). CLI commands are used in the
configuration examples; for more details about the syntax of commands, see the OmniSwitch AOS Release
6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Statically assigning ports to VLANs on page 5-4.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-1
Port Assignment Specifications Assigning Ports to VLANs
page 5-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Sample VLAN Port Assignment
2 Assign switch ports 2 through 5 on slot 3 to VLAN 255 using the following command:
VLAN 255 is now the configured default VLAN for ports 2 through 5 on slot 3.
4 Disable the default VLAN parameter for mobile ports 3/4 and 3/5 using the following command:
With this parameter disabled, VLAN 255 will not carry any traffic received on 3/4 or 3/5 that does not
match any VLAN rules configured on the switch.
Note. Optional. To verify that ports 2 through 5 on slot 3 were assigned to VLAN 255, enter show vlan
followed by 255 then port. For example:
-> show vlan 255 port
port type status
--------+---------+--------------
3/2 default inactive
3/3 default inactive
3/4 default inactive
3/5 default inactive
To verify the mobile status of ports 4 and 5 on slot 3 and determine which mobile port parameters are
enabled, enter show vlan port mobile followed by a slot and port number. For example:
-> show vlan port mobile 3/4
Mobility : on,
Config Default Vlan: 255,
Default Vlan Enabled: off,
Default Vlan Perm : on,
Default Vlan Restore: on,
Authentication : off,
Ignore BPDUs : off
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-3
Statically Assigning Ports to VLANs Assigning Ports to VLANs
Port 3/2 is now assigned to VLAN 755 and no longer associated with VLAN 1. In addition, VLAN 755 is
now the new configured default VLAN for the port.
A configured default VLAN is the VLAN statically assigned to a port. Any time the vlan port default
command is used, the VLAN assignment is static and a new configured default VLAN is defined for the
port. This command is also the only way to change a non-mobile port VLAN assignment. In addition, non-
mobile ports can only retain one VLAN assignment, unlike mobile ports that can dynamically associate
with multiple VLANs. See “Dynamically Assigning Ports to VLANs” on page 5-4 for more information
about mobile ports.
Additional methods for statically assigning ports to VLANs include the following:
• Using the vlan 802.1q command to define tagged VLANs for non-mobile ports. This method allows
the switch to bridge traffic for multiple VLANs over one physical port connection. (See Chapter 6,
“Configuring 802.1Q,” for more information.)
• Configuring ports as members of a link aggregate that is assigned to a configured default VLAN. (See
Chapter 9, “Configuring Static Link Aggregation,” and Chapter 10, “Configuring Dynamic Link
Aggregation,” for more information.)
When a port is statically assigned to a VLAN, a VLAN port association (VPA) is created and tracked by
VLAN management software on each switch. To display a list of all VPAs, use the show vlan port
command. For more information, see “Verifying VLAN Port Associations and Mobile Port Properties” on
page 5-19.
page 5-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Dynamically Assigning Ports to VLANs
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-5
Dynamically Assigning Ports to VLANs Assigning Ports to VLANs
• VLANs 2, 3, and 4 are configured on the switch, each one has VLAN mobile tagging enabled.
OmniSwitch
VLAN 2
Mobile Tag Enabled
VLAN 4
Mobile Tag Enabled
VLAN 1
Default VLAN VLAN 3
Mobile Tag Enabled
As soon as the workstations start sending traffic, switch software checks the 802.1Q VLAN ID tag of the
frames and looks for a VLAN that has the same ID and also has mobile tagging enabled. Since the work-
stations are sending tagged packets destined for the mobile tag enabled VLANs, each port is assigned to
the appropriate VLAN without user intervention. As the diagram on page 5-7 shows,
• Port 1 is assigned to VLAN 2, because the workstation is transmitting tagged packets destined for
VLAN 2.
• Port 2 is assigned to VLAN 3 because the workstation is transmitting tagged packets destined for
VLAN 3.
• Port 3 is assigned to VLAN 4 because the workstation is transmitting tagged packets destined for
VLAN 4.
• All three ports, however, retain their default VLAN 1 assignment, but now have an additional VLAN
port assignment that carries the matching traffic on the appropriate rule VLAN.
page 5-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Dynamically Assigning Ports to VLANs
OmniSwitch
VLAN 2 VLAN 4
IP Network 130.0.0.0 IP Network 140.0.0.0
VLAN 1
Default VLAN
VLAN 3
IP Network 138.0.0.0
Dynamic VPA
Default VLAN
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-7
Dynamically Assigning Ports to VLANs Assigning Ports to VLANs
• Three additional VLANs are configured on the switch, each one has an IP network address rule defined
for one of the IP subnets.
page 5-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Dynamically Assigning Ports to VLANs
OmniSwitch
VLAN 2
IP Network 130.0.0.0
VLAN 4
IP Network 140.0.0.0
VLAN 1
Default VLAN VLAN 3
IP Network 138.0.0.0
As soon as the workstations start sending traffic, switch software checks the source subnet of the frames
and looks for a match with any configured IP network address rules. Since the workstations are sending
traffic that matches a VLAN rule, each port is assigned to the appropriate VLAN without user interven-
tion. As the diagram on page 5-10 shows,
• Port 1 is assigned to VLAN 2, because the workstation is transmitting IP traffic on network 130.0.0.0
that matches the VLAN 2 network address rule.
• Port 2 is assigned to VLAN 3 because the workstation is transmitting IP traffic on network 138.0.0.0
that matches the VLAN 3 network address rule.
• Port 3 is assigned to VLAN 4 because the workstation is transmitting IP traffic on network 140.0.0.0
that matches the VLAN 4 network address rule.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-9
Dynamically Assigning Ports to VLANs Assigning Ports to VLANs
OmniSwitch
VLAN 2 VLAN 4
IP Network 130.0.0.0 IP Network 140.0.0.0
VLAN 1
Default VLAN
VLAN 3
IP Network 138.0.0.0
Dynamic VPA
Default VLAN
1 Use the vlan port mobile command to enable mobility on switch ports that will participate in dynamic
VLAN assignment. See “Enabling/Disabling Port Mobility” on page 5-11 for detailed procedures.
2 Enable/disable mobile port properties that determine mobile port behavior. See “Configuring Mobile
Port Properties” on page 5-16 for detailed procedures.
3 Create VLANs that will receive and forward mobile port traffic. See Chapter 4, “Configuring VLANs,”
for more information.
4 Configure the method of traffic classification (VLAN rules or tagged VLAN ID) that will trigger
dynamic assignment of a mobile port to the VLANs created in Step 3. See “VLAN Rule Classification” on
page 5-8 and “VLAN Mobile Tag Classification” on page 5-5 for more information.
Once the above configuration steps are completed, dynamic VLAN assignment occurs when a device
connected to a mobile port starts to send traffic. This traffic is examined by switch software to determine
which VLAN must carry the traffic based on the type of classification, if any, defined for a particular
VLAN. See “Dynamically Assigning Ports to VLANs” on page 5-4 for more information and examples of
dynamic VLAN port assignment.
page 5-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Dynamically Assigning Ports to VLANs
To enable mobility on multiple ports, specify a range of ports and/or multiple slots.
-> vlan port mobile 4/1-5 5/12-20 6/10-15
Only Ethernet and gigabit Ethernet ports are eligible to become mobile ports. If any of the following
conditions are true, however, these ports are considered non-mobile ports and are not available for
dynamic VLAN assignment:
• The mobile status for the port is disabled (the default).
• Spanning Tree is active on the port and the BPDU ignore status is disabled for the port. (See “Ignoring
Bridge Protocol Data Units (BPDU)” on page 5-11 for more information.)
• The port is configured to mirror other ports.
Note. Mobile ports are automatically trusted ports regardless of the QoS settings. See Chapter 36,
“Configuring QoS,” for more information.
Use the show vlan port mobile command to display a list of ports that are mobile or are eligible to
become mobile. For more information about this command, see the OmniSwitch AOS Release 6 CLI
Reference Guide.
• Mobility remains off on the port even if the port’s link is disabled or disconnected. Rebooting the
switch, however, will restore the port’s original mobile status.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-11
Understanding Mobile Port Properties Assigning Ports to VLANs
When BPDU ignore is enabled and the mobile port receives a BPDU, the following occurs:
• The port retains its mobile status and remains eligible for dynamic VLAN assignment.
Note. Enabling BPDU ignore is not recommended. In specific cases where it is required, such as connect-
ing legacy networks to mobile port networks, make sure that ignoring BPDU on a mobile port will not
cause network loops to go undetected. Connectivity problems could also result if a mobile BPDU port
dynamically moves out of its configured default VLAN where it provides traffic flow to/from the network.
The following command enables mobility and BPDU ignore on port 8 of slot 3:
-> vlan port mobile 3/8 BPDU ignore enable
Enabling mobility on an active port that sends or receives BPDU (for example ports that connect two
switches and Spanning Tree is enabled on both the ports and their assigned VLANs) is not allowed. If
mobility is required on this type of port, enable mobility and the BPDU ignore parameter when the port is
not active.
The effects of enabling or disabling mobile port properties are described through the following diagrams:
• How Mobile Port Traffic that Does Not Match any VLAN Rules is Classified on page 5-14.
page 5-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Understanding Mobile Port Properties
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-13
Understanding Mobile Port Properties Assigning Ports to VLANs
OmniSwitch
Configured Default
VLAN 1
VLAN 3
If device traffic does not match any VLAN rules, then the default
VLAN property determines if the traffic is forwarded on the port’s
configured default VLAN (VLAN 1 in this example).
VLAN 3 VLAN 3
Device traffic that does not match any Device traffic that does not match
VLAN rules is forwarded on the mobile any VLAN rules is discarded.
port’s configured default VLAN.
How Mobile Port Traffic that Does Not Match any VLAN Rules is Classified
page 5-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Understanding Mobile Port Properties
Secondary Secondary
VLAN 3 VLAN 3
Why enable restore default VLAN? Why disable restore default VLAN?
Security. VLANs only contain mobile port VPAs are retained even when port traffic is
traffic that has recently matched rule criteria. idle for some time. When traffic resumes, it is
not necessary to relearn the same VPA again.
VPAs created from occasional network users Appropriate for devices that only send occa-
(for example, laptop) are not unnecessarily sional traffic.
retained.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-15
Understanding Mobile Port Properties Assigning Ports to VLANs
Command Description
vlan port default vlan Enables or disables forwarding of mobile port traffic on the port’s con-
figured default VLAN that does not match any existing VLAN rules.
vlan port default vlan restore Enables or disables the retention of VLAN port assignments when
mobile port traffic ages out.
vlan port authenticate Enables or disables authentication on a mobile port.
vlan port 802.1x Enables or disables 802.1X port-based access control on a mobile port.
Use the show vlan port mobile command to view the current status of these properties for one or more
mobile ports. See “Verifying VLAN Port Associations and Mobile Port Properties” on page 5-19 for more
information.
To enable or disable the configured default VLAN on multiple ports, specify a range of ports and/or multi-
ple slots.
-> vlan port 2/1-12 3/10-24 4/3-14 default vlan enable
Note. It is recommended that mobile ports with their default VLAN disabled must not share a VLAN with
any other types of ports (for example, mobile ports with default VLAN enabled or non-mobile, fixed
ports).
See “Understanding Mobile Port Properties” on page 5-12 for an overview and illustrations of how this
property affects mobile port behavior.
page 5-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Understanding Mobile Port Properties
To enable or disable default VLAN restore on multiple ports, specify a range of ports and/or multiple
slots.
-> vlan port 2/1-12 3/10-24 4/3-14 default vlan restore enable
Note the following when changing the restore default VLAN status for a mobile port:
• If a hub is connected to a mobile port, enabling default VLAN restore on that port is recommended.
• VLAN port rule assignments are exempt from the effects of the restore default VLAN status. See
Chapter 45, “Defining VLAN Rules,” for more information about using port rules to forward mobile
port traffic.
• When a mobile port link is disabled and then enabled, all secondary VPAs for that port are automati-
cally dropped regardless of the restore default VLAN status for that port. Switch ports are disabled
when a device is disconnected from the port, a configuration change is made to disable the port, or
switch power is turned off.
See “Understanding Mobile Port Properties” on page 5-12 for an overview and illustrations of how this
property affects mobile port behavior.
To enable or disable authentication on multiple ports, specify a range of ports and/or multiple slots.
-> vlan port 6/1-32 8/10-24 9/3-14 authenticate enable
Only mobile ports are eligible for authentication. If enabled, the mobile port participates in the Layer 2
authentication process supported by Alcatel-Lucent switches. This process restricts switch access at the
VLAN level. The user is required to enter a valid login ID and password before gaining membership to a
VLAN. For more information, see Chapter 44, “Configuring Authenticated VLANs.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-17
Understanding Mobile Port Properties Assigning Ports to VLANs
To enable or disable 802.1X on multiple ports, specify a range of ports and/or multiple slots.
-> vlan port 6/1-32 8/10-24 9/3-14 802.1x enable
-> vlan port 5/3-6 9/1-4 802.1x disable
Only mobile ports are eligible for 802.1X port-based access control. If enabled, the mobile port partici-
pates in the authentication and authorization process defined in the IEEE 802.1X standard and supported
by Alcatel-Lucent switches. For more information, see Chapter 41, “Configuring 802.1X.”
page 5-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Assigning Ports to VLANs Verifying VLAN Port Associations and Mobile Port Properties
show vlan port Displays a list of VLAN port assignments, including the type and status
for each assignment.
show vlan port mobile Displays the mobile status and current mobile parameter values for each
port.
Type Description
default The port was statically assigned to the VLAN using the vlan port default
command. The VLAN is now the port’s configured default VLAN.
qtagged The port was statically assigned to the VLAN using the vlan 802.1q com-
mand. The VLAN is a static secondary VLAN for the 802.1Q tagged port.
mobile The port is mobile and was dynamically assigned when traffic received on
the port matched VLAN criteria (VLAN rules or tagged VLAN ID). The
VLAN is a dynamic secondary VLAN assignment for the mobile port.
mirror The port is assigned to the VLAN because it is configured to mirror another
port that is assigned to the same VLAN. For more information about the
Port Mirroring feature, see Chapter 49, “Diagnosing Switch Problems.”
Status Description
inactive Port is not active (administratively disabled, down, or nothing connected to
the port) for the VPA.
blocking Port is active, but not forwarding traffic for the VPA.
forwarding Port is forwarding all traffic for the VPA.
filtering Mobile port traffic is filtered for the VPA; only traffic received on the port
that matches VLAN rules is forwarded. Occurs when a mobile port’s VLAN
is administratively disabled or the port’s default VLAN status is disabled.
Does not apply to fixed ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 5-19
Verifying VLAN Port Associations and Mobile Port Properties Assigning Ports to VLANs
The following example uses the show vlan port command to display VPA information for all ports in
VLAN 200:
-> show vlan 200 port
• VLAN 200 is a secondary VLAN for mobile port 5/11, which is currently forwarding traffic for this
VPA.
• VLAN 200 is an 802.1Q tagged VLAN for port 5/12, which is an active port but currently blocked
from forwarding traffic.
Another example of the output for the show vlan port command is also given in “Sample VLAN Port
Assignment” on page 5-3. For more information about the resulting display from this command, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
Note that the show vlan port mobile command only displays ports that are mobile or are eligible to
become mobile ports. For example, ports that are part of a link aggregate or are configured for 802.1Q
VLAN tagging are not included in the output of this command.
Another example of the output for the show vlan port mobile command is also given in “Sample VLAN
Port Assignment” on page 5-3. For more information about the resulting display from this command, see
the OmniSwitch AOS Release 6 CLI Reference Guide.
page 5-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
6 Configuring 802.1Q
802.1Q is the IEEE standard for segmenting networks into VLANs. 802.1Q segmentation is done by
adding a specific tag to a packet.
In this Chapter
This chapter describes the basic components of 802.1Q VLANs and how to configure them through the
Command Line Interface (CLI). The CLI commands are used in the configuration examples; for more
details about the syntax of commands, see “802.1Q Commands” in the OmniSwitch AOS Release 6 CLI
Reference Guide.
Configuration procedures described in this chapter include:
• Setting up an 802.1Q VLAN for a specific port. See “Enabling Tagging on a Port” on page 6-5.
• Setting up an 802.1Q VLAN for a link aggregation group. See “Enabling Tagging with Link Aggrega-
tion” on page 6-5.
• Configuring 802.1Q VLAN parameters. See “Configuring the Frame Type” on page 6-6.
For information on creating and managing VLANs, see Chapter 4, “Configuring VLANs.”
For information on creating and managing link aggregation groups, see Chapter 9, “Configuring Static
Link Aggregation” and Chapter 10, “Configuring Dynamic Link Aggregation.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 6-1
802.1Q Specifications Configuring 802.1Q
802.1Q Specifications
IEEE Specification Draft Standard P802.1Q/D11 IEEE Standards for
Local And Metropolitan Area Network: Virtual
Bridged Local Area Networks, July 30, 1998
Platforms Supported OmniSwitch 6400, 6855, 6850E, 9000E
Maximum Tagged VLANs per Port 4093
Maximum Untagged VLANs per Port One untagged VLAN per port.
Maximum VLAN Port Associations (VPA) 32768
per switch
Maximum 802.1Q VLAN port associations 2500 (OmniSwitch 6400)
per switch
Force Tag Internal Not configurable.
Note. Up to 4093 VLANs can be assigned to a tagged port or link aggregation group. However, each
assignment counts as a single VLAN port association. Once the maximum number of VLAN port associa-
tions is reached, no more VLANs can be assigned to ports. For more information, see the chapter titled
Chapter 5, “Assigning Ports to VLANs.”
page 6-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1Q 802.1Q Overview
802.1Q Overview
Alcatel-Lucent’s 802.1Q is an IEEE standard for sending frames through the network tagged with VLAN
identification. This chapter details procedures for configuring and monitoring 802.1Q tagging on a single
port in a switch or a link aggregation group in a switch.
802.1Q tagging is the IEEE version of VLANs. It is a method for segregating areas of a network into
distinct VLANs. By attaching a label or tag to a packet, the packet can be identified as being from a
specific area or identified as being destined for a specific area.
When enabling a tagged port, you will also need to specify whether only 802.1Q tagged traffic is allowed
on the port, or whether the port accepts both tagged and untagged traffic.
“Tagged” refers to four bytes of reserved space in the header of the packet. The four bytes of “tagging” are
broken down as follows: the first two bytes indicate whether the packet is an 802.1Q packet, and the next
two bytes carry the VLAN identification (VID) and priority.
On the ingress side, packets are classified in a VLAN. After classifying a packet, the switch adds an
802.1Q header to the packet. Egress processing of packets is done by the switch hardware. Packets have
an 802.1Q tag, which may be stripped off based on 802.1Q tagging/stripping rules.
If a port is configured to be a tagged port, then all the untagged traffic (including priority tagged or VLAN
0 traffic) received on the port will be dropped. You do not need to reboot the switch after changing the
configuration parameters.
Note. Priority tagged traffic or traffic from VLAN 0 is used for Quality of Service (QoS) functionality.
802.1Q views priority tagged traffic as untagged traffic.
Mobile ports can be configured to accept 802.1Q traffic by enabling the VLAN mobile tagging feature as
described in Chapter 4, “Configuring VLANs.”
The following diagram illustrates a simple network by using tagged and untagged traffic:
VLAN 1 VLAN 1
untagged untagged
Stack 1 Stack 2
port 4/3
VLAN 2 tagged VLAN 2
tagged port 2/1 tagged
tagged/
untagged
VLAN 3 VLAN 3
tagged tagged
Stack 1 and 2 have three VLANs, one for untagged traffic and two for tagged traffic. The ports connect-
ing Stack 1 and 2 are configured in such a manner that Port 4/3 will only accept tagged traffic, while Port
2/1 will accept both tagged and untagged traffic.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 6-3
802.1Q Overview Configuring 802.1Q
The port can only be assigned to one untagged VLAN (in every case, this will be the default VLAN). In
the example above the default VLAN is VLAN 1. The port can be assigned to as many 802.1Q VLANs as
necessary, up to 4093 per port or 32768 VLAN port associations.
For the purposes of Quality of Service (QoS), 802.1Q ports are always considered to be trusted ports. For
more information on QoS and trusted ports, see Chapter 36, “Configuring QoS.”
Alcatel-Lucent’s 802.1Q tagging is done at wire speed, providing high-performance throughput of tagged
frames.The procedures below use CLI commands that are thoroughly described in “802.1Q Commands” of
the OmniSwitch AOS Release 6 CLI Reference Guide.
page 6-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1Q Configuring an 802.1Q VLAN
The tagged port would now also be labeled port tag. Note that you must use quotes around the text
description.
The VLAN used to handle traffic on the tagged port must be created prior to using the vlan 802.1q
command. Creating a VLAN is described in Chapter 4, “Configuring VLANs.”
For more specific information, see the vlan 802.1q command section in the OmniSwitch AOS Release 6
CLI Reference Guide.
(For further information on creating link aggregation groups, see Chapter 9, “Configuring Static Link
Aggregation,” or Chapter 10, “Configuring Dynamic Link Aggregation.”)
To add tagging to a port or link aggregation group and label it with a text name enter the text identifica-
tion following the slot and port number or link aggregation group identification number. For example, to
enable tagging on link aggregation group 8 with a text name of agg port tag, enter the command in the
following manner:
-> vlan 5 802.1q 8 “agg port tag”
The tagged port would now also be labeled agg port tag. Note that you must use quotes around the text
description.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 6-5
Configuring an 802.1Q VLAN Configuring 802.1Q
To remove 802.1Q tagging from a selected port, use the same command as above with a no keyword
added, as shown:
-> vlan 5 no 802.1q 8
Note. The link aggregation group must be created first before it can be set to use 802.1Q tagging
For more specific information, see the vlan 802.1q command section in the OmniSwitch AOS Release 6
CLI Reference Guide.
To configure a port back to accepting both tagged and untagged traffic, use the same command with the all
keyword, as shown:
-> vlan 802.1q 3/4 frame type all
Note. If you configure a port to accept only VLAN-tagged frames, then any frames received on this port
that do not carry a VLAN identification (i.e., untagged frames or priority-tagged frames) will be discarded
by the ingress rules for this port. Frames that are not discarded by this ingress rule are classified and
processed according to the ingress rules for this port.
When a port is set to support both tagged and untagged traffic, multiple VLANs for 802.1Q traffic can be
added to the port, but only one VLAN can be used to support untagged traffic. The untagged traffic VLAN
will always be the port’s default VLAN.
Note. You cannot configure a link aggregation group to accept only tagged frames.
For more specific information, see the vlan 802.1q frame type command section in the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 6-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1Q Configuring an 802.1Q VLAN
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 6-7
Application Example Configuring 802.1Q
Application Example
In this section the steps to create 802.1Q connections between switches are shown.
The following diagram shows a simple network employing 802.1Q on both regular ports and link aggrega-
tion groups.
VLAN 1
Switch 2
(untagged)
VLAN 1 Stack 1
(untagged) Port 2/1
(tagged) VLAN 2
(tagged)
Port 1/1
VLAN 2
(untagged/
(tagged) tagged)
Ports VLAN 3
3/1, 3/2 (tagged)
Aggregate
Link 5
Ports
4/1, 4/2
VLAN 1
(untagged)
Stack 3
VLAN 3
(tagged)
The following sections show how to create the network illustrated above.
-> vlan 2
2 Set port 1/1 as a tagged port and assign it to VLAN 2 by entering the following:
page 6-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1Q Application Example
The following steps apply to Switch 2. They will attach port 2/1 to VLAN 2 and set the port to accept
802.1Q tagged traffic only:
1 Create VLAN 2 by entering vlan 2 as shown below (VLAN 1 is the default VLAN for the switch):
-> vlan 2
2 Set port 2/1 as a tagged port and assign it to VLAN 2 by entering the following:
3 Set port 2/1 to accept only tagged traffic by entering the following:
2 Assign ports 3/1 and 3/2 to static aggregate VLAN 5 by entering the following two commands:
-> vlan 3
4 Configure 802.1Q tagging with a tagging ID of 3 on link aggregation group 5 (on VLAN 3) by enter-
ing vlan 3 802.1q 5 as shown below:
-> vlan 3 802.1q 5
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 6-9
Verifying 802.1Q Configuration Configuring 802.1Q
The following steps apply to Stack 3. They will attach ports 4/1 and 4/2 as link aggregation group 5 to
VLAN 3.
1 Configure static link aggregation group 5 by entering the following:
2 Assign ports 4/1 and 4/2 to static link aggregation group 5 by entering the following two commands:
-> vlan 3
4 Configure 802.1Q tagging with a tagging ID of 3 on static link aggregation group 5 (on VLAN 3) by
entering the following:
-> vlan 3 802.1q 5
show 802.1q Displays 802.1Q tagging information for a single port or a link aggrega-
tion group.
For more information about the resulting display, see Chapter 6, “802.1Q Commands,” in the OmniSwitch
AOS Release 6 CLI Reference Guide.
page 6-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
7 Using 802.1Q 2005
Multiple Spanning Tree
The Alcatel-Lucent Multiple Spanning Tree (MST) implementation provides support for the Multiple
Spanning Tree Protocol (MSTP) as defined in the IEEE 802.1Q 2005 standard. In addition to the 802.1D
Spanning Tree Algorithm and Protocol (STP) and the 802.1w Rapid Spanning Tree Algorithm and
Protocol (RSTP), MSTP also ensures that there is always only one data path between any two switches for
a given Spanning Tree instance to prevent network loops.
MSTP is an enhancement to the 802.1Q Common Spanning Tree (CST), which is provided when an
Alcatel-Lucent switch is running in the flat Spanning Tree operating mode. The flat mode applies a single
spanning tree instance across all VLAN port connections on a switch. MSTP allows the configuration of
Multiple Spanning Tree Instances (MSTIs) in addition to the CST instance. Each MSTI is mapped to a set
of VLANs. As a result, flat mode can support the forwarding of VLAN traffic over separate data paths.
In addition to MSTP support, the STP and RSTP are still available in either the flat or 1x1 mode.
However, if using STP or RSTP in the flat mode, the single Spanning Tree instance per switch algorithm
applies.
In This Chapter
This chapter describes MST in general and how MSTP works on the switch. It provides information about
configuring MSTP through the Command Line Interface (CLI). For more details about the syntax of
commands, see the OmniSwitch AOS Release 6 CLI Reference Guide. For more information about
Spanning Tree
configuration commands as they apply to all supported protocols (STP, RSTP, and MSTP), see Chapter 8,
“Configuring Spanning Tree Parameters.”
The following topics are included in this chapter as they relate to the Alcatel-Lucent implementation of the
MSTP standard:
• “MST General Overview” on page 7-4.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-1
Spanning Tree Specifications Using 802.1Q 2005 Multiple Spanning Tree
page 7-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree Spanning Tree Port Parameter Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-3
MST General Overview Using 802.1Q 2005 Multiple Spanning Tree
• “What is the Common and Internal Spanning Tree Instance” on page 7-9.
page 7-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree MST General Overview
3/1 2/1
VLAN 100 VLAN 100
4/2 5/1
VLAN 200 VLAN 200
|| 5/2
4/8
• VLAN 100 and VLAN 200 are each associated with their own Spanning Tree instance.
• The connection between 3/1 and 2/1 is left in a forwarding state because it is part of the VLAN 100
Spanning Tree instance and is the only connection for that instance.
Note that if additional switches containing a VLAN 100 were attached to the switches in this diagram,
the 3/1 to 2/1 connection could also go into blocking if the VLAN 100 Spanning Tree instance
determines it is necessary to avoid a network loop.
• The connections between 4/8 and 5/2 and 4/2 and 5/1 are seen as redundant because they are both
controlled by the VLAN 200 Spanning Tree instance and connect to the same switches. The VLAN
200 Spanning Tree instance determines which connection provides the best data path and transitions
the other connection to a blocking state.
3/1 2/1
VLAN 100 VLAN 100
4/2 5/1
||
VLAN 200 VLAN 200
|| 5/2
4/8
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-5
MST General Overview Using 802.1Q 2005 Multiple Spanning Tree
3/1 2/1
VLAN 100 VLAN 100
CIST-0 CIST-0
4/2 5/1
VLAN 150 || VLAN 150
4/8 5/2
VLAN 200 || VLAN 200
MSTI-2 MSTI-2
2/12 3/6
VLAN 250 || VLAN 250
• VLANs 100 and 150 are not associated with an MSTI. By default they are controlled by the CIST
instance 0, which exists on every switch.
• VLANs 200 and 250 are associated with MSTI 2 so their traffic can traverse a path different from that
determined by the CIST.
• Ports are blocked the same way they were blocked in the flat mode STP/RSTP example; all port
connections are compared to each other across VLANs to determine which connection provides the
best path.
However, because VLANs 200 and 250 are associated to MSTI 2, it is possible to change the port path
cost for ports 2/12, 3/6, 4/8 and/or 5/2 so that they provide the best path for MSTI 2 VLANs, but do not
carry CIST VLAN traffic or cause CIST ports to transition to a blocking state.
Another alternative is to assign all VLANs to an MSTI, leaving no VLANs controlled by the CIST. As
a result, the CIST BPDU will only contain MSTI information.
See “Quick Steps for Configuring MSTIs” on page 7-16 for more information about how to direct VLAN
traffic over separate data paths using MSTP.
page 7-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree MST General Overview
Using MSTP has the following items in common with STP (802.1D) and RSTP (802.1w) protocols:
• Each protocol ensures one data path between any two switches within the network topology. This
prevents network loops from occurring while at the same time allowing for redundant path
configuration.
• Each protocol provides automatic reconfiguration of the network Spanning Tree topology in the event
of a connection failure and/or when a switch is added to or removed from the network.
• All three protocols are supported in the flat Spanning Tree operating mode.
• The flat mode CST instance automatically determines port states and roles across VLAN port and
MSTI associations. This is because the CST instance is active on all ports and only one BPDU is used
to forward information for all MSTIs.
• MSTP is based on RSTP.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-7
MST General Overview Using 802.1Q 2005 Multiple Spanning Tree
• VLAN to MSTI table–Generated when VLANs are associated with MSTIs. Identifies the VLAN to
MSTI mapping for the switch.
Switches that share the same values for the configuration attributes described above belong to the same
region. For example, in the diagram below:
• Switches A, B, and C all belong to the same region because they all are configured with the same
region name, revision level, and have the same VLANs mapped to the same MSTI.
• The CST for the entire network sees Switches A, B, and C as one virtual bridge that is running a single
Spanning Tree instance. As a result, CST blocks the path between Switch C and Switch E instead of
blocking a path between the MST region switches to avoid a network loop.
• The paths between Switch A and Switch C and the redundant path between Switch B and Switch C
were blocked as a result of the Internal Spanning Tree (IST) computations for the MST Region. See
“What is the Internal Spanning Tree (IST) Instance” on page 7-9 for more information.
Switch A Switch D
|| CST
IST
||
||
In addition to the attributes described above, the MST maximum hops parameter defines the number of
bridges authorized to propagate MST BPDU information. In essence, this value defines the size of the
region in that once the maximum number of hops is reached, the BPDU is discarded.
The maximum number of hops for the region is not one of the attributes that defines membership in the
region. See “Quick Steps for Configuring an MST Region” on page 7-14 for a tutorial on how to
configure MST region parameters.
page 7-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree MST General Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-9
MST Configuration Overview Using 802.1Q 2005 Multiple Spanning Tree
Explicit commands allow the configuration of a particular Spanning Tree instance independent of which
mode and/or protocol is currently active on the switch. The configuration, however, does not go active
until the switch is changed to the appropriate mode. For example, if the switch is running in the 1x1 mode,
the following explicit commands changes the MSTI 3 priority to 12288:
-> bridge msti 3 priority 12288
Even though the above command is accepted in the 1x1 mode, the new priority value does not take effect
until the switch mode is changed to flat mode.
Note that explicit commands using the cist and msti keywords are required to define an MSTP
configuration. Implicit commands are only allowed for defining STP or RSTP configurations.
page 7-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree MST Configuration Overview
Implicit commands resemble previously implemented Spanning Tree commands, but apply to the
appropriate instance based on the current mode and protocol that is active on the switch. For example, if
the 1x1 mode is active, the instance number specified with the following command implies a VLAN ID:
-> bridge 255 priority 16384
If the flat mode is active, the single flat mode instance is implied and thus configured by the command.
Since the flat mode instance is implied in this case, there is no need to specify an instance number. For
example, the following command configures the protocol for the flat mode instance:
-> bridge protocol mstp
Similar to previous releases, it is possible to configure the flat mode instance by specifying 1 for the
instance number (for example, bridge 1 protocol rstp). However, this is only available when the switch is
already running in the flat mode and STP or RSTP is the active protocol.
Note. When a snapshot is taken of the switch configuration, the explicit form of all Spanning Tree
commands is captured. For example, if the priority of MSTI 2 was changed from the default value to a
priority of 16384, then bridge msti 2 priority 16384 is the command captured to reflect this in the
snapshot file. In addition, explicit commands are captured for both flat and 1x1 mode configurations.
For more information about Spanning Tree configuration commands as they apply to all supported
protocols (STP, RSTP, and MSTP), see Chapter 8, “Configuring Spanning Tree Parameters.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-11
MST Interoperability and Migration Using 802.1Q 2005 Multiple Spanning Tree
page 7-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree MST Interoperability and Migration
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-13
Quick Steps for Configuring an MST Region Using 802.1Q 2005 Multiple Spanning Tree
Switch A Switch D
|| CST
IST
||
||
In order for switches A, B, and C in the above diagram to belong to the same MST region, they must all
share the same values for region name, revision level, and configuration digest (VLAN-to-MSTI
mapping).
The following steps are performed on each switch to define Alcatel-Lucent Marketing as the MST region
name, 2000 as the MST region revision level, map exiting VLANs to existing MSTIs, and 3 as the maxi-
mum hops value for the region:
1 Configure an MST Region name using the bridge mst region name command. For example:
2 Configure the MST Region revision level using the bridge mst region revision level command. For
example:
-> bridge mst region revision level 2000
page 7-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree Quick Steps for Configuring an MST Region
3 Map VLANs 100 and 200 to MSTI 2 and VLANs 300 and 400 to MSTI 4 using the bridge msti vlan
command to define the configuration digest. For example:
-> bridge msti 2 vlan 100 200
-> bridge msti 4 vlan 300 400
See “Quick Steps for Configuring MSTIs” on page 7-16 for a tutorial on how to create and map MSTIs
to VLANs.
4 Configure 3 as the maximum number of hops for the region using the bridge mst region max hops
command. For example:
-> bridge mst region max hops 3
Note. (Optional) Verify the MST region configuration on each switch with the show spantree mst region
command. For example:
-> show spantree mst region
Configuration Name : Alcatel Marketing,
Revision Level : 2000,
Configuration Digest : 0x922fb3f 31752d68 67fe1155 d0ce8380,
Revision Max hops : 3,
Cist Instance Number : 0
All switches configured with the exact same values as shown in the above example are considered
members of the Alcatel-Lucent Marketing MST region.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-15
Quick Steps for Configuring MSTIs Using 802.1Q 2005 Multiple Spanning Tree
3/1 2/1
VLAN 100 VLAN 100
CIST-0 CIST-0
4/2 5/1
VLAN 150 || VLAN 150
4/8 5/2
VLAN 200 || VLAN 200
MSTI-1 MSTI-1
2/12 3/6
VLAN 250 || VLAN 250
Switch A Switch B
Flat Mode MSTP Quick Steps Example
1 Change the Spanning Tree operating mode, if necessary, on Switch A and Switch B from 1x1 to flat
mode using the bridge mode command. For example:
-> bridge mode flat
Note that defining an MSTP configuration requires the use of explicit Spanning Tree commands, which
are available in both the flat and 1x1 mode. As a result, this step is optional. See “Using Spanning Tree
Configuration Commands” on page 7-10 for more information.
2 Change the Spanning Tree protocol to MSTP using the bridge protocol command. For example:
3 Create VLANs 100, 200, 300, and 400 using the vlan command. For example:
4 Assign switch ports to VLANs, as shown in the above diagram, using the vlan port default command.
For example, the following commands assign ports 3/1, 4/2, 4/8, and 2/12 to VLANs 100, 150, 200, and
250 on Switch A:
-> vlan 100 port default 3/1
-> vlan 150 port default 4/2
-> vlan 200 port default 4/8
-> vlan 250 port default 2/12
page 7-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree Quick Steps for Configuring MSTIs
The following commands assign ports 2/1, 5/1, 5/2, and 3/6 to VLANs 100, 150, 200, and 250 on
Switch B:
-> vlan 100 port default 2/1
-> vlan 150 port default 5/1
-> vlan 200 port default 5/2
-> vlan 250 port default 3/6
5 Create one MSTI using the bridge msti command. For example:
By default, all VLANs are associated with the CIST instance. As a result, VLANs 100 and 150 do not
require any configuration to map them to the CIST instance.
7 Configure the port path cost (PPC) for all ports on both switches associated with MSTI 1 to a PPC
value that is lower than the PPC value for the ports associated with the CIST instance using the bridge
msti path cost command. For example, the PPC for ports associated with the CIST instance is set to the
default of 200,000 for 100 MB connections. The following commands change the PPC value for ports
associated with the MSTI 1 to 20,000:
-> bridge msti 1 4/8 path cost 20,000
-> bridge msti 1 2/12 path cost 20,000
-> bridge msti 1 5/2 path cost 20,000
-> bridge msti 1 3/6 path cost 20,000
Note that in this example, port connections between VLANs 150, 200, and 250 on each switch initially
were blocked, as shown in the diagram on page 7-16. This is because in flat mode MSTP, each instance is
active on all ports resulting in a comparison of connections independent of VLAN and MSTI associations.
To avoid this and allow VLAN traffic to flow over separate data paths based on MSTI association, Step 7
of this tutorial configures a superior port path cost value for ports associated with MSTI 1. As a result,
MSTI 1 selects one of the data paths between its VLANs as the best path, rather than the CIST data paths,
as shown in the diagram on page 7-17.
3/1 2/1
VLAN 100 VLAN 100
CIST-0 CIST-0
4/2 5/1
VLAN 150 || VLAN 150
4/8 5/2
VLAN 200 VLAN 200
MSTI-1 MSTI-1
2/12 3/6
VLAN 250 || VLAN 250
Switch A Switch B
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-17
Quick Steps for Configuring MSTIs Using 802.1Q 2005 Multiple Spanning Tree
Note that of the two data paths available to MSTI 1 VLANs, one is still blocked because it is seen as
redundant for that instance. In addition, the CIST data path still remains available for CIST VLAN traffic.
Another solution to this scenario is to assign all VLANs to an MSTI, leaving no VLANs controlled by the
CIST. As a result, the CIST BPDU will only contain MSTI information. See “How MSTP Works” on
page 7-4 for more information.
page 7-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using 802.1Q 2005 Multiple Spanning Tree Verifying the MST Configuration
show spantree cist Displays the Spanning Tree bridge configuration for the flat mode Com-
mon and Internal Spanning Tree (CIST) instance.
show spantree msti Displays Spanning Tree bridge information for a Multiple Spanning
Tree Instance (MSTI).
show spantree cist ports Displays Spanning Tree port information for the flat mode Common and
Internal Spanning Tree (CIST) instance.
show spantree msti ports Displays Spanning Tree port information for a flat mode Multiple Span-
ning Tree Instance (MSTI).
show spantree mst region Displays the Multiple Spanning Tree (MST) region information for the
switch.
show spantree cist vlan-map Displays the range of VLANs associated with the flat mode Common
and Internal Spanning Tree (CIST) instance.
show spantree msti vlan-map Displays the range of VLANs associated with the specified Multiple
Spanning Tree Instance (MSTI).
show spantree map-msti Displays the Multiple Spanning Tree Instance (MSTI) that is associated
to the specified VLAN.
show spantree mst port Displays a summary of Spanning Tree connection information and
instance associations for the specified port or a link aggregate of ports.
For more information about the resulting displays from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 7-19
Verifying the MST Configuration Using 802.1Q 2005 Multiple Spanning Tree
page 7-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
8 Configuring Spanning Tree
Parameters
The Spanning Tree Algorithm and Protocol (STP) is a self-configuring algorithm that maintains a
loop-free topology and simultaneously provides a data path redundancy and network scalability. Based on
the IEEE 802.1D standard, the Alcatel-Lucent STP implementation distributes the Spanning Tree load
between the primary management module and the network interface modules.
In the case of a stack of switches, the STP load is distributed between the primary management switch and
other switches in the stack. This functionality improves network robustness by providing a Spanning Tree
that continues to respond to BPDUs (Bridge Protocol Data Unit) and port link up and down states in the
event of a failover to a backup management module or switch.
The Alcatel-Lucent distributed implementation also incorporates the following Spanning Tree features:
• Configures a physical topology into a single Spanning Tree to ensure that there is only one data path
between any two switches.
• Supports fault tolerance within the network topology. The Spanning Tree is configured again in the
event of a data path or bridge failure or when a new switch is added to the topology.
• Supports two Spanning Tree operating modes; flat (single STP instance per switch) and 1x1 (single
STP instance per VLAN). The 1x1 mode can be configured to interoperate with Cisco’s properiatary
Per VLAN Spanning Tree instance (PVST+).
• Supports four Spanning Tree Algorithms; 802.1D (STP), 802.1w (RSTP), 802.1Q 2005 (MSTP), and
RRSTP.
• Allows 802.1Q tagged ports and link aggregate logical ports to participate in the calculation of the STP
topology.
• Provides loop-guard security to prevent network loops caused due to inconsistencies in data traffic.
The Distributed Spanning Tree software is active on all switches by default. As a result, a loop-free
network topology is automatically calculated based on default Spanning Tree switch, VLAN, and port
parameter values. It is only necessary to configure Spanning Tree parameters to change how the topology
is calculated and maintained.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-1
In This Chapter Configuring Spanning Tree Parameters
In This Chapter
This chapter provides an overview about how Spanning Tree works and how to configure Spanning Tree
parameters through the Command Line Interface (CLI). CLI commands are used in the configuration
examples; for more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Refer-
ence Guide.
Configuration procedures described in this chapter include:
• Selecting the switch Spanning Tree operating mode (flat or 1x1) on page 8-12.
page 8-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Spanning Tree Specifications
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-3
Spanning Tree Bridge Parameter Defaults Configuring Spanning Tree Parameters
page 8-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Multiple Spanning Tree (MST) Region Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-5
Spanning Tree Overview Configuring Spanning Tree Parameters
page 8-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Spanning Tree Overview
During the process of calculating the Spanning Tree topology, each port on every bridge is assigned a port
role based on how the port and/or its bridge participates in the active Spanning Tree topology.
The following table provides a list of port role types and the port and/or bridge properties that the
Spanning Tree Algorithm examines to determine which role to assign to the port.
Note. The distinction between a backup port and an alternate port was introduced with the IEEE 802.1w
standard to help define rapid transition of an alternate port to a root port.
The role a port plays or potentially plays in the active Spanning Tree topology determines the
operating state of the port; discarding, learning, or forwarding. The port state is also configurable. You
can enable or disable the administrative status of a port and/or specify a forwarding or blocking state.
The Spanning Tree Algorithm only includes ports in its calculations that are operational (link is up) and
have an enabled administrative status. The following table compares and defines 802.1D and 802.1w port
states and their associated port roles:
STP Port State RSTP Port State Port State Definition Port Role
Disabled Discarding Port is down or administratively disabled Disabled
and is not included in the topology.
Blocking Discarding Frames are dropped, nothing is learned or Alternate, Backup
forwarded on the port. Port is temporarily
excluded from topology.
Learning Learning Port is learning MAC addresses that are seen Root, Designated
on the port and adding them to the bridge
forwarding table, but not transmitting any
data. Port is included in the active topology.
Forwarding Forwarding Port is transmitting and receiving data and is Root, Designated
included in the active topology.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-7
Spanning Tree Overview Configuring Spanning Tree Parameters
Once the Spanning Tree is calculated, there is only one root bridge, one designated bridge for each LAN,
and one root port on each bridge (except for the root bridge). Data travels back and forth between bridges
over forwarding port connections that form the best, non-redundant path to the root. The active topology
ensures that network loops do not exist.
Root ID The Bridge ID for the bridge that this bridge believes is the root.
Root Path Cost The sum of the Path Costs that lead from the root bridge to this bridge port.
The Path Cost is a configurable parameter value. The IEEE 802.1D standard specifies a
default value that is based on port speed. See “Configuring Port Path Cost” on
page 8-32 for more information.
Bridge ID An eight-byte hex value that identifies this bridge within the Spanning Tree. The first
two bytes contain a configurable priority value and the remaining six bytes contain a
bridge MAC address. See “Configuring the Bridge Priority” on page 8-20 for more
information.
Each switch chassis is assigned a dedicated base MAC address. This is the MAC
address that is combined with the priority value to provide a unique Bridge ID for the
switch. For more information about the base MAC address, see the appropriate
Hardware Users Guide for the switch.
Port ID A 16-bit hex value that identifies the bridge port that transmitted this BPDU. The first 4
bits contain a configurable priority value and the remaining 12 bits contain the physical
switch port number. See “Configuring Port Priority” on page 8-31 for more
information.
The sending and receiving of Configuration BPDU between switches participating in the bridged network
constitute the root bridge election; the best path to the root is determined and then advertised to the rest of
the network. BPDU provide enough information for the STP software running on each switch to
determine the following:
• Which bridge serves as the root bridge.
• The shortest path between each bridge and the root bridge.
• The port state (forwarding or discarding) for each bridge port based on the role the port plays in the
active Spanning Tree topology.
The following events trigger the transmitting and/or processing of BPDU in order to discover and
maintain the Spanning Tree topology:
• When a bridge first comes up, it assumes it is the root and starts transmitting Configuration BPDU on
all its active ports advertising its own bridge ID as the root bridge ID.
page 8-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Spanning Tree Overview
• When a bridge receives BPDU on its root port that contains more attractive information (higher
priority parameters and/or lower path costs), it forwards this information on to other LANs to which it
is connected for consideration.
• When a bridge receives BPDU on its designated port that contains information that is less attractive
(lower priority values and/or higher path costs), it forwards its own information to other LANs to
which it is connected for consideration.
STP evaluates BPDU parameter values to select the best BPDU based on the following order of
precedence:
1 The lowest root bridge ID (lowest priority value, then lowest MAC address).
3 If root path costs are equal, the bridge ID of the bridge sending the BPDU.
4 If all the previous three values tie, then the port ID (lowest priority value, then lowest port number).
When a topology change occurs, such as when a link goes down or a switch is added to the network, the
affected bridge sends Topology Change Notification (TCN) BPDU to the designated bridge for its LAN.
The designated bridge then forwards the TCN to the root bridge. The root then sends out a Configuration
BPDU and sets a Topology Change (TC) flag within the BPDU to notify other bridges that there is a
change in the configuration information. Once this change is propagated throughout the Spanning Tree
network, the root stops sending BPDU with the TC flag set and the Spanning Tree returns to an active,
stable topology.
Note. You can restrict the propagation of TCNs on a port. To restrict TCN propagation on a port, see
“Configuring STP Port Parameters” on page 8-27.
Loop-guard on OmniSwitch
STP relies on continuous reception or transmission of BPDUs based on the port role. The designated port
or primary port transmits BPDUs, and the non-designated ports receive BPDUs. When one of the
non-designated ports in a spanning tree network stop receiving BPDUs, then the STP conceives that the
network is loop free. However, when a non-designated (Alternate, Root, or Backup) port becomes
designated and moves to a forwarding state, this situation creates a loop in the network.
With Loop Guard, if a switch stops receiving BPDUs on a non-designated port, the switch places the port
into the STP loop-inconsistent blocking state thus preventing the occurence of loop in the network.
Loop-guard protects individual ports on per-port or per-VLAN basis. A port can have both roles:
• Designated
• Non-designated for mutually exclusive set of VLANs or MSTP-instances (in MSTP mode)
If loop-guard is enabled on the port, it does not affect the forward or blocking state for a designated port.
In case of BPDU timeout, if a loop-guard enabled port fails to receive 3 consecutive BPDUs, STP
converts the port explicitly to a blocked port.
When loop-guard is enabled, if a switch stops receiving BPDUs on a non-designated port, the switch
places the port into the STP loop-inconsistent blocking state.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-9
Spanning Tree Overview Configuring Spanning Tree Parameters
By default, loop-guard is disabled on all the switch ports. User can configure loop-guard on any port
irrespective of its STP state or role. However, the feature functions only on non-designated (Alternate,
Root, or Backup) STP ports.
Note.
• In the flat mode, as there is a single STP instance on all the VLANs, the loop-guard state of the ports is
same across all the VLANs on the switch.
• In MSTP mode, there is a single STP instance for each MSTI instance. In this case, loop-guard state of
port is same across all the VLANs of a given MSTP instance. Hence if a loop-guard error occurs on
any single port, it affects all the other ports related to the MSTI.
• In 1X1 mode, there is a single STP instance assigned for each VLAN. Hence if a loop-guard error
occurs on any single VLAN, it does not affect the other VLANs.
Topology Examples
The following diagram shows an example of a physical network topology that incorporates data path
redundancy to ensure fault tolerance. These redundant paths, however, create loops in the network
configuration. If a device connected to Switch A sends broadcast packets, Switch A floods the packets out
all of its active ports. The switches connected to Switch A in turn flood the broadcast packets out through
their active ports. Switch A eventually receives the same packets back and the cycle starts over again. This
causes severe congestion on the network, often referred to as a broadcast storm.
Switch D Switch C
Switch A
Switch B
The Spanning Tree Algorithm prevents network loops by ensuring that there is always only one active link
between any two switches. This is done by transitioning one of the redundant links into a blocking state,
leaving only one link actively forwarding traffic. If the active link goes down, then Spanning Tree
transitions one of the blocked links to the forwarding state to take over instead of the link that is disabled.
page 8-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Spanning Tree Overview
If a new switch is added to the network, the Spanning Tree topology is automatically recalculated to
include the monitoring of links to the new switch.
The following diagram shows the logical connectivity of the same physical topology as determined by the
Spanning Tree Algorithm:
Switch D Switch C
(Root Bridge)
2/3 PC=4 3/8
Bridge ID Bridge ID
10, 00:00:00:00:00:01 13, 00:00:00:00:00:04
2/2 PC=19 3/9
2/1
3/10
PC=19 PC=100
2/10 3/2
Bridge ID Bridge ID
11, 00:00:00:00:00:02 PC=19 12, 00:00:00:00:00:03
2/9 3/1
Switch A
(Designated Bridge) Switch B
In the above active Spanning Tree topology example, the following configuration decisions were made as
a result of calculations performed by the Spanning Tree Algorithm:
• Switch D is the root bridge because its bridge ID has a priority value of 10 (the lower the priority
value, the higher the priority the bridge has in the Spanning Tree). If all four switches had the same
priority, then the switch with the lowest MAC address in its bridge ID would become the root.
• Switch A is the designated bridge for Switch B, because it provides the best path for Switch B to the
root bridge.
• Port 2/9 on Switch A is a designated port, because it connects the LAN from Switch B to Switch A.
• All ports on Switch D are designated ports, because Switch D is the root and each port connects to a
LAN.
• Ports 2/10, 3/1, and 3/8 are the root ports for Switches A, B, and C, respectively, because they offer the
shortest path towards the root bridge.
• The port 3/9 connection on Switch C to port 2/2 on Switch D is in a discarding (blocking) state, as the
connection these ports provides is redundant (backup) and has a higher path cost value than the 2/3 to
3/8 connection between the same two switches. As a result, a network loop is avoided.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-11
Spanning Tree Operating Modes Configuring Spanning Tree Parameters
• The port 3/2 connection on Switch B to port 3/10 on Switch C is also in a discarding (blocking) state,
as the connection these ports provides has a higher path cost to root Switch D than the path between
Switch B and Switch A. As a result, a network loop is avoided.
The following diagram shows a flat mode switch with STP (802.1D) as the active protocol. All ports,
regardless of their default VLAN configuration or tagged VLAN assignments, are considered part of one
Spanning Tree instance. To see an example of a flat mode switch with MSTP (802.1s) as the active proto-
col, see Chapter 7, “Using 802.1Q 2005 Multiple Spanning Tree.”
page 8-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Spanning Tree Operating Modes
Flat STP
In the above example, if port 8/3 connects to another switch and port 10/5 connects to that same switch,
the Spanning Tree Algorithm would detect a redundant path and transition one of the ports into a blocking
state. The same holds true for the tagged ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-13
Spanning Tree Operating Modes Configuring Spanning Tree Parameters
The following diagram shows a switch running in the 1x1 Spanning Tree mode and shows Spanning Tree
participation for both fixed and tagged ports.
STP 2 STP 3
STP 4
Switch
Port 1/3 Port 1/5
Default VLAN 5 Default VLAN 10
VLAN 2 (tagged)
Port 2/5
Port 2/3
Default VLAN 2
Default VLAN 5
VLAN 10 (tagged)
In the above example, STP2 is a single Spanning Tree instance since VLAN 5 contains only fixed ports.
STP 3 and STP 4 are a combination of single and 802.1Q Spanning Tree instances because VLAN 2
contains both fixed and tagged ports. On ports where VLAN 2 is the default VLAN, BPDU are not tagged.
On ports where VLAN 2 is a tagged VLAN, BPDU are also tagged.
Note. In the flat Spanning Tree mode, both the OmniSwitch and Cisco switches can interoperate
seamlessly using the standard MSTP protocol.
page 8-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Spanning Tree Operating Modes
Configuration Overview
You can use the bridge mode 1x1 pvst+ command to globally enable the PVST+ interoperability mode
on an OmniSwitch:
-> bridge mode 1x1 pvst+ enable
To disable the PVST+ mode interoperability mode on an OmniSwitch, use the following command:
-> bridge mode 1x1 pvst+ disable
The bridge port pvst+ command is used to configure how a particular port handles BPDUs when
connecting to a Cisco switch.
You can use the bridge port pvst+ command with the enable option to configure the port to handle only
the PVST+ BPDUs and IEEE BPDUs for VLAN 1 (Cisco native VLAN for CST). For example:
-> bridge port 1/3 pvst+ enable
You can use the bridge port pvst+ command with the disable option to configure the port to handle only
IEEE BPDUs and to drop all PVST+ BPDUs. For example:
-> bridge port 1/3 pvst+ disable
You can use the bridge port pvst+ command with the auto option to configure the port to handle IEEE
BPDUs initially (disable state). Once a PVST+ BPDU is received, it then handles PVST+ BPDUs and
IEEE BPDUs for a Cisco native VLAN. For example:
-> bridge port 1/3 pvst+ auto
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-15
Spanning Tree Operating Modes Configuring Spanning Tree Parameters
• Send and receive tagged PVST+ BPDUs for other tagged VLANs
• Send and receive untagged PVST+ BPDUs for the default VLAN of the port
• Send and receive tagged PVST+ BPDUs for other tagged VLANs
page 8-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
• Both Cisco and an OmniSwitch support two default path cost modes; long or short. It is recommended
that the same default path cost mode be configured in the same way on all switches so that the path
costs for similar interface types are consistent when connecting ports between OmniSwitch and Cisco
Switches. For more information on path cost mode, refer “Configuring the Path Cost Mode” on
page 8-25.
• Dynamic aggregate link (LACP) functions properly between OmniSwitch and Cisco switches. The
Cisco switches send the BPDUs only on one physical link of the aggregate, similar to the OmniSwitch
Primary port functionality. The path cost assigned to the aggregate link is not the same between
OmniSwitch and Cisco switches since vendor-specific formulas are used to derive the path cost.
Manual configuration is recommended to match the Cisco path cost assignment for an aggregate link.
For more information on the configuration of path cost for aggregate links, refer “Path Cost for Link
Aggregate Ports” on page 8-34.
The table below shows the default Spanning Tree values.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-17
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
• If Spanning Tree is disabled on a VLAN, active ports associated with that VLAN are excluded from
Spanning Tree calculations and remains in a forwarding state.
• Note that when a switch is running in the flat mode, disabling Spanning Tree on VLAN 1 disables the
instance for all VLANs and all active ports are then excluded from any Spanning Tree calculations and
remains in a forwarding state.
To view current Spanning Tree bridge parameter values, use the bridge rrstp ring vlan-tag command.
For more information about this command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Note. Explicit commands using the cist and msti keywords are required to define an MSTP (802.1s)
configuration. Implicit commands are only allowed for defining STP or RSTP configurations. See
Chapter 7, “Using 802.1Q 2005 Multiple Spanning Tree,” for more information about these keywords and
using implicit and explicit commands.
The following is a summary of Spanning Tree bridge configuration commands. For more information
about these commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 8-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
Note. When a snapshot is taken of the switch configuration, the explicit form of all Spanning Tree
commands is captured. For example, if the bridge protocol for the flat mode instance was changed from
STP to MSTP, then bridge cist protocol mstp is the command syntax captured to reflect this in the
snapshot file. In addition, explicit commands are captured for both flat and 1x1 mode configurations.
The following sections provide information and procedures for using implicit bridge configuration
commands and also includes explicit command examples.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-19
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
Note that when configuring the protocol value for a VLAN instance, MSTP is not an available option. This
protocol is only supported on the flat mode instance.
In addition, the explicit bridge 1x1 protocol command configures the protocol for a VLAN instance
regardless of which mode (1x1 or flat) is active on the switch. For example, the following command also
changes the protocol for VLAN 455 to RSTP:
-> bridge 1x1 455 protocol rstp
To configure the protocol for the single flat mode instance when the switch is running in either mode (1x1
or flat), use the bridge protocol command but do not specify an instance number. This command config-
ures the flat mode instance by default, so an instance number is not needed, as shown in the following
example:
-> bridge protocol mstp
As in previous releases, it is possible to configure the flat mode instance with the bridge protocol
command by specifying 1 as the instance number (for example, bridge 1 protocol rstp). However, this is
only available when the switch is already running in the flat mode and STP or RSTP is the active protocol.
In addition, the explicit bridge cist protocol command configures the protocol for the flat mode instance
regardless of which mode (1x1 or flat) is active on the switch. For example, the following command
selects the RSTP protocol for the flat mode instance:
-> bridge cist protocol mstp
Note. Configuring a Spanning Tree bridge instance with a priority value that causes the instance to
become the root is recommended, instead of relying on the comparison of switch base MAC addresses to
determine the root.
If the switch is running in the 1x1 Spanning Tree mode, then a priority value is assigned to each VLAN
instance. If the switch is running in the flat Spanning Tree mode, the priority is assigned to the flat mode
instance or a Multiple Spanning Tree Instance (MSTI). In both cases, the default priority value assigned is
32768. Note that priority values for an MSTI must be multiples of 4096.
page 8-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
To change the bridge priority value for a VLAN instance, specify a VLAN ID with the bridge priority
command when the switch is running in the 1x1 mode. For example, the following command changes the
priority for VLAN 455 to 25590:
-> bridge 455 priority 25590
The explicit bridge 1x1 priority command configures the priority for a VLAN instance when the switch
is running in either mode (1x1 or flat). For example, the following command performs the same function
as the command in the previous example:
-> bridge 1x1 455 priority 25590
Note. If PVST+ mode is enabled on the switch, then the priority values can be assigned only in the
multiples of 4096 to be compatible with the Cisco MAC Reduction mode; any other values result in an
error message.
To change the bridge priority value for the flat mode instance, use either the bridge priority command or
the bridge cist priority command. Note that both commands are available when the switch is running in
either mode (1x1 or flat) and an instance number is not required. For example, the following commands
change the priority value for the flat mode instance to 12288:
-> bridge priority 12288
-> bridge cist priority 12288
As in previous releases, it is possible to configure the flat mode instance with the bridge protocol
command by specifying 1 as the instance number (for example, bridge 1 protocol rstp). However, this is
only available when the switch is already running in the flat mode and STP or RSTP is the active protocol.
The bridge priority value is also configurable for a Multiple Spanning Tree Instance (MSTI). To config-
ure this value for an MSTI, use the explicit bridge msti priority command and specify the MSTI ID for
the instance number and a priority value that is a multiple of 4096. For example, the following command
configures the priority value for MSTI 10 to 61440:
-> bridge msti 10 priority 61440
Note that when MSTP is the active flat mode protocol, explicit Spanning Tree bridge commands are
required to configure parameter values. Implicit commands are for configuring parameters when the STP
or RSTP protocols are in use. See Chapter 7, “Using 802.1Q 2005 Multiple Spanning Tree,” for more
information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-21
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
If the switch is running in the 1x1 Spanning Tree mode, then a hello time value is defined for each VLAN
instance. If the switch is running in the flat Spanning Tree mode, then a hello time value is defined for the
single flat mode instance. In both cases, the default hello time value used is 2 seconds.
To change the bridge hello time value for a VLAN instance, specify a VLAN ID with the bridge hello
time command when the switch is running in the 1x1 mode. For example, the following command
changes the hello time for VLAN 455 to 5 seconds:
-> bridge 455 hello time 5
The explicit bridge 1x1 hello time command configures the hello time value for a VLAN instance when
the switch is running in either mode (1x1 or flat). For example, the following command performs the same
function as the command in the previous example:
-> bridge 1x1 455 hello time 5
To change the bridge hello time value for the flat mode instance, use either the bridge hello time
command or the bridge cist hello time command. Note that both commands are available when the switch
is running in either mode (1x1 or flat) and an instance number is not required. For example, the following
commands change the hello time value for the flat mode instance to 12288:
-> bridge hello time 10
-> bridge cist hello time 10
As in previous releases, it is possible to configure the flat mode instance with the bridge hello time
command by specifying 1 as the instance number (for example, bridge 1 hello time 5). However, this is
only available when the switch is already running in the flat mode and STP or RSTP is the active protocol.
Note that the bridge hello time is not configurable for Multiple Spanning Tree Instances (MSTI). These
instances inherit the hello time from the flat mode instance (CIST).
page 8-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
The explicit bridge 1x1 max age command configures the max age time for a VLAN instance when the
switch is running in either mode (1x1 or flat). For example, the following command performs the same
function as the command in the previous example:
-> bridge 1x1 455 max age 10
To change the max age time value for the flat mode instance, use either the bridge max age command or
the bridge cist max age command. Note that both commands are available when the switch is running in
either mode (1x1 or flat) and an instance number is not required. For example, the following commands
change the max age time for the flat mode instance to 10:
-> bridge max age 10
-> bridge cist max age 10
As in previous releases, it is possible to configure the flat mode instance with the bridge max age
command by specifying 1 as the instance number (for example, bridge 1 max age 30). However, this is
only available when the switch is already running in the flat mode and STP or RSTP is the active protocol.
Note that the max age time is not configurable for Multiple Spanning Tree Instances (MSTI). These
instances inherit the max age time from the flat mode instance (CIST).
The explicit bridge 1x1 forward delay command configures the forward delay time for a VLAN instance
when the switch is running in either mode (1x1 or flat). For example, the following command performs
the same function as the command in the previous example:
-> bridge 1x1 455 forward delay 20
To change the forward delay time value for the flat mode instance, use either the bridge forward delay
command or the bridge cist forward delay command. Note that both commands are available when the
switch is running in either mode (1x1 or flat) and an instance number is not required. For example, the
following commands change the forward delay time for the flat mode instance to 10:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-23
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
As in previous releases, it is possible to configure the flat mode instance with the bridge forward delay
command by specifying 1 as the instance number (for example, bridge 1 forward delay 30). However,
this is only available when the switch is already running in the flat mode and STP or RSTP is the active
protocol.
Note that the forward delay time is not configurable for Multiple Spanning Tree Instances (MSTI). These
instances inherit the forward delay time from the flat mode instance (CIST).
Note. Make sure that disabling BPDU switching on a Spanning Tree disabled VLAN does not cause
network loops to go undetected.
Enabling/Disabling Loop-guard
By default, loop-guard is disabled on ports associated with VLANs that have Spanning Tree disabled. This
feature, when enabled prevents inconsistencies that cause network loops.
Use the bridge port loop-guard command to enable or disable loop-guard on a port or link aggregate.
Enter bridge followed by an existing VLAN ID (or VLAN 1 if using a flat Spanning Tree instance) then
loop-guard followed by enable or disable. For example, the following commands enable and disable
loop-guard switching on port 1/2 :
Note. Use the show spantree and related commands to view the loop-guard related information for
per-port, per-VLAN, CIST or MSTI instances.
page 8-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Bridge Parameters
Note. Cisco supports two default path cost modes: long or short just like in OmniSwitch 1x1
implementation. If you have configured PVST+ mode in the OmniSwitch, it is recommended that the
same default path cost mode must be configured in the same way in all the switches, so that, the path costs
for similar interface types is consistent when connecting ports between OmniSwitch and Cisco Switches.
VLAN 1 VLAN 1
4/2 5/1
802.1q tag
MSTI-1 VLAN 2 VLAN 2 MSTI-1
In the above diagram, port 4/2 is the Root port and port 5/1 is a Designated port for MSTI 1. AVC is not
enabled. If another link with the same speed and lower port numbers is added to default VLAN 1 on both
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-25
Configuring STP Bridge Parameters Configuring Spanning Tree Parameters
switches, the new link becomes the root for MSTI 1 and the tagged link between VLAN 2 is blocked, as
shown below:
3/1 2/1
VLAN 1 VLAN 1
||
4/2 802.1q tag 5/1
MSTI-1 VLAN 2 VLAN 2 MSTI-1
If AVC was enabled in the above example, AVC would have assigned the new link an infinite path cost
value that would make this link undesirable as the root for MSTI 1.
Balancing VLANs across links according to their Multiple Spanning Tree Instance (MSTI) grouping is
highly recommended to ensure that there is not a loss of connectivity during any possible topology
changes. Enabling AVC on the switch is another way to prevent undesirable ports from becoming the root
for an MSTI.
By default AVC is disabled on the switch. Use the bridge auto-vlan-containment command to globally
enable this feature for all MSTIs. Once AVC is globally enabled, then it is possible to disable AVC for
individual MSTIs using the same command. For example, the following commands globally enable AVC
and then disable it for MSTI 10:
-> bridge auto-vlan-containment enable
-> bridge msti 10 auto-vlan-containment disable
Note that an administratively set port path cost takes precedence and prevents AVC configuration of the
path cost. The exception to this is if the port path cost is administratively set to zero, which resets the path
cost to the default value. In addition, AVC does not have any effect on root bridges.
page 8-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Port Parameters
• Port state (forwarding or blocking) is dynamically determined by the Spanning Tree Algorithm, not
manually set.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-27
Configuring STP Port Parameters Configuring Spanning Tree Parameters
The following is a summary of Spanning Tree port configuration commands. For more information about
these commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 8-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Port Parameters
The following sections provide information and procedures for using implicit Spanning Tree port
configuration commands and also includes explicit command examples.
Note. When a snapshot is taken of the switch configuration, the explicit form of all Spanning Tree
commands is captured. For example, if the bridge protocol for the flat mode instance was changed from
STP to MSTP, then bridge cist protocol mstp is the command syntax captured to reflect this in the
snapshot file. In addition, explicit commands are captured for both flat and 1x1 mode configurations.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-29
Configuring STP Port Parameters Configuring Spanning Tree Parameters
The explicit bridge 1x1 command configures the priority for a VLAN instance when the switch is running
in either mode (1x1 or flat). For example, the following commands perform the same function as the
commands in the previous example:
-> bridge 1x1 10 8/1 enable
-> bridge 1x1 20 6/2 disable
To change the port Spanning Tree status for the flat mode instance, use either the bridge command or the
bridge cist command. Note that both commands are available when the switch is running in either mode
(1x1 or flat) and an instance number is not required. For example, the following commands disable the
Spanning Tree status on port 1/24 for the flat mode instance:
-> bridge 1/24 disable
-> bridge cist 1/24 disable
As in previous releases, it is possible to configure the flat mode instance with the bridge slot/port
command by specifying 1 as the instance number (for example, bridge 1 1/24 enable). However, this is
only available when the switch is already running in the flat mode and STP or RSTP is the active protocol.
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
page 8-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Port Parameters
The explicit bridge cist priority command configures the port priority value for a VLAN instance when
the switch is running in either mode (1x1 or flat). For example, the following command performs the same
function as the command in the previous example:
-> bridge 1x1 10 8/1 priority 3
To change the port priority value for the flat mode instance, use either the bridge priority command or
the bridge cist priority command. Note that both commands are available when the switch is running in
either mode (1x1 or flat) and an instance number is not required. For example, the following commands
change the priority value for port 1/24 for the flat mode instance to 15:
-> bridge 1/24 priority 15
-> bridge cist 1/24 priority 10
As in previous releases, it is possible to configure the flat mode instance with the bridge priority
command by specifying 1 as the instance number (for example, bridge 1 1/24 priority 15). However, this
is only available when the switch is already running in the flat mode and STP or RSTP is the active proto-
col.
The port priority value is also configurable for a Multiple Spanning Tree Instance (MSTI). To configure
this value for an MSTI, use the explicit bridge msti priority command and specify the MSTI ID for the
instance number. For example, the following command configures the priority value for port 1/12 for
MSTI 10 to 5:
-> bridge msti 10 1/12 priority 5
Note that when MSTP is the active flat mode protocol, explicit Spanning Tree bridge commands are
required to configure parameter values. Implicit commands are for configuring parameters when the STP
or RSTP protocols are in use. See Chapter 7, “Using 802.1Q 2005 Multiple Spanning Tree,” for more
information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-31
Configuring STP Port Parameters Configuring Spanning Tree Parameters
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
IEEE 802.1D
Link Speed
Recommended Value
10 MB 2,000,000
100 MB 200,000
1 GB 20,000
10 Gbps 2,000
Is a 16-bit path cost value is in use and the path_cost is set to zero, the following IEEE 802.1D
recommended default path cost values based on link speed are used:
IEEE 802.1D
Link Speed
Recommended Value
4 Mbps 250
10 Mbps 100
16 Mbps 62
100 Mbps 19
1 Gbps 4
10 Gbps 2
page 8-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Port Parameters
By default, Spanning Tree is enabled on a port and the path cost is set to zero. If the switch is running in
the 1x1 Spanning Tree mode, then the port path cost applies to the specified VLAN instance associated
with the port. If the switch is running in the flat Spanning Tree mode, then the port path cost applies across
all VLANs associated with the port. The flat mode instance is specified as the port’s instance, even if the
port is associated with other VLANs.
To change the port path cost value for a VLAN instance, specify a VLAN ID with the bridge path cost
command when the switch is running in the 1x1 mode. For example, the following command configures a
16-bit path cost value for port 8/1 for VLAN 10 to 19 (the port speed is 100 MB, 19 is the recommended
value).
-> bridge 10 8/1 path cost 19
The explicit bridge 1x1 path cost command configures the port path cost value for a VLAN instance
when the switch is running in either mode (1x1 or flat). For example, the following command performs
the same function as the command in the previous example:
-> bridge 1x1 10 8/1 path cost 19
To change the port path cost value for the flat mode instance, use either the bridge path cost command or
the bridge cist path cost command. Note that both commands are available when the switch is running in
either mode (1x1 or flat) and an instance number is not required. For example, the following commands
configure a 32-bit path cost value for port 1/24 for the flat mode instance to 20,000 (the port speed is 1
GB, 20,000 is the recommended value):
-> bridge 1/24 path cost 20000
-> bridge cist 1/24 path cost 20000
As in previous releases, it is possible to configure the flat mode instance with the bridge path cost
command by specifying 1 as the instance number (for example, bridge 1 1/24 path cost 19). However,
this is only available when the switch is already running in the flat mode and STP or RSTP is the active
protocol.
The port path cost value is also configurable for a Multiple Spanning Tree Instance (MSTI). To configure
this value for an MSTI, use the explicit bridge msti path cost command and specify the MSTI ID for the
instance number. For example, the following command configures the path cost value for port 1/12 for
MSTI 10 to 19:
-> bridge msti 10 1/12 path cost 19
Note that when MSTP is the active flat mode protocol, explicit Spanning Tree bridge commands are
required to configure parameter values. Implicit commands are for configuring parameters when the STP
or RSTP protocols are in use. See Chapter 7, “Using 802.1Q 2005 Multiple Spanning Tree,” for more
information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-33
Configuring STP Port Parameters Configuring Spanning Tree Parameters
If a 16-bit path cost value is in use and the path_cost for a link aggregate is set to zero, the following
default values based on link speed and link aggregate size are used. Note that for Gigabit ports the aggre-
gate size is not applicable in this case:
page 8-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Port Parameters
To change the path cost value for a link aggregate, use the bridge path cost commands described above,
but specify a link aggregate control number instead of a slot and port. For example, the following
command sets the path cost for link aggregate 10 associated with VLAN 755 to 19:
-> bridge 755 10 path cost 19
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
The explicit bridge 1x1 mode command configures the port mode for a VLAN instance when the switch
is running in either mode (1x1 or flat). For example, the following command performs the same function
as the command in the previous example:
-> bridge 1x1 10 8/1 mode forwarding
To change the port Spanning Tree mode for the flat mode instance, use either the bridge mode command
or the bridge cist mode command. Note that both commands are available when the switch is running in
either mode (1x1 or flat) and an instance number is not required. For example, the following commands
configure the Spanning Tree mode on port 1/24 for the flat mode instance:
-> bridge 1/24 mode blocking
-> bridge cist 1/24 mode blocking
As in previous releases, it is possible to configure the flat mode instance with the bridge slot/port mode
command by specifying 1 as the instance number (for example, bridge 1 1/24 mode dynamic). However,
this is only available when the switch is already running in the flat mode and STP or RSTP is the active
protocol.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-35
Configuring STP Port Parameters Configuring Spanning Tree Parameters
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
• Edge port (port is at the edge of a bridged LAN, does not receive BPDU and has only one MAC
address learned). Edge ports, however, operationally revert to a point-to-point or a no point-to-point
connection type if a BPDU is received on the port.
A port is considered connected to a point-to-point LAN segment if any one of the following
conditions are true:
• The port belongs to a link aggregate of ports.
• Auto negotiation determines that the port must run in full duplex mode.
Note. Configure ports that connect to a host (PC, workstation, server, and so on) as edge ports so that these
ports transition directly to a forwarding state and not trigger an unwanted topology change when a device
is connected to the port. If a port is configured as a point-to-point or no point-to-point connection type, the
switch assumes a topology change when this port goes active. All previous learned addresses are flushed
and all MAC addresses are re-learned for the port’s assigned VLAN.
By default, Spanning Tree is enabled on the port and the connection type is set to auto point-to-point. The
auto point-to-point setting determines the connection type based on the operational status of the port.
page 8-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Port Parameters
If the switch is running in the 1x1 Spanning Tree mode, then the connection type applies to the specified
VLAN instance associated with the port. If the switch is running in the flat Spanning Tree mode, then the
connection type applies across all VLANs associated with the port. The flat mode instance is referenced as
the port’s instance, even if the port is associated with other VLANs.
To change the port connection type for a VLAN instance, specify a VLAN ID with the bridge connec-
tion command when the switch is running in the 1x1 mode. For example, the following command defines
an edge port connection type for port 8/1 associated with VLAN 10.
-> bridge 10 8/1 connection edgeport
The explicit bridge 1x1 connection command configures the connection type for a VLAN instance when
the switch is running in either mode (1x1 or flat). For example, the following command performs the same
function as the command in the previous example:
-> bridge 1x1 10 8/1 connection edgeport
To change the port Spanning Tree mode for the flat mode instance, use either the bridge connection
command or the bridge cist connection command. Note that both commands are available when the
switch is running in either mode (1x1 or flat) and an instance number is not required. For example, the
following commands configure the connection type for port 1/24 for the flat mode instance:
-> bridge 1/24 connection ptp
-> bridge cist 1/24 connection ptp
As in previous releases, it is possible to configure the flat mode instance with the bridge slot/port
connection command by specifying 1 as the instance number (for example, bridge 1 1/24 connection
noptp). However, this is only available when the switch is running in the flat mode and STP or RSTP is
the active protocol.
Note that the bridge slot/port connection command only configures one port at a time.
For more information about configuring an aggregate of ports, see Chapter 9, “Configuring Static Link
Aggregation,” and Chapter 10, “Configuring Dynamic Link Aggregation.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-37
Configuring STP Port Parameters Configuring Spanning Tree Parameters
To enable the auto-edge functionality of the port, enter the following command:
-> bridge cist 8/23 auto-edge enable
The administrative edge port status (admin-edge) is used to determine the status of the port when
automatic edge port configuration (auto-edge) is disabled.
To define the administrative edge port status (admin-edge) of a port in a CIST instance, use the bridge
cist admin-edge command. Similarly for a port in 1x1 instance, use the bridge 1x1 admin-edge
command.
To enable the administrative edge port status for a port in CIST mode, enter the following command:
-> bridge cist 8/23 admin-edge disable
Note that the above commands also provide optional syntax; restricted-role or root-guard. For example,
the following two commands perform the same function:
-> bridge 1x1 2/1 restricted-role enable
When root guard is enabled for a port, it cannot become the root port, even if it is the most likely
candidate for becoming the root port. It can be selected as the alternate port when the root port is selected.
page 8-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Configuring STP Port Parameters
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-39
Using RRSTP Configuring Spanning Tree Parameters
Using RRSTP
The Ring Rapid Spanning Tree Protocol (RRSTP) is complimentary to both the Spanning Tree Protocol
(STP) as well as the Multiple Spanning Tree Protocol (MSTP). It is designed to provide faster conver-
gence time when switches are connected point-to-point in a ring topology. RRSTP can only be configured
on an OmniSwitch running in flat mode.
RRSTP reduces convergence time by finding the bridge that hosts the alternate (ALT) port and immedi-
ately changing the ALT port state to forwarding without altering the MSTP port state. This process quickly
enables the data path. The RRSTP frame travels from the point of failure to the ALT port in both direc-
tions. The MAC addresses corresponding to the ports in the ring are flushed to make the data path conver-
gence time much faster than the normal MSTP.
While RRSTP is already reacting to the loss of connectivity, the standard MSTP BPDU carrying the link
down information is processed in normal fashion at each hop. When this MSTP BPDU reaches the bridge
whose ALT port is now in the "ALT FWD" state, due to RRSTP frame processing, it updates the MSTP
state of the two ports in the ring as per the MSTP standard.
The following limitations must be noted when using RRSTP:
• There can be no alternate connections for the same instance between any two switches within an
RRSTP ring topology.
• A port on a bridge can only be part of one RRSTP ring at any given instance.
• All bridges, which need to be made part of a ring, can be configured only statically.
• Fast convergence does not occur if an RRSTP frame is lost. However, MSTP convergence can still take
place at a later time since RRSTP frame loss cannot be detected.
• RRSTP convergence need not happen when changes in configuration result in an unstable topology.
• If either of the two ports of the RRSTP ring on a bridge goes down or if one of the bridges in the ring
goes down, the RRSTP convergence need not happen. However, MSTP convergence continues
without interruption.
• A single switch can participate on up to 128 RRSTP rings.
page 8-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Using RRSTP
Configuring RRSTP
This section describes how to use Alcatel-Lucent’s Command Line Interface (CLI) commands to
configure Ring Rapid Spanning Tree Protocol (RRSTP) on a switch.
When configuring RRSTP parameters, you must perform the following steps:
1 Enable RRSTP on your switch. To enable RRSTP globally on a switch, use the bridge rrstp
command, which is described in “Enabling and Disabling RRSTP” on page 8-41.
2 Create RRSTP ring comprising of two ports. To create an RRSTP ring comprising of two ports, use
the bridge rrstp ring command, which is described in “Creating and Removing RRSTP Rings” on
page 8-41.
You can display the current RRSTP status at a global level using the show bridge rrstp configuration
command.
-> show bridge rrstp configuration
To modify the vlan-tag associated with the ring, use the bridge rrstp ring vlan-tag command as follows:
-> bridge rrstp ring 1 vlan-tag 20
To remove an RRSTP ring comprising of two ports, use the no form of the command as follows:
-> no bridge rrstp ring 1
You can display the information of a specific ring or all the rings on the switch using the show bridge
rrstp ring command, as follows:
-> show bridge rrstp ring
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-41
Sample Spanning Tree Configuration Configuring Spanning Tree Parameters
Note. The following example network configuration illustrates using switches operating in the 1x1
Spanning Tree mode and using RSTP (802.1w) to calculate a single data path between VLANs. See
Chapter 7, “Using 802.1Q 2005 Multiple Spanning Tree,” for an overview and examples of using MSTP
(802.1s).
Switch D Switch C
(Root Bridge)
VLAN 255 Bridge ID 2/3 PC=4 3/8 VLAN 255 Bridge ID
10, 00:d0:95:00:00:01 32768, 00:d0:95:00:00:04
3/10
PC=4 PC=19
3/2
2/10
2/8 PC=4 3/3
VLAN 255 Bridge ID VLAN 255 Bridge ID
32768, 00:d0:95:00:00:02 32768, 00:d0:95:00:00:03
2/9 PC=4 3/1
Switch A
(Designated Bridge)
Switch B
Forwarding Root Port
Blocking Designated Port
Path Cost PC
• Each switch configuration has a VLAN 255 defined. The Spanning Tree administrative status for this
VLAN is enabled by default when the VLAN is created.
• VLAN 255 on each switch is configured to use the 802.1w (rapid reconfiguration) Spanning Tree
Algorithm and Protocol.
page 8-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Sample Spanning Tree Configuration
• Ports 2/1-3, 2/8-10, 3/1-3, and 3/8-10 provide connections to other switches and are all assigned to
VLAN 255 on their respective switches. The Spanning Tree administrative status for each port is
enabled by default.
• The path cost for each port connection defaults to a value based on the link speed. For example, the
connection between Switch B and Switch C is a 100 Mbps link, which defaults to a path cost of 19.
• VLAN 255 on Switch D is configured with a Bridge ID priority value of 10, which is less than the
same value for VLAN 255 configured on the other switches. As a result, VLAN 255 was elected the
Spanning Tree root bridge for the VLAN 255 broadcast domain.
• A root port is identified for VLAN 255 on each switch, except the root VLAN 255 switch. The root
port identifies the port that provides the best path to the root VLAN.
• VLAN 255 on Switch A was elected the designated bridge because it offers the best path cost for
Switch B to the root VLAN 255 on Switch D.
• Port 2/9 on Switch A is the designated port for the Switch A to Switch B connection because Switch A
is the designated bridge for Switch B.
• Redundant connections exist between Switch D and Switch C. Ports 2/2 and 3/9 are in a discarding
(blocking) state because this connection has a higher path cost than the connection provided through
ports 2/3 and 3/8. As a result, a network loop condition is avoided.
• Redundant connections also exist between Switch A and Switch B. Although the path cost value for
both of these connections is the same, ports 2/8 and 3/3 are in a discarding state because their port
priority values (not shown) are higher than the same values for ports 2/10 and 3/1.
• The ports that provide the connection between Switch B and Switch C are in a discarding (blocking)
state, because this connection has a higher path cost than the other connections leading to the root
VLAN 255 on Switch D. As a result, a network loop is avoided.
2 Assign the switch ports that provide connections between each switch to VLAN 255. For example, the
following commands entered on Switches A, B, C, and D, respectively, assign the ports shown in the
example network diagram on page 8-42 to VLAN 255:
-> vlan 255 port default 2/8-10
-> vlan 255 port default 3/1-3
-> vlan 255 port default 3/8-10
-> vlan 255 port default 2/1-3
3 Change the Spanning Tree protocol for VLAN 255 to 802.1w (rapid reconfiguration) on each switch
using the following command:
-> bridge 255 protocol 1w
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-43
Sample Spanning Tree Configuration Configuring Spanning Tree Parameters
4 Change the bridge priority value for VLAN 255 on Switch D to 10 using the following command
(leave the priority for VLAN 255 on the other three switches set to the default value of 32768):
-> bridge 255 priority 10
VLAN 255 on Switch D now has the lowest Bridge ID priority value of all four switches. Hence, the
VLAN 255 is considered as the Spanning Tree root VLAN for the VLAN 255 broadcast domain.
Note. To verify the VLAN 255 Spanning Tree configuration on each switch, use the following show
commands. The following outputs are for example purposes only and need not match the values as shown
in the sample network configuration:
-> show spantree 255
page 8-44 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Spanning Tree Parameters Verifying the Spanning Tree Configuration
bridge rrstp ring vlan-tag Displays VLAN Spanning Tree information, including parameter values
and topology change statistics.
show spantree ports Displays Spanning Tree information for switch ports, including
parameter values and the current port state.
For more information about the resulting displays from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide. An example of the output for the show spantree and show spantree
ports commands is also given in “Example Network Configuration Steps” on page 8-43.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 8-45
Verifying the Spanning Tree Configuration Configuring Spanning Tree Parameters
page 8-46 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
9 Configuring Static Link
Aggregation
Alcatel-Lucent static link aggregation software allows you to combine several physical links into one large
virtual link known as a link aggregation group. Using link aggregation provides the following benefits:
• Scalability. It is possible to configure up to 32 link aggregation groups (128 groups on chassis-based
switches) that consist of 2, 4, or 8 10-Mbps, 100-Mbps, 1-Gbps, or 10-Gbps Ethernet links.
• Reliability. If one of the physical links in a link aggregate group goes down (unless it is the last one)
the link aggregate group can still operate.
• Ease of Migration. Link aggregation can ease the transition from 100-Mbps Ethernet backbones to
Gigabit Ethernet backbones.
In This Chapter
This chapter describes the basic components of static link aggregation and how to configure them through
the Command Line Interface (CLI). CLI commands are used in the configuration examples; for more
details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Configuring static link aggregation groups on page 9-7.
• Adding and deleting ports from a static aggregate group on page 9-9.
Note. You can also configure and monitor static link aggregation with WebView, Alcatel-Lucent embed-
ded web-based device management application. WebView is an interactive and easy-to-use GUI that can
be launched from OmniVista or a web browser. Please refer to WebView online documentation for more
information on configuring and monitoring static link aggregation with WebView.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 9-1
Static Link Aggregation Specifications Configuring Static Link Aggregation
page 9-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Static Link Aggregation Quick Steps for Configuring Static Link Aggregation
1 Create the static aggregate link on the local switch with the static linkagg size command. For example:
2 Assign all the necessary ports with the static agg agg num command. For example:
3 Create a VLAN for this static link aggregate group with the vlan command. For example:
4 Create the equivalent static aggregate link on the remote switch with the static linkagg size command.
For example:
-> static linkagg 1 size 4
5 Assign all the necessary ports with the static agg agg num command. For example:
6 Create a VLAN for this static link aggregate group with the vlan command. For example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 9-3
Quick Steps for Configuring Static Link Aggregation Configuring Static Link Aggregation
Note. Optional. You can verify your static link aggregation settings with the show linkagg command. For
example:
-> show linkagg 1
Static Aggregate
SNMP Id : 40000001,
Aggregate Number : 1,
SNMP Descriptor : Omnichannel Aggregate Number 1 ref 40000001 size 4,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 4,
Number of Selected Ports : 4,
Number of Reserved Ports : 4,
Number of Attached Ports : 4,
Primary Port : 1/1
You can also use the show linkagg port port command to display information on specific ports. See
“Displaying Static Link Aggregation Configuration and Statistics” on page 9-12 for more information on
the show commands.
An example of what these commands look like entered sequentially on the command line on the local
switch:
-> static linkagg 1 size 4
-> static agg 1/1 agg num 1
-> static agg 1/2 agg num 1
-> static agg 1/3 agg num 1
-> static agg 1/4 agg num 1
-> vlan 10 port default 1
And an example of what these commands look like entered sequentially on the command line on the
remote switch:
-> static linkagg 1 size 4
-> static agg 1/9 agg num 1
-> static agg 1/10 agg num 1
-> static agg 1/11 agg num 1
-> static agg 1/12 agg num 1
-> vlan 10 port default 1
page 9-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Static Link Aggregation Static Link Aggregation Overview
This chapter describes static link aggregation. For information on dynamic link aggregation, please refer
to Chapter 10, “Configuring Dynamic Link Aggregation.”
Note. Static aggregate groups cannot be created between an OmniSwitch and some switches from other
vendors.
The figure below shows a static aggregate group that has been configured between Switch A and Switch
B. The static aggregate group links four ports on a single OS9-GNI-C24 on Switch A to two ports on one
OS9-GNI-C24 and two ports on another OS9-GNI-C24 on Switch B. The network administrator has
created a separate VLAN for this group so users can use this high speed link.
Switch A Switch B
Static Group
Example of a Static Link Aggregate Group Network
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 9-5
Static Link Aggregation Overview Configuring Static Link Aggregation
See “Configuring Static Link Aggregation Groups” on page 9-7 for information on using Command Line
Interface (CLI) commands to configure static aggregate groups and see “Displaying Static Link Aggrega-
tion Configuration and Statistics” on page 9-12 for information on using CLI to monitor static aggregate
groups.
• 802.1Q. For more information on configuring and monitoring 802.1Q see Chapter 6, “Configuring
802.1Q.”
• Spanning Tree. For more information on Spanning Tree see Chapter 9, “Configuring Static Link
Aggregation.”
Note. See “Application Example” on page 9-11 for tutorials on using link aggregation with other features.
page 9-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Static Link Aggregation Configuring Static Link Aggregation Groups
Note. See “Quick Steps for Configuring Static Link Aggregation” on page 9-3 for a brief tutorial on
configuring these mandatory parameters.
Alcatel-Lucent link aggregation software is preconfigured with the default values for static aggregate
groups as shown in the table in “Static Link Aggregation Default Values” on page 9-2. If you need to
modify any of these parameters, please see “Modifying Static Aggregation Group Parameters” on
page 9-10 for more information.
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference
Guide for complete documentation of CLI commands for link aggregation.
1 Create the Static Aggregate Group on the Local and Remote Switches. To create a static aggregate
group use the static linkagg size command, which is described in “Creating and Deleting a Static Link
Aggregate Group” on page 9-8.
2 Assign Ports on the Local and Remote Switches to the Static Aggregate Group. To assign ports to
the static aggregate group you use the static agg agg num command, which is described in “Adding and
Deleting Ports in a Static Aggregate Group” on page 9-9.
Note. Depending on the needs of your network you can need to configure additional parameters.
Commands to configure optional static aggregate parameters are described in “Modifying Static Aggrega-
tion Group Parameters” on page 9-10.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 9-7
Configuring Static Link Aggregation Groups Configuring Static Link Aggregation
Note. The number of links assigned to a static aggregate group must always be close to the number of
physical links that you plan to use. For example, if you are planning to use 2 physical links you must
create a group with a size of 2 and not 4 or 8.
As an option you can also specify a name and/or the administrative status of the group by entering static
linkagg followed by the user-specified aggregate number, size, the number of links in the static aggregate
group, name, the optional name (which can be up to 255 characters long), admin state, and either enable
or disable (the default is enable).
For example, to create static aggregate group 5 called “static1” consisting of eight links that is administra-
tively disabled enter:
-> static linkagg 5 size 8 name static1 admin state disable
Note. If you want to specify spaces within a name for a static aggregate group the name must be specified
within quotes (for example, “Static Aggregate Group 5”).
Note. You must delete any attached ports with the static agg agg num command before you can delete a
static link aggregate group.
page 9-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Static Link Aggregation Configuring Static Link Aggregation Groups
Note. A port can belong to only one aggregate group. In addition, mobile ports cannot be aggregated. See
Chapter 5, “Assigning Ports to VLANs,” for more information on mobile ports.
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to assign port 1 in slot 1 to static aggregate group 10 and docu-
ment that port 1 in slot 5 is a Giga Ethernet port you would enter:
-> static gigaethernet agg 1/1 agg num 10
Note. The ethernet, fastethernet, and gigaethernet keywords do not modify a port configuration. See
Chapter 9, “Configuring Static Link Aggregation,” for information on configuring Ethernet ports.
Ports must be deleted in the reverse order in which they were assigned. For example, if port 9 through 16
were assigned to static aggregate group 2 you must first delete port 16, then port 15, and so forth. The
following is an example of how to delete ports in the proper sequence from the console:
-> static agg no 1/24
-> static agg no 1/23
-> static agg no 1/22
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 9-9
Modifying Static Aggregation Group Parameters Configuring Static Link Aggregation
• Static aggregate group administrative state (see “Modifying the Static Aggregate Group Administra-
tive State” on page 9-10)
Note. If you want to specify spaces within a name for a static aggregate group the name must be specified
within quotes (for example, “Static Aggregate Group 4”).
page 9-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Static Link Aggregation Application Example
Application Example
Static link aggregation groups are treated by the switch software the same way it treats individual physi-
cal ports. This section demonstrates this by providing a sample network configuration that uses static link
aggregation along with other software features. In addition, a tutorial is provided that shows how to
configure this sample network using Command Line Interface (CLI) commands.
The figure below shows VLAN 8, which has been configured on static aggregate 1 and uses 802.1Q
tagging. The actual physical links connect ports 4/1, 4/2, 4/3, and 4/4 on Switch A to port 2/41, 2/42, 2/43,
and 2/44 on Switch B.
Switch A Switch B
Note. Only the steps to configure the local (Switch A) switch are provided here since the steps to config-
ure the remote (Switch B) switch would not be significantly different.
1 Configure static aggregate group 1 by entering static linkagg 1 size 4 as shown below:
2 Assign ports 4/1, 4/2, 4/3, and 4/4 to static aggregate group 1 by entering:
-> vlan 8
4 Configure 802.1Q tagging with a tagging ID of 8 on static aggregate group 1 (on VLAN 8) by enter-
ing:
-> vlan 8 802.1q 1
5 Repeat steps 1 through 4 on Switch B. All the commands would be the same except you would substi-
tute the appropriate port numbers.
Note. Optional. Use the show 802.1q command to display 802.1Q configurations.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 9-11
Displaying Static Link Aggregation Configuration and Statistics Configuring Static Link Aggregation
When you use the show linkagg command without specifying the link aggregation group number and
when you use the show linkagg port command without specifying the slot and port number these
commands provide a “global” view of switch-wide link aggregate group and link aggregate port informa-
tion, respectively.
For example, to display global statistics on all link aggregate groups (both static and dynamic) you would
enter:
-> show linkagg
When you use the show linkagg command with the link aggregation group number and when you use the
show linkagg port command with the slot and port number these commands provide detailed views of
link aggregate group and link aggregate port information, respectively. These detailed views provide
excellent tools for diagnosing and troubleshooting problems.
For example, to display detailed statistics for port 1 in slot 4 that is attached to static link aggregate group
1 you would enter:
-> show linkagg port 4/1
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference
Guide for complete documentation of show commands for link aggregation.
page 9-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
10 Configuring Dynamic Link
Aggregation
Alcatel-Lucent dynamic link aggregation software allows you to combine several physical links into one
large virtual link known as a link aggregation group. Using link aggregation provides the following
benefits:
• Scalability. It is possible to configure up to 32 link aggregation groups (128 groups on chassis-based
switches) that consist of 2, 4, or 8 10-Mbps, 100-Mbps, 1-Gbps, or 10-Gbps Ethernet links.
• Reliability. If one of the physical links in a link aggregate group goes down (unless it is the last one)
the link aggregate group can still operate.
• Ease of Migration. Link aggregation can ease the transition from 100-Mbps Ethernet backbones to
Gigabit Ethernet backbones.
In This Chapter
This chapter describes the basic components of dynamic link aggregation and how to configure them
through the Command Line Interface (CLI). CLI commands are used in the configuration examples; for
more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Configuring dynamic link aggregation groups on page 10-9.
• Configuring ports so they can be aggregated in dynamic link aggregation groups on page 10-11.
Note. You can also configure and monitor dynamic link aggregation with WebView, Alcatel-Lucent
embedded Web-based device management application. WebView is an interactive and easy-to-use GUI
that can be launched from OmniVista or a Web browser. Please refer to WebView online
documentation for more information on configuring and monitoring dynamic link aggregation with
WebView.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-1
Dynamic Link Aggregation Specifications Configuring Dynamic Link Aggregation
page 10-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Dynamic Link Aggregation Default Values
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-3
Quick Steps for Configuring Dynamic Link Aggregation Configuring Dynamic Link Aggregation
1 Create the dynamic aggregate group on the local (actor) switch with the lacp linkagg size command as
shown below:
-> lacp linkagg 2 size 8 actor admin key 5
2 Configure ports (the number of ports should be less than or equal to the size value set in step 1) with
the same actor administrative key (which allows them to be aggregated) with the lacp agg actor admin
key command. For example:
-> lacp agg 1/1 actor admin key 5
-> lacp agg 1/4 actor admin key 5
-> lacp agg 3/3 actor admin key 5
-> lacp agg 5/4 actor admin key 5
-> lacp agg 6/1 actor admin key 5
-> lacp agg 6/2 actor admin key 5
-> lacp agg 7/3 actor admin key 5
-> lacp agg 8/1 actor admin key 5
3 Create a VLAN for this dynamic link aggregate group with the vlan command. For example:
4 Create the equivalent dynamic aggregate group on the remote (partner) switch with the lacp linkagg
size command as shown below:
-> lacp linkagg 2 size 8 actor admin key 5
5 Configure ports (the number of ports should be less than or equal to the size value set in step 4) with
the same actor administrative key (which allows them to be aggregated) with the lacp agg actor admin
key command. For example:
-> lacp agg 2/1 actor admin key 5
-> lacp agg 3/1 actor admin key 5
-> lacp agg 3/3 actor admin key 5
-> lacp agg 3/6 actor admin key 5
-> lacp agg 5/1 actor admin key 5
-> lacp agg 5/6 actor admin key 5
-> lacp agg 8/1 actor admin key 5
-> lacp agg 8/3 actor admin key 5
6 Create a VLAN for this dynamic link aggregate group with the vlan command. For example:
page 10-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Quick Steps for Configuring Dynamic Link Aggregation
Note. As an option, you can verify your dynamic aggregation group settings with the show linkagg
command on either the actor or the partner switch. For example:
-> show linkagg 2
Dynamic Aggregate
SNMP Id : 40000002,
Aggregate Number : 2,
SNMP Descriptor : Dynamic Aggregate Number 2 ref 40000002 size 8,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 8,
Number of Selected Ports : 8,
Number of Reserved Ports : 8,
Number of Attached Ports : 8,
Primary Port : 1/1,
LACP
MACAddress : [00:1f:cc:00:00:00],
Actor System Id : [00:20:da:81:d5:b0],
Actor System Priority : 0,
Actor Admin Key : 5,
Actor Oper Key : 0,
Partner System Id : [00:20:da:81:d5:b1],
Partner System Priority : 0,
Partner Admin Key : 5,
Partner Oper Key : 0
You can also use the show linkagg port port command to display information on specific ports. See
“Displaying Dynamic Link Aggregation Configuration and Statistics” on page 10-33 for more
information on show commands.
An example of what these commands look like entered sequentially on the command line on the actor
switch:
-> lacp linkagg 2 size 8 actor admin key 5
-> lacp agg 1/1 actor admin key 5
-> lacp agg 1/4 actor admin key 5
-> lacp agg 3/3 actor admin key 5
-> lacp agg 5/4 actor admin key 5
-> lacp agg 6/1 actor admin key 5
-> lacp agg 6/2 actor admin key 5
-> lacp agg 7/3 actor admin key 5
-> lacp agg 8/1 actor admin key 5
-> vlan 2 port default 2
An example of what these commands look like entered sequentially on the command line on the partner
switch:
-> lacp linkagg 2 size 8 actor admin key 5
-> lacp agg 2/1 actor admin key 5
-> lacp agg 3/1 actor admin key 5
-> lacp agg 3/3 actor admin key 5
-> lacp agg 3/6 actor admin key 5
-> lacp agg 5/1 actor admin key 5
-> lacp agg 5/6 actor admin key 5
-> lacp agg 8/1 actor admin key 5
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-5
Dynamic Link Aggregation Overview Configuring Dynamic Link Aggregation
This chapter describes dynamic link aggregation. For information on static link aggregation, please refer to
Chapter 9, “Configuring Static Link Aggregation.”
page 10-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Dynamic Link Aggregation Overview
Dynamic Group
Dynamic aggregate groups can be created between each of the following OmniSwitch products:
• two OmniSwitch 6400, 6855, or 9000E switches.
• an OmniSwitch 6400, 6855, or 9000E switch and another vendor switch if that vendor supports IEEE
802.3ad LACP.
See “Configuring Dynamic Link Aggregate Groups” on page 10-9 for information on using Command
Line Interface (CLI) commands to configure dynamic aggregate groups and see “Displaying Dynamic
Link Aggregation Configuration and Statistics” on page 10-33 for information on using the CLI to
monitor dynamic aggregate groups.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-7
Dynamic Link Aggregation Overview Configuring Dynamic Link Aggregation
• 802.1Q. For more information on configuring and monitoring 802.1Q, see Chapter 6, “Configuring
802.1Q.”
• Spanning Tree. For more information on Spanning Tree, see Chapter 5, “Configuring Spanning Tree
Parameters.”
• Edge Feature - LACP WTR Delay on Bootup. For more information on WTR timer, see “Edge
Feature - LACP WTR Delay on Bootup” on page 10-28
Note. See “Application Examples” on page 10-29 for tutorials on using link aggregation with other
features.
page 10-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Configuring Dynamic Link Aggregate Groups
Note. See “Quick Steps for Configuring Dynamic Link Aggregation” on page 10-4 for a brief tutorial on
configuring these mandatory parameters.
Alcatel-Lucent link aggregation software is preconfigured with the default values for dynamic aggregate
groups and ports shown in the table in “Dynamic Link Aggregation Default Values” on page 10-3. For
most configurations, using only the steps described in “Creating and Deleting a Dynamic Aggregate
Group” on page 10-10 will be necessary to configure a dynamic link aggregate group. However, if you
need to modify any of the parameters listed in the table on page 10-3, please see “Modifying Dynamic
Link Aggregate Group Parameters” on page 10-13 for more information.
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference
Guide for complete documentation of show commands for link aggregation.
1 Create the Dynamic Aggregate Groups on the Local (Actor) and Remote (Partner) Switches. To
create a dynamic aggregate group use the lacp linkagg size command, which is described in “Creating
and Deleting a Dynamic Aggregate Group” on page 10-10.
2 Configure the Same Administrative Key on the Ports You Want to Join the Dynamic Aggregate
Group. To configure ports with the same administrative key (which allows them to be aggregated), use
the lacp agg actor admin key command, which is described in “Configuring Ports to Join and Removing
Ports in a Dynamic Aggregate Group” on page 10-11.
Note. Depending on the needs of your network you may need to configure additional parameters.
Commands to configure optional dynamic link aggregate parameters are described in “Modifying
Dynamic Link Aggregate Group Parameters” on page 10-13.These commands must be executed after you
create a dynamic aggregate group.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-9
Configuring Dynamic Link Aggregate Groups Configuring Dynamic Link Aggregation
You can create up to 32 link aggregation (both static and dynamic) groups for a standalone switch or a
stack of switches and up to 128 groups for a chassis-based switch. In addition, you can also specify
optional parameters shown in the table below. These parameters must be entered after size and the
user-specified number of links.
For example, Alcatel-Lucent recommends assigning the actor admin key when you create the dynamic
aggregate group to help ensure that ports are assigned to the correct group. To create a dynamic aggregate
group with aggregate number 3 consisting of two ports with an admin actor key of 10, for example, enter:
-> lacp linkagg 3 size 2 actor admin key 10
Note. The optional keywords for this command may be entered in any order as long as they are entered
after size and the user-specified number of links.
Note. You cannot delete a dynamic aggregate group if it has any attached ports. To remove attached ports
you must disable the dynamic aggregate group with the lacp linkagg admin state command, which is
described in “Disabling a Dynamic Aggregate Group” on page 10-14.
page 10-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Configuring Dynamic Link Aggregate Groups
Note. A port may belong to only one aggregate group. In addition, mobile ports cannot be aggregated. See
Chapter 5, “Assigning Ports to VLANs,” for more information on mobile ports.
You must execute the lacp agg actor admin key command on all ports in a dynamic aggregate group. If
not, the ports will be unable to join the group.
In addition, you can also specify optional parameters shown in the table below. These keywords must be
entered after the actor admin key and the user-specified actor administrative key value.
Note. The actor admin state and partner admin state keywords have additional parameters, which are
described in “Modifying the Actor Port System Administrative State” on page 10-18 and “Modifying the
Partner Port System Administrative State” on page 10-22, respectively.
All of the optional keywords listed above for this command may be entered in any order as long as they
appear after the actor admin key keywords and their user-specified value.
For example, to configure actor administrative key of 10, a local system ID (MAC address) of
00:20:da:06:ba:d3, and a local priority of 65535 to slot 4 port 1, enter:
-> lacp agg 4/1 actor admin key 10 actor system id 00:20:da:06:ba:d3 actor
system priority 65535
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-11
Configuring Dynamic Link Aggregate Groups Configuring Dynamic Link Aggregation
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to configure an actor administrative key of 10 and to document
that the port is a 10-Mbps Ethernet port to slot 4 port 1, enter:
-> lacp agg ethernet 4/1 actor admin key 10
Note. The ethernet, fastethernet, and gigaethernet keywords do not modify a port configuration. See
Chapter 1, “Configuring Ethernet Ports,” for information on configuring Ethernet ports.
Ports must be deleted in the reverse order in which they were configured. For example, if port 9 through
16 were configured to join dynamic aggregate group 2 you must first delete port 16, then port 15, and so
forth. The following is an example of how to delete ports in the proper sequence from the console:
-> lacp agg no 4/24
-> lacp agg no 4/23
-> lacp agg no 4/22
page 10-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
Note. You must create a dynamic aggregate group before you can modify group or port parameters. See
“Configuring Dynamic Link Aggregate Groups” on page 10-9 for more information.
• Group administrative state (see “Modifying the Dynamic Aggregate Group Administrative State” on
page 10-14)
• Group local (actor) switch actor administrative key (see “Configuring and Deleting the Dynamic
Aggregate Group Actor Administrative Key” on page 10-15)
• Group local (actor) switch system priority (see “Modifying the Dynamic Aggregate Group Actor
System Priority” on page 10-15)
• Group local (actor) switch system ID (see “Modifying the Dynamic Aggregate Group Actor System
ID” on page 10-16)
• Group remote (partner) administrative key (see “Modifying the Dynamic Aggregate Group Partner
Administrative Key” on page 10-16)
• Group remote (partner) system priority (see “Modifying the Dynamic Aggregate Group Partner System
Priority” on page 10-17)
• Group remote (partner) switch system ID (see “Modifying the Dynamic Aggregate Group Partner
System ID” on page 10-17)
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-13
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
Note. If you want to specify spaces within a name, the name must be enclosed in quotes. For example:
-> lacp linkagg 4 name "Engineering Lab"
page 10-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-15
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
page 10-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-17
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
• Actor port system priority (see “Modifying the Actor Port System Priority” on page 10-20)
• Actor port priority (see “Modifying the Actor Port Priority” on page 10-21)
Note. See “Configuring Ports to Join and Removing Ports in a Dynamic Aggregate Group” on page 10-11
for information on modifying a dynamic aggregate group administrative key.
All of the commands to modify actor port parameters allow you to add the ethernet, fastethernet, and
gigaethernet keywords before the slot and port number to document the interface type or make the
command look consistent with early-generation Alcatel-Lucent CLI syntax. However, these keywords do
not modify a port configuration. See Chapter 1, “Configuring Ethernet Ports,” for information on configur-
ing Ethernet ports.
Note. A port may belong to only one aggregate group. In addition, mobile ports cannot be aggregated. See
Chapter 5, “Assigning Ports to VLANs,” for more information on mobile ports.
page 10-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
Note. Specifying none removes all administrative states from the LACPDU configuration. For example:
-> lacp agg 5/49 actor admin state none
For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate actor port 49 in slot 5 you
would enter:
-> lacp agg 5/49 actor admin state active aggregate
As an option you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate
actor port 49 in slot 5 and document that the port is a Gigabit Ethernet port you would enter:
-> lacp agg gigaethernet 5/49 actor admin state active aggregate
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-19
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
Note. Since individual bits with the LACPDU frame are set with the lacp agg actor admin state
command you can set some bits on and restore other bits within the same command. For example, if you
wanted to restore bit 2 (aggregate) to its default settings and set bit 0 (active) on dynamic aggregate actor
port 49 in slot 5 you would enter:
-> lacp agg 5/49 actor admin state active no aggregate
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the system ID of the dynamic aggregate actor port 3 in
slot 7 to 00:20:da:06:ba:d3 and document that the port is 10 Mbps Ethernet you would enter:
-> lacp agg ethernet 7/3 actor system id 00:20:da:06:ba:d3
page 10-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the system priority of dynamic aggregate actor port 5
in slot 2 to 200 and document that the port is a Giga Ethernet port you would enter:
-> lacp agg gigaethernet 2/5 actor system priority 200
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the actor port priority of dynamic aggregate actor port
1 in slot 2 to 100 and document that the port is a Giga Ethernet port you would enter:
-> lacp agg gigaethernet 2/1 actor port priority 100
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-21
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
• Partner port system ID (see “Modifying the Partner Port System ID” on page 10-24)
• Partner port system priority (see “Modifying the Partner Port System Priority” on page 10-25)
• Partner port administrative state (see “Modifying the Partner Port Administrative Status” on
page 10-26)
• Partner port priority (see “Modifying the Partner Port Priority” on page 10-26)
All of the commands to modify partner port parameters allow you to add the ethernet, fastethernet, and
gigaethernet keywords before the slot and port number to document the interface type or make the
command look consistent with early-generation Alcatel-Lucent CLI syntax. However, these keywords do
not modify a port configuration. See Chapter 1, “Configuring Ethernet Ports,” for information on configur-
ing Ethernet ports.
Note. A port may belong to only one aggregate group. In addition, mobile ports cannot be aggregated. See
Chapter 5, “Assigning Ports to VLANs,” for more information on mobile ports.
Keyword Definition
active Specifies that bit 0 in LACPDU frames is set, which indicates that the
link is able to exchange LACPDU frames. By default, this bit is set.
timeout Specifies that bit 1 in LACPDU frames is set, which indicates that a
short time-out is used for LACPDU frames. When this bit is disabled, a
long time-out is used for LACPDU frames. By default, this bit is set.
aggregate Specifies that bit 2 in LACPDU frames is set, which indicates that the
system considers this link to be a potential candidate for aggregation. If
this bit is not set, the system considers the link to be individual (it can
only operate as a single link). By default, this bit is set.
page 10-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
Keyword Definition
synchronize Specifies that bit 3 in the partner state octet is enabled. When this bit is
set, the port is allocated to the correct dynamic aggregation group. If
this bit is not enabled, the port is not allocated to the correct aggrega-
tion group. By default, this value is disabled.
collect Specifying this keyword has no effect because the system always deter-
mines its value. When this bit (bit 4) is set by the system, incoming
LACPDU frames are collected from the individual ports that make up
the dynamic aggregate group.
distribute Specifying this keyword has no effect because the system always deter-
mines its value. When this bit (bit 5) is set by the system, distributing
outgoing frames on the port is disabled.
default Specifying this keyword has no effect because the system always deter-
mines its value. When this bit (bit 6) is set by the system, it indicates
that the partner is using defaulted actor information administratively
configured for the partner.
expire Specifying this keyword has no effect because the system always deter-
mines its value. When this bit (bit 7) is set by the system, the actor can-
not receive LACPDU frames.
Note. Specifying none removes all administrative states from the LACPDU configuration. For example:
-> lacp agg 7/49 partner admin state none
For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate partner port 49 in slot 7 you
would enter:
-> lacp agg 7/49 partner admin state active aggregate
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to set bits 0 (active) and 2 (aggregate) on dynamic aggregate
partner port 49 in slot 7 and document that the port is a Gigabit Ethernet port you would enter:
-> lacp agg gigaethernet 7/49 partner admin state active aggregate
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-23
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
Note. Since individual bits with the LACPDU frame are set with the lacp agg partner admin state
command you can set some bits on and restore other bits to default values within the same command. For
example, if you wanted to restore bit 2 (aggregate) to its default settings and set bit 0 (active) on dynamic
aggregate partner port 1 in slot 7 you would enter:
-> lacp agg 7/1 partner admin state active no aggregate
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the administrative key of a dynamic aggregate group
partner port 1 in slot 6 to 1000 and document that the port is a 10 Mbps Ethernet port you would enter:
-> lacp agg ethernet 6/1 partner admin key 1000
page 10-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the system ID of dynamic aggregate partner port 49 in
slot 6 to 00:20:da:06:ba:d3 and document that the port is a Gigabit Ethernet port you would enter:
-> lacp agg gigaethernet 6/49 partner admin system id 00:20:da:06:ba:d3
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the administrative priority of dynamic aggregate
partner port 49 in slot 4 to 100 and specify that the port is a Gigabit Ethernet port you would enter:
-> lacp agg gigaethernet 4/49 partner admin system priority 100
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-25
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the administrative status of dynamic aggregate
partner port 1 in slot 7 to 200 and document that the port is a Giga Ethernet port you would enter:
-> lacp agg gigaethernet 7/1 partner admin port 200
page 10-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Modifying Dynamic Link Aggregate Group Parameters
For example, to modify the port priority of dynamic aggregate partner port 3 in slot 4 to 100 you would
enter:
-> lacp agg 4/3 partner admin port priority 100
As an option, you can use the ethernet, fastethernet, and gigaethernet keywords before the slot and port
number to document the interface type or make the command look consistent with early-generation
Alcatel-Lucent CLI syntax. For example, to modify the port priority of dynamic aggregate partner port 3
in slot 4 to 100 and document that the port is a Giga Ethernet port you would enter:
-> lacp agg gigaethernet 4/3 partner admin port priority 100
The LACP WTR delay on bootup is applied on access switches connected to upstream Multi-Chassis or
Virtual-Chassis devices using multiple links. It improves convergence when an upstream chassis that went
down comes back up. By delaying the restoration of the LACP link long enough to allow L3 to converge,
the traffic loss is kept to a minimum. As an added benefit, if an LACP link starts flapping, no traffic will
be sent through that link until it is stable (until it is up longer that the WTR timer).
When a chassis which is part of Multi-Chassis or Virtual-Chassis powers up, the VFL links come up
immediately and all other links come up after a configured delay (usually 45 seconds). The non VFL links
include Network links which connect to upstream switches/routers and Access links which connect to L2
Access switches.
The LACP sync-up within milliseconds after the links come up and traffic originating from the Access
switches re-hash and are re-sent to the recovering upstream chassis. At that time, L3 protocols on the MC/
VC chassis is not up yet and traffic is redirected to the other MC/VC chassis (or black-holed). Later, after
the L3 protocols converge, the traffic is re-routed using the new best routes. This causes a reconvergence
double-hit which may exceed 1 second.
Without this feature, the LACP links sync up within milliseconds after the links come up and traffic
originating from the access switches re-hash and are re-sent to the recovering upstream chassis. At that
time, L3 protocols on the MC/VC chassis is not up yet and traffic is redirected to the other MC/VC
chassis (or black-holed). Later, after the L3 protocols converge, the traffic is re-routed using the new best
routes. This causes a reconvergence double-hit which may exceed 1 second.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-27
Modifying Dynamic Link Aggregate Group Parameters Configuring Dynamic Link Aggregation
Perform the following procedure to enable WTR timer to edge switches that are unaware that they are
connected to multi-chassis so it applies to regular links.
When a LACP comes up, it is required check if there is a WTR enabled for the linkagg.
If there is no WTR enabled for this linkagg, bring up the link. If there is a WTR configured for this
linkagg, do the following:
1 If there are no other links attached to the same linkagg, bypass the WTR and bring up the link
immediately.
2 If there are links attached to the same linkagg, start the WTR.
page 10-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Application Examples
See “lacp linkagg wait-to-restore-timer” on page 4-233 in Chapter 4, “Link Aggregation Commands”
to configure the wait-to-restore timer.
Application Examples
Dynamic link aggregation groups are treated by the switch software the same way it treats individual
physical ports.This section demonstrates this feature by providing sample network configurations that use
dynamic aggregation along with other software features. In addition, tutorials are provided that show how
to configure these sample networks by using Command Line Interface (CLI) commands.
Switch A
Dynamic Aggregate Group 5
VLAN 10 has been configured to
use this group with Spanning
Tree with a priority of 15.
Switch C
The steps to configure VLAN 10 (Spanning Tree example) are described in “Link Aggregation and Span-
ning Tree Example” on page 10-30. The steps to configure VLAN 12 (802.1Q and 802.1p example) are
described in “Link Aggregation and QoS Example” on page 10-31.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-29
Application Examples Configuring Dynamic Link Aggregation
Note. Although you would need to configure both the local ( Switch A) and remote ( Switch B and C)
switches, only the steps to configure the local switch are provided since the steps to configure the remote
switches are not significantly different.
Note. Only the steps to configure the local ( Switch A) are provided here since the steps to configure the
remote ( Switch B) would not be significantly different.
2 Configure ports 5/5 and 5/6 with the same actor administrative key (5) by entering:
-> vlan 10
4 If the Spanning Tree Protocol (STP) has been disabled on this VLAN (STP is enabled by default),
enable it on VLAN 10 by entering:
-> vlan 10 stp enable
Note. Optional. Use the show spantree ports command to determine if the STP is enabled or disabled and
to display other STP parameters. For example:
-> show spantree 10 ports
Spanning Tree Port Summary for Vlan 10
Adm Oper Man. Path Desig Fw Prim. Adm Op
Port Pri St St mode Cost Cost Role Tx Port Cnx Cnx Desig Bridge ID
-----+---+---+----+----+-----+-----+----+---+-----+---+---+---------------------
3/13 7 ENA FORW No 100 0 DESG 1 3/13 EDG NPT 000A-00:d0:95:6b:0a:c0
2/10 7 ENA FORW No 19 0 DESG 1 2/10 PTP PTP 000A-00:d0:95:6b:0a:c0
5/2 7 ENA DIS No 0 0 DIS 0 5/2 EDG NPT 0000-00:00:00:00:00:00
0/5 7 ENA FORW No 4 0 DESG 1 0/10 PTP PTP 000A-00:d0:95:6b:0a:c0
In the example above the link aggregation group is indicated by the “0” for the slot number.
5 Configure VLAN 10 (which uses dynamic aggregate group 5) to the highest (15) priority possible by
entering:
-> bridge 10 5 mode priority 15
page 10-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Application Examples
6 Repeat steps 1 through 5 on Switch B. All the commands would be the same except you would substi-
tute the appropriate port numbers.
Note. Only the steps to configure the local ( Switch A) switch are provided here since the steps to config-
ure the remote ( Switch C) switch would not be significantly different.
2 Configure ports 4/1, 4/2, 4/3, and 4/4 the same actor administrative key (7) by entering:
-> vlan 12
4 Configure 802.1Q tagging with a tagging ID ( VLAN ID) of 12 on dynamic aggregate group 7 by
entering:
-> vlan 12 802.1q 7
5 If the QoS Manager has been disabled (it is enabled by default) enable it by entering:
Note. Optional. Use the show qos config command to determine if the QoS Manager is enabled or
disabled.
7 Configure an 802.1p policy action with the highest priority possible ( 7) for VLAN 12 called
“vlan12_action” by entering:
-> policy action vlan12_action 802.1P 7
8 Configure a QoS rule called “vlan12_rule” by using the policy condition and policy rules you config-
ured in steps 8 and 9 above by entering:
-> policy rule vlan12_rule enable condition vlan12_condition action
vlan12_action
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-31
Application Examples Configuring Dynamic Link Aggregation
9 Enable your 802.1p QoS settings by entering qos apply as shown below:
10 Repeat steps 1 through 9 on Switch C. All the commands would be the same except you would substi-
tute the appropriate port numbers.
Note. If you do not use the qos apply command any QoS policies you configured will be lost on the next
switch reboot.
page 10-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dynamic Link Aggregation Displaying Dynamic Link Aggregation Configuration and Statistics
When you use the show linkagg command without specifying the link aggregation group number and
when you use the show linkagg port command without specifying the slot and port number, these
commands provide a “global” view of switch-wide link aggregate group and link aggregate port informa-
tion, respectively.
For example, to display global statistics on all link aggregate groups (both dynamic and static) you would
enter:
-> show linkagg
When you use the show linkagg command with the link aggregation group number and when you use the
show linkagg port command with the slot and port number, these commands provide detailed views of
the link aggregate group and port information, respectively. These detailed views provide excellent tools
for diagnosing and troubleshooting problems.
For example, to display detailed statistics for port 1 in slot 2 that is attached to dynamic link aggregate
group 1 you would enter:
-> show linkagg port 2/1
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 10-33
Displaying Dynamic Link Aggregation Configuration and Statistics Configuring Dynamic Link Aggregation
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference
Guide for complete documentation of show commands for link aggregation.
page 10-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
11 Configuring Dual-Home
Links
Dual-Home Link (DHL) is a high availability feature that provides fast failover between core and edge
switches without implementing Spanning Tree. The OmniSwitch provides two methods for implementing
a DHL solution:
• DHL Active-Active—an edge technology that splits a number of VLANs between two active links.
The forwarding status of each VLAN is modified by DHL to prevent network loops and maintain
connectivity to the core when one of the links fails. This solution does not require link aggregation.
• DHL Aggregation (Active-Standby)—an edge technology that allows a switch to have redundant
802.3ad LACP connections to two different core or distribution switches without depending on STP to
prevent loops.
In This Chapter
This chapter describes the basic components of DHL solutions and how to configure them through the
Command Line Interface (CLI). CLI commands are used in the configuration examples; for more details
about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Information and procedures described in this chapter include:
• “Dual-Home Link Specifications” on page 11-2.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-1
Dual-Home Link Specifications Configuring Dual-Home Links
page 11-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dual-Home Links Dual-Home Link Active-Active
• Two DHL links associated with the session (link A and link B). A physical switch port or a logical link
aggregate (linkagg) ID are configurable as a DHL link.
• A group of VLANs (or pool of common VLANs) in which each VLAN is associated (802.1q tagged)
with both link A and link B.
• A VLAN-to-link mapping that specifies which of the common VLANs each DHL link services. This
mapping prevents network loops by designating only one active link for each VLAN, even though both
links remain active and are associated with each of the common VLANs.
When one of the two active DHL links fails or is brought down, the VLANs mapped to that link are then
forwarded on the remaining active link to maintain connectivity to the core. When the failed link comes
back up, DHL waits a configurable amount of time before the link resumes forwarding of its assigned
VLAN traffic.
The following diagram shows how DHL works when operating in a normal state (both links up) and when
operating in a failed state (one link is down):
Edge Edge
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-3
Dual-Home Link Active-Active Configuring Dual-Home Links
Protected VLANs
A protected VLAN is one that is assigned to both links in a DHL session. This means that if the link to
which the VLAN is mapped fails, the VLAN is moved to the other active DHL link to maintain
connectivity with the core switches.
Any VLAN that is only assigned to one of the DHL links is considered an unprotected VLAN. This type
of VLAN is not eligible for DHL support if the link to which the VLAN is assigned fails.
• LPS ports
• NNI ports
• Mobile ports
• 802.1x ports
• GVRP ports.
• UNI ports
Note. No CLI error message is displayed when DHL is configured using a port type that is not supported.
page 11-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dual-Home Links Dual-Home Link Active-Active
topology change event and the MAC address table is not automatically flushed. This can create stale MAC
address entries that are looking for end devices over the wrong link.
To avoid stale MAC address entries in the forwarding tables of the core switches, some type of
communication needs to occur between the edge uplink switch and the core switches. The DHL
Active-Active feature provides two methods for clearing stale MAC address entries: MVRP Enhanced
Operation or Raw Flooding. Selecting which one of these methods to use is done on a per-DHL session
basis.
Raw Flooding
When a DHL link fails or recovers and Raw Flooding is enabled for the DHL session, the switch performs
the following tasks to trigger MAC movement:
• Identify a list of MAC addresses within the effected VLANs that were learned on non-DHL ports
(MAC addresses that were reachable through the effected VLANs).
• Create a tagged packet for each of these addresses. The SA for the packet is one of the MAC addresses
from the previously-generated list; the VLAN tag is the resident VLAN for the MAC address; the DA
is set for broadcast (all Fs); the body is just filler.
• Transmit the generated packet once for each VLAN-MAC address combination. These packets are sent
on the link that takes over for the failed link or on a link that has recovered from a failure.
The MAC movement triggered by the Raw Flooding method clears any stale MAC entries. However,
flooded packets are often assigned a low priority and the switch may filter such packets in a highly utilized
network.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-5
Dual-Home Link Active-Active Configuring Dual-Home Links
• Do not change the link assignments for the DHL session while the session is enabled.
• Configuring a MAC address flush method (MVRP or Raw Flooding) is recommended if the DHL
session ports span across switch modules or the DHL ports are on the same module but the data port is
on a different module. This configuration improves convergence time.
• To improve convergence time for uni-directional traffic, specify Raw Flooding as the MAC flush
method for the DHL session.
• Enabling the registrar mode as “forbidden” is recommended before MVRP is enabled on DHL links.
1 Configure a set of VLANs that the two DHL session links service.
2 Identify two ports or link aggregates that serve as the links for the DHL session then assign both links
to the same default VLAN. Make sure the default VLAN is one of the VLANs created in Step 1. For
example, the following commands assign VLAN 100 as the default VLAN for port 1/10 and linkagg 5:
-> vlan 100 port default 1/10
-> vlan 100 port default 5
3 Associate (802.1q tag) the ports identified in Step 2 to each one of the VLANs created in Step 1, except
for the default VLAN already associated with each port. For example, the following commands associate
port 1/10 and linkagg 5 with VLANs 101-110:
-> vlan 101-110 802.1q 1/10
-> vlan 101-110 802.1q 1
In the above command example, port 1/10 and linkagg 1 are only tagged with VLANs 101-110 because
VLAN 100 is already the default VLAN for both ports.
page 11-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dual-Home Links Dual-Home Link Active-Active
4 Create a DHL session using the dhl num command. For example:
5 Configure the pre-emption (recovery) timer for the DHL session using the dhl num pre-emption-time
command. By default, the timer is set to 30 seconds, so it is only necessary to change this parameter if the
default value is not sufficient. For example, the following command changes the timer value 500 seconds:
-> dhl num 10 pre-emption-time 500
6 Configure the MAC address flushing method for the DHL session using the dhl num mac-flushing
command and specify either the raw or mvrp parameter option. By default, the MAC flushing method is
set to none. For example, the following command selects the MVRP method:
-> dhl num 10 mac-flushing mvrp
7 Configure two links (linkA and linkB) for the DHL session using the dhl num linka linkb command.
Specify the ports identified in Step 1 as linkA and linkB. For example:
-> dhl num 10 linka linkagg 1 linkb port 1/10
8 Select VLANs from the set of VLANs created in Step 2 and map those VLANs to linkB using the dhl
num vlan-map linkb command. Any VLAN not mapped to linkB is automatically mapped to linkA. By
default, all VLANs are mapped to linkA. For example, the following command maps VLANs 11-20 to
linkB:
-> dhl num 10 vlan-map linkb 11-20
9 Administratively enable the DHL session using the dhl num admin-state command. For example:
See “Dual-Home Link Active-Active Example” on page 11-8 for a DHL application example.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-7
Dual-Home Link Active-Active Configuring Dual-Home Links
2 Configure 802.1q tagging on VLANs 2-10 for port 1/10. Because VLAN 1 is the default VLAN for
port 1/10, there is no need to tag VLAN 1.
-> vlan 2-10 802.1q 1/10
3 Configure 802.1q tagging on the VLANs 2-10 for port 2/10. Because VLAN 1 is the default VLAN for
port 2/10, there is no need to tag VLAN 1.
-> vlan 2-10 802.1q 2/10
page 11-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dual-Home Links Dual-Home Link Active-Active
5 Configure port 1/10 and port 2/10 as the dual-home links (linkA, linkB) for the DHL session.
7 Specify Raw Flooding as the MAC flushing technique to use for this DHL session.
8 Enable the administrative state of the DHL session using the following command:
Core Switches:
2 Configure 802.1q tagging on VLANs 2-10 for port 1/10 on the Core 1 switch. VLAN 1 is the default
VLAN for port 1/10, so there is no need to tag VLAN 1.
-> vlan 2-10 802.1q 1/10
3 Configure 802.1q tagging on VLANs 2-10 for port 2/10 on the Core 2 switch. VLAN 1 is the default
VLAN for port 2/10, so there is no need to tag VLAN 1.
-> vlan 2-10 802.1q 2/10
4 Configure 802.1q tagging on VLANs 2-10 for LACP 1 on both of the Core switches. VLAN 1 is the
default VLAN for LACP 1 on both Core switches, so there is no need to tag VLAN 1.
-> vlan 2-10 802.1q 1
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-9
Dual-Home Link Active-Active Configuring Dual-Home Links
Core 1 Switch:
-> vlan 2-10
-> vlan 2-10 802.1q 1/10
-> vlan 2-10 802.1q 1
Core 2 Switch:
-> vlan 2-10
-> vlan 2-10 802.1q 2/10
-> vlan 2-10 802.1q 1
In the above topology, all uplinked switches are connected to the core network through redundant links,
and the links are configured to use DHL Active-Active. Spanning Tree is disabled on all the DHL enabled
ports of the uplinked devices.
page 11-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dual-Home Links Dual-Home Link Active-Active
In the above topology, the link between the uplink device other than core network is not recommended as
it creates a loop in the network. This topology violates the principle that uplink switches can only be
connected to the network cloud through the core network.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-11
Dual-Home Link Active-Standby Configuring Dual-Home Links
Active
Link
1/1
CORE1
EDGE
Standby 1/2
CORE2 Link
• The EDGE switch uses LACP to create an aggregate with two ports, one of the ports is configured in
STANDBY mode using the lacp agg standby command.
• STP is disabled on the aggregate.
• CORE1 and CORE2 use LACP to create an aggregate with a single port to the EDGE.
• All traffic flows over the primary Active Link while it is operational.
• If the Active Link goes down traffic is immediately redirected to the Standby Link which becomes the
Active Link.
• Pre-emption can be configured to determine how DHL operates when the primary link becomes active
again.
See Chapter 10, “Configuring Dynamic Link Aggregation,”for information on configuring LACP groups.
See “Dual-Home Link Active-Standby Example” on page 11-13 for a DHL application example.
page 11-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dual-Home Links Dual-Home Link Active-Standby
Edge Switch:
2 Create the LACP linkagg group and set port 1/2 in STANDBY mode:
Note. Optional. Use the lacp linkagg pre-empt and lacp linkagg pre-empt timer commands to enable
and configure the pre-empt timer. For example:
-> lacp linkagg 1 pre-empt enable/disable
-> lacp linkagg 1 pre-empt timer 120
In the example above pre-emption is enabled and the timer is set to 120 seconds.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-13
Dual-Home Link Active-Standby Configuring Dual-Home Links
Core Switch-1:
2 Create the LACP linkagg group and set the System ID:
2 Create the LACP linkagg group and set the System ID:.
page 11-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Dual-Home Links Displaying the Dual-Home Link Configuration
Note. See the “Link Aggregation Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference
Guide for complete documentation of show commands for link aggregation.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 11-15
Displaying the Dual-Home Link Configuration Configuring Dual-Home Links
page 11-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
12 Configuring Multi-chassis
Link Aggregation
The Multi-chassis Link Aggregation feature (MC-LAG) provides resiliency at the edge of the network by
enabling dual homing of any standards-based edge switches to a pair of aggregation switches to provide a
Layer 2 multi-path infrastructure. MC-LAG enables a device to form a Logical Link Aggregation (LAG)
interface with two or more devices, providing additional benefits over traditional LAG in terms of node
level redundancy, multi-homing support, and loop-free Layer 2 network.
MC-LAG allows links that are physically connected to two different OmniSwitch 9000E appear as a single
link aggregation group to a third edge device. MC-LAG provides this functionality without running layer 2
loop-detection protocols such as Spanning Tree Protocol between the edge and aggregation switches,
while still detecting data loop conditions, failure detection, and convergence.
The following are some key points regarding MC-LAG configuration:
• MC-LAG provides active/active dual homed connectivity to standards based L2 edge devices. No
support is provided for standby ports.
• Internal automatic configuration disables Spanning Tree functionality on MC-LAG aggregate ports.
• MC-LAG peers are seen as one aggregated group to dual homed edge device(s).
• MAC addresses learned on an MC-LAG aggregate in one of the multi-chassis peers are also learned on
the other switch on the same MC-LAG aggregate.
• A loop or duplicate packet prevention mechanism is implemented so that non-unicast frames received
on the Virtual Fabric Link are not flooded out of any local MC-LAG ports.
• A chassis can only be connected to a single peer multi-chassis switch.
For more information on components of MC-LAG, see “MC-LAG Concepts and Components” on
page 12-10
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-1
In This Chapter Configuring Multi-chassis Link Aggregation
In This Chapter
This chapter describes the basic components of MC-LAG and how to configure them through the
Command Line Interface (CLI). CLI commands are used in the configuration examples; for more details
about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
The following information and configuration procedures are included in this chapter:
• “Quick Steps for Configuring MC-LAG” on page 12-5
page 12-2 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Multi-chassis Link Aggregation Specifications
Note. MC-LAG between an OS9000E and OS6900 or OS10K is not supported. In addition, each
multi-chassis peer switch must run the same version of the OmniSwitch AOS Release 6 software for
MC-LAG support.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-3
Multi-chassis Link Aggregation Default Values Configuring Multi-chassis Link Aggregation
page 12-4 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Quick Steps for Configuring MC-LAG
Note. Although some parameters are configurable at runtime, it is strongly recommended that the entire
configuration be completed prior to rebooting the switches. This will avoid a temporary mismatch of
configurations between the peer switches as well as prevent multiple reboots.
1 Configure a globally unique chassis identifier using the multi-chassis chassis-id command as shown
below:
Chassis 1 -> multi-chassis chassis-id 1
Chassis 2 -> multi-chassis chassis-id 2
2 Configure a globally unique chassis group identifier for the multi-chassis domain using the
multi-chassis chassis-group command as shown below:
Chassis 1-> multi-chassis chassis-group 10
Chassis 2-> multi-chassis chassis-group 10
3 Create a virtual fabric link between chassis peers using the multi-chassis vf-link create command as
shown below:
Chassis 1-> multi-chassis vf-link create
Chassis 2-> multi-chassis vf-link create
4 Add the physical ports as members of the virtual fabric link on each peer switch using the
multi-chassis vf-link member-port command as shown below:
[Chassis 1] -> multi-chassis vf-link member-port 1/1
[Chassis 1] -> multi-chassis vf-link member-port 1/17
[Chassis 1] -> multi-chassis vf-link member-port 3/1
[Chassis 1]-> multi-chassis vf-link member-port 3/17
5 Verify the chassis identifier settings using the show multi-chassis status command as shown below:
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-5
Quick Steps for Configuring MC-LAG Configuring Multi-chassis Link Aggregation
6 Verify the link aggregate identifier ranges using the show linkagg range command as shown below:
7 Verify the virtual fabric link configuration and default VLAN settings using the show multi-chassis
vf-link command as shown below:
VFLink ID Oper Primary Port Config Port Active Port Def Vlan
-----------+----------+------------------+--------------+-------------+---------
0 Disabled N/A 0 0 1
VFLink ID Oper Primary Port Config Port Active Port Def Vlan
----------+----------+-------------------+--------------+-------------+---------
0 Disabled N/A 0 0 1
8 Verify the virtual fabric link configuration using the show multi-chassis vf-link member-port
command as shown below:
page 12-6 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Quick Steps for Configuring MC-LAG
9 Verify the consistency of system-level mandatory parameters between the two chassis using the show
multi-chassis consistency command as shown below:
10 Save the configuration and reload using the write memory and reload commands as shown below:
11 Once the system reboots verify the multi-chassis functionality using the commands shown below:
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-7
Quick Steps for Configuring MC-LAG Configuring Multi-chassis Link Aggregation
0 4/1 Up No
0 4/17 Up No
Note. Multi chassis peers in the same domain must maintain identical configuration and operational
parameters. Ensure that the mandatory parameters are the same on both peers. For more information, see
“Mandatory and Recommended Configuration Parameters” on page 12-37
page 12-8 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Overview
MC-LAG Overview
Multi Chassis Link Aggregation (MC-LAG) addresses resiliency at the edge of the network by enabling
dual homing of any standards-based edge switches to a pair of aggregation switches resulting in a Layer 2
multi-path infrastructure. MC-LAG provides increased bandwidth, load balancing and resiliency for L2
edge devices in a network.
An edge switch is dual homed to two Omniswitch 9000E through Link Aggregation Control Protocol or
Static Aggregation. MC-LAG enhances link aggregation by eliminating blocked redundant links to
provide fast switch over between edge and core switches without implementing Spanning Tree. Dual
homed uplinks are active /active and provide sub second traffic convergence for link fail.
Edge Aggregation
MC-LAG-1
Multi-Chassis
All links are active Peer Switch
Virtual Fabric
Link
All links are active
Multi-Chassis
MC-LAG-2 Domain
Multi-Chassis Infra-
structure that allows
MC-LAG: Multi-Chassis Multi-Chassis
applications to exchange
Link Aggregate state information over the Peer Switch
virtual fabric link
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-9
MC-LAG Overview Configuring Multi-chassis Link Aggregation
• Performs and monitors MC-LAG parameter consistency checks between the peer switches.
Edge Switches are any L2 standards-based switches providing network access to client PCs, servers,
printers, and so on. These devices dual home (active/active) into MC-LAG groups aggregated across a pair
of OmniSwitch multi-chassis peers.
Multi-Chassis Peer Switches are switches that terminate the aggregate links coming from multiple edge
devices. This implementation supports two peer switches per multi-chassis domain.
• Each peer can be a member of only one domain and must be assigned a unique chassis ID. MC-LAG
functionality will remain operationally down if duplicate chassis IDs are detected.
• One of the two peer switches within the domain serves as the primary switch (the switch with the
lowest chassis ID). The role of the switch is automatically determined and only effective when both
switches are up and MC-LAG is operational.
• The system MAC address of the primary switch is used throughout the MC-LAG domain to create the
LAG Group ID.
Multi-Chassis Link Aggregate is an aggregate of multiple switch ports in which subsets of the ports are
connected to a pair of aggregation switches. This type of aggregate is used to form a dual-homed (active/
active) connection between edge devices and the peer switches.
IPC VLAN is a special VLAN reserved for inter-chassis communication exchange between multi-chassis
peers. Ensure that IPC VLAN is the same on both peers. Only VFL ports can be assigned to this VLAN
and no other ports are allowed to join the IPC VLAN.
Virtual Fabric Link (VFL) is the aggregated group of 10G ports interconnecting the multi-chassis
peers.VFL is an automatic member of all VLANs created on the local chassis. The operational state of
VFL is tracked by implementing Link Aggregation Control Protocol. Group ID 128 is reserved for VFL
aggregate ports on single or multiple slots.
Virtual IP Interface (VIP) is the IP interface bound to the VFL for the respective subnet. It is the default
gateway for devices attached to the respective subnet. The VIP cannot be bound to any routing protocol or
establish any routing adjacencies. It routes only locally between MC-LAG subnets. By configuring the
routing maps, VIP subnets can converge with external routes.
Virtual IP (VIP) VLAN is a special type of VLAN used to provide the underlying LAN infrastructure for
the support of basic IP/Layer 3 services on a multi-chassis link aggregation group. MCLAG basically
extends L2 aggregated groups across multiple switches. Each multi-chassis peer needs to identify MCLAG
page 12-10 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Overview
VLANS from non-MCLAG VLANS to manage multi-chassis operations for respective applications,
including IP interfaces and services.
VIP VLAN IP Interface is an IP interface configured for a VIP VLAN that consists of two IP addresses:
a virtual IP address that is the same on each peer switch and a local IP address to provide management
access to a specific switch. Configuring a VIP VLAN IP interface is the recommended way to access an
MC-LAG configuration over a routed network. This implementation of a VIP interface:
• Provides a common IP address for both multi-chassis peer switches.
• Synchronizes the ARP information between the two peer switches, allowing either one of the peer
switches to respond to ARP requests coming from the MC-LAG aggregates.
• Serves as the default gateway for devices attached to the respective subnet.
• Routes only locally between MC-LAG subnets. By configuring route maps, VIP subnets can converge
with external routes.
Loop Detection is a utility provided to enable network loop detection. As a rule, you must take care not to
introduce back door loops through edge devices. The loop detection is enabled or disabled per system.
Loop detection mechanism generates multicast Loop Detect PDU at regular interval.
Benefits of MC-LAG
• MC-LAG ensures high-availability in the network by providing node resiliency on the aggregation
layer.
• MC-LAG provides dual-homed Layer 2 multi-path connections for edge nodes into the aggregation
without running the Spanning Tree protocol. The edge device can be any LACP capable-device.
• MC-LAG delivers active/active forwarding mode whereby both sets of uplinks that are part of the dual
homed aggregates are processing traffic to maximize the value of the customer investment.
Edge Aggregation
MC-LAG-1
Virtual Fabric
Link
Physical loop
No logical loop to be
guaranteed by the
feature design.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-11
MC-LAG Overview Configuring Multi-chassis Link Aggregation
An important characteristic of this solution relates to the absence of a logical loop between the edge and
multi-chassis peer switches, even though a physical loop does exist.
MC-LAG Principle
In order to ensure a loop free topology, traffic received on one of the ports of an aggregate is never flooded
out to any of the member ports including the receiving port or through the VFL.
As shown in the following diagram, two switches are connected back to back through an LACP interface.
If flooded traffic (multicast, broadcast, unknown traffic) is received by switch SW2 on Port A, it will not
be flooded out on either Port B or Port C. Additionally, it cannot be sent back out of the same port where it
was received.
page 12-12 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Overview
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-13
MC-LAG Topologies Configuring Multi-chassis Link Aggregation
MC-LAG Topologies
This section describes the building blocks that are used to construct more flexible and complex network
topologies. The recommended topologies for MC-LAG that are supported are:
• When all edge devices are attached to both MC-LAG peers at the core.
• When edge switches are connected through MC-LAG and core switches are dual-attached to
non MC-LAG interfaces.
For more information on MC-LAG topologies, refer to the following sections.
• “Basic MC-LAG Building Block” on page 12-14
• “Recommended Topologies” on page 12-14
• “Topologies Not Recommended” on page 12-16
• “Unsupported Topologies” on page 12-16
LINEAR BLOCK
Recommended Topologies
The following topologies are recommended to support MC-LAG:
• MC-LAG at L2 Core
page 12-14 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Topologies
L2 Bridging
MC-LAG MC -LAG
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-15
MC-LAG Topologies Configuring Multi-chassis Link Aggregation
MC-LAG LAG
Ordinary
aggregate, i.e.
non-MC-LAG
L2 Bridging
MC-LAG MC-LAG MC-LAG
Unsupported Topologies
In the topology shown below, MC-LAG is not supported since Spanning Tree cannot run with a
“backdoor” connection and will result in a loop.
LAG
page 12-16 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Topologies
This topology violates the principle that each edge switch can only be part of a single MC-LAG domain
and increases the configuration complexity. Now all the four multi-chassis peers need to have consistent
configurations (for example, LACP System ID in order for the edge switch to be able to negotiate the four
links as part of the same aggregate).
L2 Bridging
L3 Routing
This topology introduces the risk of a possible loop indicated by the arrows. Since Spanning Tree will not
run over the MC-LAG aggregates, this loop cannot be prevented.
L2 Bridging
Loop!!!
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-17
MC-LAG Topologies Configuring Multi-chassis Link Aggregation
The following topology illustrates that Switch B is required to keep separate system resources, such as
MAC tables, ports, software applications per virtual domain.
MC-LAG Pairs:
• A–B
• B-C MC-LAG
A C
B
MC-LAG
page 12-18 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Packet Flow
LA 1 LB2
LA 2 LB1
ARP Req. MC-LAG-A Host B
MC-LAG-B
(MACB , IPB )
S1 S2
PC PC
1 Since both hosts are in the same IP subnet, host A will send an ARP request as follows:
• Target IP = IPB
Depending on the hash algorithm or use of a fixed primary port for non-unicast traffic, switch S1 will
select a different port of the aggregate MC-LAG A to send the ARP request. In this example, assume that
the request goes through one of the ports connected to M1 represented by LA1.
2 Loop Prevention
• The broadcast packet is simply flooded within the system as indicated by the arrows.
• The MC-LAG will prevent the flooded packets received by M2 through the Virtual Fabric Link from
being sent out its local MC-LAG ports.
• This way, S2 will not get duplicate copies of the original packet that would otherwise flow through two
distinct paths: S1 ==> M1 ==> S2 and S1 ==> M1 ==> M2 ==> S2.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-19
MC-LAG Packet Flow Configuring Multi-chassis Link Aggregation
MC-LAG prevents MACA from being learned on the VFL ports of switch M2 but shows MACA as learned
on the LA aggregate even though the original ARP request packet was actually received through the VFL.
The MAC addresses learned on MC-LAG ports in one switch are learned on the same MC-LAG ports on
the peer switch.
4 Step 4: ARP Reply
• Switches M1 and M2 do not respond to the ARP request because the destination IP address (IPB) is not
an IP address of any of either of their IP interfaces.
• Eventually, the ARP request will reach the destination host B, which will respond to the ARP request
as indicated below.
LA 1 LB2
LA 2 LB1
MC-LAG-A Host B
MC-LAG-B
(MACB , IPB )
S1 ARP Reply
S2
PC
PC
As the ARP reply packet traverses the system on its way back via the path Host B ==> S2 ==> M1 => S1
=> Host A, the MACB address is learned by the M1 switch on the aggregate LB.
6 Step 6: Regular Traffic Flow
The packet eventually reaches the Host A. From this moment on, Host A will be able to communicate with
Host B using IP over the Layer 2 multi-path infrastructure provided by the MC-LAG aggregates.
page 12-20 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Packet Flow
Key Points
• The MC-LAG peers perform only Layer 2 switching and learning operations despite the fact that actual
traffic flowing between the hosts is IP-based.
• MAC addresses learned on an MC-LAG aggregate on one of the MC-LAG peers are also learned on
the other peer on the same MC-LAG aggregate.
• A loop/duplicate packet prevention mechanism is implemented so that non-unicast frames received on
the Virtual Fabric Link are not flooded out any local MC-LAG ports.
• Downstream traffic always prefers the local MC-LAG ports, if these are available.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-21
Interaction with Other Features Configuring Multi-chassis Link Aggregation
page 12-22 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Interaction with Other Features
Link Aggregation
• MC-LAG ports configured as dual-homed MC-LAG do not support standby ports.
• Static or dynamic link aggregates are used to create the MC-LAG aggregates between an edge device
and the two multi-chassis peer switches.
• Specific static and dynamic link aggregate configuration and show command outputs include
parameters to configure MC-LAG functionality on the aggregate or display MC-LAG aggregate
information.
• A loop within the MC-LAG setup may occur when one end of a static MC-LAG aggregate is
configured on the core peer switches before the other end is configured on the edge switches. The
following configuration options will help to prevent loops from occuring:
> Configure the static MC-LAG aggregate on the edge switches first, then configure the other end on
the core peer switches.
> If possible, use dynamic (LACP) aggregates instead of static aggregates.
> Disable all ports that will serve as members of the static MC-LAG aggregate, configure the
aggregate on both ends (core and edge), then enable the member ports.
Multicast
• DVMRP is not supported with MC-LAG.
• IP Multicast Switching (IPMS) does not allow routing into MC-LAG VFL ports. As a result, there is
no way for multicast data traffic to be inserted into the MC-LAG IPC-VLAN, which is only present on
VFL ports.
• Enabling IPMS on the IPC-VLAN is not recommended, but doing so will only cause a slight increase
in the amount of control traffic that is sent over the VFL on the IPC-VLAN. There is no benefit to
enabling IPMS on an IPC-VLAN.
• IGMP v1/v2 translation to PIM-SSM static mapping is not supported in MC-LAG.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-23
Interaction with Other Features Configuring Multi-chassis Link Aggregation
page 12-24 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Interaction with Other Features
User Guildelines
• The MVRP configuration has to be consistent across both the chassis, else MVRP learning across
chassis might result in an unpredictable behaviour.
• The configuration for the non-MC-LAG ports also should be synchronised on both the chassis. This
ensures symmetrical propogation of VLANs out of the two MC-LAG ports of the two chassis.
• MVRP is supported only on MC-LAG ports and not on VFL and hence, no MVRP configuration is
allowed on VFL.
• With MVRP over MC-LAG, only the dynamic learning on MC-LAG ports is synchronized. No
synchronization of learning is done for Non-MC-LAG ports.
• As MVRP learning is synchronized across both the MC-LAG chassis, the MVRP Pduís are propagated
out of both the MC-LAG ports of the MC-LAG peers to the upstream as well as downstream switches
connected to the two chassis.
• When MC-LAG is up but the link between one of the MC-LAG chassis and the Edge switch is down,
to allow MVRP learning on such inactive MC-LAG ports for faster convergence, the user should
configure the applicant mode as active on the MC-LAG ports of both the chassis. For the learning to
persist/happen on down MC-LAG ports, the MC-LAG link going to atleast one of the MC-LAG
chassis should be up.
Source Learning
MC-LAG is supported only when the switch is operating in the centralized source learning mode, which is
the default mode for the switch.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-25
Interaction with Other Features Configuring Multi-chassis Link Aggregation
page 12-26 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Interaction with Other Features
• The DHCP/UDP relay agent receive messages from DHCP clients and forward them to DHCP servers.
• Responses from the DHCP servers are sent back to the relay agent, and the relay agent then sends these
responses to the DHCP client on the local network link.
• You can configure the switch to snoop DHCP server responses only from particular VLANs. Doing
this prevents spoofing of DHCP messages exchanges between server and host.
• By default DHCP snooping is disabled on relay agent.
• For DHCP relay and DHCP snooping to work over an MC-LAG environment, user should have same
configuration on both multi-chassis.
• Remote flag is added in the binding table to indicate which multi chassis processed the packets in an
Multi-chassis setup. It is significant only for binding entries created on multi-chassis link aggregation.
• The DHCP snooping configuration has to be identical on both the chassis of the multi-chassis for
smooth functioning.
• IP helper addresses configured on both MC-LAG chassis needs to be same.
• Binding entries are created only when snooping is enabled and binding entry shall not be created when
only DHCP relay is enabled.
• In case of relay, the giaddr, which is gateway address is advertised so that server can allocate IP in
same pool for client. However, in case of MC-LAG it has to be a VIP address since server should be
able to reach relay if any of the chassis goes down.
• For relay, it is mandatory to configure VIP. VIP is used as relay ip agent, that is the giddr.
• In relay with snooping, the server may get two packets from each relay agent. Still the giaddr will be
the same and mac-address of the client will be same. So end host does not face any problem becasue of
this.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-27
Interaction with Other Features Configuring Multi-chassis Link Aggregation
• IP Source Filtering (ISF) is supported on host connected on MC-LAG also. ISF is used as security
feature where traffic from host is checked against MAC, IP and Vlan. It is recommended to configure
ISF on both the chassis.
See “Example 3: MC-LAG DHCP Snooping configuration” on page 12-42 and “Example 4: MC-LAG
DHCP Relay configuration” on page 12-44 for example MC-LAG configuration with DHCP Snooping
and Relay enabled.
IPv4
Each multi-chassis peer needs to identify MC-LAG VLANs from standard (non-MC-LAG) VLANs to
manage multi-chassis operations for switch applications, including IP interfaces and services. This is done
through the use of a virtual IP VLAN (VIP VLAN). This type of VLAN provides the underlying LAN
infrastructure for the support of basic IP/Layer 3 services on a multi-chassis link aggregation group.
• VIP VLANs support IPv4 interfaces to provide routing between MC-LAG subnets and between
MC-LAG subnets and other standard IP subnets. Configuring IPv6 interfaces is not supported.
• The IP interfaces configured on a VIP VLAN have limited functionality. Routing protocols and VRRP
cannot be configured on such IP interfaces.
• A VIP VLAN IP interface supports two types of IP address on the same interfaces: a virtual IP address
and a local management address.
• A VIP VLAN IP interface is similar to a VRRP interface without master/backup and is configured the
same on both peers: same virtual IP address bound to the same VIP VLAN interface.
• The VIP VLAN interface is the gateway for devices connected through the respective IP network.
• The VIP routes are propagated to L3 networks via route redistribution. OSPF is the recommended rout-
ing protocol to interoperate with VIP VLANS.
• Configuring and enabling IP route-maps to redistribute local (VIP) routes to OSPF is required. OSPF
interfaces in the forwarding path will dynamically update and propagate VIP routes upstream to the
core routers and onwards, effectively providing visibility and bidirectional communication between
MC-LAG subnets and L3 networks.
• ECMP to upstream L3 networks is highly recommended:
> Eliminates STP on uplinks.
> Robust failover.
> Load balances upstream traffic.
page 12-28 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Interaction with Other Features
• QoS configuration
• PIM configuration
• IP interface configuration
• VRRP configuration
For more information, see “Mandatory and Recommended Configuration Parameters” on page 12-37.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-29
Configuring MC-LAG Configuring Multi-chassis Link Aggregation
Configuring MC-LAG
This section describes commands to configure MC-LAG on a switch.
• “MC-LAG Configuration Guidelines” on page 12-30
• “Configuring the Chassis-ID” on page 12-33
• “Creating the Virtual Fabric Link (VFL)” on page 12-34
• “Configuring the Group ID” on page 12-33
• “Configuring Aggregate Identifier Ranges” on page 12-35
• “Creating the Virtual Fabric Link (VFL)” on page 12-34
• “Configuring MC-LAG Aggregates” on page 12-35
• “Configuring the VIP VLAN” on page 12-35
Note. See “Quick Steps for Configuring MC-LAG” on page 12-5” for a brief tutorial on configuring these
parameters on an OmniSwitch 9000E.
General
• MC-LAG functionality is only active for switches on which an MC-LAG chassis ID is configured.
• The Spanning Tree protocol can run on MC-LAG chassis peers, however STP is disabled on MC-LAG
ports.
• One of the MC-LAG chassis peers should be the root bridge so that the VFL is always in forwarding
mode.
• MC-LAG functionality is only active for switches on which an MC-LAG chassis ID.
• Due to the MG-LAG loop avoidance feature, non-unicast traffic received on the VFL is never flooded
on local MC-LAG ports.
• There is no synchronization of routing information between MC-LAG peers.
• The same number of uplink ports must be configured from the edge device to each of the MC-LAG
aggregation switches unless a very specific setup is required. This ensures homogeneous traffic
distribution for flows.
Note. On MC-LAG, all the routing protocol interfaces should have BFD enabled. This helps to avoid the
black holing of routing flows as the VLAN on multichassis never goes down due to the VFL port always
remaining up. For more information on configuring BFD see Chapter 27, “Configuring BFD” and BFD
Commands in the OmniSwitch AOS Release 6 CLI Reference Guide.
page 12-30 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Configuring MC-LAG
Chassis-ID
• Each peer switch requires a chassis ID number that is unique within the multi-chassis domain. The
MC-LAG feature currently supports two peer switches per multi-chassis domain, so ID 1 or 2 is used.
• If a duplicate chassis ID is detected, then the operational state of the chassis will remain down.
• The chassis ID is used to generate globally unique values for the module identifiers as well as
allowing inter-chassis communication.
• The switch must be rebooted after configuring the chassis ID.
For information about configuring the Chassis-ID, see “Configuring the Chassis-ID” on page 12-33.
Chassis Group ID
• Each peer switch also requires a chassis group ID number to identify the switch as belonging to that
specific multi-chassis domain.
• The same group ID number is assigned to each peer switch in the domain. Peer switches which belongs
to other multi-chassis domains must use a different group ID number.
• If the peer switches within the same multi-chassis domain do not have the same group ID number, the
operational state of the MC-LAG will remain down due to inconsistency.
• If two or more separate multi-chassis domains use the same group ID number, this inconsistency is not
detected or corrected by MC-LAG functionality. It is up to the administrator to ensure that each
domain uses a unique group ID.
• The group ID is used to generate a globally unique virtual MAC address for each multi-chassis domain
to avoid duplicate MAC addresses in a network that may contain more than one MC-LAG domain
configuration.
For information about configuring the chassis group ID, see “Configuring the Group ID” on page 12-33.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-31
Configuring MC-LAG Configuring Multi-chassis Link Aggregation
• The hello interval parameter must match between chassis peers. The hello protocol runs across the VFL
link between the peers.
For more information on Virtual Fabric Link, see “Creating the Virtual Fabric Link (VFL)” on page 12-34
IPC VLAN
• The IPC VLAN ID must match between the two chassis and cannot be disabled.
• Only the VFL link can be configured as a member of the IPC VLAN.
For more information on IPC-VLAN, see “Configuring the IPC-VLAN” on page 12-34
• The local range configured on Chassis 1 must match the peer range configured on Chassis 2 and
vice-versa.
• Only an aggregate ID in the Multi-chassis range should be used for MC-LAG.
For more information about Aggregate Identifier Ranges, see “Configuring Aggregate Identifier Ranges”
on page 12-35
VIP VLAN
• Although VIP VLANs are identified as a special VLAN type for MC-LAG purposes, assigning
non-MC-LAG ports to this type of VLAN is supported. In addition, assigning MC-LAG ports to
standard VLANs (non-VIP VLANs) is supported.
• There are two IP addresses associated with a VIP VLAN IP interface: a management address and a
virtual IP address.
> The management address is a unique IP address used by each switch within a multi-chassis system
to provide management services. Each peer switch must have a unique management IP address.
> The virtual IP address is used to route packets that terminate on the multi-chassis peer switches.
Unlike the management address, the VIP address must be the same on each peer switch.
• The IP interfaces configured on a VIP VLAN cannot be bound to any routing protocols or establish
routing adjacencies.
• VRRP is not supported on VIP VLAN IP interfaces. IPv6 interfaces cannot be configured on a VIP
VLAN at this time.
• The VIP VLAN routes are propagated to L3 networks via route redistribution. OSPF is the
recommended routing protocol to interoperate with VIP VLANS.
• Configuring and enabling IP route-maps to redistribute local VIP routes to OSPF is required. OSPF
interfaces in the forwarding path will dynamically update and propagate VIP routes upstream to the
core routers and onwards, effectively providing visibility and bidirectional communication between
MC-LAG subnets and L3 networks.
• ECMP to upstream L3 networks is highly recommended to:
> Eliminate STP on uplinks.
> Provide Robust failover.
> Load balance upstream traffic.
page 12-32 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Configuring MC-LAG
For more information on VIP VLAN, see “Configuring the VIP VLAN” on page 12-35
By default, the chassis ID is set to ì0î. This indicates the switch is running in standalone mode, which
means that no multi-chassis functionality is available.
Note. The boot.chassis.cfg file should not be modified by user. This file is created when user configures
the chassis id and issues a write memory.
By default, the chassis group ID is set to “0”. In a network environment where more than one MC-LAG
domain may exist, such as in a back-to-back MC-LAG setup, configure each domain with its own unique
group ID. Duplicate domain group IDs are not detected by MC-LAG.
See the “Example 2: MC-LAG Group ID Configuration” on page 12-41 to see how the group ID is used to
uniquely identify two separate groups of multi-chassis peer switches to avoid duplicate MAC addresses in
an MC-LAG network environment.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-33
Configuring MC-LAG Configuring Multi-chassis Link Aggregation
Note. The virtual fabric link configuration should not be changed at runtime as adding or removing ports
to the virtual fabric link at runtime causes disruption to the existing traffic distribution configuration.
page 12-34 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Configuring MC-LAG
The example above modifies the ranges to allow for 10 local, 10 peer, and 108 MC-LAG link aggregates.
To configure only MC-LAG aggregate identifiers see the example below:
-> linkagg range local none peer none multi-chassis 0-127
Note: The local range configured on Chassis 1 must match the peer range configured on Chassis 2 and
vice-versa. The switch must be rebooted for modified ranges to become operational. The maximum
number of combined standard aggregates and MC-LAG aggregates is 128.
To configure a virtual IP interface for a VIP VLAN, use the ip interface command with the vip-address
parameter. For example, the following command creates a virtual IP interface for VIP VLAN 10:
-> ip interface vip-vlan-10 vip-address 10.10.10.100 vlan 10
To configure a management address for the virtual IP interface, use the ip interface command with the
address parameter, but specify the name of the virtual IP interface configured for the VIP VLAN. For
example, the following command assigns a management IP address to the “vip-vlan-10” interface:
-> ip interface vip-vlan 10 address 10.10.10.200 vlan 10
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-35
Configuring MC-LAG Configuring Multi-chassis Link Aggregation
When configuring an IP interface for a VIP VLAN, it is possible to configure both the virtual IP address
and the management address at the same time. For example:
-> ip interface vip-vlan-10 vip-address 10.10.10.100 address 10.10.10.200 vlan
10
Use the show vlan command to verify the VIP VLAN configuration for the switch. Use the show ip
interface command to verify the IP interface configuration for VIP VLANs.
page 12-36 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Mandatory and Recommended Configuration Parameters
Global Parameters
Chassis ID (must be different between chassis) Bring down all MC-LAG aggregates
Multi-Chassis Hello Interval
STP Path Cost Mode: Auto, 32-bit
STP Mode: 1x1, Flat
MC-LAG LACP Type: MC-LACP, MC-Static Bring the specific MC-LAG aggregate down
VLAN Configured on MC-LAG aggregate
VLAN Type: Default, 802.1Q Tag
VLAN Enable State on MC-LAG
LACP System ID (*)
LACP System Priority (*)
Note: AOS has global default values for the LACP System ID (derived from the system MAC address)
and LACP System Priority (a constant hard-coded value). Even though not widely used, the management
interface provides the ability to change these parameters on a per-aggregate basis. As a result, these
parameters are always treated as per-MC-LAG aggregate.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-37
Mandatory and Recommended Configuration Parameters Configuring Multi-chassis Link Aggregation
Ensure that the following recommended parameters are configured identical on both the chassis.
• MAC Address Aging Timer
• QoS Configuration
• PIM Configuration
• IP interface configuration
• VRRP Configuration
page 12-38 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Configuration Examples
(50.50.50.2, MACM 2)
Routes:
M
1 Routes:
VFL
40.40.40.0/24 > 20.20.20.2 M2 40.40.40.0/24 > 30.30.30.2
40.40.40.0/24 > 50.50.50.2 (50.50.50.1, MACM 1) 40.40.40.0/24 > 50.50.50.1
10.10.10.0/24 > Direct 10.10.10.0/24 > Direct
VLAN 10 (10.10.10.100, MACVIP) VLAN 10
VIP
LA 1 LA 2
MC-LAG
S1
ARP Req.
PC
-> vlan 30
-> vlan 50
-> ip interface vlan-30 address 30.30.30.1/24 vlan 30
-> ip interface vlan-50 address 50.50.50.1/24 vlan 50
[Configure appropriate routing protocol on VLANs 30 and 50]
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-39
MC-LAG Configuration Examples Configuring Multi-chassis Link Aggregation
MC-LAG Configuration - M1
-> multi-chassis chassis-id 1
MC-LAG Configuration - M2
-> multi-chassis chassis-id 2
SW1 Configuration
-> linkagg lacp agg 96 size 4 admin-state enable
-> linkagg lacp port 1/1-2 actor admin-key 1
-> linkagg lacp port 1/3-4 actor admin-key 1
-> vlan 10 members linkagg 1 untagged
page 12-40 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Configuration Examples
The following sample MC-LAG network topology consists of two multi-chassis peer groups that are
each connected to an edge device through MC-LAG aggregates:
In this sample topology, virtual IP interfaces are configured on the MC-LAG aggregates. The same virtual
MAC address (00:00:5E:00:02:01) is generated for each of these IP interfaces. If these IP interfaces are
created on the same VLAN for both of the multi-chassis peer groups, this may cause a duplicate MAC
address condition within the network.
To ensure that a globally unique MAC address is assigned to each MC-LAG virtual IP interface,
configure the multi-chassis group ID on each switch within each MC-LAG group. For example, the
following diagram shows the same topology but with the group ID configuration added:
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-41
MC-LAG Configuration Examples Configuring Multi-chassis Link Aggregation
The group ID is appended to the virtual MAC address generated for each MC-LAG virtual IP interface,
thus making each address unique within the network to avoid a duplicate MAC address scenario. For more
information about configuring the multi-chassis group ID, see the “MC-LAG Configuration Guidelines”
on page 10-27.
The topology used in this sample MC-LAG configuration is only one of many examples in which a
duplicate MAC address condition can occur. Configuring a unique group ID for each multi-chassis group
is recommended for all MC-LAG topologies.
In this scenario:
Aggregate port -> (Request) server reachable via same chassis -> Regular DHCP
-> Reply via different chassis
Request flow - DHCP client -> S1 -> M1 -> C1 -> DHCP Server
Reply flow - DHCP Server -> C1 -> M1 -> S1 -> DHCP Client
• Both M1 and M2 have access to the DHCP server through the same chassis C1.
page 12-42 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation MC-LAG Configuration Examples
• Port connected to C1 in both M1 and M2 are configured as dhcp snooping trusted ports.
• The same VLAN ID is used for VLANs connecting edge switch to M1 and M2 and M1 and M2 to the
chassis C1 which is connected to DHCP server on the same VLAN.
• At M2, STP blocked port is connected to C1 and at M1 and at M2, MC-LAG loop prevention is
enabled.
• The DHCP Client is connected to edge switch S1, host is configured to get dynamic IP address from
the DHCP server.
• UDP unicast messages are sent from the DHCP client.
• DHCP request is captured at M1 and sent through VLAN 10 to the DHCP server though the chassis.
• A trancient entry used per transaction tracks the MAC address, incoming VLAN and incoming port
information and creates a binding database entry after an aknowledgement is recieved.
• Since the trust port M2 is blocked client DHCP request packet is dropped. However, if M1 is blocked
for some reason, then M2 will process the request and sent the request packet to server.
• The DHCP server responds with a DHCP reply and a valid IP address and the reply is sent through the
same M1 to the DHCP client through the edge switch.
Note1- Unicast reply packets would flow on MC-LAG interface if it is an UP on local chassis else if it is
down would forward to the peer chassis over VFL.
Note2- All the DHCP packets are by default trapped to the CPU due to hardware configured for port 67/68
in H/W, but they are dropped in NI CPU if DHCP Relay or snooping is disabled. So in normal DHCP case
when no DHCP snooping or relay is enabled the H/W flooded packet is forwarded to the server and there
is no processing in software
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-43
MC-LAG Configuration Examples Configuring Multi-chassis Link Aggregation
Aggregate port -> (Request) server reachable via same chassis -> DHCP Relay
-> Reply via same chassis
Request flow - DHCP client -> S1 -> M1 -> C1 -> DHCP Server 1.1.1.1
Reply flow - DHCP Server -> C1 -> M1 -> S1 -> DHCP Client
• Both M1 and M2 have access to the DHCP server through the same chassis C1.
• IP helper addresses configured on both MCLAG chassis. User has to ensure that IP helper is
configured on both the chassis.
• VLAN 10 should be configured as VIP vlan and VIP address should be configured on both the chassis.
• The DHCP Client is connected to edge switch S1, host is configured to get dynamic IP address from
the DHCP server.
• DHCP request packet from host is processed in M1 since relay is configured and DHCP request packet
is forwarded to DHCP Server by M1 which is acting as relay agent.
page 12-44 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Multi-chassis Link Aggregation Displaying MC-LAG Configuration and Statistics
• This packet is flooded in hardware to in VFL port and host connected in VLAN 10 in remote chassis
might also get the request packet. But no processing is done by M2 software.
• M1 shall add VIP address for VLAN 10 as the giaddr in the request packet forwarded DHCP server.
• Since VIP address is used as giaddr even when the reply comes to M2 from server it shall be processed
since M2 is also aware of this VIP address.
• Unicast messages are sent from the DHCP client by the DHCP relay agent either through M1 or M2
which receives the reply packet from server.
• In the above example The reply from the DHCP server reaches the DHCP client through M1 and edge
switch.
show multi-chassis status Displays the configured and operational parameters related to the
multi-chassis feature on the local chassis.
show multi-chassis vf-link Displays the configured and operational parameters related to the
virtual fabric link on the local chassis.
show multi-chassis vf-link Displays the configured and operational parameters related to the
member-port virtual fabric link member ports on the local chassis
show multi-chassis consistency Displays the system level mandatory consistency parameters of both
the local and peer chassis
show multi-chassis consistency Displays the per-multi-chassis aggregate consistency parameters of
linkagg both the local and peer chassis given the aggregate identifier.
show multi-chassis loop-detection Displays the configured and operational parameters related to the
multi-chasiss loop-detection feature on the switch.
show configuration snapshot Displays the switch’s current running configuration for all features
or for the specified feature(s).
For more information about the output details that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 12-45
Displaying MC-LAG Configuration and Statistics Configuring Multi-chassis Link Aggregation
page 12-46 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
13 Configuring ERP
The ITU-T G.8032/Y.1344 Ethernet Ring Protection (ERP) switching mechanism is a self-configuring
algorithm that maintains a loop-free topology while providing data path redundancy and network
scalability. ERP provides fast recovery times for Ethernet ring topologies by utilizing traditional Ethernet
MAC and bridge functions.
Loop prevention is achieved by allowing traffic to flow on all except one of the links within the protected
Ethernet ring. This link is blocked and is referred to as the Ring Protection Link (RPL). When a ring
failure condition occurs, the RPL is unblocked to allow the flow of traffic to continue through the ring.
Alcatel-Lucent OmniSwitch supports ERPv2 according to the ITU-T recommendation
G.8032 03/2010 in the current AOS version. The previous AOS versions support ERPv1.
The ERPv2 implementation helps maintain a loop-free topology in multi-ring and ladder networks that
contain interconnection nodes, interconnected shared links, master rings and sub-rings.
The following chapter details the different functionalities and configuration settings required for both
ERPv1 and ERPv2.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-1
In This Chapter Configuring ERP
In This Chapter
This chapter provides an overview about how Ethernet Ring Protection (ERP) works and how to
configure its parameters through the Command Line Interface (CLI). CLI commands are used in the
configuration examples; for more details about the syntax of commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
The following information and configuration procedures are included in this chapter for ERPv1 and
ERPv2:
• “Quick Steps for Configuring ERPv1 or ERPv2 with Standard VLANs” on page 13-5.
• “Quick Steps for Configuring ERPv1 or ERPv2 with VLAN Stacking” on page 13-6
page 13-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERP Specifications
ERP Specifications
The following table specifies the ERP related specifications:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-3
ERP Defaults Configuring ERP
ERP Defaults
ERP Defaults
ERPv2 Defaults
page 13-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP Quick Steps for Configuring ERPv1 or ERPv2 with Standard VLANs
1 Create a VLAN using the vlan command and add the ring ports.
2 Create ERP ring ID 1, ERP Service VLAN and MEG Level and associate two ports to the ring using
the erp-ring command.
-> erp-ring 1 port1 1/3 port2 1/4 service-vlan 1001 level 1
3 Configure the RPL on one node using the erp-ring rpl-node command.
4 Create additional VLANs and add to the ring ports using the vlan command.
-> vlan 11-20
-> vlan 11-20 802.1q 1/3
-> vlan 11-20 802.1q 1/4
5 Enable the ERP ring configuration using the erp-ring enable command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-5
Quick Steps for Configuring ERPv1 or ERPv2 with VLAN Stacking Configuring ERP
1 Create a VLAN Stacking SVLAN 1001 using the ethernet-service svlan command.
2 Create a VLAN Stacking service and associate the service with SVLAN 1001 using the ethernet-
service service-name command.
-> ethernet-service service-name CustomerA svlan 1001
3 Configure ports 1/1 and 1/2 as VLAN Stacking Network Network Interface (NNI) ports, associate the
ports with SVLAN 1001, and configure them for use with ERP using the ethernet-service svlan nni
command.
4 Create ERP ring ID 1 and associate the two NNI ports to the ring using the erp-ring command.
5 Configure the RPL on one node using the erp-ring rpl-node command.
6 Create additional SVLANs and add to the ring ports using the ethernet-service svlan command.
7 Enable the ERP ring configuration using the erp-ring enable command.
page 13-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERP Overview
ERP Overview
ERP
Ethernet Ring Protection (ERP) is a protection switching mechanism for Ethernet ring topologies, such as
multi-ring and ladder networks. This implementation of ERP is based on the Recommendation
ITU-T G.8032/Y.1344 and uses the ring Automatic Protection Switching (APS) protocol to coordinate the
prevention of network loops within a bridged Ethernet ring.
Loop prevention is achieved by allowing the traffic to flow on all but one of the links within the Ethernet
ring. This link is blocked and is referred to as the Ring Protection Link (RPL). When a ring
failure condition occurs, the RPL is unblocked to allow the flow of traffic to continue through the ring.
One designated node within the ring serves as the RPL owner and is responsible for blocking the traffic
over the RPL. When a ring failure condition occurs, the RPL owner is responsible for unblocking the RPL
so that the link can forward traffic to maintain ring connectivity.
ERPv2
The ERPv2 implementation of ITU-T G.8032 03/2010 supports multi-ring and ladder networks with
interconnection nodes, interconnected shared links, master rings and sub-rings. The following features are
also supported:
• R-APS Virtual Channel
• Revertive/Non-Revertive modes
A shared link can be a part of one master ring. The sub-rings connected to the interconnection nodes are
open.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-7
ERP Overview Configuring ERP
ERP Protected VLAN for ERPv1— A VLAN that is added to the ERP ring. ERP determines the
forwarding state of protected VLANs. Protected VLAN is active only for ERPv1 configuration.
FDB — The Filtering Database that stores filtered data according to the R-APS messages recieved. This
database also maintains an association table that identifies the master rings for a given sub-ring.
BPR — The Blocked Port Reference that identifies the ring port (0 for interconnection node or sub-ring , 1
for master ring ) that is blocked. The BPR status is used in all R-APS messages.
CCM — When an Ethernet ring contains no ERP capable nodes, CCM (Continuity Check Messages) are
required to monitor the ring-port connectivity across the L2 network.
MEG and MEL — The switches in the Management Entity Group with given priority as MEG level
(MEL).
NR and SF — Not Reachable and Signal Failure specify the status messages that can be sent as part of the
R-APS messages.
ERP Timers
Wait To Restore (WTR) Timer. This timer is used by the RPL to verify stability of the Etherenet ring.
WTR Timer determines the number of minutes the RPL switch waits before returning the RPL ports to a
blocked state after the ring has recovered from a link failure.
Some important points about the WTR Timer are as follows:
• The timer is started when the RPL node receives an R-APS (NR) message that indicates ring
protection is no longer required.
• The timer is stopped when the RPL owner receives an R-APS (SF) message while WTR is running,
which indicates that an error still exists in the ring.
• When the time runs out, the RPL port is blocked and an R-APS (NR, RB) message is transmitted from
both the ring ports to indicate that the RPL is blocked.
• Refer to the “ERP Specifications” on page 13-3 for timer defaults and valid ranges.
Guard Timer. When the failed link recovers, a ring node starts the Guard Timer. The Guard Timer is used
to prevent the ring nodes from receiving outdated R-APS messages that are no longer relevant.
Some important points about the Guard Timer are as follows:
• When the Guard Timer is running, any R-APS messages received are not forwarded.
• The Guard Timer value must be greater than the maximum expected forwarding delay time for which it
takes one R-APS message to circulate around the ring. This calculated value is required to prevent any
looping scenarios within the ring.
• Refer to the “ERP Specifications” on page 13-3 for timer defaults and valid ranges.
page 13-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERP Basic Operation
Normal Mode
If a link or node failure occurs in the ring shown in the above illustration, the ring transitions as follows
into the protection mode:
• Nodes adjacent to the failure detect and report the failure using the R-APS (SF) message.
• The R-APS (SF) message triggers the RPL owner to unblock the RPL.
• All nodes in the ring flush all the dynamic MAC addresses learned on their ring ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-9
ERP Basic Operation Configuring ERP
Protection Mode
When the failed link shown in the above illustration recovers, the ring transitions as follows back to the
idle mode:
• Nodes adjacent to the recovered link initiate an R-APS (NR) message and start the Guard Timer.
• When the RPL owner receives the R-APS (NR) message, it starts the Wait-To-Restore timer (WTR),
which is the set period of time that must elapse before the RPL owner blocks the RPL.
• Once the WTR timer expires, the RPL owner blocks the RPL and transmits an R-APS (NR, RB)
message indicating that RPL is blocked (RB).
• On receiving the R-APS (NR, RB) message, ring nodes flush all the dynamic MAC addresses learned
on their ring ports and unblock any previously blocked ports.
• The ring is now operating in the idle mode. The RPL is blocked and all other ring links are operational.
page 13-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERPv2 Basic Operation
Illustration of ERPv2 on Multi Ring and Ladder Network with RPLs and Shared Links
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-11
ERPv2 Basic Operation Configuring ERP
Note. The Service VLAN must be tagged, there is no support for "untagged" service VLAN in ERPv2.
The sub ring and master ring cannot use the same service VLAN.
page 13-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP Interaction With Other Features
Spanning Tree
STP is automatically disabled when ERP is enabled on any port.
VLAN Stacking
ERP has the following interactions with VLAN Stacking:
• ERP is supported on Network Network Interface (NNI) ports; it is not supported on UNI ports.
• Tunneling of STP BPDUs across UNI ports is supported in a VLAN stacking configuration.
See “Configuring ERP with VLAN Stacking NNIs” on page 13-17 for more information.
Source Learning
The ERP protocol determines and performs the MAC address flushing per port.
QoS Interface
The interaction between ERP and QoS is for the purpose so that R-APS PDUs can be handled
appropriately by the switch.
MVRP
ERP NI must provide blocking or forwarding state of ERP ports to MVRP.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-13
ERP Configuration Overview and Guidelines Configuring ERP
1 Configure the basic components of an ERP ring (ring ports, service VLAN, and MEG level). See
“Configuring an ERP Ring” on page 13-15.
2 Tag VLANs for ring protection. See “Adding VLANs to Ring Ports” on page 13-15.
3 Configure an RPL port. When a ring port is configured as an RPL port, the node to which the port
belongs becomes the RPL owner. The RPL owner is responsible for blocking and unblocking the RPL.
See “Configuring an RPL Port” on page 13-16.
4 Change the Wait-To-Restore timer value. This timer value determines how long the RPL owner waits
before restoring the RPL to a forwarding state. See “Setting the Wait-to-Restore Timer” on page 13-16.
5 Change the Guard timer value. This timer value determines an amount of time during which ring nodes
ignore R-APS messages. See “Setting the Guard Timer” on page 13-16.
6 Configure the ring port to receive the loss of connectivity event for a Remote Ethernet OAM endpoint.
See “Configuring ERP with VLAN Stacking NNIs” on page 13-17.
7 Configure a VLAN Stacking NNI-to-SVLAN association for ERP control. This is done to include an
SVLAN in a ring configuration. See “Configuring ERP with VLAN Stacking NNIs” on page 13-17.
8 Clear ERP statistics. Commands to clear ERP statistics for a single ring or multiple rings are described
in “Clearing ERP Statistics” on page 13-18.
Configuration Guidelines
Use the following guidelines when configuring ERP for the switch:
• Physical switch ports and logical link aggregate ports can be configured as ERP ring ports. This also
includes VLAN Stacking Network Network Interface (NNI) ports.
• ERP is not supported on mobile ports, mirroring ports, link aggregate member ports, VLAN receiver
ports (ERP is supported on Multicast VLAN sender ports only), or VLAN Stacking User Network
Interface (UNI) ports.
• An ERP ring port can belong to only one ERP ring at a time.
• If the ERP switch participates in an Ethernet OAM Maintenance Domain(MD), configure the
Management Entity Group (MEG) level of the ERP service VLAN with the number that is used for the
Ethernet OAM MD.
• The Service VLAN can belong to only one ERP ring at a time and must be a static VLAN. Note that
the service VLAN is also a protected VLAN.
page 13-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERP Configuration Overview and Guidelines
1 Determine which two ports on the switch are the ring ports. For example, ports 1/1 and 1/2.
2 Determine which VLAN on the switch is the ERP service VLAN for the ring. If the VLAN does not
exist, create the VLAN. For example:
-> vlan 500
3 Create the ERP ring configuration on each switch using the erp-ring command. For example the
following command configures an ERP ring with ring ID 1 on ports 1/2 and 1/2 along with service VLAN
500 and MEG level 1.
To configure link aggregate logical ports as ring ports, use the erp-ring command with the linkagg
parameter. For example:
4 Repeat Steps 1 through 6 for each switch that participates in the ERP ring. Make sure to use the same
VLAN ID and MEG level for the service VLAN on each switch.
Use the show erp command to verify the ERP ring configuration. For more information about this
command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Note. Administratively disable ring ports before deleting the ring to avoid creating any network loops.
Once a ring is deleted, then administratively enable the ports under Spanning Tree protocol.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-15
ERP Configuration Overview and Guidelines Configuring ERP
Note. RPL node can be configured only when the ring is disabled; RPL configuration applied to the ring
while it is enabled is rejected.
To remove the RPL node configuration for the specified ring, use the no form of the erp-ring rpl-node
command. For example:
-> no erp-ring 1 rpl-node
To verify the RPL node configuration for the switch, use the show erp command. For more information
about this command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
The above command is only used on a switch that serves as the RPL node for the ERP ring. The specified
ERP ring ID must already exist in the switch configuration.
To restore the timer back to the default setting, use the no form of the erp-ring wait-to-restore command.
For example:
-> no erp-ring 1 wait-to-restore
To verify the WTR configuration, use the show erp command. For more information about this command,
see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 13-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERP Configuration Overview and Guidelines
To restore the Guard Timer back to the default value, use the no form of the erp-ring guard-timer
command. For example:
-> no erp-ring 1 guard-timer
To verify the configured Guard Timer, use the show erp command. For more information about this
command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
The above commands configure ports 1/1 and 1/2 as NNI ports for SVLAN 1001. Note that the SVLAN
specified must already exist in the switch configuration.
To configure an ERP ring with NNI-SVLAN associations, use the erp-ring command but specify an
SVLAN ID for the service VLAN and the associated NNI ports as the ring ports. For example:
Note the following when configuring an ERP ring with VLAN Stacking NNI-SVLAN associations:
• Only two ERP type NNI associations are allowed per SVLAN.
• Configuring an ERP ring on 802.1q tagged port associations with SVLANs is not allowed.
• Configuring an ERP Ring on an STP type NNI association with an SVLAN is not allowed.
• If an SVLAN that is not associated with any NNI ports is configured as the service VLAN for an ERP
ring, the NNI ring ports are automatically associated with that SVLAN at the time the ring is created.
• SVLAN User Network Interface (UNI) associations are not eligible for ERP ring protection.
•If the ERP type NNI ports are connected to the STP path through UNI ports, then STP BPDUs can be
tunneled with the help of VLAN-stacking mechanism.
•Deleting an ERP service VLAN and it is associated NNI ports is only allowed when the ERP ring itself
is deleted using the no for of the erp-ring command. None of the VLAN Stacking CLI commands can
remove a service VLAN consisting of an NNI-SVLAN association.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-17
ERP Configuration Overview and Guidelines Configuring ERP
To clear ERP statistics for a specific ring in the switch, use the clear erp statistics command with the ring
parameter to specify a ring ID. For example:
-> clear erp statistics ring 5
To clear ERP statistics for a specific ring port, use the clear erp statistics command with the ring and
port parameters. For example:
-> clear erp statistics ring 5 port 1/2
To clear ERP statistics for a specific link aggregate ring port, use clear erp statistics command with the
ring and linkagg parameters. For example:
-> clear erp statistics ring 5 linkagg 2
Use the show erp statistics command to verify ERP statistics. For more information about this command,
see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 13-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERPv2 Configuration Overview and Guidelines
Note. Use the erp-ring reset-version-fallback command after upgrading OmniSwitch to the latest AOS
version. This command must be issued on all nodes in a ring, starting from the RPL node as part of the
ERPv2 upgradation process. Check the relevant Upgrade Procedures document for details on the AOS
upgrade procedure.
2 Configure an ERPv2 ring with same ERP ring ID on all switches in the network.
4 Set the same Management Entity Group (MEG) (for example, level 2) for all switches.
5 Assign one switch to be the RPL owner. Configure the port connected to the Ring Protection Link as
an RPL port.
6 Enable the configured ERPv2 ring.
7 Use the default settings for the guard timer and WTR timer values. These values can be adjusted as
necessary.
The following sub-sections provide the details on prerequisites and different configurations for switches to
set up an ERPv2 ring network, using Alcatel-Lucent OmniSwitch CLI commands.
• An SVLAN must exist before an ERP ring is created and must be unique per ring.
• The RPL can be placed anywhere on the major ring including the shared links.
• The RPL can be placed anywhere on the sub-rings, including the sub-ring-port. Since the sub-ring is
not closed using the shared link, the RPL cannot be placed on the shared link.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-19
ERPv2 Configuration Overview and Guidelines Configuring ERP
Configuration Parameters
The following conditions must be considered before configuring an ERPv2 port:
• A given port can only be configured on one ring.
• The RPL can be placed anywhere on the Master Ring, including the shared links.
• The RPL can be placed anywhere on the Sub Rings, including the only ring port of the interconnection
nodes. Since the sub-ring is not closed using the shared link, the RPL cannot be placed on the shared
link.
A sub-ring on the non-interconnection node can be configured using the following command:
Switch 2-> erp-ring 2 port1 1/1 port2 1/3 service-vlan 10 level 2
A sub ring on the interconnection node can be configured using the following command:
Switch 3-> erp-ring 3 sub-ring-port 1/3 service-vlan 10 level 2
page 13-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERPv2 Configuration Overview and Guidelines
Step 3: Create traffic VLANs and add to ring ports as necessary using VM commands
-> vlan 100-400
-> vlan 100-300 802.1q 1/5
-> vlan 100-300 802.1q 1/3
-> vlan 201-400 802.1q 1/6
Note.
The traffic VLANs could be added or deleted as needed at any time during the configuration.
Once we configure a port as ERPv2 ring port, STP is disabled on that port and ERPv2 is operational on all
the VLANs tagged on that port.
R-APS messages from the sub-ring on the interconnection node are forwarded as normal data to the major
ring ports.A node is identified as interconnection node when atleast one ring is configured with a
sub-ring-port.
R-APS messages from the sub-ring are tagged with the sub-ring SVLAN, are forwarded to the major ring
member ports of this SVLAN.
Note. All the ring ports in major ring must be member of the sub-ring SVLAN to support R-APS virtual
channel.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-21
ERPv2 Configuration Overview and Guidelines Configuring ERP
Now, R-APS messages from the sub-ring on the interconnection node are not forwarded to any other ports.
R-APS messages are forwarded even on the blocked ports in the sub-ring. A configuration object is
required for the sub-ring to disable the R-APS virtual channel.
Note. Virtual channel configuration must be consistent among all nodes of the sub-ring.
Non-revertive Mode
Under non-revertive mode, when the failure recovers, the blocked port stays blocked and the unblocked
RPL stays unblocked. Revertive mode is enabled by default. Operator can enable non-revertive mode by
setting following command.
When the ERPv2 node is operating with ERPv1 node in the same ring, it operates in different way for
compatibility. In this mode, revertive mode is always assumed, it operates in revertive mode regardless of
user configuration.
-> erp-ring 2 revertive disable
page 13-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERPv2 Configuration Overview and Guidelines
• The ring is set in a revertive mode but the WTR timer has not expired.
The command can only be issued on the RPL owner node and when the ring is in the NR state and WTR
timer not expired or no WTR (non-revertive mode)
When the command is accepted, the RPL owner node blocks its RPL port, and transmits an R-APS (NR,
RB) message in both directions. Upon receiving the R-APS (NR, RB), each node unblocks its blocking
ports and performs a flush operation when applicable.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-23
Ethernet Ring Protection Application Example Configuring ERP
ERP Ring
The following diagram shows a five-switch ERP ring configuration:
Switch D
RI
2/1 Fa NG
Fa ] 1/2 Pr
17 ot
6.1. [17
2.1 ec
.1 tio
72 6.1
nL
[1 .14
] IN
K
NK (R
LI PL
NG )
RI [17
2.1
6.1 Fa
.13 2/1
8] RPL ]
2/2 6.1.1 Switch C
a Port
Switch E F 2.1
7
[1
Fa
1/2
]
[17
.10
1/2
Fa
2.1
6.1
RPL Owner
6.1
2.1
.21
[17
RIN ]
INK
GL
GL
INK
RIN
[17
.9]
2.1
6.1
2/2
Fa
6.1
2.1
Fa
RING LINK
2/1
.22
[17
]
Fa 2/2 Fa 1/1
[172.16.1.5] [172.16.1.6]
Switch A Switch B
Configuring the sample ERP ring network shown in the above diagram involves the following tasks:
1 Configure an ERP ring with ERP ring ID 1 on all switches in the network.
3 Set the Management Entity Group (MEG) level to 2 for all switches.
4 Switch C is the RPL owner; configure the port connected to the Ring Protection Link as a RPL port.
7 Use the default settings for the guard timer and WTR timer values. These values can be adjusted as
necessary.
page 13-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP Ethernet Ring Protection Application Example
Configuring ERP
The following steps provide a quick tutorial for configuring the ERP ring network shown in the diagram
on page 13-24:
1 Configure ERP ring 1 and add protected VLANs 11 through 20 on Switch A, B, C, D, and E using the
following commands:
-> vlan 10
-> vlan 10 802.1q 2/1
-> vlan 10 802.1q 2/2
-> erp-ring 1 port1 2/1 port2 2/2 service-vlan 10 level 2
-> erp-ring 1 enable
-> vlan 11-20 802.1q 2/1
-> vlan 11-20 802.1q 2/2
2 Configure Switch C as the RPL owner for the ring using the following commands to designate port 2/1
as the RPL port:
3 Verify the ERP ring configuration on any switch using the following command:
Ring Id : 1,
Ring Port1 : 2/1,
Ring Port2 : 1/2,
Ring Status : enabled,
Service VLAN : 10,
WTR Timer (min) : 5,
Guard Timer (centi-sec) : 50,
MEG Level : 2,
Ring State : idle,
Ring Node Type : rpl,
RPL Port : 2/1,
Last State Change : SUN DEC 25 06:50:17 2016 (sysUpTime 00h:01m:31s)
The above output example shows that ERP ring 1 is created on ring ports 2/1 and 1/2 with service VLAN
10, WTR timer of 5 mins, Guard timer of 50 centi-seconds, MEG level 2, and port 2/1 is the RPL port.
4 Verify the status of an ERP ring port on any switch using the following command:
Ring-Id : 1
Ring Port Status : forwarding,
Ring Port Type : non-rpl,
Ethoam Event : disabled
The above command shows the forwarding status of the port, the type of ring port (RPL or non-RPL), and
ETHOAM event status.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-25
ERPv2 Application Example Configuring ERP
ERPv2 Ring
The following diagram shows a seven-switch ERPv2 ring configuration when R-APS virtual channel is
enabled.
The topology of the network is as follows:
• Switches A, B, C, D, and E for the Major Ring.
page 13-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP ERPv2 Application Example
The following sub-sections provide the details on prerequisites and different configurations for switches to
set up an ERPv2 ring network, using Alcatel-Lucent OmniSwitch CLI commands.
Step 3 : Create traffic VLANs and add to ring ports as necessary using VM commands on Switch A.
Switch A -> vlan 100-400
Switch A -> vlan 100-300 802.1q 1/5
Switch A -> vlan 100-300 802.1q 1/3
Switch A -> vlan 201-400 802.1q 1/6
Step 2 : Configure Switch B as RPL Node using the erp-ring epl-node command:
Switch B -> erp-ring 1 epl-node 1/3
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-27
ERPv2 Application Example Configuring ERP
Step 4 : Create traffic VLANs and add to ring ports as necessary using VLAN commands on Switch B.
Switch B -> vlan 100-400
Switch B -> vlan 100-300 802.1q 1/3
Switch B -> vlan 100-300 802.1q 1/5
Switch B -> vlan 201-400 802.1q 1/6
The following sub-sections provide the details on prerequisites and different configurations for switches to
set up an ERPv2 ring network, using Alcatel-Lucent OmniSwitch CLI commands.
Note. Use the erp-ring reset-version-fallback command after upgrading OmniSwitch to the latest AOS
version. This command must be issued on all nodes in a ring, starting from the RPL node as part of the
ERPv2 upgradation process.
page 13-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ERP Verifying the ERP Configuration
show erp Displays the ERP configuration information for all rings, a specific ring,
or for a specific ring port.
show erp statistics Displays the ERP statistics for all rings, a specific ring, or a specific ring
port.
show ethernet-service Displays configuration information for VLAN Stacking Ethernet
services, which includes SVLANs and NNI port associations.
show ethernet-service nni Displays the VLAN Stacking NNI configuration.
show ethernet-service vlan Displays a list of SVLANs configured for the switch.
For more information about the displays that result from these commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 13-29
Verifying the ERP Configuration Configuring ERP
page 13-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
14 Configuring Loopback
Detection
Loopback Detection (LBD) automatically detects and prevents forwarding loops on ports and Link Aggre-
gations (LAGs) that have forwarded network traffic which has looped back to the originating switch. LBD
detects and prevents Layer 2 forwarding loops on a port either in the absence of other loop detection
mechanisms such as STP/RSTP/MSTP, or when these mechanisms cannot detect it (e.g., a client's equip-
ment may drop BPDUs, or the STP protocol may be restricted to the network edge).
In This Chapter
This chapter describes the LBD feature and how to configure it through the Command Line Interface
(CLI). CLI commands are used in the configuration examples; for more details about the syntax of
commands, see the OmniSwitch AOS Release 6 CLI Reference Guide. This chapter provides an overview
of LBD and includes the following information:
• “LBD Specifications” on page 14-1
LBD Specifications
RFCs supported Not applicable at this time
IEEE Standards Supported Not applicable at this time
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Ports Supported There is no restriction on type of ports on which
the LBD can be enabled. But it is recommended
LBD should be enabled on the edge ports.
Transmission Timer The valid range is from 5 to 600 seconds.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 14-1
LBD Defaults Configuring Loopback Detection
LBD Defaults
The following table shows LBD default values.
page 14-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Loopback Detection Quick Steps for Configuring LBD
2 To enable the LBD protocol on a port, use the loopback-detection port command by entering LBD
port, followed by the slot and port number, and enable. For example:
-> loopback-detection port 1/1 enable
Note. Optional. Verify the LBD global configuration by entering the show loopback-detection configura-
tion command or verify the LBD configuration on a port by entering the show loopback-detection port
command. For example:
-> show loopback-detection
To verify the LBD statistics of a port, use the show loopback-detection statistics port command. For
example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 14-3
LBD Overview Configuring Loopback Detection
LBD Overview
Loopback Detection (LBD) automatically detects and prevents L2 forwarding loops on a port. LBD oper-
ates in addition to STP which detects forwarding loops. When a loopback is detected, the port is disabled
and goes into a shutdown state. Once a loop is discovered, the port from where the loops originated is
placed into shutdown state. A trap is sent and the event is logged.
When enabling and configuring Loopback Detection:
• Enable Loopback Detection globally on the switch.
The switch periodically sends out LBD frame from loopback detection enabled port and concludes that the
port is looped back if it receives the frame on any of the loop-back detection enabled ports.
Transmission Timer
Transmission timer is the time duration in seconds at which the port sends LBD frame on the link. When
any of the port is getting blocked due to loopback detection, there will be no further transmission and
receiving of any traffic on the blocked port. The port will be go to shutdown state.
Link Aggregation
When loopback is detected on any one of the Linkagg port, all the ports of the linkagg will be shutdown
due to loopback detection.
page 14-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Loopback Detection Configuring LBD
Configuring LBD
This section describes how to use Alcatel-Lucent’s Command Line Interface (CLI) commands to config-
ure LBD on a switch.
• Enable LBD on a switch or port (see “Enabling LBD” on page 14-5)
• Configure the LBD transmission timer (see “Configuring the LBD Transmission Timer” on page 14-5)
• View the LBD statistics on a port (see “Viewing LBD Statistics” on page 14-5)
• Recover a port from LBD shutdown (see “Recovering a Port from LBD Shutdown” on page 14-5)
Enabling LBD
By default, LBD is disabled on the switch. To enable LBD on a switch, use the loopback-detection
command. For example, the following command enables LBD on a switch:
-> loopback-detection enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 14-5
Verifying the LBD Configuration Configuring Loopback Detection
show loopback-detection Displays the global LBD configuration information for the switch.
show loopback-detection port Displays LBD configuration information for all ports on the switch.
show loopback-detection statistics Displays LBD statistics information for a specific port on the switch.
port
Note. For more information about the resulting display from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 14-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
15 Configuring CPE Test
Head
The Customer Provider Edge (CPE) Test Head traffic generator and analyzer is a Test-OAM (Operation,
Administration and Maintenance) tool used in the Metro Ethernet Network to validate the customer
Service Level Agreements (SLA). This functionality allows the operator to validate the Metro Ethernet
Network between customer end points, which is critical when provisioning or troubleshooting network
services.
This implementation of CPE Test Head supports unidirectional, ingress tests. Traffic is generated at the
UNI port as if the traffic was generated from a test head connected to the UNI port.This validates the
actual customer SLA by subjecting the test traffic to the ingress QoS defined at the UNI port (Ethernet
SAP profile or QoS policy rules for priority and bandwidth control) and the egress QoS defined at the
egress NNI port and carrier network.
The feature provides a multi-stream test capability. The feature supports a stack containing up to eight
switches.
The CPE test is non-disruptive to traffic running on other UNI ports that are associated with the same SAP
profile as the test UNI port. All UNI ports, including CPE test ports, are subject to any SAP profile or QoS
configuration associated with the port. This is important to consider when analyzing test results.
In This Chapter
This chapter describes the CPE Test Head feature, CPE Test Group feature, and how to configure it
through the Command Line Interface (CLI). CLI commands are used in the configuration examples; for
more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
This includes the following information:
• “CPE Test Head Specifications” on page 15-2
• “Quick Steps for Configuring CPE Test Head” on page 15-3
• “CPE Test Head Overview” on page 15-5
• “CPE Test Head Configuration Overview” on page 15-6
• “Configuring a CPE Test Profile” on page 15-7
• “Running a CPE Test” on page 15-9
• “Verifying the CPE Test Configuration and Results” on page 15-10
• “Configuring CPE Test Group” on page 15-12
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-1
CPE Test Head Specifications Configuring CPE Test Head
page 15-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head Quick Steps for Configuring CPE Test Head
2 Configure the source and destination end point for the test, use the test-oam src-endpoint dst-
endpoint command. For example:
-> test-oam Test1 src-endpoint SW1
3 Configure the source MAC address, destination MAC address and the SVLAN for the test frame using
the test-oam vlan test-frame command. For example:
-> test-oam Test1 vlan 100 test-frame src-mac 00:00:00:00:00:01 dst-mac
00:00:00:00:00:02
4 Configure the type of role the switch will perform using the test-oam role command. For example:
5 Configure the test port on the generator switch using the test-oam port command. For example:
6 Configure the test packet parameters using the test-oam frame command. For example:
To configure a Layer 3 test frame, specify ipv4 or ipv6 as the Ether type value.
For ipv4 test frames:
-> test-oam Test1 frame vlan-tag 1 priority 2 drop-eligible false ether-type
ipv4 src-ip 1.1.1.1 dst-ip 2.2.2.2 ttl 4 tos 0x01 protocol udp src-port 2000
dst-port 3000 data-pattern 0x0010
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-3
Quick Steps for Configuring CPE Test Head Configuring CPE Test Head
7 Configure the test duration, rate and packet-size using the test-oam duration rate packet-size
command. For example:
-> test-oam Test1 duration 10 rate 64kbps packet-size 64
When the test runs the amount of time specified for the test duration, the test automatically stops.
2 To stop an active test from running, use the stop form of the test-oam start stop command.
For example:
-> test-oam Test1 start
Note. Verify the test configuration and status with the show test-oam command. For example:
To verify test results, use the show test-oam statistics command. For example:
To clear test statistics, use the clear test-oam statistics command. For example:
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about these commands.
page 15-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head CPE Test Head Overview
• Generate specific flow-based traffic across the customer’s Ethernet Virtual Circuit (EVC) to help iden-
tify flow-based issues.
• Identify the impact of QoS settings (SAP profile or QoS policies) on the overall traffic.
• Confirm throughput across the provider network.
• Debug flow-specific traffic forwarding across the provider network.
• Analyze the behavior of various user-defined traffic patterns across the provider network.
• Perform the handover testing after initial deployment.
• Perform on-demand testing and results monitoring using a central entity.
The OmniSwitch implementation of CPE Test Head supports the ability to run unidirectional, ingress
tests.Test setup involves configuring one CPE switch as the generator and a remote switch as the analyzer.
The following diagram shows an example of an OmniSwitch CPE Test Head configuration:
Carrier Network
Customer CPE Customer CPE
Generator Analyzer
Customer Domain - One Way
100K 100K
packets counted packets counted
sent on egress NNI received on ingress NNI
100K
packets generated,
counted on ingress UNI
CPE Test Head Example - Unidirectional, Ingress Test
In this example:
1 The CPE test is started first on the analyzer switch and then on the generator switch. The analyzer
switch sends packets to the generator switch to learn the source.
2 A configurable amount of traffic is generated and counted on the ingress UNI port of the generator
switch, as if the traffic was generated from a test head connected to the UNI port. This subjects the test
traffic to the ingress UNI SAP profile policies.
3 Traffic is counted and sent out on the SAP NNI port. This subjects the test frames to the egress NNI
QoS policies.
4 Test frames are forwarded through the provider network over the customer EVC to the ingress NNI on
the analyzer switch, where the packets are received and counted. Note that test frames are dropped after
they are counted.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-5
CPE Test Head Configuration Overview Configuring CPE Test Head
5 CPE Test Head CLI show commands are used on the generator and analyzer switches to display and
verify test statistics, such as packets transmitted and received.
Note. The CPE test is non-disruptive to traffic running on other UNI ports that are associated with the
same SAP profile as the test UNI port. All UNI and NNI ports, including CPE test ports, are subject to any
SAP profile or QoS configuration associated with the SAP profile. This is important to consider when
analyzing test results.
Generator Analyzer
Test Profile Parameters CLI Command
Switch Switch
Profile name Yes Yes test-oam
Source and destination endpoints Yes Yes test-oam src-endpoint dst-endpoint
Test frame source and destination Yes Yes test-oam vlan test-frame
MAC addresses
Service VLAN Yes Yes test-oam vlan test-frame
Test role (generator or analyzer) Yes Yes test-oam role
UNI port for test packet generation Yes No test-oam port
Test frame parameters, such as Yes No test-oam frame
VLAN tag, priority, and frame type
Test duration, rate, and packet size Yes No test-oam duration rate packet-size
Configuration Guidelines
Consider the following guidelines when configuring the OmniSwitch CPE Test Head:
• Make sure the same test profile name (test ID) is used on the generator and analyzer switch.
• A switch can only perform one role (generator or analyzer) for a specific test.
• Only one test can be active for the switch at any given time.
• Up to 32 test profiles are allowed per switch.
• Regular traffic is disrupted on the ingress UNI port that is used to generate the test traffic. However,
traffic on other UNI ports associated with the same SAP profile is not disrupted. Therefore, running the
test on a UNI port that is not in use is recommended.
page 15-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head Configuring a CPE Test Profile
Provider Network
1 Configure the test profile name and an optional description on the generator (CPE-1 switch) and
analyzer (CPE-2 switch) using the test-oam command. For example:
-> test-oam 100M_L2 descr “60 sec 100MB L2 test”
When the “100M_L2” test is created, a profile associated with this name is automatically created. This
initial profile contains default parameter settings, where applicable. However, in some cases the default
values are set to zero as a placeholder, but these parameters require additional configuration.
2 Configure the source (generator) and destination (analyzer) endpoints on CPE-1 and CPE-2 using the
test-oam src-endpoint dst-endpoint command. For example:
-> test-oam 100M_L2 src-endpoint "CPE-1" dst-endpoint "CPE-2"
The endpoint is identified using the DNS host name for the switch. In this example, “CPE-1” and
“CPE-2” are the configured host names for the generator and analyze switch.
3 Configure the service VLAN and the source and destination MAC for the test frame on CPE-1 and
CPE-2 using the test-oam vlan test-frame command. For example:
-> test-oam 100M_L2 vlan 100 test-frame src-mac 00:00:00:11:11:11 dst-mac
00:00:00:22:22:22
4 Configure CPE-1 as the generator switch using the test-oam role command. For example:
Use this command with the generator option on the CPE-1 switch. This will configure the role param-
eter in the “100M_L2” test profile that resides on CPE-1.
5 Configure CPE-2 as the analyzer switch using the test-oam role command. For example:
Use this command with the analyzer option on the CPE-2 switch. This will configure the role parame-
ter in the “100M_L2” test profile that resides on CPE-2.
Note that a switch can only serve as the generator or the analyzer for any given test.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-7
Configuring a CPE Test Profile Configuring CPE Test Head
6 Configure port 1/4 on CPE-1 as the port on which the test is run, using the test-oam port command.
For example:
-> test-oam 100M_L2 port 1/4
This is the ingress UNI port that will generate test packets. The packets are then subject to the SAP
profile and QoS policies that are associated with the port.
7 Configure the test duration, rate, and size of the test packet on CPE-1 using the test-oam duration rate
packet-size command. For example:
-> test-oam 100M_L2 duration 100 rate 100m packet-size 1518
The test duration is the length of time, in seconds, that the test will run. The rate determines the rate at
which packets are generated, in kbps or mbps. The packet size specifies the size of the test packet that
is generated.
8 Configure a Layer 2 or Layer 3 test frame on CPE-1 using the test-oam frame command. The type of
test needed determines the type of frame that is configured for the test. If a Layer 2 test is required, config-
ure a Layer 2 frame type; if a Layer 3 test is required, configure a Layer 3 frame type. For example:
To configure a Layer 2 test frame, specify a hexidecimal value for the Ether type.
-> test-oam 100M_L2 frame vlan-tag 20 priority 5 ether-type 0x8101 data-pattern
0xabcd
To configure a Layer 3 test frame, specify the ipv4 or ipv6 keyword for the Ether type.
For ipv4 test frame:
-> test-oam 100M_IP frame vlan-tag 10 priority 5 ether-type ipv4 src-ip
10.10.10.111 dst-ip 10.10.10.222
See the test-oam frame command page in the OmniSwitch AOS Release 6 CLI Reference Guide for
frame type parameter requirements and definitions.
The following provides a summary of the CLI commands used in the configuration example:
page 15-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head Running a CPE Test
Refer to the OmniSwitch AOS Release 6 CLI Reference Guide for more information about these
commands.
This command also includes the following optional parameters used to specify runtime (active) values for
the specified test:
• vlan—the service VLAN to use for the test.
• port—the port on which the test will generate test frames.
• packet-size—the size of the test frame to transmit.
When one or more of these runtime parameters are specified with the test-oam start command, the
parameter value is used instead of the value configured for the same parameter in the CPE test profile. For
example, if the “100M_L2” profile specifies port 1/10 for the test, the following command will run the
“100M_L2” test on port 1/4:
-> test-oam 100M_L2 port 1/4 start
Note. The runtime values specified for any of the optional test-oam start command parameters do not
overwrite the configured values for the test profile. In addition, if there are no configured values for these
parameters in the profile and a runtime value is not specified with the command, the test will not run.
Stopping the CPE test on both the generator and analyzer is recommended. The analyzer switch may
continue to send out packets attempting to learn the test source if the test is not stopped on the analyzer
switch as well.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-9
Verifying the CPE Test Configuration and Results Configuring CPE Test Head
The show test-oam command displays a summary of CPE test information or more detailed information
for a specific test. For example:
-> show test-oam tests
Total Test-Ids: 4
Test-Id Port Src-Mac Dst-Mac Vlan Direction Status
---------+-----+----------------+------------------+-----+-------------+-----------
Test1 1/1 00:11:22:33:44:55 00:22:33:44:55:66 100 unidirectional ended
Test2 1/2 00:44:22:33:44:55 00:66:33:44:55:66 200 unidirectional stopped
Test3 2/3 00:00:00:00:00:03 00:00:00:00:00:04 200 unidirectional not-started
Test4 1/1 00:00:00:00:00:07 00:00:00:00:00:08 100 unidirectional running
Frame Configuration:
Frame Type : ether,
Vlan : 200,
Priority : 7,
Pattern : 0x0001,
Dei : none,
Ether Type : 0x8000,
page 15-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head Verifying the CPE Test Configuration and Results
Port : 1/1,
Tx Rate : 8k,
Frame Size : 100,
State : start,
Status : running
Frame Configuration :
Frame Type : ipv6,
Vlan : 200,
Priority : 7,
Pattern : 0x0001,
Dei : true,
Source Ip : 2001:db8:0:0:0:ff00:42:8329,
Destination Ip : 1080:0:0:0:8:800:200C:4171,
Source Port : 10,
Destination Port : 20,
Next Header : tcp,
Hop-Count : 50,
Traffic-Class : 0xff
Flow-Label : 0x0
The show test-oam statistics command displays packet counts for the number of test packets transmitted
and received. For example:
-> show test-oam statistics
Test-Id TX-Ingress TX-Egress RX-Ingress
-----------------+------------+------------+--------------
Test1 1200366 1200366 0
Test2 0 0 1200366
The packet counts displayed are based on the role the switch plays for the specific test. For example,
“Test1” shows statistics for TX-Ingress (packets transmitted on ingress UNI) and TX-Egress (packets
transmitted on egress NNI), but not for RX-Ingress (packets received on ingress NNI). This is because the
show command was performed on the generator switch for “Test1”. The “Test2” display output only
shows statistics for RX-Ingress because the switch is the analyzer for “Test2”.
To verify the received test packet count for “Test1”, use the show test-oam statistics command on the
analyzer switch. To verify the transmitted test packet count for “Test2”, use the same show command on
the generator switch.
Note. For more information about the resulting display from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-11
Configuring CPE Test Group Configuring CPE Test Head
page 15-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head Quick Steps for Configuring CPE Test Group
2 Configure the name for the CPE test group, use the test-oam group command. For example:
3 Configure the list of tests that need to be added in the CPE test group, use the test-oam group tests
command. For example:
-> test-oam group Testgroup1 tests test1 test2 test3 test4 test5 test6 test7
test8
4 Configure the source and destination end point for the CPE test group, use the test-oam group src-
endpoint dst-endpoint command. For example:
-> test-oam group Testgroup1 src-endpoint SW1
5 Configure the required role for the switch using the test-oam group role command. For example:
6 Configure the CPE test group port on the generator switch using the test-oam group port command.
For example:
-> test-oam group Testgroup1 port 1/2
7 Configure the CPE test group duration and rate using the test-oam group duration rate command.
For example:
-> test-oam group Testgroup1 duration 10 rate 64 kbps
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-13
Quick Steps for Configuring CPE Test Group Configuring CPE Test Head
When the test runs for the amount of time specified in the test duration, the test automatically stops.
2 To stop an active test from running, use the test-oam group stop command.
For example:
-> test-oam group Testgroup1 stop
Note. Verify the CPE test group configuration and status with the show test-oam group command. For
example:
To verify test results, use the show test-oam group statistics command. For example:
To clear test statistics, use the clear test-oam group statistics command. For example:
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about these commands.
page 15-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head CPE Test Group Overview
• Generate specific flow-based traffic across the customer’s Ethernet Virtual Circuit (EVC) to help
identify flow-based issues.
• Identify the impact of QoS settings (SAP profile or QoS policies) on the overall traffic.
• Confirm throughput across the provider network.
• Debug flow-specific traffic forwarding across the provider network.
• Analyze the behavior of various user-defined traffic patterns across the provider network.
• Perform the handover testing after initial deployment.
• Perform on-demand testing and results monitoring using a central entity.
The OmniSwitch implementation of CPE Test group supports the ability to run unidirectional, ingress
tests. Test setup involves configuring one CPE switch as the generator and a remote switch as the
analyzer.
The following diagram shows an example of an OmniSwitch CPE Test Group configuration:
In this example:
1 A feeder port should be configured in the system to feed the traffic to the generator. The feeder port is
required while running a CPE test group.
2 The CPE test group is started first on the analyzer switch and then on the generator switch. The
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-15
CPE Test Group Configuration Overview Configuring CPE Test Head
analyzer switch sends packets to the generator switch to learn the source.
3 A configurable amount of traffic is generated and counted on the ingress UNI port of the generator
switch, as if the traffic was generated from a test head connected to the UNI port. This subjects the test
traffic to the ingress UNI SAP profile policies.
4 Traffic is counted and sent out on the SAP NNI port. This subjects the test frames to the egress NNI
QoS policies.
5 Test frames are forwarded through the provider network over the customer EVC to the ingress NNI on
the analyzer switch, where the packets are received and counted. Note that test frames are dropped after
they are counted.
6 CPE Test group CLI show commands are used on the generator and analyzer switches to display and
verify CPE test group statistics, such as packets transmitted and received.
Note. The CPE test is non-disruptive to traffic running on other UNI ports that are associated with the
same SAP profile as the test UNI port. All UNI and NNI ports, including CPE test ports, are subject to any
SAP profile or QoS configuration associated with the SAP profile. This is important to consider when
analyzing test results.
Generator Analyzer
CPE Test group Parameters CLI Command
Switch Switch
Profile name Yes Yes test-oam group
Source and destination endpoints Yes Yes test-oam group src-endpoint dst-
endpoint
Test-oam role (generator or analyzer) Yes Yes test-oam group role
UNI port for test packet generation Yes No test-oam group port
Test-oam duration and rate Yes No test-oam group duration rate
page 15-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head CPE Test Group Configuration Overview
Configuration Guidelines
Consider the following guidelines when configuring the OmniSwitch CPE Test group:
• Make sure the same CPE test group name (test ID) is used on the generator and analyzer switch.
• A switch can only perform one role (generator or analyzer) for a specific test.
• Each test which will be configured in the list of tests in the CPE test group that needs to run
concurrently should be configured before adding in the list.
• Each flow is properly configured to be classified into the correct CoS or QoS profile.
• The sum of bandwidth of the grouped test streams should not exceed the supported line-rate of
100 Mbps for copper port and 1 Gig for fiber port.
• Only one CPE test group can be active for the switch at any given time.
• Up to 32 CPE test groups are allowed per switch.
• The feeder port should be configured to start a CPE test group.
• The VLAN used for a CPE test group should be a service VLAN.
• Each test in a CPE test group should have a unique VLAN, source mac-address, and destination
mac-address.
• The modification to the test which is part of the active CPE test group is not allowed.
• The CPE test group supports eight-test flows that can run concurrently.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-17
Configuring a CPE Test Group Profile Configuring CPE Test Head
1 Configure the feeder port globally in the system to feed the test traffic to generator port, use the test-
oam feeder command. For example:
The configured feeder port 1/3 will feed the test traffic from the CPE test group to the generator port.
2 Configure the CPE test group profile name and an optional description on the generator (DUT-1
switch) and analyzer (DUT-2 switch) using the test-oam group command. For example:
-> test-oam group Testgroup1 descr first-testgroup
When the “Testgroup1” CPE test group is created, a profile associated with this name is automatically
created.
3 Configure the list of CPE test group tests that need to be added in the CPE test group using the test-
oam group tests command. For example:
-> test-oam group Testgroup1 tests test1 test2 test3 test4 test5 test6 test7
test8
The configured list of CPE test group tests will run concurrently when the CPE test group Testgroup1
is started.
page 15-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head Configuring a CPE Test Group Profile
4 Configure the source (generator) and destination (analyzer) endpoints on DUT-1 and DUT-2 using the
test-oam group src-endpoint dst-endpoint command. For example:
-> test-oam group Testgroup1 src-endpoint SW1 dst-endpoint SW2
The endpoint is identified using the DNS host name for the switch. In this example, “DUT-1” and
“DUT-2” are the configured host names for the generator and analyze switch.
5 Configure DUT-1 as the generator switch using the test-oam group role command. For example:
Use this command with the generator option on the DUT-1 switch. This will configure the role
parameter in the “Testgroup1” CPE test group profile that resides on DUT-1.
6 Configure DUT-2 as the analyzer switch using the test-oam group role command. For example:
Use this command with the analyzer option on the DUT-2 switch. This will configure the role
parameter in the “Testgroup1” CPE test group profile that resides on DUT-2.
Note that a switch can only serve as the generator or the analyzer for any given test.
7 Configures the port in DUT-1 on which the CPE test group test will run, using the test-oam group
port command. For example:
-> test-oam group Testgroup1 port 1/2
This is the ingress UNI port that will generate test packets. The packets are then subject to the SAP
profile and QoS policies that are associated with the port.
8 Configure the test duration and rate of the CPE test group packet on DUT-1 using the test-oam group
duration rate command. For example:
-> test-oam group Testgroup1 duration 20 rate 8m
The test duration is the length of time, in seconds, that the test will run. The rate determines the rate at
which packets are generated, in kbps or mbps. The group rate configuration is optional. The test band-
width is considered by default if the group rate is not configured.
The following table provides a summary of the CLI commands used in the configuration example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-19
Running a CPE Test Group test Configuring CPE Test Head
Refer to the OmniSwitch AOS Release 6 CLI Reference Guide for more information about these
commands.
This command also includes the following optional parameter used to specify runtime (active) values for
the specified test:
port—the port on which the test will generate test frames.
When this runtime parameter is specified with the test-oam group start command, the parameter value is
used instead of the value configured for the same parameter in the CPE test group profile. For
example, if the “Testgroup1” profile specifies port 1/10 for the test, the following command will run the
“Testgroup1” test on port 1/4:
-> test-oam group Testgroup1 port 1/4 start
Note. The runtime values specified for any of the optional test-oam group start command parameters do
not overwrite the configured values for the test profile. In addition, if there are no configured values for
these parameters in the profile and a runtime value is not specified with the command, the test will not run.
Stopping the CPE test group on both the generator and analyzer is recommended. The analyzer switch will
continue to send out packets attempting to learn the test source if the test is not stopped on the analyzer
switch as well.
page 15-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring CPE Test Head Verifying the CPE Test Group Configuration and Results
show test-oam group Displays the configuration and status of the CPE test groups.
show test-oam group statistics Displays the statistics for all CPE test groups or for a specific CPE
test group.
The show test-oam group command displays the configuration and status of the CPE test groups. For
example:
-> show test-oam group tests
Total Test-Groups: 4
Feeder Port : 1/2
Test-Group Port Duration Rate Nb of Direction Status
(secs) Flows
-------------+-------+---------+---------+-------+----------------+--------------
TestGroup1 1/1 10 100M 8 unidirectional not-started
TestGroup2 1/3 30 - 3 unidirectional ended
TestGroup3 2/4 40 - 2 unidirectional running
Flow1:
Test Name : test_1,
Vlan: 1001
Tx Rate : 1M,
Source MAC: 00:00:00:00:01:01,
Destination MAC: 00:00:00:00:01:02,
Frame size: 64,
Flow2:
Test Name : test_2,
Vlan: 1002
Tx Rate : 10M,
Source MAC: 00:00:00:00:02:01,
Destination MAC: 00:00:00:00:02:02,
Frame size: 1518,
Flow3:
Test Name : test_3,
Vlan: 1003
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 15-21
Verifying the CPE Test Group Configuration and Results Configuring CPE Test Head
Tx Rate: 15M,
Source MAC: 00:00:00:00:03:01,
Destination MAC: 00:00:00:00:03:02,
Frame size: 1518,
Flow4:
Test Name : test_4,
Vlan: 1004
Tx Rate: 5M,
Source MAC: 00:00:00:00:04:01,
Destination MAC: 00:00:00:00:04:02,
Frame size: 1518,
The show test-oam group statistics command displays the statistics for all CPE test groups or for a
specific CPE test group. For example:
-> show test-oam group statistics
Test-Group Flow TX-Ingress TX-Egress RX-Ingress
-------------+-------------+-------------------+---------------+-----------
TestGroup1 flow1 19017 19017 0
TestGroup1 flow2 19017 19017 0
TestGroup1 flow3 19017 19017 0
TestGroup1 flow4 19017 19017 0
TestGroup1 flow5 19017 19017 0
TestGroup1 flow6 19017 19017 0
The packet counts displayed are based on the role the switch plays for the specific test. For example,
“TestGroup1” shows statistics for TX-Ingress (packets transmitted on ingress UNI) and TX-Egress
(packets transmitted on egress NNI), but not for RX-Ingress (packets received on ingress NNI). This is
because the show command was performed on the generator switch for “TestGroup1”.
To verify the received test packet count for “TestGroup1”, use the show test-oam group statistics
command on the analyzer switch.
Note. For more information about the resulting display from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 15-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
16 Configuring PPPoE
Intermediate Agent
Point-to-Point Protocol over Ethernet (PPPoE) provides the ability to connect a network of hosts over a
simple bridging access device to a Remote Access Concentrator (RAC). For example, Broadband Network
Gateway. In PPPoE model, each host utilizes its own Point-to-Point Protocol (PPP) stack and the user is
presented with a familiar user interface. Access control, billing, and type of service can be configured on a
per-user, rather than a per-site, basis.
PPPoE Intermediate Agent (PPPoE-IA) solution is designed for the PPPoE access method and is based on
the access node implementing a PPPoE-IA function to insert the access loop identification.
In This Chapter
This chapter describes the PPPoE-IA feature and how to configure it through the Command Line
Interface (CLI). CLI commands are used in the configuration examples. For more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
This chapter includes the following:
• “PPPoE-IA Specifications” on page 16-2
• “PPPoE-IA Defaults” on page 16-2
• “Quick Steps for Configuring PPPoE-IA” on page 16-3
• “PPPoE Intermediate Agent Overview” on page 16-4
• “Configuring PPPoE-IA” on page 16-6
• “Verifying PPPoE-IA Configuration” on page 16-8
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 16-1
PPPoE-IA Specifications Configuring PPPoE Intermediate Agent
PPPoE-IA Specifications
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Maximum number of options 5
supported for Circuit-Identifier
Maximum Circuit-Identifier 63 Bytes
length supported
Maximum Remote-Identifier length 63 Bytes
supported
PPPoE-IA Defaults
Following are the PPPoE-IA default values:
page 16-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring PPPoE Intermediate Agent Quick Steps for Configuring PPPoE-IA
Note. All PPPoE-IA parameters are configurable irrespective of the global status of PPPoE-IA. It is
mandatory to enable PPPoE-IA globally as well as on a port for the PPPoE-IA feature to function.
2 Enable PPPoE-IA on a port or a link aggregate port using the pppoe-ia port command. For
example, the following command enables PPPoE-IA on port 1/1 of the switch.
-> pppoe-ia port 1/1 enable
3 Configure a port or a link aggregate port as trusted or client port for PPPoE-IA using the pppoe-ia
command. By default, all ports are client ports. For example, the following command configures port 1/1
as a trusted port.
-> pppoe-ia port 1/1 trust
Note. The port that is connected to the PPPoE server must be configured as trusted, whereas the port
connected to the host must be configured as a client port. Both client and trust ports must be in the same
VLAN.
4 Configure a format to form an identifier that uniquely identifies an access node globally using the
pppoe-ia access-node-id command. For example, the following command uses the base MAC address of
the switch to identify an access node.
-> pppoe-ia access-node-id base-mac
5 Configure a Circuit-ID format that forms an identifier that uniquely identifies an access node globally,
and an access loop that receives the PADI/PADR/PADT from the user side using the pppoe-ia circuit-id
command. For example, the following command uses the base MAC address in ASCII format as the
Circuit-ID.
-> pppoe-ia circuit-id ascii base-mac vlan
6 Configure a format to form an identifier that uniquely identifies the user attached to the access loop
globally using the pppoe-ia remote-id command. For example, the following command uses the user
configured string as the format for Remote-ID:
-> pppoe-ia remote-id user-string "remote-id-1"
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 16-3
PPPoE Intermediate Agent Overview Configuring PPPoE Intermediate Agent
Note. To view the global configuration for PPPoE-IA, enter the show pppoe-ia configuration command.
The PPPoE-IA configuration is displayed as shown:
page 16-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring PPPoE Intermediate Agent PPPoE Intermediate Agent Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 16-5
Configuring PPPoE-IA Configuring PPPoE Intermediate Agent
Configuring PPPoE-IA
This section describes how to configure PPPoE-IA using the CLI commands.
Note. All PPPoE-IA parameters are configurable irrespective of the global status of PPPoE-IA. It is
mandatory to enable PPPoE-IA globally as well as on a port for the PPPoE-IA to function.
Note. PPPoE-IA is not supported on port mirroring destination ports, however, the configurations are
accepted. PPPoE-IA is not supported on aggregable ports.
page 16-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring PPPoE Intermediate Agent Configuring PPPoE-IA
For example, the following command uses the user configured string to identify an access node:
-> pppoe-ia access-node-id user-string acessnode1
If the management address format is used as the Access Node Identifier, then the IP address of the
Loopback0 interface (if configured and active) or the first active IP interface address is used as the
management address. If none of them are available, IP address ‘0.0.0.0’ is used as management address.
The access-node-identifier can have a maximum of 32 characters. The access-node-identifier longer than
32 characters is truncated to 32 characters when encoded in the VSA tag.
If the management address format is used as the Remote-ID, the IP address of the Loopback0 interface (if
configured and active) or the first active IP interface address is used as the management address. If none
of them are available, IP address ‘0.0.0.0’ is used as management address.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 16-7
Verifying PPPoE-IA Configuration Configuring PPPoE Intermediate Agent
To clear the statistics for all the physical or link-aggregate ports, a single port or a link aggregate port, or a
range of physical ports for PPPoE-IA, use the clear pppoe-ia statistics command.
For more information about the output details that result from these commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 16-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
17 Configuring GVRP
The GARP VLAN Registration Protocol (GVRP) facilitates in controlling virtual local area networks
(VLANs) in a large network. It is an application of Generic Attribute Registration Protocol (GARP) and
provides VLAN registration service. GVRP enables devices to dynamically learn their VLAN
memberships.
GVRP is compliant with 802.1Q standard. It dynamically learns and propagates VLAN membership
information across a bridged network. GVRP dynamically maintains and updates the registration and
de-registration of VLANs and prunes unnecessary broadcast and unicast traffic. Through the propagation
of GVRP information, a device is continuously able to update its knowledge on the set of VLANs that
currently have active nodes and on the ports through which those nodes can be reached.
In This Chapter
This chapter describes the basic components of GVRP and their configuration through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Enabling GVRP on page 17-7.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 17-1
GVRP Specifications Configuring GVRP
GVRP Specifications
IEEE Standards Supported IEEE Std. 802.1D - 2004, Media Access Control
(MAC) Bridges
IEEE Draft Std. P802.1Q-REV/D5.0
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Maximum GVRP VLANs 4094
256 (OmniSwitch 6400)
GVRP Defaults
The following table lists the defaults for GVRP configuration:
page 17-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring GVRP GARP Overview
GARP Overview
GARP was introduced to avoid manual configuration of devices and applications in a large network. It
enables dynamic configuration of devices and applications in a network. It also provides a generic
framework whereby devices in a bridged LAN can register and de-register attribute values, such as VLAN
identifiers, with each other. These attributes are propagated through devices in the bridged LAN. GARP
consists of:
GARP Information Declaration (GID)—The part of GARP that generates data from the switch.
GARP Information Propagation (GIP)—The part of GARP that distributes data to different switches.
A GARP applicant may or may not choose to actively participate in declaring and registering an attribute
value. By declaring an attribute, a GARP applicant indicates to other applicants that it is either associated
with the attribute or it is interested to know about the other applicants associated with that attribute. A
GARP applicant that declares attributes is referred to as an active member. A passive member is an
applicant interested in an attribute but does not initiate GARP PDUs when it is aware that other applicants
have also registered the attribute.
The following messages are used in GARP:
JoinIn and JoinEmpty—Used by an applicant (including itself) associated with an attribute. Receiving
JoinIn messages from other applicants or transmitting JoinEmpty messages enables an applicant to
register the attribute.
LeaveIn and LeaveEmpty—Used by an applicant to withdraw its declaration when it is no more
associated with an attribute.
LeaveAll—Used for periodic declarations and registration maintenance. An applicant periodically sends
LeaveAll messages, which enable other applicants to indicate their attributes’ registered states.
These messages indicate the current state of the sender applicant device to other GARP applicant devices.
With this information, these GARP applicant devices can modify their behavior associated with the
attribute (declare and withdraw).
GVRP Overview
GVRP, an application of GARP, is designed to propagate VLAN information from device to device. With
GVRP, a single switch is manually configured with all the desired VLANs for the network, and all the
other switches on the network learn those VLANs dynamically. An end station can be plugged into a
switch and be connected to its desired VLAN. However, end stations need GVRP-aware Network Inter-
face Cards (NIC) to make use of GVRP.
GVRP sends information encapsulated in an Ethernet frame to a specific MAC address
(01:80:C2:00:00:21). Based on the received registration information (Join message of GARP), VLAN
information is learned on a system. GVRP enables new dynamic VLANs on a device or dynamically
registers a port to an existing VLAN. In effect, based on the received registration information of a VLAN,
the port becomes associated with that VLAN. Similarly, whenever de-registration information is received
for a VLAN (Leave message of GARP) on a particular port, the association of that VLAN with the port
may get deleted.
A GVRP-enabled port sends GVRP PDUs advertising the VLAN. Other GVRP-aware ports receiving
advertisements over a link can dynamically join the advertised VLAN. All ports of a dynamic VLAN
operate as tagged ports for that VLAN. Also, a GVRP-enabled port can forward an advertisement for a
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 17-3
GVRP Overview Configuring GVRP
VLAN it learned about from other ports on the same switch. However, that forwarding port does not join
that VLAN until an advertisement for that VLAN is received on that port.
The following illustration shows dynamic VLAN advertisements:
1 2 3 4 5
Switch A has 3 VLANs configured as static VLANs (10, 20, and 30). Other switches on the same network
learn these 3 VLANs as dynamic VLANs. Also, the end station connected on port 5 is statically
configured for VLAN 50. Port 1 on Switch A is manually configured for VLANs 10, 20, and 30. Hence, as
the diagram above shows,
1 Port 1 on Switch A advertises VLAN IDs (VIDs) 10, 20, and 30.
2 Port 2 on Switch B receives the advertisements. VLANs 10, 20, and 30 are created as dynamic VLANs
on this switch and Port 2 becomes a member of VLANs 10, 20, and 30.
3 Port 3 on Switch B is triggered to advertise VLANs 10, 20, and 30, but does not become a member of
these VLANs.
4 Port 4 on Switch C receives the advertisements. VLANs 10, 20, and 30 are created as dynamic VLANs
on this switch and Port 4 becomes a member of VLANs 10, 20, and 30.
5 Port 5 advertises VLANs 10, 20, and 30, but this port is not a member of these VLANs.
Note. Default VLAN (VLAN 1) exists on all switches, but it is not considered here.
The above sequence of advertisements and registration of VLANs results in the following configuration:
1 2 3 4 5
Here, the end station advertises itself as a member of VLAN 50. As the above diagram shows,
1 Port 5 receives the advertisement and Switch C creates VLAN 50 as a dynamic VLAN. Port 5 of
Switch C becomes a member of VLAN 50.
2 Port 4 advertises VLAN 50, but is not a member of VLAN 50.
page 17-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring GVRP Quick Steps for Configuring GVRP
3 Port 3 of Switch B receives the advertisement, Switch B creates the dynamic VLAN 50, and Port 3
becomes a member of VLAN 50.
4 Port 2 advertises VLAN 50, but is not a member of this VLAN.
5 Port 1 on Switch A receives the advertisement, creates dynamic VLAN 50. Port 1 becomes a member
of VLAN 50.
The resulting configuration is depicted below:
1 2 3 4 5
Note. Every port on a switch is not a member of all the VLANs. Only those ports that receive the
advertisement become members of the VLAN being advertised.
2 Assign a port to the VLAN using the vlan port default command. For example:
3 Tag the port with one or more VLANs using the vlan 802.1q command. Specify the VLAN IDs that
GVRP should advertise on the port. For example, the following command tags port 3/2 with VLAN 10:
-> vlan 10 802.1q 3/2
-> gvrp
5 Enable GVRP on the port by using the gvrp port command. For example, the following command
enables GVRP on port 3/2 of the switch:
-> gvrp port 3/2
6 (Optional) Restrict a port from becoming a member of the statically created VLAN by using the
gvrp static-vlan restrict command. For example, the following command restricts port 3/5 from becom-
ing a member of static VLAN 10:
-> gvrp static-vlan restrict port 3/5 10
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 17-5
Quick Steps for Configuring GVRP Configuring GVRP
Note. To view the global configuration details of the router, enter the show gvrp configuration command.
The globally configured details are displayed as shown:
To view GVRP configuration for a specific port, enter the show gvrp configuration linkagg/port
command.The configuration details of the particular port are displayed as shown:
VLAN Memberships:
VLAN Id Static Restricted Restricted
Registration Registration Applicant
---------------+---------------+---------------+-----------
1 LEARN FALSE FALSE
2 LEARN FALSE FALSE
11 LEARN FALSE FALSE
12 LEARN FALSE FALSE
13 LEARN FALSE FALSE
14 LEARN FALSE FALSE
15 LEARN FALSE FALSE
16 LEARN FALSE FALSE
17 LEARN FALSE FALSE
18 LEARN FALSE FALSE
19 LEARN FALSE FALSE
20 LEARN FALSE FALSE
51 RESTRICT FALSE FALSE
52 RESTRICT FALSE FALSE
53 LEARN TRUE FALSE
54 LEARN TRUE FALSE
55 LEARN FALSE TRUE
56 LEARN FALSE TRUE
57 LEARN FALSE FALSE
58 LEARN FALSE FALSE
59 LEARN FALSE FALSE
60 LEARN FALSE FALSE
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
page 17-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring GVRP Configuring GVRP
Configuring GVRP
This section describes how to configure GVRP using Alcatel-Lucent’s Command Line Interface (CLI)
commands.
Enabling GVRP
GVRP is used primarily to prune unnecessary broadcast and unknown unicast traffic, and dynamically
create and manage VLANs. GVRP has to be globally enabled on a switch before it can start forwarding
GVRP frames.
To enable GVRP globally on the switch, enter the gvrp command at the CLI prompt as shown:
-> gvrp
To disable GVRP globally on the switch, use the no form of the gvrp command as shown:
-> no gvrp
Note. Disabling GVRP globally leads to the deletion of all learned VLANs.
GVRP can be enabled on ports regardless of whether it is globally enabled or not. However, for the port to
become an active participant, you should enable GVRP globally on the switch. By default, GVRP is
disabled on the ports. To enable GVRP on a specified port, use the gvrp port command.
For example, to enable GVRP on port 2 of slot 1, enter:
-> gvrp port 1/2
To disable GVRP on a specific port, use the no form of the command as shown:
-> no gvrp port 1/2
Note. GVRP can be configured only on fixed, 802.1 Q and aggregate ports. It cannot be configured on
mirror, aggregable, mobile, and MSTI Trunking ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 17-7
Configuring GVRP Configuring GVRP
Note. If GVRP is globally enabled on a switch, transparent switching does not have effect on the switch.
You can configure the switch to propagate GVRP frames transparently using the gvrp transparent
switching command, as shown:
-> gvrp transparent switching
Use the no form of this command to disable the transparent switching capability of the switch. For
example:
-> no gvrp transparent switching
Note. When both GVRP and GVRP transparent switching are globally disabled, the switch discards the
GVRP frames.
Here, the number of dynamic VLANs the switch can create is set to a maximum of 150.
• IP routing
page 17-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring GVRP Configuring GVRP
To view the registration mode of the port, use the show gvrp configuration linkagg/port command. For
example:
-> show gvrp configuration port 3/2
Note. The registration mode for the default VLANs of all the ports in the switch is set to fixed.
To view the registration mode of the port, use the show gvrp configuration linkagg/port command. For
example, to view the mode of port 1/21, enter the following:
-> show gvrp configuration port 3/2
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 17-9
Configuring GVRP Configuring GVRP
The GVRP registration mode of the port can be set to default value by using the no form of
gvrp registration command.
To set the GVRP registration mode of port 3/2 to default mode (normal mode) enter the following
command:
-> no gvrp registration port 3/2
When a port is set to participant mode, GVRP protocol exchanges are allowed only if the port is set to the
STP forwarding state.
To set the applicant mode of port 3/2 to participant mode, enter the following:
-> gvrp applicant participant port 3/2
When a port is set to non-participant mode, GVRP PDUs are not sent through the STP forwarding and
blocking ports.
To set the applicant mode of port 3/2 to non-participant mode, enter the following:
-> gvrp applicant non-participant port 3/2
The applicant mode of the port can be set to the default value by using the no form of the gvrp applicant
command. To set the GVRP applicant mode of port 3/2 to the default mode (participant mode), enter the
following command:
-> no gvrp applicant port 3/2
• Leave timer—The wait time taken to remove the port from the VLAN after receiving a Leave message
on that port.
• LeaveAll timer—The time a GVRP instance takes to generate LeaveAll messages. The LeaveAll
message instructs the port to modify the GVRP state of all its VLANs to Leave.
page 17-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring GVRP Configuring GVRP
The default values of the Join, Leave, and LeaveAll timers are 200 ms, 600 ms, and 10000 ms,
respectively.
When you set the timer values, the value for the Leave timer should be greater than or equal to thrice the
Join timer value (Leave>=Join * 3). The LeaveAll timer value must be greater than the Leave timer value
(LeaveAll > Leave). If you attempt to set a timer value that does not adhere to these rules, an error
message is displayed.
For example, if you set the Leave timer to 900 ms and attempt to configure the Join timer to 450 ms, an
error is returned. You need to set the Leave timer to at least 1350 ms and then set the Join timer to 450 ms.
To modify the Join timer value, use the gvrp timer command. For example, to modify the Join timer
value of port 3/2, enter the following:
-> gvrp timer join 400 port 3/2
The Join timer value of port 3/2 is now set to 400 ms.
To set the Join timer to the default value, use the no form of the command as shown:
-> no gvrp timer join port 3/2
To set the Leave timer value of port 3/2 to 1200 ms, enter the command as shown:
-> gvrp timer leave 1200 port 3/2
To set the LeaveAll timer of port 3/2 to 1400 ms, enter the command as shown:
-> gvrp timer leaveall 1200 port 3/2
To view the timer value assigned to a particular port, use the show gvrp timer command. For example, to
view the timer value assigned to port 1/21, enter the command as shown:
-> show gvrp configuration port 1/21
Note. Set the same GVRP timer value on all the connected devices.
Here, VLAN 4 cannot be learned by the device dynamically. However, if the VLAN already exists on the
device as a static VLAN, it can be mapped to the receiving port.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 17-11
Configuring GVRP Configuring GVRP
To allow dynamic VLAN registrations on the port, use the no form of the gvrp restrict-vlan-registration
command as shown:
-> no gvrp restrict-vlan-registration port 3/1 4
Here, the port 1/2 is restricted from becoming a GVRP member of VLAN 5.
To restrict a port from becoming a member of a range of statically created VLANs, enter the
gvrp static-vlan restrict command as shown:
-> gvrp static-vlan restrict port 1/2 5-9
page 17-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring GVRP Verifying GVRP Configuration
clear gvrp statistics Clears GVRP statistics for all the ports, an aggregate of ports, or a spe-
cific port.
show gvrp last-pdu-origin Displays the source MAC address of the last GVRP message received
on a specified port or an aggregate of ports.
show gvrp configuration Displays the global configuration for GVRP.
show gvrp configuration port Displays the GVRP configuration status for all the ports.
show gvrp configuration link- Displays the GVRP configuration for a specific port or an aggregate of
agg/port ports.
show gvrp timer Displays the timer values configured for all the ports or a specific port.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 17-13
Verifying GVRP Configuration Configuring GVRP
page 17-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
18 Configuring MVRP
Multiple VLAN Registration Protocol (MVRP) is standards-based Layer 2 network protocol for
automatic configuration of VLAN information on switches. It was defined in the 802.1ak amendment to
802.1Q-2005.
MVRP provides a method to share VLAN information dynamically and configure the needed VLANs
within a layer 2 network. For example, in order to add a switch port to a VLAN, only the end port, or the
VLAN-supporting network device connected to the switchport, has to be reconfigured, and all necessary
VLAN trunks are dynamically created on the other MVRP-enabled switches. MVRP helps to maintain
VLAN configuration dynamically based on current network configurations.
In This Chapter
This chapter describes the MVRP feature and how to configure it through the Command Line Interface
(CLI). CLI commands are used in the configuration examples; for more details about the syntax of
commands, see the OmniSwitch AOS Release 6 CLI Reference Guide. This chapter provides an overview
of MVRP and includes the following information:
• “Enabling MVRP” on page 18-10
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-1
MVRP Specifications Configuring MVRP
MVRP Specifications
IEEE Standards Supported IEEE 802.1ak-2007 Amendment 7: Multiple Registration Protocol
IEEEStd802.1Q-2005 Corrigendum 2008
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Maximum MVRP VLANs 4094
256 in OmniSwitch 6400.
page 18-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP MVRP Defaults
MVRP Defaults
The following table lists the defaults for MVRP configuration.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-3
Quick Steps for Configuring MVRP Configuring MVRP
2 Assign a port to the VLAN using the vlan port default command. For example:
3 Tag the port with one or more VLANs using the vlan 802.1q command. For example:
Note. If MVRP is configured, GVRP cannot be configured on that switch and GVRP frames are ignored
by the switch.
5 Enable MVRP on the port by using the mvrp port command. For example, the following command
enables MVRP on port 1/2 of the switch:
-> mvrp port 1/2 enable
6 (Optional) Restrict a port from becoming a member of the statically created VLAN by using the mvrp
static-vlan-restrict command. For example, the following command restricts port 1/5 from becoming a
member of static VLAN 10:
-> mvrp port 1/5 static-vlan-restrict vlan 10
Note. To view the global configuration details of the router, enter the show mvrp configuration
command. The globally configured details are displayed as shown:
To view the MVRP configuration for a specific port, enter the show mvrp port command. The configura-
tion data of the particular port is displayed as shown:
page 18-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP Quick Steps for Configuring MVRP
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-5
MRP Overview Configuring MVRP
MRP Overview
Multiple Registration Protocol (MRP) was introduced as a replacement for GARP with the IEEE
802.1ak-2007 amendment. The Multiple VLAN Registration Protocol (MVRP) defines a MRP
Application that provides the VLAN registration service.
MVRP provides a mechanism for dynamic maintenance of the contents of dynamic VLAN registration
Entries for each VLAN, and for propagating the information they contain to other bridges. This
information allows MVRP-aware devices to dynamically establish and update their knowledge of the set
of VLANs that currently have active members, and through which ports those members can be reached.
The main purpose of MVRP is to allow switches to automatically discover some of the VLAN
information that would otherwise need to be manually configured.
MVRP Overview
MVRP acts as an MRP application, sending and receiving MVRP information encapsulated in an ethernet
frame on a specific MAC address. MVRP allows both end stations and bridges in a bridged local area
network to issue and revoke declarations relating to membership of VLANs. Each MVRP device that
receives the declaration in the network creates or updates a dynamic VLAN registration entry in the
filtering database to indicate that the VLAN is registered on the reception port.
In this way, MVRP provides a method to share VLAN information within a layer 2 network dynamically,
and configure the needed VLANs. For example, in order to add a switch port to a VLAN, only the end
port, or the VLAN-supporting network device connected to the switchport, need be reconfigured, and all
necessary VLAN trunks are dynamically created on the other MVRP-enabled switches. Without using
MVRP, either a manual configuration of VLAN trunks or use of a manufacturer-specific proprietary
method is necessary. In short, MVRP helps to maintain VLAN configuration dynamically based on current
network configurations.
page 18-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP MVRP Overview
1 2 3 4 5
Switch A has 3 VLANs configured as static VLANs (10, 20, and 30). Other switches on the same network
learn these 3 VLANs as dynamic VLANs. Also, the end station connected on port 5 is statically
configured for VLAN 50. Port 1 on Switch A is manually configured for VLANs 10, 20, and 30. All the
ports are in the same Spanning tree instance and are in forwarding state. Hence, as the
Initial Configuration of MVRP diagram shows,
1 Port 1 on Switch A advertises VLAN IDs (VIDs) 10, 20, and 30.
2 Port 2 on Switch B receives the advertisements. VLANs 10, 20, and 30 are created as dynamic VLANs
on this Switch B and Port 2 becomes a member of VLANs 10, 20, and 30.
3 Port 3 on Switch B is triggered to advertise VLANs 10, 20, and 30, but does not become a member of
these VLANs.
4 Port 4 on Switch C receives the advertisements. VLANs 10, 20, and 30 are created as dynamic VLANs
on Switch C and Port 4 becomes a member of VLANs 10, 20, and 30.
5 Port 5 advertises VLANs 10, 20, and 30, but this port is not a member of these VLANs.
Note. Default VLAN (VLAN 1) exists on all switches, but it is not considered here.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-7
MVRP Overview Configuring MVRP
The configuration sequence of advertisements and registration of VLANs results in the following
configuration.
1 2 3 4 5
Here, the end station advertises itself as a member of VLAN 50. As the Dynamic Learning of VLANs 10, 20,
and 30 diagram shows,
1 Port 5 receives the advertisement and Switch C creates VLAN 50 as a dynamic VLAN. Port 5 of
Switch C becomes a member of VLAN 50.
2 Port 4 advertises VLAN 50, but is not a member of VLAN 50.
3 Port 3 of Switch B receives the advertisement, Switch B creates the dynamic VLAN 50, and Port 3
becomes a member of VLAN 50.
4 Port 2 advertises VLAN 50, but is not a member of this VLAN.
5 Port 1 on Switch A receives the advertisement, creates dynamic VLAN 50. Port 1 becomes a member
of VLAN 50.
The resulting configuration is depicted as follows:
1 2 3 4 5
Note. Every port on a switch is not a member of all the VLANs. Only those ports that receive the
advertisement become members of the VLAN being advertised.
page 18-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP Interaction With Other Features
GVRP
If MVRP is configured, GVRP cannot be configured and the GVRP frames are ignored on that switch.
MVRP is functionally independent of the GVRP.
When the device has legacy GVRP commands in the boot.cfg (for example, during image upgrade from a
previous release which does not support MVRP) and the default mode is configured for MVRP, the GVRP
commands are still accepted and the VLAN registration mode is internally changed to GVRP.
There is an option to change the operational mode between MVRP and GVRP. But, when you change the
mode, it results in the complete deletion of static as well as dynamic configurations of the existing
operational mode.
STP
MVRP feature is supported only in STP flat mode. If MVRP is configured in the system with STP flat
mode, then STP mode cannot be changed to 1x1 mode. When a topology change is detected by STP,
MAC addresses for the dynamic VPAs learned by MVRP is also deleted.
IPM VLAN
MVRP is not supported on IP Multicast VLANs (IPMVLANs). If MVRP PDU for IPMVLAN
registration is received on standard/network port, the PDUs are discarded. IPMVLAN is not advertised by
MVRP.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-9
Configuring MVRP Configuring MVRP
Configuring MVRP
This section describes how to configure MVRP using the Command Line Interface (CLI) commands.
Enabling MVRP
MVRP is used primarily to prune unnecessary broadcast and unknown unicast traffic, and dynamically
create and manage VLANs. MVRP has to be globally enabled on a switch before it can start forwarding
MVRP frames. When MVRP is configured on a switch, GVRP cannot be configured on that switch and
when a port is enabled for MVRP, it cannot be converted as a mobile, mirroring, aggregate, VPLS Access,
or a VLAN stacking User port.
To enable MVRP globally on the switch, enter the mvrp command at the CLI prompt as shown:
-> mvrp enable
To disable MVRP globally on the switch, use disable option of the mvrp command as shown:
-> mvrp disable
Note. Disabling MVRP globally leads to the deletion of all learned VLANs.
MVRP can be enabled on ports regardless of whether it is globally enabled or not. However, for the port to
become an active participant, MVRP must be globally enabled on the switch. By default, MVRP is
disabled on the ports. To enable MVRP on a specified port, use the mvrp port command.
For example, to enable MVRP on port 2 of slot 1, enter:
-> mvrp port 1/2 enable
To disable MVRP on a specific port, use disable option of the mvrp port command as shown:
-> mvrp port 1/2 enable
Note. MVRP can be configured only on fixed, 802.1 Q and aggregate ports. It cannot be configured on
mirror, aggregate, mobile, VPLS Access, and VLAN Stacking User ports.
page 18-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP Configuring MVRP
Note. If MVRP is globally enabled on a switch, transparent switching does not have any effect on the
switch.
You can configure the switch to propagate MVRP frames transparently using the mvrp port command, as
shown:
-> mvrp transparent-switching enable
Use the disable option of this command to disable the transparent switching capability of the switch. For
example:
-> mvrp transparent-switching disable
Note. When both MVRP and MVRP transparent switching are globally disabled, the switch discards the
MVRP frames.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-11
Configuring MVRP Configuring MVRP
To view the registration mode of the port, use the show mvrp port command. For example:
-> show mvrp port 1/2
page 18-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP Configuring MVRP
To view the registration mode of the port, use the show mvrp port command. For example,
-> show mvrp port 1/2
Note. The registration mode for the default VLANs of all the ports in the switch is set to normal.
To view the registration mode of the port, use the show mvrp port command. For example,
-> show mvrp port 1/2
MVRP Enabled : no,
Registrar Mode : forbidden,
Applicant Mode : participant,
Join Timer (msec) : 600,
Leave Timer (msec) : 1800,
LeaveAll Timer (msec) : 30000,
Periodic Timer (sec) : 1,
Periodic Tx status : disabled
To view the MVRP configurations for all the ports, including timer values, registration and applicant
modes, enter the following:
-> show mvrp port enabled
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-13
Configuring MVRP Configuring MVRP
When a port is set to participant mode, MVRP protocol exchanges are allowed only if the port is set to the
STP forwarding state.
To set the applicant mode of port 1/2 to participant mode, enter the following:
-> mvrp port 1/2 applicant participant
When a port is set to non-participant mode, MVRP PDUs are not sent through the STP forwarding and
blocking ports.
To set the applicant mode of port 1/2 to non-participant mode, enter the following:
-> mvrp port 1/2 non-participant
The applicant mode of the port can be set to the default value by using the mvrp applicant command. To
set the MVRP applicant mode of port 1/2 to the default mode (active mode), enter the following
command:
-> mvrp port 1/2 active
page 18-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP Configuring MVRP
• Leave timer—The wait time taken to remove the port from the VLAN after receiving a Leave message
on that port.
• LeaveAll timer—The time an MVRP instance takes to generate LeaveAll messages. The LeaveAll
message instructs the port to modify the MVRP state of all its VLANs to Leave.
• Periodic timer—The time frequency with which the messages are transmitted again and again.
The default values of the Join, Leave, and LeaveAll timers are 600 ms, 1800 ms, and 30000 ms,
respectively.
When you set the timer values, the value for the Leave timer must be greater than or equal to twice the
Join timer value plus 100 milliseconds.(Leave>=Join * 2 +100). The LeaveAll timer value must be
greater than or equal to the Leave timer value (LeaveAll >= Leave). If you attempt to set a timer value
that does not adhere to these rules, an error message is displayed.
For example, if you set the Leave timer to 1700 ms and attempt to configure the Join timer to 400 ms, an
error is returned. Set the Leave timer to at least 1800 ms and then set the Join timer to 600 ms.
To modify the Join timer value, use the mvrp timer join command. For example, to modify the Join timer
value of port 1/2, enter the following:
-> mvrp port 1/2 timer join 600
The Join timer value of port 1/2 is now set to 600 ms.
To set the Leave timer value of port 1/2 to 1800 ms, enter the command as shown:
-> mvrp port 1/2 timer leave 1800
To set the LeaveAll timer of port 1/2 to 30000 ms, enter the command as shown:
-> mvrp port 1/2 timer leaveall 30000
To set the Periodic timer of port 1/2 to 1 second, enter the command as shown:
-> mvrp port 1/2 timer periodic-timer 1
To view the timer value assigned to a particular port, use the show mvrp timer command.
-> show mvrp port 1/2 timer
Note. Set the same MVRP timer value on all the connected devices.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-15
Configuring MVRP Configuring MVRP
Here, VLAN 4 cannot be learned by the device dynamically. However, if the VLAN exists on the device
as a static VLAN, it can be mapped to the receiving port.
To allow dynamic VLAN registrations on the port, use the no form of the
mvrp restrict-vlan-registration command as shown:
-> no mvrp port 1/1 restrict-vlan-registration vlan 4
Here, the port 1/9 is restricted from becoming a MVRP member of VLAN 5.
To restrict a port from becoming a member of a range of statically created VLANs, enter the
mvrp static-vlan-restrict command as shown:
-> mvrp port 1/9 static-vlan-restrict vlan 5-9
page 18-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MVRP Configuring MVRP
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 18-17
Verifying the MVRP Configuration Configuring MVRP
show mvrp last-pdu-origin Displays the source MAC address of the last MVRP message
received on specific ports or aggregates.
show mvrp configuration Displays the global configuration for MVRP.
show mvrp linkagg Displays the MVRP configuration for a specific port or an aggregate
of ports.
show mvrp port Displays the MVRP configurations for all the ports, including timer
values, registration and applicant modes.
show mvrp vlan-restrictions Displays the list of VLANS learned through MVRP and their details.
show mvrp timer Displays the timer values configured for all the ports or a specific
port.
show mvrp statistics Displays the MVRP statistics for all the ports, aggregates, or specific
ports.
show mvrp configuration Clears MVRP statistics for all the ports, an aggregate of ports, or a
specific port.
For more information about the output details that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 18-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
19 Configuring 802.1AB
Link Layer Discovery Protocol (LLDP) is an emerging standard that provides a solution for the
configuration issues caused by expanding networks. LLDP supports the network management software
used for complete network management. LLDP is implemented according to the IEEE 802.1AB standard.
LLDP specifically defines a standard method for Ethernet network devices and Media Endpoint Devices
(MED) to exchange information with its neighboring devices and maintain a database of the information.
The exchanged information, passed as LLDPDU, is in TLV (Type, Length, Value) format.
The information available to the network management software must be as new as possible. Hence, the
remote device information is periodically updated.
The LLDP-MED capability of OmniSwitch supports the usage of LLDP-MED Network Policy to
advertise a VLAN to the connected MEDs. The network policy IDs can be configured on fixed, mobile
and 802.1x ports. The LLDP Agent Security mechanism can be configured manually for secure access to
the network by detecting rogue devices and preventing them from accesing the internal network.
In This Chapter
This chapter describes the basic components of 802.1AB and how to configure them through the
Command Line Interface (CLI). The CLI commands are used in the configuration examples; for more
details about the syntax of commands, see Chapter 12, “802.1AB Commands,” in the OmniSwitch AOS
Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include the following:
• “Quick Steps for Configuring 802.1AB” on page 19-4
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-1
802.1AB Specifications Configuring 802.1AB
802.1AB Specifications
IEEE Specification IEEE 802.1AB-2005 Station and Media Access
Control Connectivity Discovery
TIA Specifications TIA-1057 - Link Layer Discovery Protocol for
Media Endpoint Devices
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
(LLDP-MED added in 6.3.4)
Transmit time interval for LLDPDUs 5 to 32768 in seconds
Transmit hold multiplier value 2 to 10
Transmit delay 1 to 8192 in seconds
Fast start count 1 to 10
Reinit delay 1 to 10 in seconds
Notification interval 5 to 3600 in seconds
Maximum number of network policies that 8
can be associated with a port
Maximum number of network policies 32
that can be configured on the switch
VLAN ID Range for assigning explicit 1 to 4094
LLDP-MED Network Policy
DSCP range 0 to 63
802.1p priority range 0 to 7
Nearest Bridge MAC Address 01:80:c2:00:00:0e
Nearest Edge MAC Address 01:20:da:02:01:73
page 19-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB 802.1AB Defaults Table
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-3
Quick Steps for Configuring 802.1AB Configuring 802.1AB
2 To control per port notification status about a change in a remote device associated to a port, use the
lldp notification command. For example:
-> lldp 2/47 notification enable
3 To control per port management TLV to be incorporated in the LLDPDUs, use the
lldp tlv management command. For example:
-> lldp 2/47 tlv management port-description enable
4 Set the transmit time interval for LLDPDUs. To set the timer for a 50 second delay, use the
lldp transmit interval command. For example:
-> lldp transmit interval 50
5 Set the minimum time interval between successive LLDPDUs. To set the interval for a 20 second
delay, use the lldp transmit delay command. For example:
-> lldp transmit delay 20
6 Set the LLDPDUs transmit fast start count required for LLDP Fast Restart mechanism to be activated.
Note. Optional. Verify the LLDP per port statistics by entering the show lldp statistics command. For
example:
-> show lldp statistics
----------+--------------------------------------+---------------------+----------
| LLDPDU | TLV | Device
Slot/Port| Tx Rx Errors Discards | Unknown Discards | Ageouts
----------+--------+----------+----------+----------+----------+----------+-----
1/23 52 0 0 0 0 0 0
2/47 50 50 0 0 0 0 0
2/48 50 50 0 0 0 0 0
To verify the remote system information, use the show lldp remote-system command. For example:
For more information about this display, see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 19-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB Quick Steps for Configuring LLDP-MED Network Policy
Note. A VLAN and VPA must be created for LLDP-MED to work on fixed, mobile or 802.1x ports.
However, if the VLAN is not created and the VLAN is added in the LLDP-MED Network Policy, no error
is displayed.
2 Configure a local network policy on the switch for a specific application type using the lldp network
policy command. Assign a network policy identifier (ID) to a particular application type using this
command. For example:
-> lldp network-policy 1 application voice vlan 10 l2-priority 5
3 Bind the network policy to the VLAN port using the lldp med network-policy command.
For example:
-> lldp 1/10 med network-policy 1
3 Enable network policy using the lldp tlv med command. Configure LLDP-MED TLVs for a particular
port using this command.
-> lldp 2/10 tlv med network-policy enable
4 Configure a local network policy on the switch for a specific application type using the lldp network
policy application command.
-> lldp network-policy 1 application voice vlan 10 l2-priority 5
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-5
Quick Steps for Configuring LLDP-MED Network Policy Configuring 802.1AB
5 Bind the network policy to a port associated with a VLAN using the lldp med command.
3 Use the aaa radius-server command to configure the radius server to be used for port authentication.
Configure the radius server to return the VLAN ID for the incoming MAC address of the LLDP device.
-> aaa radius-server rad1 host 10.10.2.1 timeout 25
4 Associate the RADIUS server with authentication for 802.1X ports using the aaa authentication
command.
-> aaa authentication 802.1x rad1
5 Configure the User Network Profile and add a classification rule for the MAC address using the
following command.
-> aaa classification-rule mac-address <mac-address-of-the-lldp-device>
user-network-profile name engineering
6 Enable network policy using the lldp tlv med command. Configure LLDP-MED TLVs for a particular
port using this command.
-> lldp 3/10 tlv med network-policy enable
7 Configure a local network policy on the switch for a specific application type using the lldp network
policy application command.
-> lldp network-policy 1 application voice vlan 10 l2-priority 5
8 Bind the network policy to a port associated with a VLAN using the lldp med command.
If the authentication server returns a VLAN ID, then the client device is assigned to the related VLAN.
Note. Optional. Verify the LLDP network policies enabled with regard to different network policy IDs, by
entering the show lldp network-policy command. For example:
-> show lldp network-policy
page 19-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB Quick Steps for Configuring LLDP-MED Network Policy
To verify the network policies enabled on different slots and ports, use the show lldp med network-
policy command. For example:
For more information about this display, see the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-7
802.1AB Overview Configuring 802.1AB
802.1AB Overview
LLDP is a Layer 2 protocol used to detect adjacent devices in a network. Each device in a network sends
and receives LLDPDUs through all ports on which the protocol is enabled. If the protocol is disabled on a
port, then LLDPDUs received on that port are dropped.
The LLDPDUs are transmitted at a certain interval. This transmission interval can be configured. When an
LLDPDU is received from a neighboring device, the LLDPDU software validates the frame and stores the
information in the remote device Management Information Base (MIB). This information ages
periodically. If an LLDPDU is not received from the same device within the time specified in the TTL
TLV of the LLDPDU, the information is updated in the related MIB. By exchanging information with all
the neighbors, each device gets to know its neighbor on each port. The information contained in the
LLDPDU is transmitted in the TLV (Type, Length, Value) format and falls under two categories:
• Mandatory
• Optional
Each LLDPDU contains all the five mandatory TLVs and optional TLVs.
Mandatory TLVs
The mandatory TLV information contains the following information with regard to the LAN device:
• MSAP (MAC service access point) identifier.
page 19-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB 802.1AB Overview
Optional TLVs
The optional TLVs defined as part of LLDP are grouped into the following sets listed below:
Note. This optional TLV set is required for all LLDP implementation.
Note. If one TLV from this set is included in the LLDPDU, then all the other TLVs need to be included.
• Power through MDI TLV (in network connectivity TLV set, Extended Power-Via-MDI TLV is
supported)
• Link Aggregation TLV
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-9
802.1AB Overview Configuring 802.1AB
When an 802.1AB supporting system receives an LLDPDU containing MED capability TLV, then the
remote device is identified as an edge device , for example, IP phone and IP PBX, among others. In such a
case, the switch stops sending LLDPDU and starts sending MED LLDPDU on the port connected to the
edge device.
• Inventory management, allowing network administrators to track their network devices, and determine
their characteristics (manufacturer, software and hardware versions, and serial / asset number).
• Support for receiving, storing and advertising of VLAN information from and to remote Network
Connectivity Devices and Media Endpoint Devices (MEDs). LLDP-MED Network Policy TLVs are
used to let the OmniSwitch advertise the VLAN to the connected MEDs.
• Support for receiving and storing of Inventory Management TLVs from remote Media Endpoint
Devices.
VLAN assignment through explicit LLDP-MED Network Policy is supported on the OmniSwitch AOS.
• The LLDP-MED service advertises the information over the Logical Link-Layer Control Frames and
records higher layer management reachability and connection endpoint information from adjacent
devices.
• The LLDP-MED service enabled on OmniSwitch operates in advertising mode. However, it does not
support any means for soliciting information from the MEDs.
• Voice Signaling
page 19-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB 802.1AB Overview
• Guest Voice
• Video Conferencing
• Streaming voice
• Video Signaling
• Each network policy identifier (ID) must be configured with an application type and VLAN-ID as
mandatory parameters. Other parameters include L2 priority and DSCP.
• Upto 8 network policy IDs; one per each application type; can be configured for a given port.
• Two or more network policy IDs with the same application type can not be assigned to a port.
• The network policy ID can be configured on fixed, mobile and 802.1x ports.
• When any MED connects to a port with an explicit MED network policy configuration, the
OmniSwitch advertises the policy in the LLDPDU along with the MED Network Policy TLVs. This
advertisement occurs only if the transmission of the Network Policy TLV is enabled by the user. The
Media Endpoint Device must configure itself according to the advertised policy.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-11
802.1AB Overview Configuring 802.1AB
Aging Time
The LLDP specific information of the remote system is stored in the LLDP MIB. The TTL TLV carries a
positive value in seconds, and conveys to the other device the duration for which this information is valid.
Once a remote device is learned on a local port, if the receiving device does not receive an LLDPDU from
the same remote device and on the same local port within the TTL mentioned in the previous LLDPDU,
then the local device discards the related entry from its database. This is called the aging time and can be
set by the user.
page 19-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB 802.1AB Overview
• The NNI port that is connected to the rogue device is blocked. Thus the rogue device is prevented from
accessing the internal network.
LLDP security mechanism can be enabled or disabled globally at chassis level, at slot level, or at
individual port level. When the LLDP agent security is enabled, the configured ports are monitored for
reception of any LLDPDU. When an LLDPDU is received, the remote agent ID is learned and the port is
considered as a trusted port if the port does not have any other LLDP remote agent assigned. If the remote
agent chassis ID and port IDs received are already present in the trusted remote agent database on the
same port, then the port remains in a trusted state.
However, a port is moved to violation state under the following conditions:
• When a link up is received on a LLDP security enabled port, if no LLDPDU is received even after
three times the LLDP timer interval period (30 seconds), the port is moved to a violation state.
• If a trusted remote agent exists, and if no LLDP remote agent is learned even after three times the
LLDP timer interval period (30 seconds), the port is moved to a violation state.
• If a new LLDP remote agent is learned after the link up and down, then the port is moved to a
violation state.
• If the same chassis ID and port ID exist in the trusted remote agent database but on a different port,
then the port remote agent is learned and the port is moved to a violation state.
• If a new LLDP remote agent is learned on a port that has a trusted LLDP remote agent, then the port is
moved to a violation state.
Three actions can be configured when an LLDP security violation occurs. The different violation actions
that can be configured are:
• trap - Generate a trap
When a shutdown occurs on a port, it can be cleared manually through the CLI interface using the clear
violations command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-13
802.1AB Overview Configuring 802.1AB
• Nearest-bridge Mode uses the LLDP standard "nearest-bridge" address of 01:80:c2:00:00:0e as the
destination MAC address.
• When running in Nearest-bridge Mode LLDP frames with the nearest-edge MAC address are not
processed by LLDP but are flooded as normal L2 multicast frames.
Nearest-Edge Mode:
• The switch must be configured to operate in Nearest-edge mode.
• Nearest-edge Mode uses the Nearest-edge MAC address of 01:20:da:02:01:73 as the destination MAC
address, this MAC address is not configurable.
• When LLDP is set to Nearest-edge Mode LLDP frames with a destination MAC address of
01:20:da:02:01:73 are processed by LLDP.
• When running in Nearest-edge Mode LLDP frames with the nearest-bridge MAC address are not
processed by LLDP but are flooded as normal L2 multicast frames.
• The Management Switch sends LLDP PDUs on the untagged interface with the MAC address of 01:20:
DA: 02:01:73.
page 19-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB Configuring 802.1AB
Configuring 802.1AB
The following sections list detailed procedures to enable 802.1AB, assign ports, network policies to
802.1AB, and configure the LLDP security mechanism for OmniSwitch.
To set the LLDPDU flow on port 4 of slot 3 as receive, enter the following command at the CLI prompt:
-> lldp 3/4 lldpdu rx
To disable the flow of LLDPDU on a switch, enter the lldp lldpdu command:
-> lldp chassis lldpdu disable
To disable the flow of LLDPDU on port 5 of slot 1, enter the following command at the CLI prompt:
-> lldp 1/5 lldpdu disable
To enable notification on port 2 of slot 1, enter the following command at the CLI prompt:
-> lldp 1/2 notification enable
To disable notification on port 4 of slot 1, enter the following command at the CLI prompt:
-> lldp 1/4 notification disable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-15
Configuring 802.1AB Configuring 802.1AB
To enable the management TLV on port 3 of slot 2, enter the following command at the CLI prompt:
-> lldp 2/3 tlv management system-capabilities enable
To disable the management TLV on a switch, enter the lldp tlv management command:
-> lldp chassis tlv management port-description disable
To disable management TLV on port 3 of slot 2, enter the following command at the CLI prompt:
-> lldp 2/3 tlv management system-capabilities disable
To enable the 802.1 TLV on port 1 of slot 5, enter the following command at the CLI prompt:
-> lldp 5/1 tlv dot1 vlan-name enable
To disable the 802.1 TLV on a switch, enter the lldp tlv dot1 command:
-> lldp chassis tlv dot1 port-vlan disable
To disable 802.1 TLV on port 2 of slot 5, enter the following command at the CLI prompt:
-> lldp 5/2 tlv dot1 vlan-name disable
To enable the 802.3 TLV on port 4 of slot 2, enter the following command at the CLI prompt:
-> lldp 2/4 tlv dot3 mac-phy enable
page 19-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB Configuring 802.1AB
To disable the 802.3 TLV on a switch, enter the lldp tlv dot3 command, as shown:
-> lldp chassis tlv dot3 mac-phy disable
To disable 802.3 TLV on port 5 of slot 3, enter the following command at the CLI prompt:
-> lldp 3/5 tlv dot3 mac-phy disable
To enable the MED TLV on port 4 of slot 4, enter the following command at the CLI prompt:
-> lldp 4/4 tlv med capability enable
To disable the MED TLV on a switch, enter the lldp tlv med command, as shown:
-> lldp chassis tlv med power disable
To disable MED TLV on port 3 of slot 4, enter the following command at the CLI prompt:
-> lldp 4/3 tlv med capability disable
To enable the voice application network policy for a MED TLV on the port 3 of slot 4, enter the
following command at the CLI prompt:
-> lldp 4/3 tlv med network policy 1 enable
To disable a MED TLV voice network policy on the port 3 of slot 4, enter the following command at the
CLI prompt:
Note. The Time To Live is a multiple of the transmit interval and transmit hold-multiplier.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-17
Configuring 802.1AB Configuring 802.1AB
By default, the transmit delay is less than or equal to the multiplication of the transmit interval and 0.25.
Note. In a specified interval, generating more than one notification-event is not possible.
To enable LLDP trust agent at slot number 1, enter the lldp trust-agent command as shown:
-> lldp 1 trust-agent enable
To enable LLDP trust agent at individual port 3 of slot 1, enter the lldp trust-agent command as shown:
-> lldp 1/3 trust-agent enable
page 19-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1AB Configuring 802.1AB
The chassis ID subtype is configured to validate the remote agent as a trust agent. To set the
chassis-id-subtype for the LLDP trust agent globally at chassis level, as chassis-component, enter the
lldp trust-agent command as shown:
-> lldp chassis trust-agent chassis-id-subtype chassis-component
To set the chassis-id-subtype for the LLDP trust agent on the individual port 3 of slot 1 as
port-component, enter the lldp trust-agent command as shown:
-> lldp 1/3 trust-agent chassis-id-subtype port-component
Note. By default, the first remote agent with any chassis ID sub type is accepted as a trust agent, if no
chassis-id-subtype component is specified to validate the remote agent.
To set the action to be performed when a violation is detected globally at the chassis level, use the lldp
trust-agent violation-action command as shown:
-> lldp chassis trust-agent violation-action trap-and-shutdown
To set the action to be performed when a violation is detected at the individual slot level, use the lldp
trust-agent violation-action command as shown:
-> lldp 1 trust-agent violation-action shutdown
Note. For further details on verifying LLDP configuration and trust agent information, see “Verifying
802.1AB Configuration” on page 19-20.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 19-19
Verifying 802.1AB Configuration Configuring 802.1AB
Note.
The show lldp trust-agent command is used to verify the LLDP security configuration.
When LLDP security is disabled, the show lldp trust-agent command displays the Admin Status as
Disabled for all the ports. However, default values are displayed for the output fields - Violation Action
as Trap only, the Violation Status as Trusted, and Chassis ID Subtype as 8(any).
Example
For more information about the resulting display, see Chapter 12, “802.1AB Commands,” in the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 19-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
20 Using Interswitch
Protocols
Alcatel-Lucent Interswitch Protocol (AIP) is used to discover adjacent switches in the network. The
following protocol is supported:
• Alcatel-Lucent Mapping Adjacency Protocol (AMAP), which is used to discover the topology of
OmniSwitches and Omni Switch/Router (Omni S/R). See “AMAP Overview” on page 20-3.
This protocol is described in detail in this chapter.
In This Chapter
This chapter describes the AMAP protocol and how to configure it through the Command Line Interface
(CLI). CLI commands are used in the configuration examples; for more details about the syntax of
commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Activating AMAP on page 20-5.
For information about statically and dynamically assigning switch ports to VLANs, see Chapter 5,
“Assigning Ports to VLANs.”
For information about defining VLAN rules that allow dynamic assignment of mobile ports to a VLAN,
see Chapter 39, “Defining VLAN Rules.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 20-1
AIP Specifications Using Interswitch Protocols
AIP Specifications
Standards Not applicable at this time. AMAP is an Alcatel-
Lucent proprietary protocol.
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Maximum number of IP addresses 255
propagated by AMAP
AMAP Defaults
Parameter Description Command Default
AMAP status amap Enabled
Discovery time interval amap discovery time 30 seconds
Common time interval amap common time 300 seconds
page 20-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Interswitch Protocols AMAP Overview
AMAP Overview
The Alcatel-Lucent Mapping Adjacency Protocol (AMAP) is used to discover the topology of
OmniSwitches in a particular installation. Using this protocol, each switch determines which
OmniSwitches are adjacent to it by sending and responding to Hello update packets. For the purposes of
AMAP, adjacent switches are those that:
• have a Spanning Tree path between them
• do not have any switch between them on the Spanning Tree path that has AMAP enabled
In the illustration here, all switches are on the Spanning Tree path. OmniSwitch A and OmniSwitch C
have AMAP enabled. OmniSwitch B does not. OmniSwitch A is adjacent to OmniSwitch C and vice
versa. If OmniSwitch B enables AMAP, the adjacency changes. OmniSwitch A would be next to
OmniSwitch B, B would be adjacent to both A and C, and C would be adjacent to B.
Note. All Hello packet transmissions are sent to a well-known MAC address (0020da:007004).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 20-3
AMAP Overview Using Interswitch Protocols
No
Yes Any No
Hello packet received Common Hello packet
before discovery Transmission State received?
time-out interval?
page 20-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Interswitch Protocols Configuring AMAP
Configuring AMAP
AMAP is active by default. In addition to disabling or enabling AMAP, you can view a list of adjacent
switches or configure the time-out intervals for Hello packet transmission and reception.
Note. Ports in the common transmission state send out Hello packets based on the common time-out inter-
val described later.
The discovery time-out interval is set to 30 seconds by default. To display the current discovery time-out
interval, enter the following command:
-> show amap
To change the discovery time-out interval, use either of these forms of the command with the desired
value (any value between 1 and 65535). Note that the use of the time command keyword is optional. For
example:
-> amap discovery 60
-> amap discovery time 60
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 20-5
Configuring AMAP Using Interswitch Protocols
Note. Switches avoid synchronization by jittering the common time-out interval plus or minus 10 percent
of the configured value. For example, if the default common time-out interval is used (300 seconds), the
jitter is plus or minus 30 seconds.
When a Hello packet is received from an adjacent switch before the common time-out interval expires, the
switch sends a Hello reply and restarts the common transmission timer.
The common time-out interval is set to 300 seconds by default. To display the current common time-out
interval, enter the following command:
-> show amap
To change the common time-out interval, use either of these forms of the command with the desired value
(any value between 1 and 65535). Note that the use of the time command keyword is optional. For exam-
ple:
-> amap common 600
-> amap common time 600
page 20-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Interswitch Protocols Configuring AMAP
AMAP:
Operational Status = enabled,
Common Phase Timeout Interval (seconds) = 300,
Discovery Phase Timeout Interval (seconds) = 30
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 20-7
Configuring AMAP Using Interswitch Protocols
Remote OmniSwitch B
Remote interface 2/1 0020da:032c40
OmniSwitch A (local)
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the show amap command.
page 20-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
21 Configuring IP
Internet Protocol (IP) is primarily a network-layer (Layer 3) protocol that contains addressing and control
information that enables packets to be forwarded. Along with Transmission Control Protocol (TCP), IP
represents the heart of the Internet protocols. IP has two primary responsibilities, providing connection-
less, best-effort delivery of datagrams through an internetwork; and providing fragmentation and reassem-
bly of datagrams to support data links with different Maximum Transmission Unit (MTU) sizes.
Note. IP routing (Layer 3) can be accomplished using static routes or by using one of the IP routing proto-
cols, Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). For more information on
these protocols see Chapter 25, “Configuring RIP,” in this manual; or “Configuring OSPF” in the
OmniSwitch AOS Release 6 Advanced Routing Configuration Guide.
There are two versions of Internet Protocol supported, IPv4 and IPv6. For more information about using
IPv6, see Chapter 23, “Configuring IPv6.”
In This Chapter
This chapter describes IP and how to configure it through the Command Line Interface (CLI). It includes
instructions for enabling IP forwarding, configuring IP route maps, basic IP configuration commands (e.g.,
ip default-ttl), tunneling, VRF Route leak, and IP and ARP spoofing.CLI commands are used in the
configuration examples; for more details about the syntax of commands, see the OmniSwitch AOS Release
6 CLI Reference Guide. This chapter provides an overview of IP and includes information about the
following procedures:
• IP Forwarding
– Configuring an IP Router Interface (see page 21-9)
– Creating a Static Route or Recursive Static Route (see page 21-13)
– Creating a Default Route (see page 21-16)
– Configuring Address Resolution Protocol (ARP) (see page 21-16)
– Configuring MAC Forced Forwarding (see page 21-18)
• IP Configuration
– Configuring the Router Primary Address (see page 21-20)
– Configuring the Router ID (see page 21-20)
– Configuring the Time-to-Live (TTL) Value (see page 21-21)
– Configuring Route Map Redistribution (see page 21-21)
– IP-Directed Broadcasts (see page 21-27)
– Protecting the Switch from Denial of Service (DoS) attacks (see page 21-28)
– Configuring the IP Dual-Hash mode (see page 21-27)
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-1
In This Chapter Configuring IP
• Managing IP
– Internet Control Message Protocol (ICMP) (see page 21-34)
– Using the Ping Command (see page 21-37)
– Tracing an IP Route (see page 21-38)
– Displaying TCP Information (see page 21-38)
– Displaying User Datagram Protocol (UDP) Information (see page 21-39)
– Service Assurance Agent (SAA) (see page 21-39)
• Tunneling
– Generic Routing Encapsulation (page 21-40)
– IP Encapsulation within IP (page 21-40)
– Tunneling operation (page 21-41)
– Configuring a Tunnel Interface (page 21-42)
• VRF Route Leak
– Quick Steps for Configuring VRF Route Leak (page 21-44)
– Configuring VRF Route Leak (page 21-45)
– Verifying VRF Route Leak Configuration (page 21-48)
• IP and ARP Spoofing
– Configuring IP and ARP Spoofing (page 21-49)
– Verifying IP and ARP Spoofing Configuration (page 21-51)
page 21-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Specifications
IP Specifications
Note that the maximum limit values provided in the following Specifications table are subject to available
system resources:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-3
IP Defaults Configuring IP
IP Defaults
The following table lists the defaults for IP configuration through the ip command.
Note. The operational status of a VLAN remains inactive until at least one active switch port is assigned to
the VLAN. Ports are considered active if they are connected to an active network device. Non-active port
assignments are allowed, but do not change the operational state of the VLAN.
To forward packets to a different VLAN on a switch, you must create a router interface on each VLAN.
The following steps show you how to enable IP forwarding between VLANs “from scratch”. If active
VLANs have already been created on the switch, you only need to create router interfaces on each VLAN
(Steps 5 and 6).
1 Create VLAN 1 with a description (e.g., VLAN 1) by using the vlan command. For example:
2 Create VLAN 2 with a description (e.g., VLAN 2) by using the vlan command. For example:
3 Assign an active port to VLAN 1 by using the vlan port default command. For example, the follow-
ing command assigns port 1 on slot 1 to VLAN 1:
-> vlan 1 port default 1/1
4 Assign an active port to VLAN 2 by using the vlan port default command. For example, the follow-
ing command assigns port 2 on slot 1 to VLAN 2:
-> vlan 2 port default 1/2
page 21-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Quick Steps for Configuring IP Forwarding
5 Create an IP router interface on VLAN 1 using the ip interface command. For example:
6 Create an IP router interface on VLAN 2 using the ip interface command. For example:
Note. See Chapter 4, “Configuring VLANs.” for more information about how to create VLANs and
VLAN router interfaces.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-5
IP Overview Configuring IP
IP Overview
IP is a network-layer (Layer 3) protocol that contains addressing and control information that enables
packets to be forwarded on a network. IP is the primary network-layer protocol in the Internet protocol
suite. Along with TCP, IP represents the heart of the Internet protocols.
IP Protocols
IP is associated with several Layer 3 and Layer 4 protocols. These protocols are built into the base code
loaded on the switch. A brief overview of supported IP protocols is included below.
Transport Protocols
IP is both connectionless (it forwards each datagram separately) and unreliable (it does not guarantee
delivery of datagrams). This means that a datagram may be damaged in transit, thrown away by a busy
switch, or simply never make it to its destination. The resolution of these transit problems is to use a Layer
4 transport protocol, such as:
• TCP—A major data transport mechanism that provides reliable, connection-oriented, full-duplex data
streams. While the role of TCP is to add reliability to IP, TCP relies upon IP to do the actual delivering
of datagrams.
• UDP—A secondary transport-layer protocol that uses IP for delivery. UDP is not connection-oriented
and does not provide reliable end-to-end delivery of datagrams. But some applications can safely use
UDP to send datagrams that do not require the extra overhead added by TCP. For more information on
UDP, see Chapter 28, “Configuring DHCP and DHCPv6.”
Application-Layer Protocols
Application-layer protocols are used for switch configuration and management:
• Bootstrap Protocol (BOOTP)/Dynamic Host Configuration Protocol (DHCP)—May be used by an end
station to obtain an IP address. The switch provides a DHCP Relay that allows BOOTP requests/replies
to cross different networks.
• Simple Network Management Protocol (SNMP)—Allows communication between SNMP managers
and SNMP agents on an IP network. Network administrators use SNMP to monitor network perfor-
mance and manage network resources. For more information, see the “Using SNMP” chapter in the
OmniSwitch AOS Release 6 Switch Management Guide.
• Telnet—Used for remote connections to a device. You can telnet to a switch and configure the switch
and the network by using the CLI.
• File Transfer Protocol (FTP)—Enables the transfer of files between hosts. This protocol is used to load
new images onto the switch.
page 21-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Overview
Additional IP Protocols
There are several additional IP-related protocols that may be used with IP forwarding. These protocols are
included as part of the base code.
• Address Resolution Protocol (ARP)—Used to match the IP address of a device with its physical
(MAC) address. For more information, see “Configuring Address Resolution Protocol (ARP)” on
page 21-16.
• Virtual Router Redundancy Protocol (VRRP)—Used to back up routers. For more information, see
Chapter 31, “Configuring VRRP.”
• Internet Control Message Protocol (ICMP)—Specifies the generation of error messages, test packets,
and informational messages related to IP. ICMP supports the ping command used to determine if hosts
are online. For more information, see “Internet Control Message Protocol (ICMP)” on page 21-34.
• Router Discovery Protocol (RDP)—Used to advertise and discover routers on the LAN. For more
information, see Chapter 26, “Configuring RDP.”
• Multicast Services—Includes IP multicast switching (IPMS). For more information, see Chapter 34,
“Configuring IP Multicast Switching.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-7
IP Forwarding Configuring IP
IP Forwarding
Network device traffic is bridged (switched) at the Layer 2 level between ports that are assigned to the
same VLAN. However, if a device needs to communicate with another device that belongs to a different
VLAN, then Layer 3 routing is necessary to transmit traffic between the VLANs. Bridging makes the deci-
sion on where to forward packets based on the packet’s destination MAC address; routing makes the deci-
sion on where to forward packets based on the packet’s IP network address (e.g., IP - 21.0.0.10).
Alcatel-Lucent switches support routing of IP traffic. A VLAN is available for routing when at least one
router interface is defined for that VLAN and at least one active port is associated with the VLAN. If a
VLAN does not have a router interface, the ports associated with that VLAN are in essence firewalled
from other VLANs.
IP multinetting is also supported. A network is said to be multinetted when multiple IP subnets are brought
together within a single broadcast domain. It is now possible to configure up to eight IP interfaces per
VLAN. Each interface is configured with a different subnet. As a result, traffic from each configured
subnet can coexist on the same VLAN.
In the illustration below, an IP router interface has been configured on each VLAN. Therefore, worksta-
tions connected to ports on VLAN 1 on Switch 1 can communicate with VLAN 2; and workstations
connected to ports on VLAN 3 on Switch 2 can communicate with VLAN 2. Also, ports from both
switches have been assigned to VLAN 2, and a physical connection has been made between the switches.
Therefore, workstations connected to VLAN 1 on Switch 1 can communicate with workstations connected
to VLAN 3 on Switch 2.
Switch 1 Switch 2
= IP Router Interface
Physical
VLAN 1 VLAN 2 Connection VLAN 2 VLAN 3
110.0.0.0 120.0.0.0 120.0.0.0 130.0.0.0
IP Forwarding
If the switch is running in single MAC router mode, a maximum of 4094 VLANs can have IP interfaces
defined. In this mode, each router VLAN is assigned the same MAC address, which is the base chassis
MAC address for the switch.
page 21-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Forwarding
• An IP address to assign to the router interface (e.g., 193.204.173.21). Note that router interface IP
addresses must be unique. You cannot have two router interfaces with the same IP address.
• A subnet mask (defaults to the IP address class). It is possible to specify the mask in dotted decimal
notation (e.g., 255.255.0.0) or with a slash (/) after the IP address followed by the number of bits to
specify the mask length (e.g., 193.204.173.21/64).
• The forwarding status for the interface (defaults to forwarding). A forwarding router interface sends IP
frames to other subnets. A router interface that is not forwarding can receive frames from other hosts
on the same subnet.
• An Ethernet-II or SNAP encapsulation for the interface (defaults to Ethernet-II). The encapsulation
determines the framing type the interface uses when generating frames that are forwarded out of
VLAN ports. Select an encapsulation that matches the encapsulation of the majority of VLAN traffic.
• The Local Proxy ARP status for the VLAN. If enabled, traffic within the VLAN is routed instead of
bridged. ARP requests return the MAC address of the IP router interface defined for the VLAN. For
more information about Local Proxy ARP, see “Local Proxy ARP” on page 21-18.
• The primary interface status. Designates the specified IP interface as the primary interface for the
VLAN. By default, the first interface bound to a VLAN becomes the primary interface for that VLAN.
The following ip interface command example creates an IP interface named Marketing with an IP
network address of 21.0.0.1 and binds the interface to VLAN 455:
-> ip interface Marketing address 21.0.0.1 vlan 455
The name parameter is the only parameter required with this command. Specifying additional parameters
is only necessary to configure a value other than the default value for that parameter. For example, all of
the following commands will create an IP router interface for VLAN 955 with a class A subnet mask, an
enabled forwarding status, Ethernet-II encapsulation, and a disabled Local Proxy ARP and primary inter-
face status:
-> ip interface Accounting address 71.0.0.1 mask 255.0.0.0 vlan 955 forward e2
no local-proxy-arp no primary
-> ip interface Accounting address 71.0.0.1/8 vlan 955
-> ip interface Accounting address 71.0.0.1 vlan 955
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-9
IP Forwarding Configuring IP
Note. The rtr-vlan used to associate with the IP interface must be an unused VLAN. To modify the
parameters rtr-port, rtr-vlan, and type (tagged/untagged), the IP interface must be recreated to change the
association.
page 21-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Forwarding
Note that when changing the IP address for the interface, the subnet mask will revert back to the default
mask value if it was previously set to a non-default value and it is not specified when changing the IP
address. For example, the following command changes the IP address for the Accounting interface:
-> ip interface Accounting address 40.0.0.1
The subnet mask for the Accounting interface was previously set to 255.255.255.0. The above example
resets the mask to the default value of 255.0.0.0 because 40.0.0.1 is a Class A address and no other mask
was specified with the command. This only occurs when the IP address is modified; all other parameter
values remain unchanged unless otherwise specified.
To avoid the problem in the above example, simply enter the non-default mask value whenever the IP
address is changed for the interface. For example:
-> ip interface Accounting address 40.0.0.1 mask 255.255.255.0
-> ip interface Accounting address 40.0.0.1/8
Use the show ip interface command to verify IP router interface changes. For more information about
these commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
To view a list of IP interfaces configured on the switch, use the show ip interface command. For more
information about this command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-11
IP Forwarding Configuring IP
• The admin parameter is the only configurable parameter supported with this type of interface.
• Creating this interface does not deduct from the total number of IP interfaces allowed per VLAN or
switch.
• OSPF advertises the host route to the Loopback0 IP interface in its Router-LSAs (as a Stub link) as an
internal route into all its configured areas.
See the OmniSwitch AOS Release 6 Advanced Routing Configuration Guide for more information.
page 21-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Forwarding
If a managed IP interface is not defined for an application, the application uses the egress IP interface
address as the source IP.
A source IP address is configurable for the following applications within the specified VRF context:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-13
IP Forwarding Configuring IP
The subnet mask is not required if you want to use the natural subnet mask. By default, the switch imposes
a natural mask on the IP address. In the above example, the Class B mask of 255.255.0.0 is implied. If you
do not want to use the natural mask, you must enter a subnet mask. For example, to create a static route to
IP address 10.255.11.0, you would have to enter the Class C mask of 255.255.255.0:
-> ip static-route 10.255.11.0 mask 255.255.255.0 gateway 171.11.2.1
Note that specifying the length of the mask in bits is also supported. For example, the above static route is
also configurable using the following command:
-> ip static-route 10.255.11.0/24 gateway 171.11.2.1
When you create a static route, the default metric value of 1 is used. However, you can change the priority
of the route by increasing its metric value. The lower the metric value, the higher the priority. This metric
is added to the metric cost of the route. The metric range is 1 to 15. For example:
-> ip static-route 10.255.11.0/24 gateway 171.11.2.1 metric 5
If you want to classify certain static routes and filter them, then a tag value may be allocated to those
routes and route-map match statement to filter those routes.
-> ip static-route 10.0.3.0/24 gateway 30.0.3.1 tag 123 name HRDept
The subnet mask is not required if you want to use the natural subnet mask. By default, the switch imposes
a natural mask on the IP address. In the above example, the Class B mask of 255.255.0.0 is implied. If you
do not want to use the natural mask, enter a subnet mask. For example, to create a static route to IP address
10.255.11.0, you would have to enter the Class C mask of 255.255.255.0:
-> ip static-route 10.255.11.0 mask 255.255.255.0 gateway 171.11.2.1
Static routes do not age out of the IP Forwarding table; you must delete them from the table. Use the
no ip static route command to delete a static route. You must specify the destination IP address of the
route as well as the IP address of the first hop (gateway). For example, to delete a static route to IP address
171.11.0.0 through gateway 171.11.2.1, you would enter:
-> no ip static-route 171.11.0.0 gateway 171.11.2.1
The IP Forwarding table includes routes learned through one of the routing protocols (RIP, OSPF, BGP)
as well as any static routes that are configured. Use the show ip route command to display the IP
Forwarding table.
page 21-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Forwarding
The show ip route command displays the routes in FIB data structure of the IPEDR module. The show
command is now enhanced to support certain filtering options. The filtering options are:
• IP destination address/mask
• Gateway IP address
• Protocol
With this the user or administrator can filter the routes in FIB based on the prefix or can view the routes
from certain gateway or of a particular protocol rather than going through the entire routing table. This
provides more convenience to view the routes and thereby verifying and debugging faster.
With the enhancement, user can filter the output to see the filtered options. For example, if you want to see
the BGP routes or only routes from a certain gateway or search for a specific destination, use the
command as follows.
IPv6 already supports the destination and protocol option filtering. So along with the current options,
gateway filtering is also added to the show ipv6 route command.
A route to the 192.168.10.1 address would need to be learned by a dynamic routing protocol for the recur-
sive static route to be active.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-15
IP Forwarding Configuring IP
Note that specifying the length of the mask in bits is also supported. For example, the above default route
is also configurable using the following command:
-> ip static-route 0.0.0.0/0 gateway 171.11.2.1
Note. You cannot create a default route by using the EMP port as a gateway.
Configuring a permanent ARP entry with a multicast address is also supported. For example, the follow-
ing command creates a permanent multicast ARP entry:
-> arp 2.2.3.40 01:4a:22:03:44:5c
When configuring a static multicast ARP entry, do not use any of the following multicast addresses:
01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF
01:80:C2:XX.XX.XX
33:33:XX:XX:XX:XX
page 21-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Forwarding
Note that the IP address and hardware address (MAC address) are required when you add an entry to the
ARP table. Optionally, you may also specify:
• Alias. Use the alias keyword to specify that the switch will act as an alias (proxy) for this IP address.
When the alias option is used, the switch responds to all ARP requests for the specified IP address with
its own MAC address. Note that this option is not related to Proxy ARP as defined in RFC 925.
For example:
-> arp 171.11.1.1 00:05:02:c0:7f:11 alias
• ARP Name. Use the arp-name parameter to specify a name for the permanent ARP entry.
For example:
-> arp 171.11.1.1 00:2a:90:d1:8e:10 arp-name server1
Note. Because most hosts support the use of address resolution protocols to determine and cache address
information (called dynamic address resolution), you generally do not need to specify permanent ARP
entries.
Use the show arp command to display the ARP table and verify that the entry was deleted.
Note. You can also use the no arp command to delete a dynamic entry from the table.
Note. Dynamic entries remain in the ARP table until they time out. If the switch does not receive data
from a host for this user-specified time, the entry is removed from the table. If another packet is received
from this host, the switch goes through the discovery process again to add the entry to the table. The
switch uses the MAC Address table time-out value as the ARP time-out value. Use the mac-address-table
aging-time command to set the time-out value.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-17
IP Forwarding Configuring IP
Note that when Local Proxy ARP is enabled for any one IP router interface associated with a VLAN, the
feature is applied to the entire VLAN. It is not necessary to enable it for each interface. However, if the IP
interface that has this feature enabled is moved to another VLAN, Local Proxy ARP is enabled for the new
VLAN and must be enabled on another interface for the old VLAN.
page 21-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Forwarding
6. All traffic from the clients is now forwarded to the head end router to be filtered.
Use the port mapping user-port network-port and ip helper dhcp-snooping vlan commands as shown
below to enable Dynamic Proxy ARP - MAC Forced Forwarding. For example:
-> port mapping 1 user-port 1/1-2 network-ports 1/3
-> port mapping 1 dynamic-proxy-arp enable
-> ip helper dhcp-snooping vlan 1
The example above assumes all devices are in VLAN 1, Clients 1 and 2 are connected to ports 1/1 and 1/2,
and the head end router is connected to port 1/3.
ARP Filtering
ARP filtering is used to determine whether or not the switch responds to ARP requests that contain a
specific IP address. This feature is generally used in conjunction with the Local Proxy ARP application;
however, ARP filtering is available for use on its own and/or with other applications.
By default, no ARP filters exist in the switch configuration. When there are no filters present, all ARP
packets are processed, unless they are blocked or redirected by some other feature.
Use the ip dos arp-poison restricted-address command to specify the following parameter values
required to create an ARP filter:
• An IP address (e.g., 193.204.173.21) used to determine whether or not an ARP packet is filtered.
• An IP mask (e.g. 255.0.0.0) used to identify which part of the ARP packet IP address is compared to
the filter IP address.
• An optional VLAN ID to specify that the filter is only applied to ARP packets from that VLAN.
• Which ARP packet IP address to use for filtering (sender or target). If the target IP address in the ARP
packet matches a target IP specified in a filter, then the disposition for that filter applies to the ARP
packet. If the sender IP address in the ARP packet matches a sender IP specified in a filter, then the
disposition for that filter applies to the ARP packet.
• The filter disposition (block or allow). If an ARP packet meets filter criteria, the switch is either
blocked from responding to the packet or allowed to respond to the packet depending on the filter
disposition. Packets that do not meet any filter criteria are responded to by the switch.
The following arp filter command example creates an ARP filter, which will block the switch from
responding to ARP packets that contain a sender IP address that starts with 198:
-> arp filter 198.0.0.0 mask 255.0.0.0 sender block
Up to 200 ARP filters can be defined on a single switch. To remove an individual filter, use the no form of
the arp filter command. For example:
-> no arp filter 198.0.0.0
To clear all ARP filters from the switch configuration, use the clear arp filter command. For example:
-> clear arp filter
Use the show arp summary command to verify the ARP filter configuration. For more information about
this and other ARP filter commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-19
IP Configuration Configuring IP
IP Configuration
IP is enabled on the switch by default and there are few options that can, or need to be, configured. This
section provides instructions for some basic IP configuration options.
To display the current route preference configuration, use the show ip route-pref command:
-> show ip route-pref
Protocol Route Preference Value
------------+------------------------
Local 1
Static 2
OSPF 110
RIP 120
EBGP 190
IBGP 200
page 21-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Configuration
The default hop count is 64. The valid range is 1 to 255. Use the show ip config command to display the
default TTL value.
2 Configure redistribution to apply a route map, as described in “Configuring Route Map Redistribu-
tion” on page 21-25.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-21
IP Configuration Configuring IP
The ip route-map command is used to configure route map statements and provides the following action,
match, and set parameters:
Refer to the “IP Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for more
information about the ip route-map command parameters and usage guidelines.
Once a route map is created, it is then applied using the ip redist command. See “Configuring Route Map
Redistribution” on page 21-25 for more information.
The above command creates the ospf-to-bgp route map, assigns a sequence number of 10 to the route
map, and specifies a permit action.
To optionally filter routes before redistribution, use the ip route-map command with a match parameter
to configure match criteria for incoming routes. For example,
-> ip route-map ospf-to-bgp sequence-number 10 match tag 8
The above command configures a match statement for the ospf-to-bgp route map to filter routes based on
their tag value. When this route map is applied, only OSPF routes with a tag value of eight are redistrib-
uted into the BGP network. All other routes with a different tag value are dropped.
Note. Configuring match statements is not required. However, if a route map does not contain any match
statements and the route map is applied using the ip redist command, the router redistributes all routes
into the network of the receiving protocol.
To modify route information before it is redistributed, use the ip route-map command with a set parame-
ter. For example,
-> ip route-map ospf-to-bgp sequence-number 10 set tag 5
The above command configures a set statement for the ospf-to-bgp route map that changes the route tag
value to five. Because this statement is part of the ospf-to-bgp route map, it is only applied to routes that
have an existing tag value equal to eight.
page 21-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Configuration
To delete a specific sequence number within a route map, enter no ip route-map followed by the route
map name, then sequence-number followed by the actual number. For example, the following command
deletes sequence 10 from the redistipv4 route map:
-> no ip route-map redistipv4 sequence-number 10
Note that in the above example, the redistripv4 route map is not deleted. Only those statements associated
with sequence 10 are removed from the route map.
To delete a specific statement within a route map, enter no ip route-map followed by the route map name,
then sequence-number followed by the sequence number for the statement, then either match or set and
the match or set parameter and value. For example, the following command deletes only the match tag 8
statement from route map redistipv4 sequence 10:
-> no ip route-map redistipv4 sequence-number 10 match tag 8
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-23
IP Configuration Configuring IP
To configure a new sequence of statements for an existing route map, specify the same route map name
but use a different sequence number. For example, the following commands create a new sequence 20 for
the rm_1 route map:
-> ip route-map rm_1 sequence-number 20 action permit
-> ip route-map rm_1 sequence-number 20 match ipv4-interface to-finance
-> ip route-map rm_1 sequence-number 20 set metric 5
Sequence 10 and sequence 20 are both linked to route map rm_1 and are processed in ascending order
according to their sequence number value. Note that there is an implied logical OR between sequences. As
a result, if there is no match for the tag value in sequence 10, then the match interface statement in
sequence 20 is processed. However, if a route matches the tag 8 value, then sequence 20 is not used. The
set statement for whichever sequence was matched is applied.
A route map sequence may contain multiple match statements. If these statements are of the same kind
(e.g., match tag 5, match tag 8, etc.) then a logical OR is implied between each like statement. If the match
statements specify different types of matches (e.g. match tag 5, match ip4 interface to-finance, etc.), then a
logical AND is implied between each statement. For example, the following route map sequence will
redistribute a route if its tag is either 8 or 5:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
The following route map sequence will redistribute a route if the route has a tag of 8 or 5 and the route
was learned on the IPv4 interface to-finance:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
-> ip route-map rm_1 sequence-number 10 match ipv4-interface to-finance
page 21-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Configuration
To add addresses to an access list, use the ip access-list address (IPv4) or the ipv6 access-list address
(IPv6) command. For example, the following commands add addresses to an existing access list:
-> ip access-list ipaddr address 10.0.0.0/8
-> ipv6 access-list ip6addr address 2001::/64
Use the same access list name each time the above commands are used to add additional addresses to the
same access list. In addition, both commands provide the ability to configure if an address and/or its
matching subnet routes are permitted (the default) or denied redistribution. For example:
-> ip access-list ipaddr address 16.24.2.1/16 action deny redist-control all-
subnets
-> ipv6 access-list ip6addr address 2001::1/64 action permit redist-control no-
subnets
For more information about configuring access list commands, see the “IP Commands” chapter in the
OmniSwitch AOS Release 6 CLI Reference Guide.
OSPF routes received by the router interface are processed based on the contents of the ospf-to-bgp route
map. Routes that match criteria specified in this route map are either allowed or denied redistribution into
the BGP network. The route map may also specify the modification of route information before the route
is redistributed. See “Using Route Maps” on page 21-21 for more information.
To remove a route map redistribution configuration, use the no form of the ip redist command. For exam-
ple:
-> no ip redist ospf into bgp route-map ospf-to-bgp
Source Destination
Protocol Protocol Status Route Map
------------+------------+---------+--------------------
LOCAL4 RIP Enabled rip_1
LOCAL4 OSPF Enabled ospf_2
LOCAL4 BGP Enabled bgp_3
RIP OSPF Enabled ospf-to-bgp
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-25
IP Configuration Configuring IP
The resulting ospf-to-bgp route map redistribution configuration does the following
• Denies the redistribution of Type 2 external OSPF routes with a tag set to five.
• Redistributes into BGP all routes learned on the intf_ospf interface and sets the metric for such routes
to 255.
• Redistributes into BGP all other routes (those not processed by sequence 10 or 20) and sets the tag for
such routes to eight.
page 21-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Configuration
IP-Directed Broadcasts
An IP directed broadcast is an IP datagram that has all zeroes or all 1 in the host portion of the destination
IP address. The packet is sent to the broadcast address of a subnet to which the sender is not directly
attached. Directed broadcasts are used in denial-of-service “smurf” attacks. In a smurf attack, a continu-
ous stream of ping requests is sent from a falsified source address to a directed broadcast address, result-
ing in a large stream of replies, which can overload the host of the source address. By default, the switch
drops directed broadcasts. Typically, directed broadcasts should not be enabled.
Use the ip directed-broadcast command to enable or disable IP-directed broadcasts. For example:
-> ip directed-broadcast off
Use the show ip config command to display the IP-directed broadcast state.
When a table lookup is done, the output can be a 'hit' (entry found) or a 'miss' (entry not found). Since dual
hashing reduces the chances of collision and more entries are learnt, the chances of 'miss' are reduced. The
performance improves as the switch is now able to facilitate routing of more number of traffic streams.
The following steps has to be performed to enable/disable dual hash mode.
1 Configure the mode as enabled using the command "ip dual-hash mode enable"
The updated boot.cfg with command ip dual-hash mode enabled is applied during boot-up.
To disable the dual-hash mode, follow the above procedure using the command ip dual-hash mode
disable.
For more information on how to enable dual-hash mode see ip dual-hash mode in IP Commands chapter
in the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-27
IP Configuration Configuring IP
• 255.255.255.255.
page 21-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Configuration
• 0.x.x.x.
Note. In both the conditions described above in “Multicast IP and MAC Address Mismatch”, packets are
dropped and SNMP traps are generated.
• the destination IP is a unicast IP and the destination MAC address is either a Broadcast or Multicast
address. In such a condition, an event is recorded in the DoS statistics. No SNMP traps are gener-
ated because valid packets can also fall under this category.
• Ping overload—Floods a switch with a large number of ICMP packets, resulting in the switch using a
large amount of CPU time to respond to these packets. If the number of ICMP packets exceed 100 per
second, a DoS attack is detected. By default, the detection of attack is disabled.
• Packets with loopback source IP address—Packets with an invalid source address of 127.0.0.0/8
(looback network) are received by the switch. When such packets are detected, they are dropped, and
SNMP traps are generated.
The switch can be set to detect various types of port scans by monitoring for TCP or UDP packets sent to
open or closed ports. Monitoring is done in the following manner:
• Packet penalty values set. TCP and UDP packets destined for open or closed ports are assigned a
penalty value. Each time a packet of this type is received, its assigned penalty value is added to a
running total. This total is cumulative and includes all TCP and UDP packets destined for open or
closed ports.
• Port scan penalty value threshold.The switch is given a port scan penalty value threshold. This
number is the maximum value the running penalty total can achieve before triggering an SNMP trap.
• Decay value. A decay value is set. The running penalty total is divided by the decay value every
minute.
• Trap generation. If the total penalty value exceeds the set port scan penalty value threshold, a trap is
generated to alert the administrator that a port scan may be in progress.
For example, imagine that a switch is set so that TCP and UDP packets destined for closed ports are given
a penalty of 10, TCP packets destined for open ports are given a penalty of 5, and UDP packets destined
for open ports are given a penalty of 20. The decay is set to 2, and the switch port scan penalty value
threshold is set to 2000:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-29
IP Configuration Configuring IP
.
DoS Settings
UDP/TCP closed = 10
UDP open = 20
TCP open = 5
Threshold = 2000
Decay = 2
Penalty Total = 0
In one minute, 10 TCP closed port packets and 10 UDP closed port packets are received. This would bring
the total penalty value to 200, as shown using the following equation:
(10 TCP X 10 penalty) + (10 UDP X 10 penalty) = 200
This value would be divided by 2 (due to the decay) and decreased to 100. The switch would not record a
port scan:
DoS Settings
UDP/TCP closed = 10
UDP open = 20
TCP open = 5
Threshold = 2000
Decay = 2
In the next minute, 10 more TCP and UDP closed port packets are received, along with 200 UDP open-
port packets. This would bring the total penalty value to 4300, as shown using the following equation:
(100 previous minute value) + (10 TCP X 10 penalty) + (10 UDP X 10 penalty) +
(200 UDP X 20 penalty) = 4300
This value would be divided by 2 (due to decay) and decreased to 2150. The switch would record a port
scan and generate a trap to warn the administrator:
page 21-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Configuration
DoS Settings
UDP/TCP closed = 10
UDP open =20
TCP open = 5
Threshold = 2000
Decay = 2
10 TCP closed port packets
The above functions and how to set their values are covered in the sections that follow.
Each type has its own command to assign a penalty value. Penalty values can be any non-negative inte-
ger. Each time a packet is received that matches an assigned penalty, the total penalty value for the switch
is increased by the penalty value of the packet in question.
To assign a penalty value to TCP/UDP packets bound for a closed port, use the ip dos scan close-port-
penalty command with a penalty value. For example, to assign a penalty value of 10 to TCP/UDP packets
destined for closed ports, enter the following:
-> ip dos scan close-port-penalty 10
To assign a penalty value to TCP packets bound for an open port, use the ip dos scan tcp open-port-
penalty command with a penalty value. For example, to assign a penalty value of 10 to TCP packets
destined for opened ports, enter the following:
-> ip dos scan tcp open-port-penalty 10
To assign a penalty value to UDP packets bound for an open port, use the ip dos scan udp open-port-
penalty command with a penalty value. For example, to assign a penalty value of 10 to TCP/UDP packets
destined for closed ports, enter the following:
-> ip dos scan udp open-port-penalty 10
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-31
IP Configuration Configuring IP
To disable DoS traps, enter the same ip dos trap command, as shown:
-> ip dos trap disable
ARP Poisoning
ARP Poisoning allows an attacker to sniff and tamper the data frames on a network. It also modifies or
halts the traffic. The principle of ARP Poisoning is to send false or spoofed ARP messages to an Ethernet
LAN.
Alcatel-Lucent introduces the functionality that detects the presence of an ARP poisoning host on a
network. This functionality uses a configured restricted IP addresses, so that the switch will not get ARP
response on sending an ARP request. If an ARP response is received, then an event is logged and the user
is alerted using an SNMP trap.
Use the ip dos arp-poison restricted-address command to add an ARP Poison restricted address. Enter
the command, followed by the IP address. For example, to add an ARP Poison restricted address as
192.168.1.1, you would enter:
-> ip dos arp-poison restricted-address 192.168.1.1
To verify the number of attacks detected for configured ARP poison restricted addresses, use the show ip
dos arp-poison command. For more information about this command, see the OmniSwitch AOS Release 6
CLI Reference Guide.
page 21-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP Configuration
Enabling/Disabling IP Services
When a switch initially boots up, all supported TCP/UDP well-known service ports are enabled (open).
Although these ports provide access for essential switch management services, such as telnet, ftp, snmp,
etc., they also are vulnerable to DoS attacks. It is possible to scan open service ports and launch such
attacks based on well-known port information.
The ip service command allows you to selectively disable (close) TCP/UDP well-known service ports and
enable them when necessary. This command only operates on TCP/UDP ports that are opened by default.
It has no effect on ports that are opened by loading applications, such as RIP and BGP.
In addition, the ip service command allows you to designate which port to enable or disable by specifying
the name of a service or the well-known port number associated with that service. For example, both of
the following commands disable the telnet service:
-> no ip service telnet
-> no ip service port 23
Note that specifying a port number requires the use of the optional port keyword.
To enable or disable more than one service in a single command line, enter each service name separated
by a space. For example, the following command enables the telnet, ftp, and snmp service ports:
-> ip service telnet ftp snmp
The following table lists ip service command options for specifying TCP/UDP services and also includes
the well-known port number associated with each service:
service port
ftp 21
ssh 22
telnet 23
http 80
secure-http 443
avlan-http 260
avlan-secure-http 261
avlan-telnet 259
udp-relay 67
network-time 123
snmp 161
proprietary 1024
proprietary 1025
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-33
Managing IP Configuring IP
Managing IP
The following sections describe IP commands that can be used to monitor and troubleshoot IP forwarding
on the switch.
page 21-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Managing IP
The following table is provide to identify the various ICMP messages, and their type and code:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-35
Managing IP Configuring IP
In addition to the icmp type command, several commonly used ICMP messages have been separate CLI
commands for convenience. These commands are listed below with the ICMP message name, type, and
code:
These commands are entered as the icmp type command, only without specifying a type or code. The
echo, timestamp, and address mask commands have options for distinguishing between a request or a
reply, and the unreachable command has options distinguishing between a network, host, protocol, or port.
For example, to enable an echo request message, enter the following:
-> icmp echo request enable
Note. Enabling host-unreachable and net-unreachable messages are not recommended as it can cause
the switch instability due to high-CPU conditions depending upon the volume of traffic required by these
messages.
See Chapter 14, “IP Commands,” for specifics on the ICMP message commands.
To disable all ICMP messages, enter the same command with the disable keyword. For example:
-> icmp messages enable
page 21-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Managing IP
Likewise, to set the Timestamp Reply minimum packet gap to 100 microseconds, enter the following:
-> icmp timestamp reply min-pkt-gap 100
When you ping a device, the device IP address or host name is required. Optionally, you may also specify:
• Count. Use the count keyword to set the number of frames to be transmitted.
• Size. Use the size keyword to set the size, in bytes, of the data portion of the packet sent for this ping.
You can specify a size or a range of sizes up to 60000.
• Interval. Use the interval keyword to set the frequency, in seconds, that the switch will poll the host.
• Time-out. Use the time-out keyword to set the number of seconds the program will wait for a response
before timing out.
• source-interface. Use the source-interface keyword to set the IP address to be used as source IP for
the ping packets.
• sweep-range: Use the sweep-range keyword to specify the size of the first packet, the incremental and
the maximum size of the packet. Here the three parameters start_size - specifies the size in bytes of the
first packet to be sent, diff_size - specifies the increment factor of size for the next packet and end_size
- specifies the maximum size of the packet. Here, if sweep-range is used in the ping command, then the
count and size parameters become redundant. So if sweep-range is used, then count and size parame-
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-37
Managing IP Configuring IP
ters are not configurable. Also the values for minsize (greater than 4 bytes) and maxSize (greater than
minsize) is validated. For example, a sweep-range 10 110 20, sends out 6 packets with sizes 10, 30, 50,
70, 90 and 110.
• pattern. Use the pattern keyword to set the data pattern to be used in the data field of the ping pack-
ets.
• dont-fragment. Use the dont-fragment keyword to set the don't-fragment bit in the IP packet.
• tos. Use the tos keyword to set the type of service field in the IP header.
For example, to send a ping with a count of 2, a size of 32 bytes, an interval of 2 seconds, and a time-out
of 10 seconds you would enter:
-> ping 172.22.2.115 count 2 size 32 interval 2 timeout 10
Note. If you change the default values, they will only apply to the current ping. The next time you use the
ping command, the default values will be used unless you enter different values again.
Tracing an IP Route
The traceroute command is used to find the path taken by an IP packet from the local switch to a speci-
fied destination. This command displays the individual hops to the destination as well as some timing
information. When using this command, you must enter the name of the destination as part of the
command line (either the IP address or host name). Use the optional max-hop parameter to set a maxi-
mum hop count to the destination. If the trace reaches this maximum hop count without reaching the desti-
nation, the trace stops.
For example, to perform a traceroute to a device with an IP address of 172.22.2.115 with a maximum hop
count of 10 you would enter:
-> traceroute 172.22.2.115 max-hop 10
• source-interface. Use the source-interface keyword to set the source IP interface to be used in the
traceroute packets.
• probes. Use the probes keyword to set the number of packets (retry) that is sent for each hop-count.
• timeout. Use the timeout keyword to set the time to wait for the response of each probe packet.
• port. Use the port keyword to set the destination port number to be used in the probing packets.
page 21-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Managing IP
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-39
Tunneling Configuring IP
Tunneling
Tunneling is a mechanism that can encapsulate a wide variety of protocol packet types and route them
through the configured tunnels. Tunneling is used to create a virtual point-to-point link between routers at
remote points in a network. This feature supports the creation, administration, and deletion of IP inter-
faces whose underlying virtual device is a tunnel. The Alcatel-Lucent implementation provides support for
two tunneling protocols: Generic Routing Encapsulation (GRE) and IP encapsulation within IP(IPIP).
• The features such as Multinetting, Egress ACL, NAT, QoS, and VRRP are not supported on the GRE
tunnel interfaces.
IP Encapsulation within IP
IPIP tunneling is a method by which an IP packet is encapsulated within another IP packet. The Source
Address and Destination Address of the outer IP header identifies the endpoints of tunnel. Whereas Source
Address and Destination Address of the inner IP header identifies the original sender and recipient of the
packet, respectively.
Consider the following when configuring the IPIP tunnel interfaces:
• A switch can support up to 127 IPIP tunnel interfaces.
• IPIP tunnel interfaces are included in the maximum number of IP interfaces that are supported on the
switch.
page 21-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Tunneling
Tunneling operation
The diagram below illustrates how packets are forwarded over the tunnel.
IP Host IP Host
50.0.0.1 Switch A Switch B
24.24.24.1 24.24.24.2
IP Host IP Host
40.0.0.1
In the above diagram, IP packets flowing from the private IP network 50.0.0.0 to the private IP network
40.0.0.0 are encapsulated by the tunneling protocol at switch A and forwarded to switch B. Intermediate
switches route the packets using addresses in the delivery protocol header. Switch B extracts the original
payload and routes it to the appropriate destination in the 40.0.0.0 network.
The tunnel interface is identified as being up when all of the following are satisfied:
• Both source and destination addresses are assigned.
• The source address of the tunnel is one of the switch's IP interface addresses that is either a VLAN or
Loopback0 interface.
• A route is available to reach the destination IP address. A route whose egress interface is a VLAN-
based interface is available for its destination IP address.The switch supports assigning an IP address as
well as routes to a tunnel interface.
This section describes how to configure a tunnel interface using GRE and IPIP, using Command Line
Interface (CLI) commands.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-41
Tunneling Configuring IP
In this example, the GRE tunnel named “gre” is created and assigned a source IP address of 23.23.23.1
and a destination IP address of 155.2.2.2.
You can configure an IP address for the GRE tunnel interface using the ip interface command as shown:
-> ip interface "gre" address 24.24.24.1 mask 255.255.255.0
In this example, the IPIP tunnel named “ipip” is created and assigned a source IP address of 23.23.23.1
and a destination IP address of 155.2.2.2.
You can configure an IP address for the IPIP tunnel interface using the ip interface command as shown:
-> ip interface "ipip" address 24.24.24.1 mask 255.255.255.0
Note. To display information about the configured tunnels on the switch, use the show ip interface.
page 21-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Verifying the IP Configuration
show ip interface Displays the usability status of interfaces configured for IP.
show ip route Displays the IP Forwarding table.
show ip route-pref Displays the configured route preference of a router.
show ip router database Displays a list of all routes (static and dynamic) that exist in the IP
router database.
show ip managed-interface Displays the application name and the corresponding IP interface
name to be used for IP communication.
show ip config Displays IP configuration parameters.
show ip protocols Displays switch routing protocol information and status.
show ip service Displays the current status of TCP/UDP service ports. Includes service
name and well-known port number.
show arp Displays the ARP table.
show arp summary Displays the ARP filter configuration for the switch.
show icmp control This command allows the viewing of the ICMP control settings.
show ip dos config Displays the configuration parameters of the DoS scan for the switch.
show ip dos statistics Displays the statistics on detected port scans for the switch.
show ip dos arp-poison Displays the number of attacks detected for a restricted address.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-43
VRF Route Leak Configuring IP
• Buildings where multiple companies sharing a same router reside in individual VRF have to access
common services like logistics, common network equipment that is a part of an independent VRF.
VRF Route Leak feature can be used to forward routes from one VRF routing table to another VRF
routing table, allowing routing from one VRF to a gateway in another VRF.
2 Define the route-map with the criteria that a route must match by using ip route-map match
command. This route map controls export of routes from the VRF FDB (Forwarding Routing Database) to
GRT based on the match. For example,
-> ip route-map R1 match protocol static
For more details on route map configuration, see “Using Route Maps” on page 21-21. Refer to the “IP
Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for more information about
the ip route-map command parameters and usage guidelines.
3 Configure a route map to export routes from the source VRF to Global Routing Table (GRT) by using
the ip export route-map command. For example,
-> ip export route-map R1
4 Define protocol preference for import policy route map by using ip route-map match command. This
route map controls import of routes from GRT. For example,
-> ip route-map R2 match protocol static
5 Configure a route map to import the leaked routes from GRT to the destination VRF from a given
source VRF by using the ip import vrf command. For example,
-> ip import vrf V1 import route-map R2
6 Configure route preference for imported routes by using ip route-pref import command. For example,
page 21-44 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP VRF Route Leak
7 Redistribute imported routes to other routing protocols that are imported and added to the RDB from
other VRFs by using ip redist command. For example,
-> ip redist import into ospf route-map R3 status enable
To export routes from a specific VRF, specify the VRF globally or enter into the specific VRF instance
and enter ip export route-map command:
-> vrf vrf2 ip export route-map R1
Note. As a pre-requisite to export routes, create a route-map and define protocol preference for the route
map by using ip route-map and ip route-map match commands. Route map configured for an export
policy can contain any of the following filter and set options:
- Filter options: ip-address, ip-next-hop, tag, protocol, ipv4-interface, metric, route-type
- Set option: tag, metric
For route map configuration and its match extensions, See “Using Route Maps” on page 21.
To disable exporting of routes from the VRF to GRT, use the no form of this command as shown:
-> no ip export
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-45
VRF Route Leak Configuring IP
Note. As a pre-requisite to import routes, create a route-map and define protocol preference for the route
map by using ip route-map and ip route-map match commands. Route map configured for the import
policy can contain any of the following filter and set options:
- Filter options: ip-address, ip-next-hop, tag, metric
- Set option: tag, metric
For route map configuration and its match extensions, See “Using Route Maps” on page 21.
To import routes from GRT to the destination VRF, enter the ip import vrf command at the CLI prompt
as shown:
-> ip import vrf V1 import route-map R2
To disable importing of routes from GRT, use the no form of this command as shown:
-> no ip import VRF V1
Leaked routes are only for forwarding. If a local route is leaked, that interface is not accessible in the
importing VRF. Another switch will not be able to ping the interface in the import VRF.
page 21-46 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP VRF Route Leak
Backup Functionality
Backup functionality takes care of selection of a route out of similar routes imported from different source
VRFs. Best route is selected based on the VRF that is created first (primary VRF) from the rest of the
VRFs exporting similar routes.
Following example scenario describe the VRF Route Leak backup functionality:
Consider VRF V1, V2, V3, V4,V5 and V6.
VRF V5 has imported routes from VRF V1, V2, V3 and V4. So, the primary VRF will be VRF1, and
VRF2, V3, V4 are backup for VRF V1.
Scenario 1:
Import route from VRF V1 in VRF V6 using the following command:
vrf VRF6-> ip import vrf V1
Route from VRF V1 will be sent to VRF V6. When route is being imported, all the routes that are backup
for V1 is checked. Then a notification is sent to import routes from V2, V3 and V4. The following
message is displayed in the CLI.
+++ Back-Up Routes from VRF VRFV2 : Please configure import from this VRF
+++ Back-Up Routes from VRF VRFV3 : Please configure import from this VRF
+++ Back-Up Routes from VRF VRFV4 : Please configure import from this VRF.
Based on the notification, import backup routes from VRF V2, V3, V4 in VRF V6.
Scenario 2:
VRF6 import routes from VRF1, V2, V3, and V4. Use the following command to remove importing of
routes:
vrf VRF5-> no ip import vrf V1
The imported routes are deleted from VRF V5. But the new routes from the backup VRFs (VRF2, V3,
V4) are not installed unless the imported routes are removed from VRF6. Following error message is
displayed:
+++ Import config for VRF VRFV1 still present in VRF V6
+++ Either remove the config from VRF V6: or re-add the above deleted config
Note. Whenever user warning is displayed to import or export routes, it is mandatory to adhere to the
warnings for proper functioning of the feature.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-47
VRF Route Leak Configuring IP
show ip export Displays the configured route map for exporting routes to GRT.
show ip import Displays the route map and source VRF combination configured for
importing routes in this VRF.
show ip global-route-table Displays the GRT for all the routes that are exported from the VRFs.
This command can be executed only in default VRF.
The imported routes are also displayed under the protocol field as IMPORT in the show ip route, show ip
route-pref, show ip redist, and show ip router database show commands.
For more information about the output details that result from the show commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 21-48 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP and ARP Spoofing
Enabling IP Anti-spoofing
Enable the IP anti-spoofing globally on the switch. By default, anti-spoofing is enabled globally on all the
IP or VRRP interfaces. You can also enable or disable IP anti-spoofing at an interface level (IP interface
or VRRP interface).
To enable IP anti-spoofing globally on the switch, enter the ip dos anti-spoofing command at the CLI
prompt as shown:
-> ip dos anti-spoofing enable
To enable IP anti-spoofing on a specific interface, enter the ip dos anti-spoofing address command at the
CLI prompt as shown:
-> ip dos anti-spoofing address 192.1.10.1 enable
Note.
- IP anti-spoofing is enabled for VRRP interface only if the interface is activated and is a VRRP master.
- If you want to enable IP anti-spoofing on a specific interface, ARP-only anti spoofing must be disabled
on that interface.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-49
IP and ARP Spoofing Configuring IP
Enable ARP-only anti-spoofing for a specific interface, enter the ip dos anti-spoofing address arp-only
command at the CLI prompt as shown:
-> ip dos anti-spoofing address 172.18.16.1 arp-only enable
Note.
- IP spoofing must be enabled globally to enable ARP-only spoofing (both globally and at an interface
level).
- ARP-only anti-spoofing is enabled for VRRP interface only if the interface is in an active state and is a
VRRP master.
To disable ARP-only anti-spoofing globally on the switch, use disable option as shown:
-> ip dos anti-spoofing arp-only disable
page 21-50 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP IP and ARP Spoofing
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 21-51
IP and ARP Spoofing Configuring IP
page 21-52 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
22 Configuring Multiple VRF
Multiple Virtual Routing and Forwarding (VRF) provides a mechanism for segmenting Layer 3 traffic into
virtual routing domains (instances) on the same switch. Each routing instance independently maintains its
own routing and forwarding table, peer, and interface information.
In This Chapter
This chapter describes the Multiple VRF feature and how to configure it through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide. This chapter provides an
overview of Multiple VRF and includes the following information:
• “Quick Steps for Configuring Multiple VRF” on page 22-3.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-1
VRF Specifications Configuring Multiple VRF
VRF Specifications
The multiple VRF functionality described in this chapter is supported on the OmniSwitch 6855-U24X,
OmniSwitch 6850E (running in 6850E mode), and OmniSwitch 9000E switches. Note that any maximum
limits provided in the Specifications table are subject to available system resources.
VRF Defaults
Parameter Description Command Default Value/Comments
Active VRF instance vrf Default VRF instance
page 22-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Multiple VRF Quick Steps for Configuring Multiple VRF
Note. Configuring a VRF instance name is case sensitive. In addition, if the name specified does not exist,
a VRF instance is automatically created. As a result, it is possible to accidentally create or delete
instances. Use the show ip dynamic-proxy-arp command to verify the VRF instance configuration before
adding or removing instances.
1 Create VRF instance, IpOne, using the vrf command. For example:
Note that in the preceding example, the change in the command prompt from “->” to “IpOne: ->”
indicates that the instance was created and is now the active VRF CLI context. Any commands entered
at this point will apply to this instance, unless the commands entered are not supported in multiple
VRF instances.
2 Create a second VRF instance, IpTwo, using the vrf command. For example:
Note that in the preceding example, IpOne was the active instance until IpTwo was created and
replaced IpOne as the active VRF CLI context.
3 Select IpOne for the active VRF instance and create an IP router interface on VLAN 100 and VLAN
101 using the ip interface command. For example:
IpTwo: -> vrf IpOne
IpOne: -> ip interface intf100 address 100.1.1.1/24 vlan 100
IpOne: -> ip interface intf101 address 101.1.1.1/24 vlan 101
IpOne: ->
4 Configure 1.1.1.1 as the primary router ID address for the IpOne VRF instance using the ip router
router-id command. For example:
IpOne: -> ip router router-id 1.1.1.1
IpOne: ->
5 Create an IP static route for the IpOne VRF instance using the ip static-route command. For example:
6 Load and enable the RIP protocol for the IpOne VRF instance using the ip load rip and ip rip status
commands. For example:
IpOne: -> ip load rip
IpOne: -> ip rip status enable
IpOne: ->
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-3
Quick Steps for Configuring Multiple VRF Configuring Multiple VRF
7 Enable RIP on IP interface “intf100” in the IpOne VRF instance using the ip rip interface status
command. For example:
IpOne: -> ip rip interface intf100 status enable
IpOne: ->
8 Select IpTwo for the active VRF instance and create an IP router interface on VLAN 102 using the
ip interface command. For example:
IpOne: -> vrf IpTwo
IpTwo: -> ip interface intf102 address 102.1.1.1/24 vlan 102
IpTwo: ->
9 Configure 2.2.2.2 as the primary router ID address for the IpTwo VRF instance using the
ip router router-id command. For example:
IpTwo: -> ip router router-id 2.2.2.2
IpTwo: ->
10 Load and enable the BGP protocol for the IpTwo VRF instance using the ip load bgp command.
For example:
IpTwo: -> ip load bgp
IpTwo: ->
11 Configure a BGP neighbor for the IpTwo VRF instance using the ip bgp neighbor,
ip bgp neighbor remote-as, and ip bgp neighbor status commands. For example:
IpTwo: -> ip bgp neighbor 102.1.1.10
IpTwo: -> ip bgp neighbor 102.1.1.10 remote-as 1000
IpTwo: -> ip bgp neighbor 102.1.1.10 status enable
Note. Verify the Multiple VRF configuration using the show ip dynamic-proxy-arp command:
IpOne: -> show vrf
Virtual Routers Protocols
-----------------------------------------------
default
IpOne RIP
IpTwo BGP
To verify the configuration of a protocol within a VRF instance, use the show commands related to that
protocol. For example, the show ip interface command will display the IP interfaces associated with the
current CLI VRF context:
-> vrf IpOne
IpOne: -> show ip interface
Total 1 interfaces
Name IP Address Subnet Mask Status Forward Device
--------------------+---------------+---------------+------+-------+--------
intfone 200.1.1.1 255.255.255.0 DOWN NO vlan 200
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in the preceding
displays.
page 22-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Multiple VRF Quick Steps for Configuring Multiple VRF
An example of what the Quick Steps configuration commands look like when entered sequentially on the
switch:
-> vlan 100
-> vlan 101
-> vlan 102
-> vrf IpOne
IpOne: -> vrf IpTwo
IpTwo: -> vrf IpOne
IpOne: -> ip interface intf100 address 100.1.1.1/24 vlan 100
IpOne: -> ip interface intf101 address 101.1.1.1/24 vlan 101
IpOne: -> ip router router-id 1.1.1.1
IpOne: -> ip static-route 192.100.1.1/24 gateway 100.1.1.10
IpOne: -> ip load rip
IpOne: -> ip rip status enable
IpOne: -> ip rip interface intf100 status enable
IpOne: -> vrf IpTwo
IpTwo: -> ip interface intf102 address 102.1.1.1/24 vlan 102
IpTwo: -> ip router router-id 2.2.2.2
IpTwo: -> ip load bgp
IpTwo: -> ip bgp neighbor 102.1.1.10
IpTwo: -> ip bgp neighbor 102.1.1.10 remote-as 1000
IpTwo: -> ip bgp neighbor 102.1.1.10 status enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-5
Multiple VRF Overview Configuring Multiple VRF
Note. It is recommended to configure the IP-IP or GRE tunnels only on the default VRF.
The illustration on page 22-7 shows an example of how the Multiple VRF feature is used to provide
independent routing domains that isolate and carry customer traffic through the provider network. In this
example:
• Each PE switch maintains more than one routing and forwarding table, in addition to the default VRF
instance table.
• One VRF instance is configured on the PE switch for each customer network to which the PE is
connected.
• Each interface on the PE that is connected to a customer edge (CE) switch is associated with the VRF
instance configured for that customer.
• When an IP packet for Customer A is received on a PE 1 or PE 2 interface associated with VRF A, the
VRF A instance determines how to route the packet through the provider backbone so that it reaches
the intended Customer A destination.
• When an IP packet for Customer B is received on a PE 1, PE 2, or PE 3 interface associated with VRF
B, the VRF B instance determines how to route the packet through the provider backbone so that it
reaches the intended Customer B destination.
• When an IP packet for Customer C is received on a PE 1 or PE 3 interface associated with VRF C, the
VRF C instance determines how to route the packet through the provider backbone so that it reaches
the intended Customer C destination.
page 22-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Multiple VRF Multiple VRF Overview
Customer A
Site 2
VRF A
PE 2
Customer A
Site 1
VRF A VRF A
Customer B
Site 2
VRF B
VRF B
Customer B
Site 1
VRF B VRF A
VRF B
VRF B
VRF C Customer C
Site 2
VRF C
PE 3
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-7
Multiple VRF Overview Configuring Multiple VRF
Note. Only those commands for features that are VRF aware are accepted within the context of a VRF
instance. Default VRF applications are supported only in the default VRF instance. For more information
about VRF supported applications, see “VRF Interaction With Other Features” on page 22-9
The CLI command prompt indicates which instance is the active VRF context; the instance name is added
as a prefix to the command prompt. For example, if VRF instance IpOne is the current context, then IpOne
appears in the CLI command prompt. For example:
IpOne: ->
When the default VRF instance is the active context, no VRF name appears in the command prompt. For
example, the following prompt indicates that the default VRF instance is the current context:
->
It is also possible to enter configuration commands for other non-default instances from within the default
VRF CLI context. For more information about how to do this and additional examples of using the VRF
context-based CLI, see “Configuring VRF Instances” on page 22-13 and “Verifying the VRF Configura-
tion” on page 22-16.
Note. All VRF instances are active in terms of routing and forwarding tasks whether or not the instance is
the current CLI context. Selecting a VRF instance as the CLI context simply indicates the instance to
which any configuration or show commands will apply.
ASCII-File-Only Syntax
When configuration commands for VRF-aware applications are configured and saved in an ASCII file
(typically through the snapshot command) or the switch boot.cfg file, a prefix is added to these
commands to indicate the name of the VRF instance to which the commands apply. For example:
! VRF
vrf vrfOne
! IP
vrf vrfOne ip interface intf100 address 100.1.1.1/24 vlan 100
vrf vrfOne ip interface intf101 address 101.1.1.1/24 vlan 101
vrf vrfOne ip router router-id 1.1.1.1
vrf vrfOne ip static route 192.100.1.0/24 gateway 100.1.1.10
! RIP
vrf vrfOne ip load rip
vrf vrfOne ip rip status enable
vrf vrfOne ip rip interface intf100 status enable
In this example, vrfOne is added to the beginning of the IP and RIP configuration command lines. This
indicates that these commands apply to the vrfOne instance. If a command line does not contain an
page 22-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Multiple VRF VRF Interaction With Other Features
instance name, then that command is for an application that applies only to the default VRF instance or the
application is not VRF-aware.
Default VRF commands appear first in an ASCII or boot.cfg file, followed by commands for VRF-aware
applications configured in non-default instances.
The following subsections provide additional information related to Multiple VRF interaction with
specific applications.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-9
VRF Interaction With Other Features Configuring Multiple VRF
Console HTTP
Telnet SNMP
FTP 802.1X
SSH (ssh, sftp, and scp) MAC-based authentication
• If the VRF instance that the RADIUS servers reside on is deleted or disabled, access to the RADIUS
servers will be disabled as well.
BGPv4
• Each BGPv4 routing instance requires configuration of an Autonomous System number, router ID
number, and primary IP address that is explicit to the associated VRF instance.
• BGP neighbors defined for a specific VRF instance and address family (IPv4 and IPv6) will peer with
neighbors accessible through interfaces associated with the same VRF instance.
• A maximum of 8 combined SSH sessions are allowed simultaneously across all VRFs on the switch
page 22-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Multiple VRF VRF Interaction With Other Features
VRF Policies
• A VRF policy condition parameter is available to specify a VRF name to which the policy condition
applies. This parameter can also specify the default VRF, and a no form of the command exists to
remove a VRF condition parameter. For example:
-> qos policy condition c1 vrf engr_vrf
-> qos policy condition c2 vrf default
-> qos policy condition c1 no vrf
• VRF policies are configured in the default VRF, similar to how all other QoS policies are configured.
If the VRF name specified does not exist, the policy is not allocated any system resources.
• Policies that do not specify a VRF name are considered global policies and are applied across all VRF
instances and VLANs.
• Policies that specify the default VRF apply only to traffic in the default VRF instance.
• Policies that specify a VRF name apply only to traffic in the VRF instance associated with that name.
• The switch network group is supported only in VRF policies that specify the default VRF instance. If
this group is specified in a global policy (no VRF specified) then the policy is applied across all VRF
instances.
SNMP
• SNMPv3 is required to manage VRF instances; SNMPv1 and v2 are not supported.
• Configuring the management station to use SNMPv3 is required to receive traps from VRF-aware
applications.
VLANs
Configuring an interface for a VLAN also associates that VLAN with the active VRF context. A VLAN,
however, can only belong to one VRF instance at a time. As a result, all interfaces configured for a VLAN
must belong to the same VRF instance. See “Assigning IP Interfaces to a VRF Instance” on page 22-15
for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-11
VRF Interaction With Other Features Configuring Multiple VRF
UDP/DHCP Relay
VRF support for UDP/DHCP Relay allows for the configuration and management of relay agents and
servers within the context of a VRF instance. However, the level of VRF support and functionality for
individual UDP/DHCP Relay commands falls into one of the following three categories:
• VRF-Aware commands. These commands are allowed in any of the VRF instances configured in the
switch. The settings in one VRF are independent of the settings in another VRF. Command parameters
are visible and configurable within the context of any VRF.
• Global commands. These commands are supported only in the default VRF, but are visible and
applied to all VRF instances configured in the switch. This command behavior is similar to how
command parameters are applied in the per-VLAN DHCP Relay mode. For example, the maximum
hops value configured in the default VRF is applied to all DHCP Relay agents across all VRF
instances. This value is not configurable in any other VRF instance.
• Default VRF commands. These commands are supported only in the default VRF and are not applied
to any other VRF instance configured in the switch. For example, per-VLAN mode, DHCP Snooping,
and boot-up commands fall into this category.
Use the following table to determine which UDP/DHCP Relay commands are VRF-aware, global, and
default VRF commands:
The following guidelines apply when configuring UDP/DHCP Relay within the context of VRF instances:
• A separate DHCP server is required for each VRF instance to which DHCP packets are relayed to and
from the server. The server should reside in the same VRF as the originating requests. For example, the
following command configures the DHCP server address for the vrfOne instance:
-> vrf vrfOne
vrfOne:> ip helper address 10.0.0.1
The preceding configuration relays all DHCP packets within the vrfOne instance to the specified server
page 22-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Multiple VRF Configuring VRF Instances
• The DHCP per-VLAN mode is only supported in the default VRF instance. As a result, DHCP Relay
operates only in the standard mode in all other VRF instances.
• When a VRF instance is deleted, all UDP/DHCP Relay configuration associated with that instance is
also deleted. However, if the VRF instance is created again with the same name, the relay
configuration previously associated with that name is not restored.
In this example, instance IpOne is created and made the active VRF context at the same time. Note that
the CLI command prompt indicates the active context by displaying the name of the VRF instance as part
of the actual prompt. Any subsequent commands entered on this command line are applied to the IpOne
instance.
Within the context of the default VRF instance, it is also possible to enter configuration commands for
another instance. For example, to configure an IP interface for instance IpOne from within the CLI context
of the default instance, prefix the ip interface command with vrf command followed by the name of the
instance. For example:
-> vrf IpOne ip interface intf100 address 100.1.1.1/24 vlan 100
The preceding command creates the IP interface for VRF IpOne but does not change the CLI context in
which the command was entered. The default VRF instance remains the active context.
Note. The default VRF instance is the only VRF CLI context within which configuration of another
instance is allowed.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-13
Configuring VRF Instances Configuring Multiple VRF
In the preceding example, selecting the IpTwo instance changed the VRF CLI context from IpOne to
IpTwo. Any subsequent commands entered will apply to the IpTwo instance.
Note. If the instance name specified with the vrf command does not exist, a VRF instance is automati-
cally created. In addition, configuring a VRF instance name is case sensitive. As a result, it is possible to
accidentally create or delete instances. Use the show ip dynamic-proxy-arp command to verify the VRF
instance configuration before selecting, adding, or removing instances.
To return to the default VRF instance from within the context of another instance, enter the vrf command
with or without the optional default parameter. For example, both of the following commands return the
CLI context to the default VRF instance:
IpOne: -> vrf
Note. The command prompt for the default VRF instance does not display the instance name.
page 22-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Multiple VRF Configuring VRF Instances
Once an IP interface is associated with a VRF instance, Layer 3 traffic on that interface is routed within
the domain of the VRF instance. In other words, such traffic is only routed between other IP interfaces that
are associated with the same VRF instance. Any additional routing protocol traffic configured for that
same interface is also routed within the associated VRF domain.
Use the following guidelines when configuring IP interfaces for a VRF instance:
• A single IP interface as well as the VLAN associated with the interface, can only belong to one VRF
instance at a time.
• Once a VLAN is associated with a specific VRF instance, configuring an interface for that VLAN
within the context of any other instance, is not allowed. For example, if the first IP interface
configured for VLAN 100 was associated with the VRF IpOne instance, then any subsequent IP
interface configuration for VLAN 100 is only allowed within the context of the IpOne instance.
• A VRF instance can have multiple VLAN associations, even though a VLAN can only have one VRF
association.
To view a list of VRF instances configured on the switch, use the show ip dynamic-proxy-arp command.
For more information about this command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 22-15
Verifying the VRF Configuration Configuring Multiple VRF
The VRF CLI context determines which information is displayed using application-specific show
commands. For example, if IpOne is the active VRF context, then only IP interfaces associated with IpOne
are displayed.
-> vrf IpOne
IpOne: -> show ip interface
Total 1 interfaces
Name IP Address Subnet Mask Status Forward Device
--------------------+---------------+---------------+------+-------+--------
Loopback 127.0.0.1 255.0.0.0 UP NO Loopback
intfone 200.1.1.1 255.255.255.0 DOWN NO vlan 200
Note that when the default VRF CLI context is active, the show commands can display specific
information for another instance. This is done by first entering the vrf command followed by the instance
name and then the show command. For example, the following command displays the IP interfaces
configured for IpOne from within the context of the default VRF CLI:
-> vrf IpOne show ip interface
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 22-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
23 Configuring IPv6
Internet Protocol version 6 (IPv6) is the next generation of Internet Protocol version 4 (IPv4). Both
versions are supported along with the ability to tunnel IPv6 traffic over IPv4. Implementing IPv6 solves
the limited address problem currently facing IPv4, which provides a 32-bit address space. IPv6 increases
the address space available to 128 bits.
In This Chapter
This chapter describes IPv6 and how to configure it through Command Line Interface (CLI). The CLI
commands are used in the configuration examples; for more details about the syntax of commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
This chapter provides an overview of IPv6 and includes information about the following procedures:
• Configuring an IPv6 interface (see page 23-15)
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-1
IPv6 Specifications Configuring IPv6
IPv6 Specifications
Note that the maximum limit values provided in the following Specifications table are subject to available
system resources:
page 23-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 IPv6 Defaults
IPv6 Defaults
The following table lists the defaults for IPv6 configuration through the ip command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-3
Quick Steps for Configuring IPv6 Routing Configuring IPv6
Note.. When the IPv6 interface is configured, the switch automatically generates a link-local address for
the interface. This allows for communication with other interfaces and/or devices on the same link, but
does not provide routing between interfaces.
2 Assign a unicast address to the v6if-v200 interface by using the ipv6 address command. For example:
3 Configure an IPv6 interface for VLAN 300 by using the ipv6 interface command. For example:
4 Assign a unicast address to the v6if-v300 interface by using the ipv6 address command. For example:
Note. Optional. To verify the IPv6 interface configuration, enter show ipv6 interface For example:
Note that the link-local addresses for the two new interfaces and the loopback interface were
automatically created and included in the show ipv6 interface display output. In addition, the subnet
router anycast address that corresponds to the unicast address is also automatically generated for the
interface.
5 Enable RIPng for the switch by using the ipv6 load rip command. For example:
6 Create a RIPng interface for each of the IPv6 VLAN interfaces by using the ipv6 rip interface
command. For example:
-> ipv6 rip interface v6if-v200
-> ipv6 rip interface v6if-v300
page 23-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Quick Steps for Configuring IPv6 Routing
IPv6 routing is now configured for VLAN 200 and VLAN 300 interfaces, but it is not active until at least
one port in each VLAN goes active.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-5
IPv6 Overview Configuring IPv6
IPv6 Overview
IPv6 provides the basic functionality that is offered with IPv4 but includes the following enhancements
and features not available with IPv4:
• Increased IP address size—IPv6 uses a 128-bit address, a substantial increase over the 32-bit IPv4
address size. Providing a larger address size also significantly increases the address space available,
thus eliminating the concern over running out of IP addresses. See “IPv6 Addressing” on page 23-7 for
more information.
• Autoconfiguration of addresses—When an IPv6 interface is created or a device is connected to the
switch, an IPv6 link-local address is automatically assigned for the interface and/or device. See
“Autoconfiguration of IPv6 Addresses” on page 23-9 for more information.
• Anycast addresses—A new type of address. Packets sent to an anycast address are delivered to one
member of the anycast group.
• Simplified header format—A simpler IPv6 header format is used to keep the processing and
bandwidth cost of IPv6 packets as low as possible. As a result, the IPv6 header is only twice the size of
the IPv4 header despite the significant increase in address size.
• Improved support for header options—Improved header option encoding allows more efficient
forwarding, fewer restrictions on the length of options, and greater flexibility to introduce new options.
• Security improvements—Extension definitions provide support for authentication, data integrity, and
confidentiality.
• Neighbor Discovery protocol—A protocol defined for IPv6 that detects neighboring devices on the
same link and the availability of those devices. Additional information that is useful for facilitating the
interaction between devices on the same link is also detected (for example, neighboring address
prefixes, address resolution, duplicate address detection, link MTU, and hop limit values, and so on.).
This implementation of IPv6 also provides the following mechanisms to maintain compatibility between
IPv4 and IPv6:
• Dual-stack support for both IPv4 and IPv6 on the same switch.
• Embedded IPv4 addresses in the four lower-order bits of the IPv6 address.
The remainder of this section provides a brief overview of the new IPv6 address notation,
autoconfiguration of addresses, and tunneling of IPv6 over IPv4.
page 23-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 IPv6 Overview
IPv6 Addressing
One of the main differences between IPv6 and IPv4 is that the address size has increased from 32 bits to
128 bits. Going to a 128-bit address also increases the size of the address space to the point where running
out of IPv6 addresses is not a concern.
The following types of IPv6 addresses are supported:
Link-local—A link-local address is a private unicast address that identifies an interface or device on the
local network. This type of address allows communication with devices and/or neighboring nodes that are
attached to the same physical link. Note that when the communication is between two nodes that are not
attached to the same link, both nodes must have a configured global unicast address. Routing between
link-local addresses is not available because link-local addresses are not known or advertised to the
general network.
Unicast—Standard unicast addresses, similar to IPv4.
Unique Local IPv6 Unicast—IPv6 unicast address format that is globally unique and intended for local
communications, usually inside of a site. These addresses are not expected to be routable on the global
Internet.
Multicast—Addresses that represent a group of devices. Traffic sent to a multicast address is delivered to
all members of the multicast group.
Anycast—Traffic that is sent to this type of address is delivered to one member of the anycast group. The
device that receives the traffic is usually the one that is easiest to reach as determined by the active
routing protocol.
Note. IPv6 does not support the use of broadcast addresses. This functionality is replaced using improved
multicast addressing capabilities.
IPv6 address types are identified by the high-order bits of the address, as shown in the following table:
Note that anycast addresses are unicast addresses that are not identifiable by a known prefix.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-7
IPv6 Overview Configuring IPv6
2 1234:531F:0:0:BCD2:F34A::
With IPv6 addresses that have long strings of zeros, the benefit of zero compression is more dramatic. For
example, address FF00:0:0:0:0:0:4501:32 becomes FF00::4501:32.
Note that hexadecimal notation used for IPv6 addresses resembles the notation which is used for MAC
addresses. However, it is important to remember that IPv6 addresses still identify a device at the Layer 3
level and MAC addresses identify a device at the Layer 2 level.
Another supported IPv6 address notation includes embedding an IPv4 address as the four lower-order bits
of the IPv6 address. This is especially useful when dealing with a mixed IPv4/IPv6 network. For example:
0:0:0:0:0:0:212.100.13.6
page 23-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 IPv6 Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-9
IPv6 Overview Configuring IPv6
Every IPv6 host is assigned with a global IPv6 address either in Stateless or Stateful mode. This is decided
by IPv6 router located on the network.
IPv6 router sends out RA multicast messages periodically to all-nodes multicast address (ff02::1). Every
IPv6 host upon boot up processes this RA message to decide its address configuration mode. Based on
these RA messages, IPv6 host decides the address configuration mode. There are three types of address
configuration modes:
• IPv6 node uses DHCPv6 messages to get IPv6 address and other network parameters like DNS, default
gateway.
• IPv6 node uses DHCPv6 messages to get IPv6 address alone. All other network parameters are fetched
from IPv6 router through RA message.
• IPv6 node acquires IPv6 address in stateless auto configuration and sends DHCPv6 messages for other
network parameters
page 23-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 IPv6 Overview
• Use the well-known prefix FC00::/7 to to allow for easy filtering at site boundaries.
• Allow sites to be combined or privately interconnected without creating any address conflicts or requir-
ing renumbering of interfaces that use these prefixes.
• Internet Service Provider independent and can be used for communications inside of a site without
having any permanent or intermittent Internet connectivity.
• If accidentally leaked outside of a site through routing or DNS, there is no conflict with any other
address.
• In practice, applications treat these addresses like global scoped addresses.
A 40-bit global identifier is used to make the local IPv6 address prefixes globally unique. This global ID
can either be explicitly configured, or created using the pseudo-algorithm recommended in RFC 4193.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-11
IPv6 Overview Configuring IPv6
Note. RIPng is not supported over 6to4 tunnels. However, it is possible to create a RIPng interface for a
configured tunnel. See “Configuring IPv6 Tunnel Interfaces” on page 23-19 for more information.
6to4 Tunnels
6to4 tunneling provides a mechanism for transporting IPv6 host traffic over an IPv4 network infrastruc-
ture to other IPv6 hosts and/or domains without having to configure explicit tunnel endpoints. Instead, an
IPv6 6to4 tunnel interface is created at points in the network where IPv6 packets are encapsulated (IPv4
header added) prior to transmission over the IPv4 network or decapsulated (IPv4 header stripped) for
transmission to an IPv6 destination.
An IPv6 6to4 tunnel interface is identified by its assigned address, which is derived by combining a 6to4
well-known prefix (2002) with a globally unique IPv4 address and embedded as the first 48 bits of an IPv6
address. For example, 2002:d467:8a89::137/64, where D467:8A89 is the hex equivalent of the IPv4
address 212.103.138.137.
6to4 tunnel interfaces are configured on routers and identify a 6to4 site. Because 6to4 tunnels are
point-to-multi-point in nature, any one 6to4 router can communicate with one or more other 6to4 routers
across the IPv4 cloud. Two common scenarios for using 6to4 tunnels are described as follows.
IPv4 Domain
page 23-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 IPv6 Overview
3 The 6to4 border router encapsulates IPv6 packets with IPv4 headers and sends to the destination 6to4
border router over the IPv4 domain.
4 The destination 6to4 border router strips IPv4 header and forwards to 6to4 destination host.
IPv4 Domain
IPv6
Router
6to4 Host
IPv6 Site
IPv6 Host
1 The 6to4 relay router advertises a route to 2002::/16 on its IPv6 router interface.
2 The IPv6 host traffic received by the relay router that has a next hop address that matches 2002::/16 is
routed to the 6to4 tunnel interface configured on the relay router.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-13
IPv6 Overview Configuring IPv6
3 The traffic routed to the 6to4 tunnel interface is then encapsulated into IPv4 headers and sent to the
destination 6to4 router over the IPv4 domain.
4 The destination 6to4 router strips the IPv4 header and forwards it to the IPv6 destination host.
For more information about configuring an IPv6 6to4 tunnel interface, see “Configuring an IPv6 Inter-
face” on page 23-15 and “Configuring IPv6 Tunnel Interfaces” on page 23-19. For more detailed informa-
tion and scenarios by using 6to4 tunnels, refer to RFC 3056.
Configured Tunnels
A configured tunnel is where the endpoint addresses are manually configured to create a point-to-point
tunnel. This type of tunnel is similar to the 6to4 tunnel on which IPv6 packets are encapsulated in IPv4
headers to facilitate communication over an IPv4 network. The difference between the two types of
tunnels is that configured tunnel endpoints require manual configuration, whereas 6to4 tunneling relies on
an embedded IPv4 destination address to identify tunnel endpoints.
For more information about IPv6 configured tunnels, see “Configuring IPv6 Tunnel Interfaces” on
page 23-19. For more detailed information about configured tunnels, refer to RFC 2893. Note that RFC
2893 also discusses automatic tunnels, which are not supported with this implementation of IPv6.
page 23-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Configuring an IPv6 Interface
• If creating a VLAN interface, the VLAN must already exist. See Chapter 4, “Configuring VLANs,” for
more information.
• If creating a tunnel interface, a tunnel ID or 6to4 is specified. Only one 6to4 tunnel is allowed per
switch, so it is not necessary to specify an ID when creating this type of tunnel.
• If a tunnel ID is specified, then a configured tunnel interface is created. This type of tunnel requires
additional configuration by using the ipv6 address global-id command. See “Configuring IPv6 Tunnel
Interfaces” on page 23-19 for more information.
• The following configurable interface parameters are set to their default values unless otherwise
specified when the ipv6 interface command is used:
Refer to the ipv6 interface command page in the OmniSwitch AOS Release 6 CLI Reference Guide for
more details regarding these parameters.
• Each VLAN can have one IPv6 interface. Configuring both an IPv4 and IPv6 interface on the same
VLAN is allowed. Note that the VLAN interfaces of both types are not active until at least one port
associated with the VLAN goes active.
• A link-local address is automatically configured for an IPv6 interface, except for 6to4 tunnels, when
the interface is configured. For more information regarding how this address is formed, see “Autocon-
figuration of IPv6 Addresses” on page 23-9.
• Assigning more than one IPv6 address to a single IPv6 interface is allowed.
• Assigning the same link-local address to multiple interfaces is allowed. Each global unicast prefix,
however, can only exist on one interface. For example, if an interface for a VLAN 100 is configured
with an address 4100:1000::1/64, an interface for VLAN 200 cannot have an address 4100:1000::2/64.
• Each IPv6 interface anycast address must also have a unique prefix. However, multiple devices may
share the same anycast address prefix to identify themselves as members of the anycast group.
To create an IPv6 interface for a VLAN or configured tunnel, enter ipv6 interface followed by an
interface name, then vlan (or tunnel) followed by a VLAN ID (or tunnel ID). For example, the following
two commands create an IPv6 interface for VLAN 200 and an interface for tunnel 35:
-> ipv6 interface v6if-v200 vlan 200
-> ipv6 interface v6if-tunnel-35 tunnel 35
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-15
Configuring an IPv6 Interface Configuring IPv6
To create an IPv6 interface for a 6to4 tunnel, use the following command:
-> ipv6 interface v6if-6to4 tunnel 6to4
Use the show ipv6 interface command to verify the interface configuration for the switch. For more
information about this command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Once the global ID is generated the ipv6 address local-unicast command can be used to generate a unique
local address using the configured global-id.
When an existing interface name is specified with the ipv6 interface command, the command modifies
specified parameters for that interface. If an unknown interface name is entered along with an existing
VLAN or tunnel parameter, a new interface is created with the name specified.
page 23-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Assigning IPv6 Addresses
In the preceding example, 4100:1000:: is specified as the subnet prefix and 20 is the interface identifier.
Note that the IPv6 address is expressed using CIDR notation to specify the prefix length. In the preceding
example, /64 indicates a subnet prefix length of 64 bits.
To use the MAC address of an interface or device as the interface ID, specify the eui-64 option with this
command. For example:
-> ipv6 address 4100:1000::/64 eui-64 v6if-v200
• Any field of an address may contain all zeros or all ones. The exception to this is the interface
identifier portion of the address, which cannot be all zeros. If the eui-64 option is specified with the
ipv6 address command, this is not an issue.
• The EUI-64 interface identifier takes up the last 64 bits of the 128-bit IPv6 address. If the subnet prefix
combined with the EUI-64 interface ID is longer than 128 bits, an error occurs and the address is not
created.
• A subnet router anycast address is automatically created when a global unicast address is assigned to
an interface. The anycast address is derived from the global address by adding an interface ID of all
zeros to the prefix of the global address. For example, the global address 4100:1000::20/64 generates
the anycast address 4100:1000::/64.
• Devices, such as a PC, are eligible for stateless autoconfiguration of unicast addresses in addition to the
link-local address. If this type of configuration is in use on the network, manual configuration of
addresses is not required.
• IPv6 VLAN or tunnel interfaces are only eligible for stateless autoconfiguration of their link-local
addresses. Manual configuration of addresses is required for all additional addresses.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-17
Assigning IPv6 Addresses Configuring IPv6
See “IPv6 Addressing” on page 23-7 for an overview of IPv6 address notation. Refer to RFC 4291 for
more technical address information.
Note that the subnet router anycast address is automatically deleted when the last unicast address of the
same subnet is removed from the interface.
page 23-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Configuring IPv6 Tunnel Interfaces
In the preceding example, 2002 is the well-known prefix that identifies a 6to4 tunnel. The D467:8A89 part
of the address that follows 2002 is the hex equivalent of the IPv4 address 212.103.138.137. Note that an
IPv4 interface configured with the embedded IPv4 address is required on the switch. In addition, do not
configure a private (for example, 172.168.10.1), broadcast, or unspecified address as the embedded IPv4
address.
One of the main benefits of 6to4 tunneling is that no other configuration is required to identify tunnel
endpoints. The router that the 6to4 tunnel interface is configured on will encapsulate IPv6 packets in IPv4
headers and send them to the IPv4 destination address where they will be processed. This is particularly
useful in situations where the IPv6 host is isolated.
The second type of tunnel supported is referred to as a configured tunnel. With this type of tunnel it is
necessary to specify an IPv4 address for the source and destination tunnel endpoints. Note that if bidirec-
tional communication is desired, then it is also necessary to create the tunnel interface at each end of the
tunnel.
Creating an IPv6 configured tunnel involves the following general steps:
• Create an IPv6 tunnel interface using the ipv6 interface command.
• Associate an IPv4 source and destination address with the tunnel interface by using the ipv6 address
global-id command. These addresses identify the tunnel endpoints.
• Associate an IPv6 address with the tunnel interface by using the ipv6 address command.
• Configure a tunnel interface and associated addresses at the other end of tunnel.
Note that RIPng is not supported over 6to4 tunnels, but is allowed over configured tunnels. To use this
protocol on a configured tunnel, a RIPng interface is created for the tunnel interface. For example, the
following command creates a RIPng interface for tunnel v6if-tunnel-137:
-> ipv6 rip interface v6if-tunnel-137
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-19
Creating an IPv6 Static Route Configuring IPv6
Note that in the example preceding the IPv6 interface name for the gateway was included. This parameter
is required only when a link local address is specified as the gateway.
If you want to classify certain static routes and filter them, then a tag value may be allocated to those
routes and route-map match statement to filter those routes.
-> ipv6 static-route 10.0.3.0/24 gateway 30.0.3.1 tag 123 name HRDept
When you create a static route, the default metric value of 1 is used. However, you can change the priority
of the route by increasing its metric value. The lower the metric value, the higher the priority. This metric
is added to the metric cost of the route. The metric range is 1 to 15. For example:
-> ipv6 static-route 212:95:5::/64 gateway fe80::2d0:95ff:fe6a:f458 v6if-137
metric 3
Static routes do not age out of the IPv6 Forwarding table; you must delete them from the table. Use the
no ipv6 static-route command to delete a static route. You must specify the destination IPv6 address of
the route as well as the IPv6 address of the first hop (gateway). For example, to delete a static route to
IPv6 address 212:95:5::/64 through gateway fe80::2d0:95ff:fe6a:f458 on interface v6if-137, you
would enter:
-> no ip static-route 212:95:5::/64 gateway fe80::2d0:95ff:fe6a:f458 v6if-137
The IPv6 Forwarding table includes routes learned through one of the routing protocols (RIP, OSPF, BGP)
as well as any static routes that are configured. Use the show ipv6 routes command to display the IPv6
Forwarding table.
Note. A static route is not active unless the gateway it is using is active.
page 23-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Configuring the Route Preference of a Router
To display the current route preference configuration, use the show ipv6 route-pref command:
-> show ipv6 route-pref
Protocol Route Preference Value
------------+------------------------
Local 1
Static 2
OSPF 110
RIP 120
EBGP 190
IBGP 200
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-21
Configuring Route Map Redistribution Configuring IPv6
2 Configure redistribution to apply a route map, as described in “Configuring Route Map Redistribu-
tion” on page 23-26.
Refer to the “IP Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for more
information about the ip route-map command parameters and usage guidelines.
Once a route map is created, it is then applied using the ipv6 redist command. See “Configuring Route
Map Redistribution” on page 23-26 for more information.
page 23-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Configuring Route Map Redistribution
The preceding command creates the ospf-to-rip route map, assigns a sequence number of 10 to the route
map, and specifies a permit action.
To optionally filter routes before redistribution, use the ip route-map command with a match parameter
to configure match criteria for incoming routes. For example,
-> ip route-map ospf-to-rip sequence-number 10 match tag 8
The preceding command configures a match statement for the ospf-to-rip route map to filter routes based
on their tag value. When this route map is applied, only OSPF routes with a tag value of eight are redis-
tributed into the RIP network. All other routes with a different tag value are dropped.
Note. Configuring match statements is not required. However, if a route map does not contain any match
statements and the route map is applied using the ipv6 redist command, the router redistributes all routes
into the network of the receiving protocol.
To modify route information before it is redistributed, use the ip route-map command with a set
parameter. For example,
-> ip route-map ospf-to-rip sequence-number 10 set tag 5
The preceding command configures a set statement for the ospf-to-rip route map that changes the route tag
value to five. Because this statement is part of the ospf-to-rip route map, it is only applied to routes that
have an existing tag value equal to eight.
The following is a summary of the commands used in the preceding examples:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-23
Configuring Route Map Redistribution Configuring IPv6
To delete a specific sequence number within a route map, enter no ip route-map followed by the route
map name, then sequence-number followed by the actual number. For example, the following command
deletes sequence 10 from the redistipv4 route map:
-> no ip route-map redistipv4 sequence-number 10
Note that in the preceding example, the redistripv4 route map is not deleted. Only those statements
associated with sequence 10 are removed from the route map.
To delete a specific statement within a route map, enter no ip route-map followed by the route map name,
then sequence-number followed by the sequence number for the statement, then either match or set and
the match or set parameter and value. For example, the following command deletes only the match tag 8
statement from route map redistipv4 sequence 10:
-> no ip route-map redistipv4 sequence-number 10 match tag 8
To configure a new sequence of statements for an existing route map, specify the same route map name
but use a different sequence number. For example, the following command creates a new sequence 20 for
the rm_1 route map:
-> ip route-map rm_1 sequence-number 20 action permit
-> ip route-map rm_1 sequence-number 20 match ipv4-interface to-finance
-> ip route-map rm_1 sequence-number 20 set metric 5
page 23-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Configuring Route Map Redistribution
Sequence 10 and sequence 20 are both linked to route map rm_1 and are processed in ascending order
according to their sequence number value. Note that there is an implied logical OR between sequences. As
a result, if there is no match for the tag value in sequence 10, then the match interface statement in
sequence 20 is processed. However, if a route matches the tag 8 value, then sequence 20 is not used. The
set statement for whichever sequence was matched is applied.
A route map sequence may contain multiple match statements. If these statements are of the same kind
(for example, match tag 5, match tag 8, and so on.) then a logical OR is implied between each like
statement. If the match statements specify different types of matches (for example match tag 5, match ip4
interface to-finance, and so on.), then a logical AND is implied between each statement. For example, the
following route map sequence will redistribute a route if its tag is either 8 or 5:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
The following route map sequence will redistribute a route if the route has a tag of 8 or 5 and the route
was learned on the IPv6 interface to-finance:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
-> ip route-map rm_1 sequence-number 10 match ipv6-interface to-finance
To add addresses to an access list, use the ip access-list address (IPv4) or the ipv6 access-list address
(IPv6) command. For example, the following commands add addresses to an existing access list:
-> ip access-list ipaddr address 10.0.0.0/8
-> ipv6 access-list ip6addr address 2001::/64
Use the same access list name each time the preceding commands are used to add additional addresses to
the same access list. In addition, both commands provide the ability to configure if an address and/or its
matching subnet routes are permitted (the default) or denied redistribution. For example:
-> ip access-list ipaddr address 16.24.2.1/16 action deny redist-control
all-subnets
-> ipv6 access-list ip6addr address 2001::1/64 action permit redist-control
no-subnets
For more information about configuring access list commands, see the “IP Commands” chapter in the
OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-25
Configuring Route Map Redistribution Configuring IPv6
Note. A router automatically becomes an Autonomous System Border Router (ASBR) when
redistribution is configured on the router.
A source protocol is a protocol from which the routes are learned. A destination protocol is the one into
which the routes are redistributed. Make sure that both protocols are loaded and enabled before
configuring redistribution.
Redistribution applies criteria specified in a route map to routes received from the source protocol.
Therefore, configuring redistribution requires an existing route map. For example, the following command
configures the redistribution of OSPFv3 routes into the RIPng network using the ospf-to-rip route map:
-> ipv6 redist ospf into rip route-map ospf-to-rip
OSPFv3 routes received by the router interface are processed based on the contents of the ospf-to-rip route
map. Routes that match criteria specified in this route map are either allowed or denied redistribution into
the RIPng network. The route map may also specify the modification of route information before the route
is redistributed. See “Using Route Maps” on page 23-22 for more information.
To remove a route map redistribution configuration, use the no form of the ipv6 redist command. For
example:
-> no ipv6 redist ospf into rip route-map ospf-to-rip
Use the show ipv6 redist command to verify the redistribution configuration:
-> show ipv6 redist
Source Destination
Protocol Protocol Status Route Map
------------+------------+---------+--------------------
localIPv6 RIPng Enabled ipv6rm
OSPFv3 RIPng Enabled ospf-to-rip
page 23-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPv6 Configuring Route Map Redistribution
The resulting ospf-to-rip route map redistribution configuration does the following:
• Denies the redistribution of Type 2 external OSPFv3 routes with a tag set to five.
• Redistributes into RIPng all routes learned on the intf_ospf interface and sets the metric for such routes
to 255.
• Redistributes into RIPng all other routes (those not processed by sequence 10 or 20) and sets the tag for
such routes to eight.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 23-27
Verifying the IPv6 Configuration Configuring IPv6
show ipv6 rip Displays the RIPng status and general configuration parameters.
show ipv6 redist Displays the route map redistribution configuration.
show ipv6 interface Displays the status and configuration of IPv6 interfaces.
show ipv6 tunnel Displays IPv6 configured tunnel information and whether the 6to4
tunnel is enabled or not.
show ipv6 routes Displays the IPv6 Forwarding Table.
show ipv6 route-pref Displays the configured route preference of a router.
show ipv6 router database Displays a list of all routes (static and dynamic) that exist in the IPv6
router database.
show ipv6 prefixes Displays IPv6 subnet prefixes used in router advertisements.
show ipv6 hosts Displays the IPv6 Local Host Table.
show ipv6 neighbors Displays the IPv6 Neighbor Table.
show ipv6 traffic Displays statistics for IPv6 traffic.
show ipv6 icmp statistics Displays ICMP6 statistics.
show ipv6 pmtu table Displays the IPv6 Path MTU Table.
show ipv6 tcp ports Displays TCP Over IPv6 Connection Table. Contains information
about existing TCP connections between IPv6 endpoints.
show ipv6 udp ports Displays the UDP Over IPv6 Listener Table. Contains information
about UDP/IPv6 endpoints.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 23-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
24 Configuring IPsec
Internet Protocol security (IPsec) is a suite of protocols for securing IPv6 communications by
authenticating and/or encrypting each IP packet in a data stream. IPsec is a framework of open standards
designed to provide interoperable, high quality, cryptographically-based security for IP networks through
the use of appropriate security protocols, cryptographic algorithms, and cryptographic keys. The set of
security services offered includes access control, connectionless integrity, data origin authentication,
detection and rejection of replays (a form of partial sequence integrity), and confidentiality (through
encryption).
These security services are provided through use of two security protocols, the Authentication Header
(AH) and the Encapsulating Security Payload (ESP), and through the use of cryptographic key
management procedures and protocols.
In This Chapter
This chapter describes the basic components of IPsec and how to configure them through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Master Key Configuration (see “Configuring an IPsec Master Key” on page 24-11).
• Security Policy Rule Configuration (see “Configuring an IPsec Rule” on page 24-15).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-1
IPsec Specifications Configuring IPsec
IPsec Specifications
RFCs Supported 4301 - Security Architecture for the Internet Proto-
col
4302 - IP Authentication Header (AH)
4303 - IP Encapsulating Security Payload (ESP)
4305 - Cryptographic Algorithm Implementation
Requirements for ESP and AH
4308 - Cryptographic Suites for IPsec
Encryption Algorithms Supported for ESP NULL, DES-CBC, 3DES-CBC, AES-CBC, and
AES-CTR
Key lengths supported for Encryption Algo- DES-CBC - 64 bits
rithms 3DES-CBC - 192 bits
AES-CBC - 128, 192, or 256 bits
AES-CTR - 160, 224, or 288 bits
Authentication Algorithms Supported for HMAC-SHA1-96, HMAC-MD5-96, and
AH AES-XCBC-MAC-96
Key lengths supported for Authentication HMAC-MD5 - 128 bits
Algorithms HMAC-SHA1 - 160 bits
AES-XCBC-MAC - 128 bits
Master Security Key formats Hexadecimal (16 bytes) or String (16 characters)
Priority value range for IPsec Policy 1 - 1000
Index value range for IPsec Policy Rule 1 - 10
SPI Range 256 - 999999999
Modes Supported Transport
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
page 24-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec IPsec Defaults
IPsec Defaults
The following table shows the default settings of the configurable IPsec parameters.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-3
Quick Steps for Configuring an IPsec AH Policy Configuring IPsec
1 Configure the master security key. The master security key must be set if keys are to be encrypted
when saved in the boot.cfg and snapshot files.
-> ipsec security-key master-key-12345
2 Define the policy. A policy defines the traffic that requires IPsec protection. The commands below
define a bi-directional policy for any protocol and the associated IPv6 address ranges. For example:
-> ipsec policy ALLoutMD5 source 664:1:1:1::199/64 destination 664:1:1:1::1/64
protocol any out ipsec shutdown
3 Define the rule. A rule defines the security services for the traffic defined by its associated policy. For
example the commands below add an AH rule to the polices defined above:
-> ipsec policy ALLoutMD5 rule 1 ah
4 Enable the policies. A policy cannot be enabled until the rules are defined. Now that rules have been
defined, enable the policy using the commands below:
-> ipsec policy ALLoutMD5 no shutdown
5 Define the Security Keys. Each SA has its own unique set of security keys. The key name is the SA
name that is going to use the key and the length must match the authentication algorithm key size. Keys
must be defined before the SA can be enabled.
-> ipsec key ALLoutMD5_SA sa-authentication 0x11112222333344445555666677778888
6 Define the SA. An SA specifies the actual actions to be performed. The security parameters index (SPI)
helps identify the source/destination pair. The security parameters index (SPI) in combination with the
source and destination addresses uniquely identifies an SA. An identical SA (same SPI, source, and desti-
nation) must be configured on both systems exchanging IPsec protected traffic.
-> ipsec sa ALLoutMD5_SA ah source 664:1:1:1::199 destination 664:1:1:1::1 spi
2000 authentication HMAC-MD5 no shutdown
page 24-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Quick Steps for Configuring an IPsec Discard Policy
1 Define the policy. The commands below use similar policy information as in the previous example but
the action has been changed to discard:
-> ipsec policy Discard_ALLoutMD5 source 664:1:1:1::199/64 destination
664:1:1:1::1/64 protocol any out discard no shutdown
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-5
IPsec Overview Configuring IPsec
IPsec Overview
IPsec provides protection to IP traffic. To achieve this, IPsec provides security services for IP packets at
the network layer. These services include access control, data integrity, authentication, protection against
replay, and data confidentiality. IPsec enables a system to select the security protocols, encryption and
authentication algorithms, and use any cryptographic keys as required. IPsec uses the following two
protocols to provide security for an IP datagram:
• Encapsulating Security Payload (ESP) to provide confidentiality, data origin authentication and
connectionless integrity.
• Authentication Header (AH) to provide connectionless integrity and data origin authentication for IP
datagrams and to provide optional protection against replay attacks. Unlike ESP, AH does not provide
confidentiality.
IPsec on an OmniSwitch operates in Transport mode. In transport mode only the payload of the IP packet
is encapsulated, and an IPsec header (AH or ESP) is inserted between the original IP header and the
upper-layer protocol header. The figure below shows an IP packet protected by IPsec in transport mode.
page 24-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec IPsec Overview
16 24 32-bit
Sequence Number
ESP is identified by a value of 50 in the IP header. The ESP header is inserted after the IP header and
before the upper layer protocol header. The Security Parameter Index (SPI) in the ESP header is a
32-bit value that, combined with the destination address and protocol in the preceding IP header,
identifies the security association (SA) to be used to process the packet. SPI helps distinguish multiple
SAs configured for the same source and destination combination. The payload data field carries the data
that is being encrypted by ESP. The Authentication digest in the ESP header is used to verify data
integrity. Authentication is always applied after encryption, so a check for validity of the data is done
upon receipt of the packet and before decryption.
Encryption Algorithms
There are several different encryption algorithms that can be used in IPsec. However, the most commonly
used algorithms are “AES” and “3DES”. These algorithms are used for encrypting IP packets.
• Advanced Encryption Standard - Cipher Block Chaining - (AES-CBC)
The AES-CBC mode comprises three different key lengths; AES-128, AES-192 and AES-256. Each block
of plaintext is XOR'd with the previous encrypted block before being encrypted again.
• Advanced Encryption Standard Counter - (AES-CTR)
The AES-CTR mode comprises three different key lengths; AES-160, AES-224 and AES-288. AES-CTR
creates a stream cipher from the AES block cipher. It encrypts and decrypts by XORing key stream blocks
with plaintext blocks to produce the encrypted data.
• Triple DES (3DES)
A mode of the DES encryption algorithm that encrypts data three times. Three 64-bit keys are used,
instead of one, for an overall key length of 192 bits (the first encryption is encrypted with second key, and
the resulting cipher text is again encrypted with a third key). 3DES is a more powerful version of DES.
• Data Encryption Standard (DES)
DES is a cryptographic block algorithm with a 64-bit key. It is a popular symmetric-key encryption
method. DES uses a 56-bit key and uses the block cipher method, which breaks text into 64-bit blocks and
then encrypts them. DES is deprecated and only provided for backward compatibility.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-7
IPsec Overview Configuring IPsec
Authentication Algorithms
• HMAC-MD5 - An algorithm that produces a 128-bit hash (also called a digital signature or message
digest) from a message of arbitrary length and a 16-byte key. The resulting hash is used, like a finger-
print of the input, to verify content and source authenticity and integrity.
• HMAC-SHA1 - An algorithm that produces a 160-bit hash from a message of arbitrary length and a
20-byte key. It is generally regarded as more secure than MD5 because of the larger hashes it produces.
• AES-XCBC-MAC-96 - An algorithm that uses AES [AES] in CBC mode [MODES] with a set of
extensions [XCBC-MAC-1] to overcome the limitations of the classic CBC-MAC algorithm. It uses
the AES block cipher with an increased block size and key length (128 bits) which enables it to with-
stand continuing advances in crypto-analytic techniques and computational capability. Its goal is to
ensure that the datagram is authentic and cannot be modified in transit.
Unlike ESP, AH does not encrypt the data. Therefore, it has a much simpler header than ESP. The figure
below shows an AH-protected IP packet.
IP Packet protected by AH
AH is identified by a value of 51 in the IP header. The Next header field indicates the value of the upper
layer protocol being protected (for example, UDP or TCP) in the transport mode. The payload length field
in the AH header indicates the length of the header. The SPI, in combination with the source and
destination addresses, helps distinguish multiple SAs configured for the same source and destination
combination. The AH header provides a means to verify data integrity. It is similar to the integrity check
provided by the ESP header with one key difference. The ESP integrity check only verifies the contents of
the ESP payload. AH's integrity check also includes portions of the packet header as well.
page 24-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec IPsec Overview
• The IP datagram can be permitted to pass without being subjected to any IPsec processing.
The system decides which packets are processed and how they are processed by using the combination of
the policy and the SA. The policy is used to specificy which IPsec protocols are used such as AH or ESP
while the SA specifies the algorithms such as AES and HMAC-MD5.
• Policy Rules - Determines whether AH, ESP, or a combination of both must be used.
• Security Associations (SAs) - Determines which algorithms must be used to secure the traffic.
• SA Keys - Determines the keys to be used with the SA to secure the traffic.
IPsec Policy
IPsec Policies define which traffic requires IPsec processing. The policy requires the source and destina-
tion of the traffic to be specified as IPv6 addresses. The policy may cover all traffic from source to desti-
nation or may further restrict it by specifying an upper-layer protocol, source, and/or destination ports.
Each policy is unidirectional, applying either to inbound or outbound traffic. Therefore, to cover all traffic
between a source and destination, two policies would need to be defined.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-9
IPsec Overview Configuring IPsec
SA Keys
Keys are used for encrypting and authenticating the traffic. Key lengths must match what is required by
the encryption or authentication algorithm specified in the SA. Key values may be specified either in hexa-
decimal format or as a string.
page 24-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Configuring IPsec on the OmniSwitch
• Use SSH, HTTPS, or SNMPv3 to prevent sensitive information such as SA keys from being sent in the
clear.
• Restrict IPsec commands to authorized users only. This is described in Chapter 10, “Managing Switch
User Accounts.”
Configuring IPsec for securing IPv6 traffic on a switch requires several steps which are explained below
• Configure the master security key for the switch which is used to encrypt and decrypt the configured
SA keys. This is described in “Configuring an IPsec Master Key” on page 24-11.
• Configure an IPsec Security Policy on the switch. This is described in “Configuring an IPsec Policy”
on page 24-12.
• Set an IPsec rule for the configured IPsec Security Policy on the switch. This is described in “Config-
uring an IPsec Rule” on page 24-15.
• Enable the Security Policy. This is described in “Enabling and Disabling a Policy” on page 24-13.
• Configure the authentication and encryption keys required for manually configured IPsec Security
associations (SA). This is described in “Configuring IPsec SA Keys” on page 24-17
• Configure an IPsec Security Association on the switch by setting parameters such as Security Associa-
tion type, encryption and authentication for SA. This is described in “Configuring an IPsec SA” on
page 24-16.
Configuring IPsec for discarding IPv6 traffic on a switch requires a single step:
• Configure the IPsec Discard policy on the switch which is used to discard or filter the IPv6 packets.
This is described in “Discarding Traffic using IPsec” on page 24-10.
or
Note. The key value can be specified either in hexadecimal format (16 bytes in length) or as a string (16
characters in length). A warning message is logged if SA keys are set without the Master Key being set.
To change the master security key specify the old and new key values.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-11
Configuring IPsec on the OmniSwitch Configuring IPsec
The above command replaces the old security key with the new key value. The old key value must be
entered to modify an existing key. If an incorrect old key value is entered, then setting the new key will
fail.
When the master security key is set or changed, its value is immediately propagated to the secondary
CMM. In a stacked configuration, the master security key is saved to all modules in the stack. When the
master security key is changed, save and synchronize the current configuration to ensure the proper opera-
tion of IPsec in the event of a switch reboot or takeover.
Note. By default, no master security key is set for the switch. When no master security key is configured
for the switch, the SA key values are written unencrypted to permanent storage (boot.cfg or other configu-
ration file).
Remote System
-> ipsec policy tcp_out source 3ffe:1:1:1::99 destination 3ffe:1:1:1::1 proto-
col tcp out ipsec description “IPsec on all outbound TCP” no shutdown
The above commands configure a bi-directional IPsec policy for IPv6 traffic destined to or from the speci-
fied IPv6 addresses and indicates the traffic must be processed using IPsec.
Prefixes can also be used when configuring a policy to match a range of addresses as shown below:
-> ipsec policy tcp_in source 3ffe::/16 destination 4ffe::/16 protocol tcp in ipsec
description “Any 3ffe to any 4ffe” no shutdown
Use the no form of the command to remove the configured IPsec policy. For example:
-> no ipsec policy tcp_in
page 24-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Configuring IPsec on the OmniSwitch
Note. Policies cannot be enabled until at least one rule is configured. See “Configuring an IPsec Rule” on
page 24-15.
Note. If two security policies have the same priority then the one configured first will be processed first.
-> ipsec policy telnet_ipsec priority 100 source 3ffe:1200::/32 destination ::/0
port 23 protocol tcp in ipsec shutdown
-> ipsec policy telnet_clear priority 200 source 3ffe:1200::1 destination ::/0
port 23 protocol tcp in none
1 Policy telnet_deny is the lowest priority policy. It will discard any incoming telnet connection
attempts.
2 Policy telnet_ipsec covers a subset of the source addresses of telnet_deny. With its greater priority, it
overrides telnet_deny and allows incoming telnet connections from addresses starting with the prefix
3ffe:1200::/32 as long as they are protected by ESP.
3 The policy telnet_clear overrides telnet_ipsec, allowing telnet connection attempts from the host to be
accepted without any IPsec protection.
4 Policy telnet_malicious can be configured to handle a known malicious system that otherwise would
fall under the telnet_ipsec policy. Its priority of 1000 ensures that it always takes precedence and discards
any incoming telnet connection attempts from the known malicious system.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-13
Configuring IPsec on the OmniSwitch Configuring IPsec
• ipsec - Allows IPsec processing of the traffic to which this policy is applied.
If the action is ipsec, then a rule must be defined before the policy can be enabled. Additionally, SAs and
SA keys must also be configured to support the rule.
• none - No action is performed.
The above commands could be modified to discard the traffic instead of processing using IPsec.
-> ipsec policy tcp_in discard
The following table lists the various protocols that can be specified, refer to the ipsec policy command for
additional details.
protocol
any icmp6[type type] tcp udp
ospf vrrp number protocol
Verifying a Policy
To verify the configured IPsec policy, use the show ipsec policy command. For example:
-> show ipsec policy
Name Priority Source-> Destination Protocol Direction Action State
-----------+--------+-----------------------------+--------+-------+-------+------
tcp_in 500 3ffe:1:1:1::99->3ffe:1:1:1::1 TCP in ipsec esp active
tcp_out 500 3ffe:1:1:1::1->3ffe:1:1:1::99 TCP out ipsec esp active
ftp-in-drop 100 ::/0->::/0 TCP in discard disabled
telnet-in-1 100 2000::/48->::/0 TCP in ipsec disabled
Note. The presence of a ‘+’ sign in the ‘Source->Destination’ or ‘Action’ indicates the values has been
truncated to fit. View a specific security policy to view additional details.
You can also verify the configuration of a specific security policy by using the show ipsec policy
command followed by the name of the security policy. For example:
page 24-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Configuring IPsec on the OmniSwitch
The above command applies the configured IPsec security policy with rule 1 to ESP. The index value
specified determines the order in which a rule must get applied to the payload. The policy name
configured for the IPsec policy rule must be the same as the policy name configured for the IPsec security
policy. It is possible to first encrypt the original content of an IPv6 packet using ESP and then
authenticate the packet using AH by configuring an ESP rule with an index of one and then configuring
the AH rule with an index of two. For example:
-> ipsec policy tcp_in rule 1 esp
Use the no form of this command to remove the configured IPsec rule for an IPsec security policy. For
example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-15
Configuring IPsec on the OmniSwitch Configuring IPsec
Configuring an IPsec SA
IPsec Security Association (SA) is a set of security information that describes a particular kind of secure
connection between two devices. An SA specifies the actual IPsec algorithms applied to the IP traffic (for
example encryption using 3DES, HMAC-SHA1 for authentication).
To configure an IPsec Security Association, use the ipsec sa command along with the type of security
association, IPv6 source address, IPv6 destination address, encryption and authentication algorithms used
for SA. For example:
Local System
-> ipsec sa tcp_in_ah ah source 3ffe:1:1:1::99 destination 3ffe:1:1:1::1 spi
9901 authentication hmac-sha1 description "HMAC SHA1 on traffic from 99 to 1"
Remote System
-> ipsec sa tcp_out_ah ah source 3ffe:1:1:1::99 destination 3ffe:1:1:1::1 spi
9901 authentication hmac-sha1 description "HMAC SHA1 on traffic from 99 to 1"
The above commands configure bi-directional IPsec SAs of AH type for data traffic to and from source
IPv6 addresses 3ffe:1:1:1::99 and 3ffe:1:1:1::1 with security parameter indexes (SPI) of 9901 and 9902.
The combination of SPI, source, and destination addresses uniquely identify an SA. The above commands
also configure hmac-shal as the type of authentication algorithm which is to be used for the IPv6 traffic
covered by the configured SA.
Note. The IPsec endpoints must have identical SAs (SPI, source address, destination addresses)
configured.
Use the no shutdown and shutdown parameters to enable or disable the SA.
-> ipsec sa tcp_in_ah no shutdown
Configuring ESP or AH
The IPsec SA can be configured as ESP or AH. In the above example, the IPsec SA is configured as AH.
You can also configure the SA as ESP, as shown below:
-> ipsec sa tcp_in_ah esp source 3ffe:1:1:1::99 destination 3ffe:1:1:1::1 spi
9901 encryption 3DES-CBC description "3DES on traffic from 99 to 1"
You can use the encryption parameter to specify the encryption algorithm to be used for the traffic
covered by the SA. This parameter can only be used when the SA type is ESP.
page 24-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Configuring IPsec on the OmniSwitch
The above command configures an IPsec SA of ESP using aes-cbs and a key length of 192 bits. You can
allow an IPsec SA to operate as an ESP confidentiality-only SA by using the none option with the authen-
tication parameter or by simply omitting the authentication parameter from the command.
Refer to “Configuring IPsec SA Keys” on page 24-17 or the ipsec sa command for supported encryption
types and key lengths.
Verifying IPsec SA
To display the configured IPsec SA, use the show ipsec sa command. For example:
To display the configuration of a specific IPsec SA, use the show ipsec sa command followed by the
name of the configured IPsec SA. For example:
Name = tcp_in_ah
Type = AH
Source = 3ffe:1:1:1::99,
Destination = 3ffe:1:1:1::1,
SPI = 9901
Encryption = none
Authentication = hmac-sha1
State = active
Description:
"HMAC SHA1 on traffic from 99 to 1
The above command configures an IPsec SA key named tcp_in_ah. This IPsec SA key will be used for the
AH authentication protocol and has a value of 0x11223344556677889900112233445566.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-17
Configuring IPsec on the OmniSwitch Configuring IPsec
The length of the key value must match the value that is required by the encryption or authentication algo-
rithm that will use the key. The table shown below displays the key lengths for the supported algorithms:
Use the following information to determine how to create the proper key size:
• Number of Characters = Key Size (in bits) / 8; Ex. A 160-bit key would require 20 characters for the
key.
• Number of Hexidecimal = Key Size (in bits) / 4; Ex. A 160-bit key would require 40 hexidecimal
digits.
Note. The name parameter must be the same as the name of the manually configured IPsec SA. Also, the
combination of the key name and type must be unique.
Use the no form of this command to delete the configured IPsec SA key. For example:
-> no ipsec key tcp_in_ah
The above command shows the number of manually configured SAs along with their encryption key
lengths in bits respectively. To display the IPsec SA keys used for AH, use the show ipsec key command,
as shown below:
-> show ipsec key sa-authentication
Authentication Keys
Name Length (bits)
--------------------+----------------
tcp_in_ah 160
sa_1 128
sa_5 160
page 24-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Configuring IPsec on the OmniSwitch
The above command shows the number of manually configured SAs along with their authentication key
lengths in bits respectively.
Note. Due to security reasons, key values will not be displayed; only key names and key lengths will be
displayed.
Once IPsec is configured for IPv6 on the switch, you can monitor the incoming and outgoing packets for
the configured parameters by using the show ipsec ipv6 statistics command.
Inbound:
Successful = 2787
Policy violation = 0
No SA found = 0
Unknown SPI = 0
AH replay check failed = 0
ESP replay check failed = 0
AH authentication success = 93
AH authentication failure = 0
ESP authentication success = 25
ESP authentication failure = 0
Packet not valid = 0
No memory available = 0
Outbound:
Successful = 5135
Policy violation = 0
No SA found = 19
Packet not valid = 0
No memory available = 0
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-19
Configuring IPsec on the OmniSwitch Configuring IPsec
Additional Examples
Configuring ESP
The example below shows the commands for configuring ESP between two OmniSwitches for all TCP
traffic.
Switch A Switch B
ESP
Switch A
-> ipsec security-key master-key-12345
-> ipsec policy tcp_out source 3ffe::100 destination 3ffe::200 protocol tcp out
ipsec description “IPsec on TCP to 200”
-> ipsec policy tcp_in source 3ffe::200 destination 3ffe::100 protocol tcp in
ipsec description “IPsec on TCP from 200”
-> ipsec sa tcp_out_esp esp source 3ffe::100 destination 3ffe::200 spi 1000
encryption des-cbc authentication hmac-sha1 description “ESP to 200” no shutdown
-> ipsec sa tcp_in_esp esp source 3ffe::200 destination 3ffe::100 spi 1001
encryption des-cbc authentication hmac-sha1 description “ESP from 200” no shut-
down
page 24-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Configuring IPsec on the OmniSwitch
Switch B
-> ipsec security-key master-key-12345
-> ipsec policy tcp_out source 3ffe::200 destination 3ffe::100 protocol tcp out
ipsec description “IPsec on TCP to 100”
-> ipsec policy tcp_in source 3ffe::100 destination 3ffe::200 protocol tcp in
ipsec description “IPsec on TCP from 100”
-> ipsec sa tcp_out_esp esp source 3ffe::200 destination 3ffe::100 spi 1001
encryption des-cbc authentication hmac-sha1 description “ESP to 100” no shutdown
-> ipsec sa tcp_in_esp esp source 3ffe::100 destination 3ffe::200 spi 1000
encryption des-cbc authentication hmac-sha1 description “ESP from 100” no
shutdown
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-21
Configuring IPsec on the OmniSwitch Configuring IPsec
Switch A Switch B
Switch A
-> ipsec policy DISCARD_UDPout source fe80::100 destination ff02::9 protocol udp
out discard
-> ipsec policy DISCARD_UDPin source fe80::200 destination ff02::9 protocol udp
in discard
Switch B
-> ipsec policy DISCARD_UDPout source fe80::200 destination ff02::9 protocol udp
out discard
-> ipsec policy DISCARD_UDPin source fe80::100 destination ff02::9 protocol udp
in discard
page 24-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IPsec Verifying IPsec Configuration
For more information about the resulting displays form these commands, see the “IPsec Commands”
chapter in the OmniSwitch AOS Release 6 CLI Reference Guide.
Examples of the above commands and their outputs are given in the section “Configuring IPsec on the
OmniSwitch” on page 24-11
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 24-23
Verifying IPsec Configuration Configuring IPsec
page 24-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
25 Configuring RIP
Routing Information Protocol (RIP) is a widely used Interior Gateway Protocol (IGP) that uses hop count
as its routing metric. RIP-enabled routers update neighboring routers by transmitting a copy of their own
routing table. The RIP routing table uses the most efficient route to a destination, that is, the route with the
fewest hops and longest matching prefix.
The switch supports RIP version 1 (RIPv1), RIP version 2 (RIPv2), and RIPv2 that is compatible with
RIPv1. It also supports text key and MD5 authentication, on an interface basis, for RIPv2.
In This Chapter
This chapter describes RIP and how to configure it through the Command Line Interface (CLI). It includes
instructions for configuring basic RIP routing and fine-tuning RIP by using optional RIP configuration
parameters (for example, RIP send/receive option and RIP interface metric). It also details RIP
redistribution, which allows a RIP network to exchange routing information with networks running
different protocols (for example, OSPF and BGP). CLI commands are used in the configuration
examples; for more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Refer-
ence Guide.
This chapter provides an overview of RIP and includes information about the following procedures:
• RIP Routing
– Loading RIP (see page 25-6)
– Enabling RIP (see page 25-7)
– Creating a RIP Interface (see page 25-7)
– Enabling a RIP Interface (see page 25-7)
• RIP Options
– Configuring the RIP Forced Hold-Down Interval (see page 25-10)
– Configuring the RIP Update Interval (see page 25-10)
– Configuring the RIP Invalid Timer (see page 25-10)
– Configuring the RIP Garbage Timer (see page 25-11)
– Configuring the RIP Hold-Down Timer (see page 25-11)
– Enabling a RIP Host Route (see page 25-11)
• RIP Redistribution
– Configuring Route Redistribution (see page page 25-12)
• RIP Security
– Configuring Authentication Type (see page 25-18)
– Configuring Passwords (see page 25-18)
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-1
RIP Specifications Configuring RIP
RIP Specifications
RFCs Supported RFC 1058–RIP v1
RFC 2453–RIP v2
RFC 1722–RIP v2 Protocol Applicability Statement
RFC 1724–RIP v2 MIB Extension
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Maximum Number of RIP Peers 10 (OmniSwitch 6400)
Maximum Number of RIP Interfaces 10 (OmniSwitch 6400)
RIP Defaults
The following table lists the defaults for RIP configuration through the ip rip command.
page 25-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP Quick Steps for Configuring RIP Routing
1 Create VLAN 1 with a description (for example, VLAN 1) by using the vlan command. For example:
2 Create VLAN 2 with a description (for example, VLAN 2) by using the vlan command. For example:
3 Assign an active port to VLAN 1 by using the vlan port default command. For example, the follow-
ing command assigns port 1 on slot 1 to VLAN 1:
-> vlan 1 port default 1/1
4 Assign an active port to VLAN 2 by using the vlan port default command. For example, the follow-
ing command assigns port 2 on slot 1 to VLAN 2:
-> vlan 2 port default 1/2
5 Configure an IP interface to enable IP routing on a VLAN by using the ip interface command. For
example:
-> ip interface vlan-1 address 171.10.1.1 vlan 1
6 Configure an IP interface to enable IP routing on a VLAN by using the ip interface command. For
example:
-> ip interface vlan-2 address 171.11.1.1 vlan 2
7 Load RIP into the switch memory by using the ip load rip command. For example:
8 Enable RIP on the switch by using the ip rip status command. For example:
9 Create a RIP interface on VLAN 1 by using the ip rip interface command. For example:
10 Enable the RIP interface by using the ip rip interface status command. For example:
11 Create an RIP interface on VLAN 2 by using the ip rip interface command. For example:
Note. For more information on VLANs and router ports, see Chapter 4, “Configuring VLANs.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-3
RIP Overview Configuring RIP
RIP Overview
In switching, traffic may be transmitted from one media type to another within the same VLAN. Switch-
ing happens at Layer 2, the link layer; routing happens at Layer 3, the network layer. In IP routing, traffic
can be transmitted across VLANs. When IP routing is enabled, the switch uses routing protocols to build
routing tables that keep track of stations in the network and decide the best path for forwarding data. When
the switch receives a packet to be routed, it strips off the MAC header and examines the IP header. It looks
up the source/destination address in the routing table, and then adds the appropriate MAC address to the
packet. Calculating routing tables and stripping/adding MAC headers to packets is performed by switch
software.
IP is associated with several Layer 3 routing protocols. RIP is built into the base code loaded onto the
switch. Others are part of Alcatel-Lucent’s optional Advanced Routing Software. IP supports the follow-
ing IP routing protocols:
• RIP—An IGP that defines how routers exchange information. RIP makes routing decisions by using a
“least-cost path” method. RIPv1 and RIPv2 services allow the switch to learn routing information from
neighboring RIP routers. For more information and instructions for configuring RIP, see “RIP Rout-
ing” on page 25-6.
• Open Shortest Path First (OSPF)—An IGP that provides a routing function similar to RIP but uses
different techniques to determine the best route for a datagram. OSPF is part of Alcatel-Lucent’s
optional Advanced Routing Software. For more information see the “Configuring OSPF” chapter in the
OmniSwitch AOS Release 6 Advanced Routing Configuration Guide.
When RIP is initially enabled on a switch, it issues a request for routing information, and listens for
responses to the request. If a switch configured to supply RIP hears the request, it responds with a
response packet based on information in its routing database. The response packet contains destination
network addresses and the routing metric for each destination. When a RIP response packet is received,
RIP takes the information and rebuilds the switch’s routing database, adding new routes and “better”
(lower metric) routes to destinations already listed in the database.
RIP uses a hop count metric to measure the distance to a destination. In the RIP metric, a switch adver-
tises directly connected networks at a metric of 1. Networks that are reachable through one other gateway
are 2 hops, networks that are reachable through two gateways are 3 hops, and so on. Thus, the number of
hops (or hop count) along a path from a given source to a given destination refers to the number of
networks that are traversed by a datagram along that path. When a switch receives a routing update that
contains a new or changed destination network entry, the switch adds one to the metric value indicated in
the update and enters the network in the routing table. After updating its routing table, the switch immedi-
ately begins transmitting routing updates to inform other network switches of the change. These updates
are sent independently of the regularly scheduled updates. By default, RIP packets are broadcast every 30
seconds, even if no change has occurred anywhere in a route or service.
RIP deletes routes from the database if the next switch to that destination says the route contains more than
15 hops. In addition, all routes through a gateway are deleted by RIP if no updates are received from that
gateway for a specified time period. If a gateway is not heard from for 120 seconds, all routes from that
gateway are placed in a hold-down state. If the hold-down timer value is exceeded, the routes are deleted
from the routing database. These intervals also apply to deletion of specific routes.
page 25-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP RIP Overview
RIP Version 2
RIP version 2 (RIPv2) adds additional capabilities to RIP. Not all RIPv2 enhancements are compatible
with RIPv1. To avoid supplying information to RIPv1 routes that could be misinterpreted, RIPv2 can only
use non-compatible features when its packets are multicast. Multicast is not supported by RIPv1. On inter-
faces that are not compatible with IP multicast, the RIPv1-compatible packets used do not contain poten-
tially confusing information. RIPv2 enhancements are listed below.
• Next Hop—RIPv2 can advertise a next hop other than the switch supplying the routing update. This
capability is useful when advertising a static route to a silent switch not using RIP, since packets pass-
ing through the silent switch do not have to cross the network twice.
• Network Mask—RIPv1 assumes that all subnetworks of a given network have the same network mask.
It uses this assumption to calculate the network masks for all routes received. This assumption prevents
subnets with different netmasks from being included in RIP packets. RIPv2 adds the ability to specify
the network mask with each network in a packet. Because RIPv1 switches ignore the network mask in
RIPv2 packets, their calculation of the network mask could possibly be wrong. For this reason, RIPv1-
compatible RIPv2 packets cannot contain networks that would be misinterpreted by RIPv1. These
networks must only be provided in native RIPv2 packets that are multicast.
• Authentication—RIPv2 packets can contain an authentication key that may be used to verify the valid-
ity of the supplied routing data. Authentication may be used in RIPv1-compatible RIPv2 packets, but
RIPv1 switches will ignore authentication information. Authentication is a simple password in which
an authentication key of up to 16 characters is included in the packet. If this key does not match the
configured authentication key, the packet is discarded. For more information on RIP authentication, see
“RIP Security” on page 25-18.
• IP Multicast—IP Multicast Switching (IPMS) is a one-to-many communication technique employed by
emerging applications such as video distribution, news feeds, netcasting, and resource discovery.
Unlike unicast, which sends one packet per destination, multicast sends one packet to all devices in any
subnetwork that has at least one device requesting the multicast traffic. For more information on IPMS,
see Chapter 34, “Configuring IP Multicast Switching.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-5
RIP Routing Configuring RIP
RIP Routing
IP routing requires IP router interfaces to be configured on VLANs and a routing protocol to be enabled
and configured on the switch. RIP also requires a RIP interface to be created and enabled on the routing
interface. In the illustration below, a router interface and RIP interface have been configured on each
VLAN. Therefore, workstations connected to ports on VLAN 1 on Switch 1 can communicate with VLAN
2; workstations connected to ports on VLAN 3 on Switch 2 can communicate with VLAN 2. Also, ports
from both switches have been assigned to VLAN 2, and a physical connection has been made between the
switches. Therefore, workstations connected to VLAN 1 on Switch 1 can communicate with workstations
connected to VLAN 3 on Switch 2.
Switch 1 Switch 2
Router interface/
= RIP Interface
Physical
VLAN 1 VLAN 2 Connection VLAN 3
VLAN 2
110.0.0.0 120.0.0.0 130.0.0.0
120.0.0.0
RIP Routing
Loading RIP
When the switch is initially configured, RIP must be loaded into the switch memory. Use the ip load rip
command to load RIP.
To remove RIP from the switch memory, you must manually edit the boot.cfg file. The boot.cfg file is an
ASCII text-based file that controls many of the switch parameters. Open the file and delete all references
to RIP. You must reboot the switch when this is complete.
Note. In simple networks where only IP forwarding is required, you may not want to use RIP. If you are
not using RIP, it is best not to load it to save switch resources.
page 25-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP RIP Routing
Enabling RIP
RIP is disabled by default. Use the ip rip status command to enable RIP routing on the switch. For exam-
ple:
-> ip rip status enable
Use the ip rip status disable command to disable RIP routing on the switch. Use the show ip rip
command to display the current RIP status.
Use the no ip rip interface command to delete a RIP interface. Use the show ip rip interface command
to display configuration and error information for a RIP interface.
Note. You can create a RIP interface even if an IP router interface has not been configured. However, RIP
will not function unless a RIP interface is created and enabled on an IP router interface. See Chapter 4,
“Configuring VLANs,” and Chapter 21, “Configuring IP,” for more information.
To disable an RIP interface, use the disable keyword with the ip rip interface status command. For
example to disable RIP routing on a RIP interface rip-1 you would enter:
-> ip rip interface rip-1 status disable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-7
RIP Routing Configuring RIP
• v1compatible. Only RIPv2 broadcast packets (not multicast) will be sent by the switch.
• both. Both RIPv1 and RIPv2 packets will be received by the switch.
page 25-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP RIP Routing
Note. When you configure a metric for a RIP interface, this metric cost is added to the metric of the
incoming route.
Use the ip rip interface metric command to configure the RIP metric or cost for routes generated by a
RIP interface. Enter the IP address of the RIP interface as well as a metric value. For example, to set a
metric value of 2 for the RIP interface rip-1 you would enter:
-> ip rip interface rip-1 metric 2
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-9
RIP Options Configuring RIP
RIP Options
The following sections detail procedures for configuring RIP options. RIP must be loaded and enabled on
the switch before you can configure any of the RIP configuration options.
page 25-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP RIP Options
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-11
Configuring Redistribution Configuring RIP
Configuring Redistribution
It is possible to configure the RIP protocol to advertise routes learned from other routing protocols into the
RIP network. Such a process is referred to as route redistribution and is configured using the ip redist
command.
Redistribution uses route maps to control how external routes are learned and distributed. A route map
consists of one or more user-defined statements that can determine which routes are allowed or denied
access to the RIP network. In addition a route map may also contain statements that modify route parame-
ters before they are redistributed.
When a route map is created, it is given a name to identify the group of statements that it represents. This
name is required by the ip redist command. Therefore, configuring route redistribution involves the
following steps:
1 Create a route map, as described in “Using Route Maps” on page 25-12.
2 Configure redistribution to apply a route map, as described in “Configuring Route Map Redistribu-
tion” on page 25-16.
Refer to the “IP Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for more
information about the ip route-map command parameters and usage guidelines.
Once a route map is created, it is then applied using the ip redist command. See “Configuring Route Map
Redistribution” on page 25-16 for more information.
page 25-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP Configuring Redistribution
The above command creates the ospf-to-rip route map, assigns a sequence number of 10 to the route
map, and specifies a permit action.
To optionally filter routes before redistribution, use the ip route-map command with a match parameter
to configure match criteria for incoming routes. For example,
-> ip route-map ospf-to-rip sequence-number 10 match tag 8
The above command configures a match statement for the ospf-to-rip route map to filter routes based on
their tag value. When this route map is applied, only OSPF routes with a tag value of eight are
redistributed into the RIP network. All other routes with a different tag value are dropped.
Note. Configuring match statements is not required. However, if a route map does not contain any match
statements and the route map is applied using the ip redist command, the router redistributes all routes
into the network of the receiving protocol.
To modify route information before it is redistributed, use the ip route-map command with a set
parameter. For example,
-> ip route-map ospf-to-rip sequence-number 10 set tag 5
The above command configures a set statement for the ospf-to-rip route map that changes the route tag
value to five. Because this statement is part of the ospf-to-rip route map, it is only applied to routes that
have an existing tag value equal to eight.
The following is a summary of the commands used in the above examples:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-13
Configuring Redistribution Configuring RIP
To delete a specific sequence number within a route map, enter no ip route-map followed by the route
map name, then sequence-number followed by the actual number. For example, the following command
deletes sequence 10 from the redistipv4 route map:
-> no ip route-map redistipv4 sequence-number 10
Note that in the above example, the redistripv4 route map is not deleted. Only those statements associated
with sequence 10 are removed from the route map.
To delete a specific statement within a route map, enter no ip route-map followed by the route map name,
then sequence-number followed by the sequence number for the statement, then either match or set and
the match or set parameter and value. For example, the following command deletes only the match tag 8
statement from route map redistipv4 sequence 10:
-> no ip route-map redistipv4 sequence-number 10 match tag 8
To configure a new sequence of statements for an existing route map, specify the same route map name
but use a different sequence number. For example, the following command creates a new sequence 20 for
the rm_1 route map:
-> ip route-map rm_1 sequence-number 20 action permit
-> ip route-map rm_1 sequence-number 20 match ipv4-interface to-finance
-> ip route-map rm_1 sequence-number 20 set metric 5
page 25-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP Configuring Redistribution
Sequence 10 and sequence 20 are both linked to route map rm_1 and are processed in ascending order
according to their sequence number value. Note that there is an implied logical OR between sequences. As
a result, if there is no match for the tag value in sequence 10, then the match interface statement in
sequence 20 is processed. However, if a route matches the tag 8 value, then sequence 20 is not used. The
set statement for whichever sequence was matched is applied.
A route map sequence may contain multiple match statements. If these statements are of the same kind
(for example, match tag 5, match tag 8, and so on.) then a logical OR is implied between each like
statement. If the match statements specify different types of matches (for example match tag 5, match ip4
interface to-finance, and so on.), then a logical AND is implied between each statement. For example, the
following route map sequence will redistribute a route if its tag is either 8 or 5:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
The following route map sequence will redistribute a route if the route has a tag of 8 or 5 and the route
was learned on the IPv4 interface to-finance:
-> ip route-map rm_1 sequence-number 10 action permit
-> ip route-map rm_1 sequence-number 10 match tag 5
-> ip route-map rm_1 sequence-number 10 match tag 8
-> ip route-map rm_1 sequence-number 10 match ipv4-interface to-finance
To add addresses to an access list, use the ip access-list address (IPv4) or the ipv6 access-list address
(IPv6) command. For example, the following commands add addresses to an existing access list:
-> ip access-list ipaddr address 16.24.2.1/16
-> ipv6 access-list ip6addr address 2001::1/64
Use the same access list name each time the above commands are used to add additional addresses to the
same access list. In addition, both commands provide the ability to configure if an address and/or its
matching subnet routes are permitted (the default) or denied redistribution. For example:
-> ip access-list ipaddr address 16.24.2.1/16 action deny redist-control
all-subnets
-> ipv6 access-list ip6addr address 2001::1/64 action permit redist-control
no-subnets
For more information about configuring access list commands, see the “IP Commands” chapter in the
OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-15
Configuring Redistribution Configuring RIP
RIP routes received by the router interface are processed based on the contents of the ospf-to-rip route
map. Routes that match criteria specified in this route map are either allowed or denied redistribution into
the RIP network. The route map may also specify the modification of route information before the route is
redistributed. See “Using Route Maps” on page 25-12 for more information.
To remove a route map redistribution configuration, use the no form of the ip redist command. For
example:
-> no ipv6 redist ospf into rip route-map ospf-to-rip
Source Destination
Protocol Protocol Status Route Map
------------+------------+---------+--------------------
LOCAL4 RIP Enabled rip_1
LOCAL4 OSPF Enabled ospf_2
LOCAL4 BGP Enabled bgp_3
RIP OSPF Enabled ospf-to-rip
page 25-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP Configuring Redistribution
The resulting ospf-to-rip route map redistribution configuration does the following:
• Denies the redistribution of Type 2 external OSPF routes with a tag set to five.
• Redistributes into RIP all routes learned on the intf_ospf interface and sets the metric for such routes to
255.
• Redistributes into RIP all other routes (those not processed by sequence 10 or 20) and sets the tag for
such routes to eight.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-17
RIP Security Configuring RIP
RIP Security
By default, there is no authentication used for a RIP. However, you can configure a password for a RIP
interface. To configure a password, you must first select the authentication type (simple or MD5), and then
configure a password.
For example, to configure the RIP interface rip-1 for simple authentication you would enter:
-> ip rip interface rip-1 auth-type simple
To configure the RIP interface rip-1 for MD5 authentication you would enter:
-> ip rip interface rip-1 md5 auth-type md5
Configuring Passwords
If you configure simple or MD5 authentication you must configure a text string that will be used as the
password for the RIP interface. If a password is used, all switches that are intended to communicate with
each other must share the same password.
After configuring the interface for simple authentication as described above, configure the password for
the interface by using the ip rip interface auth-key command. Enter the IP address of the RIP interface,
and then enter a 16-byte text string. For example to configure a password “nms” you would enter:
-> ip rip interface rip-1 auth-key nms
page 25-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RIP Verifying the RIP Configuration
show ip rip Displays the RIP status and general configuration parameters (for
example, forced hold-down timer).
show ip rip routes Displays the RIP routing database. The routing database contains all
the routes learned through RIP.
show ip rip interface Displays the RIP interface status and configuration.
show ip rip peer Displays active RIP neighbors (peers).
show ip redist Displays the currently configured RIP redistribution filters.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 25-19
Verifying the RIP Configuration Configuring RIP
page 25-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
26 Configuring RDP
Router Discovery Protocol (RDP) is an extension of ICMP that allows end hosts to discover routers on
their networks. This implementation of RDP supports the router requirements as defined in RFC 1256.
In This Chapter
This chapter describes the RDP feature and how to configure RDP parameters through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
The following procedures are described:
• “Enabling/Disabling RDP” on page 26-8.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 26-1
RDP Specifications Configuring RDP
RDP Specifications
RFCs Supported RFC 1256–ICMP Router Discovery Messages
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Router advertisements Supported
Host solicitations Only responses to solicitations supported.
Maximum number of RDP interfaces per One for each available IP interface configured
switch on the switch.
Advertisement destination addresses 224.0.0.1 (all systems multicast)
255.255.255.255 (broadcast)
RDP Defaults
Parameter Description CLI Command Default Value/Comments
RDP status for the switch ip router-discovery Disabled
RDP status for switch interfaces ip router-discovery Disabled
(router VLAN IP addresses) interface
Advertisement destination address ip router-discovery All systems multicast (224.0.0.1)
for an active RDP interface. interface advertise-
ment-address
Maximum time between advertise- ip router-discovery 600 seconds
ments sent from an active RDP inter- interface max-adver-
face tisement-interval
Minimum time between advertise- ip router-discovery 450 seconds
ments sent from an active RDP inter- interface min-adver- (0.75 * maximum advertisement interval)
face tisement-interval
Maximum time IP addresses con- ip router-discovery 1800 seconds
tained in an advertisement packet are interface advertise- (3 * maximum advertisement interval)
considered valid ment-lifetime
Preference level for IP addresses ip router-discovery 0
contained in an advertisement packet interface preference-
level
page 26-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RDP Quick Steps for Configuring RDP
Note. Optional. To verify the global RDP configuration for the switch, enter the show ip router-discov-
ery command. The display is similar to the one shown below:
For more information about this command, refer to the “RDP Commands” chapter in the OmniSwitch AOS
Release 6 CLI Reference Guide.
2 Use the following command to create an RDP interface for an IP router interface. In this example, an
RDP interface is created for the IP router interface named Marketing (note that the IP interface is
referenced by its name).
-> ip router-discovery interface Marketing enable
3 When an RDP interface is created, default values are set for the interface advertisement destination
address, transmission interval, lifetime, and preference level parameters. If you want to change the
default values for these parameters, see “Creating an RDP Interface” on page 26-8.
Note. Optional. To verify the RDP configuration for all RDP interfaces, enter the show ip router-
discovery interface command. The display is similar to the one shown below:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 26-3
Quick Steps for Configuring RDP Configuring RDP
To verify the configuration for a specific RDP interface, specify the interface name when using the show
ip router-discovery interface command. The display is similar to the one shown below:
For more information about this command, refer to the “RDP Commands” chapter in the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 26-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RDP RDP Overview
RDP Overview
End host (clients) sending traffic to other networks need to forward their traffic to a router. In order to do
this, hosts need to find out if one or more routers exist on their LAN, then learn their IP addresses. One
way to discover neighboring routers is to manually configure a list of router IP addresses that the host
reads at startup. Another method available involves listening to routing protocol traffic to gather a list of
router IP addresses.
RDP provides an alternative method for hosts to discover routers on their network that involves the use of
ICMP advertisement and solicitation messages. Using RDP, hosts attached to multicast or broadcast
networks send solicitation messages when they start up. Routers respond to solicitation messages with an
advertisement message that contains the router IP addresses. In addition, routers first send advertisement
messages when their RDP interface becomes active, and then subsequently at random intervals.
When a host receives a router advertisement message, it adds the IP addresses contained in the message to
its list of default router gateways in the order of preference. As a result, the list of router IP addresses is
dynamically created and maintained, eliminating the need for manual configuration of such a list. In addi-
tion, hosts do not have to recognize many different routing protocols to discover router IP addresses.
The following diagram illustrates an example of using RDP in a typical network configuration:
RS-1
2/3
H-1
1/1
2/4
H-2
RS-2
1/2
Network 17.0.0.0
When interfaces 2/3 and 2/4 on hosts H-1 and H-2, respectively, become active, they transmit router
solicitation ICMP messages on Network 17.0.0.0. The RDP enabled routers RS-1 and RS-2 pick up these
packets on their RDP interfaces 1/1 and 1/2 and respond with router advertisement ICMP messages. RS-1
and RS-2 also periodically send out router advertisements on their RDP interfaces.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 26-5
RDP Overview Configuring RDP
RDP Interfaces
An RDP interface is created by enabling RDP on a VLAN router IP address. Once enabled, the RDP
interface becomes active and joins the all-routers IP multicast group (224.0.0.2). The interface then
transmits three initial router advertisement messages at random intervals that are no greater than 16
seconds apart. This process occurs upon activation to increase the likelihood that end hosts quickly
discover this router.
After an RDP interface becomes active and transmits its initial advertisements, subsequent advertisements
are transmitted at random intervals that fall between a configurable range of time. This range of time is
defined by specifying a maximum and minimum advertisement interval value. See “Defining the Adver-
tisement Interval” on page 26-9 for more information. Because advertisements are transmitted at random
intervals, the risk of system overload is reduced as advertisements from other routers on the same link are
not likely to transmit at the same time.
It is important to note that advertisements are only transmitted on RDP interfaces if the following
conditions are met:
• The RDP global status is enabled on the switch.
• Whether VRRP is disabled or enabled, there is one or more Master IP addresses for the VLAN. If
VRRP is enabled and if there are no Masters IP addresses, router advertisements are not sent on the
VLAN. (See Chapter 21, “Configuring IP,” for more information).
The router advertisement is a multicast packet sent to the all-systems IP multicast group (224.0.0.1) or the
broadcast address. If VRRP is enabled, the message should be filled with IP addresses obtained from
VRRP Master IP address list; otherwise the IP address of the IP router interface is used.
Note that RDP is not recommended for detecting neighboring router failures, referred to as black holes, in
the network. However, it is possible to use RDP as a supplement for black hole detection by setting RDP
interface advertisement interval and lifetime values to values lower than the default values for these
parameters. See “Defining the Advertisement Interval” on page 26-9 and “Setting the Advertisement Life-
time” on page 26-10 for more information.
page 26-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RDP RDP Overview
Security Concerns
ICMP RDP packets are not authenticated, which makes them vulnerable to the following attacks:
• Passive monitoring—Attackers can use RDP to re-route traffic from vulnerable systems through the
attacker system. This allows the attacker to monitor or record one side of the conversation. However,
the attacker must reside on the same network as the victim for this scenario to work.
• Man in the middle—Attacker modifies any of the outgoing traffic or plays man in the middle, acting
as a proxy between the router and the end host. In this case, the victim thinks that it is communicating
with an end host, not an attacker system. The end host thinks that is it communicating with a router
because the attacker system is passing information through to the host from the router. If the victim is a
secure Web server that uses SSL, the attacker sitting in between the server and an end host could
intercept unencrypted traffic. As is the case with passive monitoring, the attacker must reside on the
same network as the victim for this scenario to work.
• Denial of service (DoS)—Remote attackers can spoof these ICMP packets and remotely add bad
default-route entries into a victim routing table. This would cause the victim to forward frames to the
wrong address, thus making it impossible for the victim traffic to reach other networks. Because of the
large number of vulnerable systems and the fact that this attack penetrates firewalls that do not stop
incoming ICMP packets, this DoS attack can become quite severe. (See Chapter 21, “Configuring IP,”
and Chapter 36, “Configuring QoS,” for more information about DoS attacks.)
Note. Security concerns associated with using RDP are generic to the feature as defined in RFC 1256 and
not specific to this implementation.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 26-7
Enabling/Disabling RDP Configuring RDP
Enabling/Disabling RDP
RDP is included in the base software and is available when the switch starts up. However, by default this
feature is not operational until it is enabled on the switch.
To enable RDP operation on the switch, use the following command:
-> ip router-discovery enable
Once enabled, any existing RDP interfaces on the switch that are also enabled will activate and start to
send initial advertisements. See “RDP Interfaces” on page 26-6 for more information.
To disable RDP operation on the switch, use the following command:
-> ip router-discovery disable
Use the show ip router-discovery command to determine the current operational status of RDP on the
switch.
The IP router interface name is the name assigned to the interface when it was first created. For more
information about creating IP router interfaces, see Chapter 21, “Configuring IP.”
The first time an RDP interface is enabled, it is not necessary to enter enable as part of the command.
However, if the interface is subsequently disabled, then entering enable is required the next time this
command is used. For example, the following sequence of commands initially enables an RDP interface
for the Marketing IP router interface, then disables and again enables the same interface:
-> ip router-discovery interface Marketing
-> ip router-discovery interface Marketing disable
-> ip router-discovery interface Marketing enable
When the above RDP interface becomes active, advertisement packets are transmitted on all active ports
that belong to the VLAN associated with the Marketing interface. These packets contain the IP address
associated with the Marketing interface for the purposes of advertising this interface on the network.
When an RDP interface is created, it is automatically configured with the following default parameter
values:
page 26-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RDP Creating an RDP Interface
It is only necessary to change the above parameter values if the default value is not sufficient. The
following subsections provide information about how to configure RDP interface parameters if it is
necessary to use a different value.
Enter all-systems-multicast when using this command to change the destination address to 224.0.0.1. For
example:
-> ip router-discovery interface Marketing advertisement-address
all-systems-multicast
Make sure that the value specified with this command is greater than the current minimum advertisement
interval value. By default, this value is set to 600 seconds.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 26-9
Creating an RDP Interface Configuring RDP
Make sure that the value specified with this command is less than the current maximum advertisement
interval value. By default, this value is set to 0.75 * the default maximum interval value (450 seconds if
the maximum interval is set to its default value of 600 seconds).
By default, the lifetime value is set to 3 * the current maximum interval value (1800 seconds if the maxi-
mum interval is set to its default value of 600 seconds).
Note that router IP address preference levels are only compared with the preference levels of other routers
that exist on the same subnet. Set low preference levels to discourage selection of a specific router.
page 26-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring RDP Verifying the RDP Configuration
show ip router-discovery Displays the current operational status of RDP on the switch. Also
includes the number of advertisement packets transmitted and the num-
ber of solicitation packets received by all RDP interfaces on the switch.
show ip router- Displays the current RDP status, related parameter values, and RDP
discovery interface traffic statistics for one or more switch router RDP interfaces.
For more information about the resulting displays from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide. An example of the output for the show ip router-discovery and show ip
router-discovery interface commands is also given in “Quick Steps for Configuring RDP” on page 26-3.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 26-11
Verifying the RDP Configuration Configuring RDP
page 26-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
27 Configuring BFD
In This Chapter
This chapter describes the basic components of BFD and how to configure them through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Global Configuration (see page 27-16).
• Configuring BFD support for multicast routing protocol PIM -SM/DM (see page 27-10)
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-1
BFD Specifications Configuring BFD
BFD Specifications
IETF Internet-Drafts Supported draft-ietf-bfd-base-08.txt — Bidirectional
Forwarding Detection
draft-ietf-bfd-v4v6-1hop-08.txt — BFD for IPv4
and IPv6 (Single Hop)
Platforms Supported OmniSwitch 6850E, 6855, 9000E
Maximum Number of Sessions (Per NI) 64 on OS 9000E and 16 on OS 6855, OS 6850E
Maximum Number of Sessions (Per System) 512 on OS 9000E and 64 on OS 6855, OS 6850E
Protocols Supported BGP, OSPF, VRRP Remote Address Tracking only,
and Static Routes.
IPv6 protocols not supported.
Modes Supported Asynchronous with Echo disabled, Asynchronous
with Echo enabled, and Echo-Only.
Demand mode not supported.
Valid Range for BFD Transmit, Receive, 100 - 999 milliseconds
Echo, and l2-hold-down time intervals
Valid Range for Dead Interval Multiplier 1 - 10
page 27-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD BFD Defaults
BFD Defaults
The following table shows the default settings of the configurable BFD parameters.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-3
Quick Steps for Configuring BFD Configuring BFD
1 Configure a BFD interface using the ip bfd-std interface command with the name of an existing IP
interface. For example:
-> ip bfd-std interface bfd-vlan-101
2 Configure a global transmit time interval for all BFD interfaces using the ip bfd-std transmit
command. This command defines a default transmit value that is automatically applied when a BFD
interface is created. For example:
-> ip bfd-std transmit 500
3 Configure the transmit time interval for a specific BFD interface using the ip bfd-std interface trans-
mit command. The value set with this command overrides the global transmit value configured for the
switch. For example:
-> ip bfd-std interface bfd-vlan-101 transmit 500
4 Configure a global receive time interval for all BFD interfaces using the ip bfd-std receive command.
This command defines a default receive time value that is automatically applied when a BFD interface is
created. For example:
-> ip bfd-std receive 500
5 Configure the receive time interval for a specific BFD interface using the ip bfd-std interface receive
command. The value set with this command overrides the global receive time value configured for the
switch:
-> ip bfd-std interface bfd-vlan-101 receive 500
6 Configure the BFD interface dead interval multiplier value using the ip bfd-std interface multiplier
command. For example:
-> ip bfd-std interface bfd-vlan-101 multiplier 5
7 Configure the global operational mode and echo status for the BFD protocol using the ip bfd-std mode
command. This command defines a default mode and status that is automatically applied when a BFD
interface is created. For example:
-> ip bfd-std mode echo-only
8 Configure the operational mode and echo status for a specific BFD interface using the ip bfd-std inter-
face mode command. The mode and status set with this command overrides the global mode and status
configured for the switch. For example:
-> ip bfd-std interface bfd-vlan-101 mode echo-only
page 27-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Quick Steps for Configuring BFD
Note. Demand mode is not supported. The default operational mode is Asynchronous with the echo
function enabled. However, Static Routing and VRRP protocol support BFD in the echo-only operational
mode.
9 Configure the global BFD echo packet time interval using the ip bfd-std echo interval command. This
command defines a default echo packet time value that is automatically applied when a BFD interface is
created. For example:
-> ip bfd-std echo-interval 500
10 Configure the echo time interval for a specific BFD interface using the ip bfd-std interface echo-
interval command. The echo time interval value set with this command overrides the global echo time
interval configured for the switch. For example:
-> ip bfd-std interface bfd-vlan-101 echo-interval 500
11 Configure the global Layer 2 hold-down (convergence) timer value using the ip bfd-std l2-hold-timer
command. This command defines a default timer value that is automatically applied when a BFD
interface is created. For example:
-> ip bfd-std l2-hold-timer 500
12 Configure the Layer 2 hold-down (convergence) timer value for a specific BFD interface using the ip
bfd-std interface l2-hold-timer command. The timer value set with this command overrides the global
timer value configured for the switch. For example:
-> ip bfd-std interface bfd-vlan-101 l2-hold-timer 500
13 Enable the administrative status of a BFD interface using the ip bfd-std interface status command.
For example:
-> ip bfd-std interface bfd-vlan-101 status enable
Note. BFD parameters are not configurable once the BFD administrative status is enabled on the interface.
14 Globally enable the BFD protocol for the switch using the ip bfd-std status command. For example:
Note. Optional. Verify the BFD interface status and configuration using the show ip bfd-std interfaces
command. For example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-5
Quick Steps for Configuring BFD Configuring BFD
To verify the global BFD configuration for the switch, use the show ip bfd-std command. For example:
See the “BFD Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for
information about the fields in this display.
• OSPF
• VRRP Tracking
• Static routes
Once the BFD configuration is in place (see “Quick Steps for Configuring BFD” on page 27-4), the steps
described in the following sections are used to configure BFD interaction with the supported Layer 3
protocols.
2 Enable BFD on specific OSPF interfaces using the ip ospf interface bfd-std command or on all OSPF
interfaces using the ip ospf bfd-std all-interfaces command. For example:
-> ip ospf bfd-std all-interfaces
-> ip ospf interface int1 bfd-std enable
3 Establish BFD sessions with all OSPF DR neighbors in full states only or with all neighbors greater
than or equal to the “2-way” state using the ip ospf interface bfd-std drs-only command or the ip ospf
interface bfd-std all-nbrs command. For example:
-> ip ospf interface int1 bfd-std drs-only
-> ip ospf interface int1 bfd-std all-nbrs
page 27-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Quick Steps for Configuring BFD
2 Enable BFD for specific BGP neighbors using the ip bgp neighbors bfd-std command or for all BGP
neighbors using the ip bgp bfd-std all-neighbors command. For example:
-> ip bgp bfd-std all-neighbors
-> ip bgp neighbor neigh1 bfd-std enable
2 Enable BFD for a specific track policy using the vrrp track address bfd-std command. For example:
Make sure that the track policy is associated with at least one of the virtual routers. In addition, note that
the value of the address parameter should be a remote interface address. BFD cannot be configured for a
local interface address.
Note. To display the VRRP tracking policies on which BFD is enabled, use the show vrrp track
command.
See the “VRRP Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for
information about the fields in this display.
To create a BFD session for a static route, make sure the gateway address does not match any of the local
interface addresses on the switch and that BFD is enabled on the interface on which the gateway address
exists. In instances where multiple routes are configured with the same gateway address, only one BFD
session can run.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-7
Quick Steps for Configuring BFD Configuring BFD
Note. To display the static routes on which BFD is enabled use the show ip route command. An asterisk
appears before the gateway address of a BFD enabled static route. For example:
See the “IP Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide for information
about the fields in this display.
BFD deployment on PIM-SM/DM helps achieve multicast sub second convergence over PIM interface
neighbors and RP Routes on most AOS products. The purpose is to reduce the delay at the time of
failure in the primary path forwarding multicast data packets. On intimation from BFD about the primary
link (neighbor) failure, subsecond convergence is achieved by a redundant path to carry forward the source
traffic immediately. Redundant path functionality helps in minimizing the delay in resuming the data
packet flow in the alternate path.
page 27-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Quick Steps for Configuring BFD
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-9
Quick Steps for Configuring BFD Configuring BFD
page 27-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Quick Steps for Configuring BFD
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-11
BFD Overview Configuring BFD
BFD Overview
Detecting communication failures as soon as possible is the first step in any network recovery process;
until a failure is detected, network convergence can’t begin. By rapidly detecting failures, BFD enables
faster convergence of routing protocols particularly on shared media such as ethernet.
The BFD protocol is very similar to the widely-used Hello mechanisms prevalent in a majority of routing
protocols, with the exception that BFD tests bidirectional communication links, has smaller packets, and is
focused exclusively on path-failure detection. BFD can also be less CPU-intensive in routers with
distributed architecture because unlike routing protocol Hello packets, BFD packets can be processed on
the interface modules rather than the control plane.
BFD protocol is a fairly simple Hello protocol designed to provide fast forwarding path failure detection
that can be enabled at the interface and routing protocol levels. It helps in the verification of forwarding
plane-to-forwarding plane connectivity (including links, interfaces, tunnels). It allows semantic separation
of forwarding plane connectivity and control plane connectivity. BFD is a single mechanism that works
independently of underlying media, data, and network protocols. It can be encapsulated within any
routing protocol that is, it can run on top of any routing protocol being forwarded between two systems.
Moreover, it requires no changes to the existing protocols. This implementation of BFD supports BGP,
OSPF, VRRP tracking, and static route protocols.
Common BFD Applications include:
• Control plane liveliness detection
• BFD is not tied to any particular routing protocol. As a result, BFD provides a generic and consistent
failure detection mechanism for OSPF, BFP, VRRP Remote Tracking, and static routes.
• BFD is less CPU-intensive than reduced timer mechanisms for routing protocols.
page 27-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD BFD Overview
Each time a BFD system successfully receives a BFD control packet on a BFD session, the detect-timer
for that session is reset to zero. As long as the BFD peer systems receive the control packets from each
other within the negotiated time interval [(Detect Multiplier) * (Required Minimum Rx Interval)], the
BFD session remains up, and any routing protocol that encapsulates the BFD maintains its adjacencies,
that is, it continues its periodic transmission of BFD control packets at the negotiated rate.
In case a system stops receiving the packets within the predetermined time frame, some component in the
bidirectional path to that particular system is assumed to have failed, and the BFD system simply informs
its client protocol that a failure has occurred. It does this by sending rapid failure detection notices to
respective registered routing protocols in the local router to initiate the router table recalculation process in
order to accelerate routing convergence and network uptime.
In order to agree with its peers about how rapidly failure detection will take place, each system estimates
the rate at which it can send and receive BFD control packets. This design also enables fast systems on
shared medium with a slow system to detect failures more rapidly between fast systems while allowing the
slow system to participate to the best of its ability.
Note. : If you try and establish more than the maximum allowed limit of BFD sessions on the switch, an
error is displayed. In such cases, remove the interface from the BFD configuration using the no ip bfd-std
interface interface_name.
This implementation of BFD supports the Asynchronous mode. In this mode, BFD neighbors periodically
send BFD control packets to each other. A time interval for transmitting and receiving such packets is
negotiated between the two BFD systems. If a neighboring system fails to receive a number of control
packets continuously over a specific period of time, the session is considered down and BFD informs the
appropriate routing protocol.
In addition to the operational mode, an Echo function is available to verify the forwarding path between
neighboring BFD systems. When enabled, a BFD system transmits Echo packets to a BFD neighbor,
which then sends the packets back to the originating system along the forwarding path. If no Echo packets
are received back from the BFD neighbor within a configured Echo time interval, the session is
considered down.
The Echo function is a configurable option and can work on its own or simultaneously with the
Asynchronous mode. Note that using the Echo function with the Asynchronous mode lowers the rate at
which control packets are sent because Echo packets are then used to detect session liveliness. In addi-
tion, transmitting Echo packets is only allowed over a single hop; transmitting BFD control packets is
allowed over multiple hops.
Once a BFD session is started, the BFD peers can decide whether or not Echo packets are actually
transmitted. A session is considered down when the peers receive no BFD control packets from each other
or if sufficient Echo packets are missed within a specific period of time.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-13
BFD Overview Configuring BFD
Note. The BFD control packet has a mandatory section and an optional authentication section.
Authentication is not supported in this implementation of the BFD protocol.
Field Description
Version The version number of the BFD protocol.
My Discriminator An identifier for the BFD session connecting to the
local side.
Sequence Number The sequence number for this packet. This value is
incremented for each successive packet transmitted
for a session.
page 27-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD BFD Overview
system receives a control packet with Init or Up in its state field (in which case the session state moves to
Up) or until the detection time limit is reached.(in which case the remote system is then considered
unreachable and the state moves to Down)
An Up state indicates that a BFD session has been created and both BFD peers are communicating with
each other. The BFD session will continue to remain in this state until connectivity fails and the state
moves to Down or until the BFD session is taken down administratively.
Demultiplexing
Each BFD session must be able to uniquely identify itself and received BFD packets among the myriad of
BFD sessions that can be running. Each BFD peer must choose an identifying and unique discriminator
value. This value is sent in the “My Discriminator” field of the BFD control packet, and is reflected back
in the “Your Discriminator” field of the control packet sent from the remote peer. Once the system has
echoed the respective “Your Discriminator” value back to its peer, the packets are demultiplexed (that is,
converted back into their original separate signals). The source address and interfaces can change but
continue to be associated with the proper session.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-15
Configuring BFD Configuring BFD
Configuring BFD
Configuring BFD for your network requires a two-fold approach as described below:
1 Configure a BFD interface and related session parameter values. Once configured, enable all
participating BFD interfaces before configuring BFD interoperability with the supported Layer 3
protocols. See “Configuring BFD Session Parameters” on page 27-16 for more information.
2 Configure BFD support for the Layer 3 protocols for which BFD establishes sessions. This
implementation of BFD supports the IPv4 versions of BGP, OSPF, VRRP remote tracking, and static
routes. See “Configuring BFD Support for Layer 3 Protocols” on page 27-21 for more information.
At the end of the chapter is a simple BFD network diagram with instructions on how it was created on a
router-by-router basis. See “BFD Application Example” on page 27-28 for more information.
• Transmit time interval (see “Configuring the BFD Transmit Time interval” on page 27-17).
• Receive time interval (see “Configuring the BFD Receive Time Interval” on page 27-17).
• Layer 2 hold-down timer (see “Configuring the BFD Layer 2 Hold-Timer” on page 27-19).
• Operating mode (see “Configuring the BFD Operating Mode” on page 27-18).
• Echo interval (see “Configuring the BFD Echo interval” on page 27-18).
When a BFD interface is created, default values are automatically set for these parameters. However, if
necessary, it is possible to change these parameter values on a global basis (new value is applied to all
BFD interfaces) or for a specific BFD interface.
Note. A BFD interface is disabled by default when the interface is created. Once the interface is enabled,
parameter values are no longer configurable. To subsequently change parameter values, disable the BFD
interface. See “Enabling or Disabling BFD Status” on page 27-19 for more information.
page 27-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Configuring BFD
The above command configures BFD on the IP interface named bfd-vlan-101. By default, the interface is
disabled. See “Enabling or Disabling BFD Status” on page 27-19 for more information.
To delete the BFD interface, use the no form of the above command. For example:
-> no ip bfd-std interface bfd-vlan-101
Note. The interface name must belong to an existing IP interface that is configured with an IP address.
The above command changes the global transmit time interval to 500 msecs.
To change the transmit time interval for a specific BFD interface, use the ip bfd-std interface transmit
command along with the interface name and transmit time interval in milliseconds. For example:
-> ip bfd-std interface bfd-vlan-101 transmit 500
The above command changes the transmit time interval value to 500 msecs on the BFD interface named
bfd-vlan-101.
The global transmit time interval serves as the default interval value for a BFD interface. This default
value is overridden when a specific value is configured for the interface.
The above command configures the global receive time interval of 500 msecs.
To change the receive time interval for a specific BFD interface, use the ip bfd-std interface receive
command. For example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-17
Configuring BFD Configuring BFD
The above command changes the receive time interval value to 500 msecs on the BFD interface named
bfd-vlan-101.
The global receive time interval serves as the default interval value for a BFD interface. The default
interval value is overridden when a specific value is configured for the interface.
The above command configures BFD to globally operate in the asynchronous mode with the echo
function disabled.
The BFD operational mode and echo status is also configurable at the BFD interface level. To change the
operational mode of a specific BFD interface, use the ip bfd-std interface mode command along with the
interface name. For example:
-> ip bfd-std interface bfd-vlan-101 mode echo-only
The above command sets the operational mode of BFD interface named bfd-vlan-101 to echo only.
The global operating mode and Echo function status serves as the default mode for a BFD interface.The
global mode and status is overridden when a specific value is configured for the interface.
The above command sets the echo interval to 500 milliseconds globally on all BFD interfaces.
To change the BFD echo time interval for a particular BFD interface, use the ip bfd-std interface echo-
interval command. For example:
-> ip bfd-std interface bfd-vlan-101 echo-interval 500
The above command configures the echo time interval value to 500 milliseconds on BFD interface named
bfd-vlan-101.
The global echo packet time interval serves as the default interval value for a BFD interface. The default
interval value is overridden when a specific value is configured for the interface.
page 27-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Configuring BFD
The above command sets the BFD Layer 2 hold-down timer to 100 milliseconds.
To change the amount of time a specific BFD interface remains in a hold-down state after a Layer 2
topology change occurs, use the ip bfd-std interface l2-hold-timer command. For example:
-> ip bfd-std interface bfd-vlan-101 l2-hold-timer 100
The above command sets the Layer 2 hold-down timer to 100 milliseconds for the BFD interface named
bfd-vlan-101.
The global Layer 2 hold-down timer serves as the default value for a BFD interface. However, the default
timer value is overridden when a specific value is configured for the interface.
To disable the global BFD status for the switch, use the ip bfd-std status command with the disable
keyword. For example:
-> ip bfd-std status disable
The above command disables BFD globally on the switch. Note that disabling BFD does not remove the
existing BFD configuration from the switch. Also, when BFD is globally disabled, all BFD functionality is
disabled for the switch, but configuring BFD is still allowed.
By default, a BFD interface is disabled when the interface is created. To enable a BFD interface, use the
ip bfd-std interface status command. For example:
-> ip bfd-std interface bfd-vlan-101 status enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-19
Configuring BFD Configuring BFD
The above command enables the administrative status of the BFD interface named bfd-vlan-101.
Note that a BFD interface must be disabled before any of its parameters can be changed. To disable a BFD
interface, use the ip bfd-std interface status command with the disable keyword. For example:
-> ip bfd-std interface bfd-vlan-101 status disable
To verify the BFD status and configuration for the switch, use the show ip bfd-std command. For
example:
-> show ip bfd-std
Version : 1,
Admin Status : Enabled,
Transmit interval : 200,
Receive interval : 200,
Multiplier : 3,
Echo status : Enabled,
Echo interval : 200,
Mode : Asynchronous,
Protocols registered : OSPF,
The above command shows that BFD is registered with the OSPF protocol and has a transmit interval of
200 msecs, receive interval of 200 msecs, multiplier 3, echo interval of 200 msecs, and operational mode
set as asynchronous mode.
To verify the BFD status and configuration for a specific interface, use the show ip bfd-std interfaces
command. For example:
->show ip bfd-std interface
The output above displays the interfaces participating in the BFD sessions, along with their IP interface
names and respective BFD session parameters. To see additional detail for a specific interface, use the
show ip bfd-std interface command and specify an interface name. For example:
-> show ip bfd-std interface vlan-10
page 27-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Configuring BFD
Note. OSPF must be running on all participating routers, and BFD must be configured and enabled on the
participating OSPF interfaces. See “Configuring BFD Session Parameters” on page 27-16 for more
information.
1 To encapsulate BFD within the OSPF protocol, register OSPF with BFD at the protocol level using the
ip ospf bfd-std status command. For example:
-> ip ospf bfd-std status enable
The BFD status for the OSPF protocol is now enabled, which means that communication between OSPF
and BFD is enabled. To de-register OSPF with BFD, enter the following command:
-> ip ospf bfd-std status disable
2 To verify the BFD status for OSPF protocol, use the show ip ospf command. For example:
->show ip ospf
Router Id = 10.172.18.16,
OSPF Version Number = 2,
Admin Status = Enabled,
BFD Status = Disabled,
Area Border Router ? = No,
AS Border Router Status = Disabled,
Route Tag = 0,
SPF Hold Time (in seconds) = 10,
SPF Delay Time (in seconds) = 5,
MTU Checking = Disabled,
# of Routes = 9,
# of AS-External LSAs = 0,
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-21
Configuring BFD Configuring BFD
# of self-originated LSAs = 1,
# of LSAs received = 0,
External LSDB Limit = -1,
Exit Overflow Interval = 0,
# of SPF calculations done = 4,
# of Incr SPF calculations done = 0,
# of Init State Nbrs = 0,
# of 2-Way State Nbrs = 0,
# of Exchange State Nbrs = 0,
# of Full State Nbrs = 0,
# of attached areas = 1,
# of Active areas = 1,
# of Transit areas = 0,
# of attached NSSAs = 0,
Default Route Origination = none,
Default Route Metric-Type/Metric = type2 / 1
3 Once OSPF is registered with BFD at the protocol level, enable the OSPF interface(s) that participate
in BFD using the ip ospf interface bfd-std command. For example:
-> ip ospf interface vlan-10 bfd-std enable
The above command enables BFD on the interface named vlan-10. To enable BFD on all configured
OSPF interfaces, use the ip ospf bfd-std all-interfaces command. For example:
-> ip ospf bfd-std all-interfaces
To disable BFD for all configured OSPF interfaces, use the no form of the ip ospf bfd-std all-interfaces
command. For example:
-> no ip ospf bfd-std all-interfaces
4 To display the BFD status on an OSPF interface, use the show ip ospf interface command.
For example:
-> show ip ospf interface
5 Once OSPF is registered with BFD at the protocol level and BFD is enabled on the desired OSPF
interface(s), use the show ip bfd-std interfaces command to display BFD-enabled interfaces. For
example:
->show ip bfd-std interfaces
6 To establish BFD sessions with neighbors that are in full state only, enter the ip ospf interface bfd-std
drs-only command as shown below:
-> ip ospf interface int1 bfd-std drs-only
page 27-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Configuring BFD
The above command establishes a BFD session on interface named int1 with OSPF DR neighbors in full
state only. To establish a BFD session on an interface with all neighbors which are greater than or equal to
“2-way” state, use the ip ospf interface bfd-std all-nbrs command as shown below:
-> ip ospf interface int2 bfd-std all-nbrs
The above command establishes a BFD session on interface named int2 with all OSPF neighbors that are
greater than or equal to “2-way” state.
Note. By default, BFD session is enabled on an interface with all neighbors which are greater than or
equal to “2-way” state.
When any neighbors are added to this interface, OSPF informs BFD about the newly added neighbor(s);
BFD then establishes a session with them. Use the show ip bfd-std sessions command to view BFD
sessions with all BFD neighbors, as shown below:
-> show ip bfd-std sessions
To view a BFD session with a particular neighbor, use the show ip bfd-std session command followed by
the local session discriminator. For example:
-> show ip bfd-std session 45
Whenever there is any change to the interface/neighbor list or interface/neighbor state, OSPF immediately
informs BFD about the changes. Additionally, whenever BFD detects any changes to the other end, BFD
updates its database accordingly and informs OSPF for its fastest convergence.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-23
Configuring BFD Configuring BFD
Note. BFD must be configured and enabled on the participating BGP interfaces. See “Configuring BFD
Session Parameters” on page 27-16 for more information.
1 To encapsulate BFD within the BGP protocol, register BGP with BFD at the protocol level using the
ip bgp bfd-std status command as shown below:
-> ip bgp bfd-std status enable
The BFD status for the BGP protocol is now enabled, which means that communication between BGP and
BFD is enabled. To de-register BGP with BFD, enter the following command:
-> ip bgp bfd-std status disable
To verify the BFD status for BGP protocol, you can use the show ip bgp command as shown below:
-> show ip bgp
2 Once BGP is registered with BFD at the protocol level, you need to enable BFD for particular BGP
neighbors using the ip bgp neighbors bfd-std command as shown below:
-> ip bgp neighbor neigh1 bfd-std enable
The above command enables BFD for neighbor named neigh1. To enable BFD for all BGP neighbors, use
the ip bgp bfd-std all-neighbors command as shown below:
-> ip bgp bfd-std all-neighbors
page 27-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Configuring BFD
To disable BFD for all configured BGP neighbors, use the ip bgp bfd-std all-neighbors with the no
keyword, as shown below:
-> no ip bgp bfd-std all-neighbors
To display the BFD status of BGP neighbors, use the show ip bgp neighbors command. For example:
-> show ip bgp neighbors
Legends:Nbr = Neighbor
As = Autonomous System
Nbr Address As Admin state Oper state BgpId Up/Down BFD Status
-------------+---+-------------+-------------+-------------+------------+-----------
192.40.4.29 3 enabled established 192.40.4.29 00h:14m:48s enabled
192.40.4.121 5 disabled idle 0.0.0.0 00h:00m:00s disabled
Thereafter when there are any neighbors established to this interface, BGP informs the BFD-CMM about
any newly added neighbor(s); BFD-CMM, in turn, informs the BFD-NI about the neighbor(s) and requests
it to establish BFD sessions with them. You can use the show ip bfd-std sessions command to view BFD
sessions with all BFD neighbors, as shown below:
-> show ip bfd-std sessions
Neighbor Interface Local Remote Negotiated Negotiated Echo Rx
IP Address Address State Disc Disc Tx Rx
-----------+------------+-------+------+------+------------+----------+----------
25.25.25.1 25.25.25.25 UP 45 53 100 100 200
26.26.26.63 26.26.26.36 INIT 43 21 200 200 200
Whenever there is any change to the neighbor/interface list or neighbor/interface state, BGP immediately
informs BFD-CMM about the changes. Additionally, whenever BFD-NI detects any changes to the other
end, it immediately informs BFD-CMM about the changes. BFD-CMM, then, updates its database
accordingly and informs BGP for its fastest convergence.
Note. The BFD status for VRRP protocol is disabled by default. Also, VRRP protocol supports BFD in
the echo-only operational mode.
BFD status for VRRP protocol is now enabled which means that socket communication between VRRP
and BFD is enabled. To de-register VRRP with BFD, enter the following command at the system prompt:
-> vrrp bfd-std disable
To verify the BFD status for VRRP protocol, you can use the show vrrp command as shown below:
-> show vrrp
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-25
Configuring BFD Configuring BFD
2 Once VRRP is registered with BFD at the protocol level, you need to enable BFD for a particular
VRRP track policy using the vrrp track address bfd-std command. Ensure that the track policy is
associated with at least one of the virtual routers. For example:
-> vrrp track 2 address 10.1.1.1 bfd-std enable
The above command enables BFD for a track policy with VRRP track number 2 and a remote interface
address of 10.1.1.1.
Note. The value of the address parameter should be a remote interface address. BFD cannot be configured
for a local interface address.
You can verify whether BFD is enabled for a particular track policy by using the show vrrp track
command as shown below:
-> show vrrp track
3 Once VRRP is registered with BFD at the protocol level, and BFD is configured for the relevant track
policies, VRRP protocol informs BFD-CMM about the VRID primary interface address and the remote
address which should be tracked. BFD-CMM, in turn, adds these interfaces to its interface list. You can
use the show ip bfd-std interfaces command to verify this.
Once the configured track policy is associated with VRID, BFD-CMM establishes the BFD session with
the remote address. BFD-CMM also informs the BFD-NI about the interface and its respective
neighbor(s), and requests it to establish BFD sessions with them. You can use the show ip bfd-std
sessions command to view BFD sessions with all BFD neighbors, as shown below:
-> show ip bfd-std sessions
Neighbor Interface Local Remote Negotiated Negotiated Echo Rx
IP Address Address State Disc Disc Tx Rx
-----------+------------+-------+------+------+------------+----------+----------
25.25.25.1 25.25.25.25 UP 45 53 100 100 200
26.26.26.63 26.26.26.36 INIT 43 21 200 200 200
Whenever there is any change in a track policy or change in VRID status with respect to the protocol,
VRRP immediately informs BFD-CMM about the changes. Additionally, whenever BFD-NI detects any
changes to the other end, it immediately informs BFD-CMM about the changes. BFD-CMM, then, updates
its database accordingly and informs VRRP for its fastest convergence.
page 27-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD Configuring BFD
Note. BFD for a static route is disabled by default. Also, Static Routes support BFD in the echo-only
operational mode.
The above command enables BFD support for a static route with destination ip address as 10.1.1.1,
destination network mask as 255.0.0.0, and gateway address as 10.1.1.25.
In order to create a BFD session for a static route, the gateway address should not match with any local
interface address of the switch, and BFD should be enabled on the interface on which the gateway address
exists. If multiple routes are configured with the same gateway address, only one BFD session runs for the
routes. You can verify the BFD session list which shows the gateway address using the show ip bfd-std
sessions command.
To enable BFD support for all static routes, use the ip static-route all bfd-std command, as follows:
-> ip static-route all bfd-std enable
You can display the static routes on which BFD is enabled by using the show ip route command. For
example:
-> show ip route
+ = Equal cost multipath routes
* = BFD Enabled
Total 12 routes
Once BFD determines that the next hop is unreachable, it informs IPRM that the neighbor is down. On
receiving this message, IPRM moves the routes corresponding to this gateway to inactive routing data-
base if BFD status is enabled. If BFD determines that the gateway is reachable, IPRM moves the routes
corresponding to the gateway to the forwarding database.
If a BFD-enabled static route is deleted, and other BFD-enabled routes with the same gateway are
available, the BFD session continues to run; if no routes are available, the router sends NBRDEL message
to BFD-CMM.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-27
BFD Application Example Configuring BFD
VLAN 12 VLAN 31
Interface 12.x.x.x Interface 31.x.x.x
VLAN 23
Interface 23.x.x.x
Router 2 Router 3
Router ID 2.2.2.2 Router ID 3.3.3.3
The following steps are used to configure the example BFD-enabled OSPF network as shown in the
diagram above.
page 27-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD BFD Application Example
Note. The ports are statically assigned to the router VLANs, as a VLAN must have a physical port
assigned to it in order for the IP router interface to function.
-> vlan 12
-> ip interface vlan-12 vlan 12 address 12.0.0.1 mask 255.0.0.0
-> vlan 12 port default 2/2
-> vlan 10
-> ip interface vlan-10 vlan 10 address 10.0.0.1 mask 255.0.0.0
-> vlan 10 port default 2/3-5
-> vlan 23
-> ip interface vlan-23 vlan 23 address 23.0.0.2 mask 255.0.0.0
-> vlan 23 port default 2/2
-> vlan 20
-> ip interface vlan-20 vlan 20 address 20.0.0.2 mask 255.0.0.0
-> vlan 20 port default 2/3-5
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-29
BFD Application Example Configuring BFD
• VLAN 20 handles the device connections to Router 2, using the IP router port 20.0.0.2 and physical
ports 2/3-5. More ports could be added at a later time if necessary.
The router was assigned the Router ID of 2.2.2.2.
Router 3 (using ports 2/1 and 2/2 for the backbone, and ports 2/3-5 for end devices):
-> vlan 23
-> ip interface vlan-23 vlan 23 address 23.0.0.3 mask 255.0.0.0
-> vlan 23 port default 2/1
-> vlan 31
-> ip interface vlan-31 vlan 31 address 31.0.0.3 mask 255.0.0.0
-> vlan 31 port default 2/2
-> vlan 30
-> ip interface vlan-30 vlan 30 address 30.0.0.3 mask 255.0.0.0
-> vlan 30 port default 2/3-5
page 27-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD BFD Application Example
Router 2
-> ip ospf interface vlan-12
-> ip ospf interface vlan-12 area 0.0.0.0
-> ip ospf interface vlan-12 status enable
Router 3
-> ip ospf interface vlan-23
-> ip ospf interface vlan-23 area 0.0.0.0
-> ip ospf interface vlan-23 status enable
Router 2
-> ip bfd-std interface vlan-12
-> ip bfd-std interface vlan-12 status enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-31
BFD Application Example Configuring BFD
Router 3
-> ip bfd-std interface vlan-23
-> ip bfd-std interface vlan-23 status enable
• Set the minimum amount of time BFD waits to receive control packets to 200 milliseconds.
• Set the global BFD Echo packet time interval to 200 milliseconds.
• Set the amount of time BFD remains in a hold-down state to 500 milliseconds.
page 27-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring BFD BFD Application Example
• To verify the configured BFD status on routers, use the show ip bfd-std command. This command
shows the protocols registered for BFS (OSPF in example network) and the parameter values for the
transmit, receive, and echo intervals, the multiplier number, and the operational mode.
• To check the BFD status on all interfaces, use the show ip bfd-std interfaces command. This
command displays the interfaces participating in the BFD sessions, the IP addresses associated with the
interface, and respective BFD session parameters.
• To check the BFD status on an individual interface, use the show ip bfd-std interfaces command
along with the interface name.
• To display information about BFD sessions, use the show ip bfd-std sessions command.
• To check the BFD status at the OSPF protocol level, use the show ip ospf command. This command is
also used to check the general OSPF configuration. For OSPF interfaces, use the show ip ospf inter-
face command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 27-33
Verifying the BFD Configuration Configuring BFD
show ip bfd-std Displays the global BFD configuration for the switch.
show ip bfd-std interfaces Displays the BFD interface configuration for the switch.
show ip bfd-std sessions Displays the BFD neighbors and session states.
show ip ospf Displays the BFD status for the OSPF protocol.
show ip ospf interface Displays the BFD status for OSPF interfaces.
show ip bgp Displays the BFD status for the BGP protocol.
show ip bgp neighbors Displays the BFD status for BGP neighbors.
show vrrp Displays the BFD status for the VRRP protocol.
show vrrp track Displays the BFD status for a track policy.
show ip route Displays the BFD status for static routes.
For more information about the resulting displays form these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide. Examples of the above commands and their outputs are given in the section
“Configuring BFD” on page 27-16.
page 27-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
28 Configuring DHCP and
DHCPv6
The User Datagram Protocol (UDP) is a connectionless transport protocol that runs on top of IP networks.
The DHCP Relay allows you to use nonroutable protocols (such as UDP) in a routing environment. UDP
is used for applications that do not require the establishment of a session and end-to-end error checking.
Email and file transfer are two applications that could use UDP. UDP offers a direct way to send and
receive datagrams over an IP network and is primarily used for broadcasting messages. This chapter
describes the DHCP Relay feature. This feature allows UDP broadcast packets to be forwarded across
VLANs that have IP routing enabled.
The DHCPv6 Relay implementation on Alcatel-Lucent OmniSwitch allows UDPv6 broadcast packets to
be forwarded across VLANs that have IPv6 routing enabled.
In This Chapter
This chapter describes the basic components of DHCP Relay and how to configure them. CLI commands
are used in the configuration examples. For more details about the syntax of commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter for DHCP Relay are as follows:
• Quick steps for configuring DHCP Relay on page 28-7.
• Setting the Relay Forwarding Option to Standard, Per-VLAN, or AVLAN on page 28-15.
• Configuring the DHCP Client Interface to obtain an IP address for the Switch on page 28-16.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-1
In This Chapter Configuring DHCP and DHCPv6
The diiferent sections describing the DHCPv6 Relay functionality in this chapter are as follows:
• “Quick Steps for Setting Up DHCPv6 Relay” on page 28-8
For information about the IP protocol, see Chapter 17, “Configuring IP.” and IPv6 protocol see
Chapter 15, “IPv6 Commands”
page 28-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCP Relay Specifications
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-3
DHCPv6 Relay Specifications Configuring DHCP and DHCPv6
IPv6 addresses supported for the Maximum of 8 IPv6 addresses for each VLAN relay service.
Per-VLAN service Maximum of 256 VLAN relay services.
Maximum number of UDPv6 32
relay services allowed per switch
Maximum number of VLANs to 256
which forwarded UDPv6
service port traffic is allowed
Maximum number of DHCPv6 1
Client interfaces
Maximum number of DHCPv6 256
Snooping VLANs
page 28-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCP Relay Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-5
DHCPv6 Relay Defaults Configuring DHCP and DHCPv6
page 28-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Quick Steps for Setting Up DHCP Relay
2 Set the forward delay timer for the BOOTP/DHCP relay. To set the timer for a 15 second delay, use
the following command:
-> ip helper forward delay 15
3 Set the maximum hop count value. To set a hop count of 3, use the following command:
Note. Optional. To verify the DHCP Relay configuration, enter the show ip helper command. The display
shown for the DHCP Relay configured in the above Quick Steps is shown here:
For more information about this display, see the “DHCP Relay” chapter in the OmniSwitch AOS Release 6
CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-7
Quick Steps for Setting Up DHCPv6 Relay Configuring DHCP and DHCPv6
2 Set the maximum hops count for the DHCPv6 relay. To set the hop count to 32, use the following
command:
-> ipv6 helper maximum hops 32
Note. Optional. To verify the DHCPv6 Relay configuration, enter the show ipv6 helper command. The
display shown for the DHCPv6 Relay configured in the above Quick Steps is shown here:
For more information about this display, see the “Configuring IPv6” chapter in the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 28-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCP Relay Overview
• Configurable options: DHCP server IP address, Forward Delay, Maximum Hops, Forwarding Option
The port numbers indicate the destination port numbers in the UDP header. The DHCP Relay verifies that
the forward delay time (specified by the user) has elapsed before sending the packet down to UDP with
the destination IP address replaced by the address (also specified by the user).
If the relay is configured with multiple IP addresses, then the packet is sent to all IP address
destinations. The DHCP Relay also verifies that the maximum hop count has not been exceeded. If the
forward delay time is not met or the maximum hop count is exceeded, the BOOTP/DHCP packet is
discarded by the DHCP Relay.
The forwarding option allows you to specify if the relay should operate in the standard, per-VLAN only,
or AVLAN-only mode. The standard mode forwards all DHCP packets on a global relay service. The
per-VLAN only mode forwards DHCP packets that originate from a specific VLAN. The AVLAN-only
mode only forwards packets received on authenticated ports from non-authenticated clients. See “Setting
the Relay Forwarding Option” on page 28-15 for more information.
Alternately the relay function can be provided by an external router connected to the switch; in this case,
the relay would be configured on the external router.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-9
DHCP Relay Overview Configuring DHCP and DHCPv6
DHCP
DHCP (Dynamic Host Configuration Protocol) provides a framework for passing configuration informa-
tion to Internet hosts on a TCP/IP network. It is based on the Bootstrap Protocol (BOOTP), adding the
ability to automatically allocate reusable network addresses and additional configuration options. DHCP
consists of the following two components:
• A protocol for delivering host-specific configuration parameters from a DHCP server to a host.
DHCP is built on a client-server model in which a designated DHCP server allocates network addresses
and delivers configuration parameters to dynamically configured hosts. It supports the following two
mechanisms for IP address allocation.
Dynamic—DHCP assigns an IP address to a host for a limited period of time (or until the host explic-
itly relinquishes the address).
Manual—The network administrator assigns a host IP address and DHCP simply conveys the assigned
address to the host.
page 28-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCP Relay Overview
OmniSwitch
External Router
with
DHCP Relay
125.0.0.1
DHCP Clients VLAN 1
IN OUT
125.0.0.2
DHCP Server
130.0.0.13
DHCP Clients
The external router inserts the subnet address of the first hop segment into the DHCP request frames from
the DHCP clients. This subnet address allows the DHCP server to locate the segment on which the
requesting client resides. In this example, all clients attached to the OmniSwitch are DHCP-ready and
have the same subnet address (130.0.0.0) inserted into each of the requests by the router DHCP Relay
function. The DHCP server assigns a different IP address to each of the clients. The switch does not need
an IP address assigned and all DHCP clients are members of either a default VLAN or an IP protocol
VLAN.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-11
DHCP Relay Overview Configuring DHCP and DHCPv6
DHCP Relay
125.0.0.21 130.0.0.21
(Router Port IP Address) (Router Port IP Address)
VLAN 2 VLAN 3
130.0.0.14 130.0.0.15
DHCP Clients
125.0.0.1 125.0.0.2
DHCP Client DHCP Server 130.0.0.13
DHCP Client
DHCP Clients in Two VLANs
During initialization, each network client forwards a DHCP request frame to the DHCP server using the
local broadcast address. For those locally attached stations, the frame is switched.
In this case, the DHCP server and clients must be members of the same VLAN (they could also all be
members of the default VLAN). One way to accomplish this is to use DHCP rules in combination with IP
protocol rules to place all IP frames in the same VLAN. See Chapter 39, “Defining VLAN Rules,” for
more information.
Because the clients in the application example are not members of the same VLAN as the DHCP server,
they must request an IP address via the DHCP Relay routing entity in the switch. When a DHCP request
frame is received by the DHCP Relay entity, it is forwarded from VLAN 3 to VLAN 2. All the
DHCP-ready clients in VLAN 3 must be members of the same VLAN, and the switch must have the
DHCP Relay function configured.
page 28-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCP Relay Implementation
Global DHCP
For the global DHCP service, you must identify an IP address for the DHCP server.
The DHCP Relay forwards BOOTP/DHCP broadcasts to and from the specified address. If multiple
DHCP servers are used, one IP address must be configured for each server. You can configure up to 256
addresses for each relay service.
To delete an IP address, use the no form of the ip helper address command. The IP address specified
with this syntax is deleted. If an IP address is not specified with this syntax, then all IP helper addresses
are deleted. The following command deletes an IP helper address:
-> ip helper no address 125.255.17.11
Per-VLAN DHCP
For the Per-VLAN DHCP service, you must identify the number of the VLAN that makes the relay
request.
The following syntax identifies two DHCP servers for VLAN 4 at two different IP addresses:
-> ip helper address 125.255.17.11 125.255.18.11 vlan 4
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-13
DHCP Relay Implementation Configuring DHCP and DHCPv6
To delete an IP address, use the no form of the ip helper address command. The IP address specified with
this syntax is deleted. If an IP address is not specified with this syntax, then all IP helper addresses are
deleted. The following command deletes a helper address for IP address 125.255.17.11:
-> ip helper no address 125.255.17.11
The only parameter that is required for BOOTP relay is the IP address to the DHCP server or to the next
hop to the DHCP server. The default values can be accepted for forward delay, hop count, and relay
forwarding option.
Alternately the relay function can be provided by an external router connected to the switch; in this case,
the relay is configured on the external router.
The range for the forward delay time value is 0 to 65535 seconds.
page 28-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCP Relay Implementation
The hops value represents the maximum number of relays. The range is from one to 16 hops. The default
maximum hops value is set to four. This maximum hops value only applies to DHCP Relay. All other
switch services ignore this value.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-15
Configuring the DHCP Client Interface Configuring DHCP and DHCPv6
• The DHCP Client interface supports the release and renew functionality according to RFC-2131.
• The Option-60 string can be configured on the OmniSwitch and sent as part of the DHCP discover/
request packet.
• DHCP Option-2 is supported for configuring the time zone.
When the switch receives a valid IP address lease from a DHCP server:
• The IP address and the subnet mask (DHCP option 1) are assigned to the DHCP Client IP interface.
• The lease is periodically renewed and rebound according to the renew time (DHCP option 58) and
rebind time (DHCP option 59) returned by the DHCP Server. If the lease cannot be renewed within the
lease time (DHCP option 51) returned by the DHCP Server, the IP address is released. When not
specified by the DHCP Server, a default lease time of 7 days is allocated.
• The system name and the time zone of the OmniSwitch is set according to the system name (DHCP
Option-12) and time zone (DHCP Option-2) assigned by the DHCP server. However, if user
configures the system name and time zone to non-default values, DHCP server does not assign the
system name and time zone values.
• The DHCP Client-enabled IP address serves as the primary IP address when multiple addresses are
configured for a VLAN.
page 28-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring the DHCP Client Interface
Note. User-defined values for the system name and time zone can be set using system name and system
timezone CLI commands.
• Periodic DHCPINFORM message is sent to the DHCP server every ten minutes requesting for
Option-2 and Option-12 (only after successfully acquiring the DHCP lease from the server). The
DHCP server values are compared to the existing time zone and system name values, and the values
are applied only if there is a change in value and the user have not configured them. This helps in
applying the changes done in the DHCP server on the fly.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-17
Configuring the DHCP Client Interface Configuring DHCP and DHCPv6
• VLAN information
• Subnet mask
• Router IP address
Whenever there is any change in the DHCP server assigned IP address, the dhcpClient.db file is updated
with the new information and synchronized to the secondary CMM. This file is also synchronized period-
cally with the DHCP snooping binding table.
The following occurs after a switch reload or takeover:
• The DHCP client interface uses the dhcpClient.db file information to create the IP interface with a
lease time of 10 minutes and tries to acquire the same IP address.
• After successful renewal of the IP address, the lease time is modified as per the DHCP server assigned
IP address.
• If the DHCP client is not able acquire the same IP address, the client then tries to get a new IP address
after the switch-assigned DHCP lease time expires. Note that a trap message is sent whenever there is
any change to the IP address.
• When using this feature in a stack configuration, enable MAC Retention to ensure that the same IP
address is obtained from the DHCP server after takeover.
• Do not configure the DHCP client interface on a switch where the interface is the relay agent for the
client VLAN.
• Although a DHCP Client is configurable for any VLAN in any VRF instance, only one DHCP Client
per switch is allowed.
• Make sure the DHCP server is reachable through the DHCP Client VLAN.
• When a DHCP release is performed or the DHCP client interface is deleted, any default static route
added for the client is also removed and the corresponding timers (such as release/renew timer) are
cancelled.
• When a DHCP release is performed the system name remains unchanged even if the name was updated
using the DHCP client option-12 information.
page 28-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring UDP Port Relay
Note. If the relay service for BOOTP/DHCP is disabled when the switch reboots, the service is
automatically enabled when the switch comes back up. If there were three non-BOOTP/DHCP relay
services already enabled before the reboot, the most recent service enabled is disabled and replaced with
the BOOTP/DHCP relay service.
• The ip helper commands are used to configure BOOTP/DHCP relay and the ip udp port commands
are used to configure UDP port relay. The ip udp relay command, however, is also used to enable or
disable relay for BOOTP/DHCP well known ports 67 and 68.
• If the BOOTP/DHCP relay service is disabled, the ip helper configuration is not retained and all
dependant functionality (Telnet and HTTP client authentication, and so on) is disrupted.
• Relaying BOOTP/DHCP traffic is available on a global and per-VLAN basis. Using this function on a
per-VLAN basis requires setting the DHCP relay forwarding mode to per-vlan only. UDP port relay
for generic services is only available on a per-VLAN basis, but does not require enabling the per-vlan
only forwarding option.
Thus the bi-directional UDP relay specifies a VLAN that receives all UDP relay broadcast packets. The
original UDP packets are flooded in this new VLAN. This service supports the forwarding of broadcast
packet to destination VLANs based on the destination UDP port. User must configure the destination UDP
port and the destination VLANs.
Configuring UDP Port Relay for generic UDP services is a two-step process. The first step involves
enabling UDP Port Relay on the generic service port. The second step involves specifying a VLAN that
relays traffic destined for the generic service port. Both steps are required and are described in the follow-
ing sections “Enabling/Disabling UDP Port Relay” on page 28-21 and “Specifying a Forwarding VLAN”
on page 28-21.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-19
Configuring UDP Port Relay Configuring DHCP and DHCPv6
OmniSwitch
VLAN 2
125.0.0.1
DHCP Clients Router 2
Router 1 DHCP Server 2
DHCP Server 1
For details on configuration see the “Specifying a Forwarding IP address” on page 28-22
Note.
• If the UDP packet is sent to a server on the same VLAN as the originator the server receives both the
original broadcast and the relayed packet. Some services cannot handle duplicate packets.
• User must not specify different forwarding VLANs for different UDP servers.
page 28-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring UDP Port Relay
To enable relay on a user-defined (not well-known) UDP service port, then enter the service port number
instead of the service name. For example, the following command enables relay on service port 3047:
-> ip udp relay 3047
To disable a relay operation for a UDP service port, use the no form of the ip udp relay command. For
example, the following command disables relay on the DNS well-known service port:
-> no ip udp relay dns
For more information about using the ip udp relay command, see the OmniSwitch AOS Release 6 CLI
Reference Guide.
Note that the ip udp relay vlan command only works if UDP Port Relay is already enabled on the speci-
fied service port. In addition, when assigning a VLAN to the BOOTP/DHCP service ports, set the DHCP
relay forwarding mode to per-vlan only first before trying to assign the VLAN.
It is also possible to assign up to 256 forwarding VLANs to each generic service port. To specify more
than one VLAN with a single command, enter a range of VLANs. For example, the following command
assigns VLANs 6 through 8 and VLAN 10 as forwarding VLANs for the NBNS/NBDD well-known
service ports:
-> ip udp relay nbnsnbdd vlan 6-8 10
If UDP Port Relay was enabled on a not well-known service port, then enter the service port number
instead of the service name. For example, the following command assigns VLAN 100 as a forwarding
VLAN for UDP service port 3047:
-> ip udp relay 3047 vlan 100
To remove a VLAN association with a UDP service port, use the no form of the ip udp relay vlan
command. For example, the following command removes the VLAN 6 association with the NBNS/NBDD
well-known service port:
-> no ip udp relay nbnsnbdd vlan 6
For more information about using the ip udp relay vlan command, see the OmniSwitch AOS Release 6
CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-21
Configuring DHCP Security Features Configuring DHCP and DHCPv6
Note that for the ip udp relay address command, the associated UDP port is 5001.
• Remote ID—the MAC address of the router interface associated with the VLAN ID specified in the
Circuit ID suboption.
The ip helper dhcp-snooping option-82 format command is used to configure the type of data (base
MAC address, system name, interface alias, or user-defined) that is inserted into the above Option-82
suboptions. The system name and user-defined text are reported in ASCII text format, but the MAC
address is still reported in hex-based format.
page 28-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring DHCP Security Features
By default, the relay agent drops client DHCP packets it receives that already contain Option-82 data.
However, it is possible to configure an Option-82 policy to specify how such packets are treated. See
“Configuring a Relay Agent Information Option-82 Policy” on page 28-25 for more information.
The DHCP Option-82 feature is only applicable when DHCP relay is used to forward DHCP packets
between clients and servers associated with different VLANs. In addition, a secure IP network must exist
between the relay agent and the DHCP server.
The DHCP client sends a parameter request list - the DHCP Option-55. For captive portal, OmniSwitch
acts as the DHCP Server for the pre-authenticated users and performs Auto Proxy Discovery.The DHCP
server always returns option 252 in the DHCP ACK message to the client.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-23
Configuring DHCP Security Features Configuring DHCP and DHCPv6
How the Relay Agent Processes DHCP Packets from the Client
Option 82
The following table describes how the relay agent processes DHCP packets received from clients when the
Option-82 feature is enabled for the switch:
If the DHCP packet from the client ... The relay agent ...
Contains a zero gateway IP address (0.0.0.0) and Inserts Option-82 with unique information to
no Option-82 data. identify the client source.
Contains a zero gateway IP address (0.0.0.0) and Drops the packet, keeps the Option-82 data and
Option-82 data. forwards the packet, or replaces the Option-82
data with its own Option-82 data and forwards the
packet.
Option-55
When Option-55 is enabled, the DHCP client sends a parameter request list to the DHCP Server.
How the Relay Agent Processes DHCP Packets from the Server
Note that if a DHCP server does not support Option-82, the server strips the option from the packet. If the
server does support this option, the server retains the Option-82 data received and send it back in a reply
packet.
When the relay agent receives a DHCP packet from the DHCP server and the Option-82 feature is
enabled, the agent:
1 Extracts the VLAN ID from the Circuit ID suboption field in the packet and compare the MAC address
of the IP router interface for that VLAN to the MAC address contained in the Remote ID suboption field
in the same packet.
2 If the IP router interface MAC address and the Remote ID MAC address are not the same, then the
agent drops the packet.
3 If the two MAC addresses match, then a check is made to see if the slot/port value in the Circuit ID
suboption field in the packet matches a port that is associated with the VLAN also identified in the Circuit
ID suboption field.
page 28-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring DHCP Security Features
4 If the slot/port information does not identify an actual port associated with the Circuit ID VLAN, then
the agent drops the packet.
5 If the slot/port information does identify an actual port associated with the Circuit ID VLAN, then the
agent strips the Option-82 data from the packet and unicasts the packet to the port identified in the Circuit
ID suboption.
This same command is also used to disable this feature. For example:
-> ip helper agent-information disable
Note that because this feature is not available on a per-VLAN basis, DHCP Option-82 functionality is not
restricted to ports associated with a specific VLAN. Instead, DHCP traffic received on all ports is eligible
for Option-82 data insertion when it is relayed by the agent.
• keep—The existing Option-82 data in the DHCP packet is retained and the packet is forwarded to the
server.
• replace—The existing Option-82 data in the DHCP packet is replaced with local relay agent data and
then forwarded to the server.
For example, the following commands configure DHCP Option-82 policies:
-> ip helper agent-information policy drop
Note that this type of policy applies to all DHCP packets received on all switch ports. In addition, if a
packet that contains existing Option-82 data also contains a gateway IP address that matches a local subnet
address, the relay agent drops the packet and does not apply any existing Option-82 policy.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-25
Configuring DHCP Security Features Configuring DHCP and DHCPv6
• The packet already contains Option-82 data in the options field and the Option-82 check function is
enabled. See “Bypassing the Option-82 Check on Untrusted Ports” on page 28-30 for more informa-
tion.
page 28-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring DHCP Security Features
If none of the above are true, then DHCP Snooping accepts and forwards the packet. When a DHCPACK
packet is received from a server, the following information is extracted from the packet to create an entry
in the DHCP Snooping binding table:
• MAC address of the DHCP client.
• IP address for the client that was assigned by the DHCP server.
• The VLAN associated with the port from where the DHCP packet originated.
After extracting the above information and populating the binding table, the packet is then forwarded to
the port from where the packet originated. Basically, the DHCP Snooping features prevents the normal
flooding of DHCP traffic. Instead, packets are delivered only to the appropriate client and server ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-27
Configuring DHCP Security Features Configuring DHCP and DHCPv6
Note. DHCP Snooping drops server packets received on untrusted ports (ports that connect to devices
outside the network or firewall). It is important to configure ports connected to DHCP servers as trusted
ports so that traffic to/from the server is not dropped.
When DHCP Snooping is enabled at the switch level, all DHCP packets received on all switch ports are
screened/filtered by DHCP Snooping. By default, only client DHCP traffic is allowed on the ports, unless
the trust mode for a port is configured to block or allow all DHCP traffic. See “Configuring the Port Trust
Mode” on page 28-29 for more information.
In addition, the following functionality is also activated by default when switch-level DHCP Snooping is
enabled:
• The DHCP Snooping binding table is created and maintained. To configure the status or add a static
entry to this table, use the ip helper dhcp-snooping binding command.
• MAC address verification is performed to compare the source MAC address of the DHCP packet with
the client hardware address contained in the packet. To configure the status of MAC address
verification, use the ip helper dhcp-snooping mac-address verification command.
• Option-82 data is inserted into the packet and then DHCP reply packets are only sent to the port from
where the DHCP request originated, instead of flooding these packets to all ports. To configure the
status of Option-82 data insertion, use the ip helper dhcp-snooping option-82 data-insertion
command.
• The base MAC address of the switch is inserted into the Circuit ID and Remote ID suboptions of the
Option-82 field. To configure the type of data (base MAC address, system name, or user-defined) that
is inserted into the Option-82 suboptions, use the ip helper dhcp-snooping option-82 format
command. The system name and user-defined text are reported in ASCII text format, but the MAC
address is still reported in hex-based format.
page 28-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring DHCP Security Features
When this feature is enabled at the VLAN level, DHCP Snooping functionality is only applied to ports
that are associated with a VLAN that has this feature enabled. Up to 64 VLANs can have DHCP Snoop-
ing enabled. Note that enabling DHCP Snooping at the switch level is not allowed if it is enabled for one
or more VLANs.
By default, when DHCP Snooping is enabled for a specific VLAN, MAC address verification and Option-
82 data insertion is also enabled for the VLAN by default. To disable or enable either of these two
features, use the ip helper dhcp-snooping vlan command with either the mac-address verification or
option-82 data-insertion parameters. For example:
-> ip helper dhcp-snooping vlan 200 mac-address verification disable
Note that if the binding table functionality is enabled, disabling Option-82 data insertion for the VLAN is
not allowed. See “Configuring the DHCP Snooping Binding Table” on page 28-31 for more information.
Note. If DHCP Snooping is not enabled for a VLAN, then all ports associated with the VLAN are consid-
ered trusted ports. VLAN-level DHCP Snooping does not filter DHCP traffic on ports associated with a
VLAN that does not have this feature enabled.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-29
Configuring DHCP Security Features Configuring DHCP and DHCPv6
It is also possible to specify a range of ports. For example, the following command changes the trust mode
for ports 2/1 through 2/10 to trusted:
-> ip helper dhcp-snooping port 2/1-10 trust
Note that it is necessary to configure ports connected to DHCP servers within the network and/or firewall
as trusted ports so that necessary DHCP traffic to/from the server is not blocked. Configuring the port
mode as trusted also identifies the device connected to that port as a trusted device within the network.
page 28-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring DHCP Security Features
Note that enabling the binding table functionality is not allowed if Option-82 data insertion is not enabled
at either the switch or VLAN level.
In addition, it is also possible to configure static binding table entries. This type of entry is created using
available ip helper dhcp-snooping binding command parameters to define the static entry. For example,
the following command creates a static DHCP client entry:
-> ip helper dhcp-snooping binding 00:2a:95:51:6c:10 port 1/15 address
17.15.3.10 lease-time 3 vlan 200
To remove a static binding table entry, use the no form of the ip helper dhcp-snooping binding
command. For example:
-> no ip helper dhcp-snooping binding 00:2a:95:51:6c:10 port 1/15 address
17.15.3.10 lease-time 3 vlan 200
To view the DHCP Snooping binding table contents, use the show ip helper dhcp-snooping binding
command. See the OmniSwitch AOS Release 6 CLI Reference Guide for example outputs of this
command.
Note. Do not manually change the dhcpBinding.db file. This file is used by DHCP Snooping to preserve
and maintain binding table entries. Changing the file name or contents can cause problems with this func-
tionality or with the DHCP Snooping application itself.
The amount of time, in seconds, between each automatic save is referred to as the binding table timeout
value. By default, the timeout value is 300 seconds. To configure this value, use the
ip helper dhcp-snooping binding timeout command. For example, the following command sets the time-
out value to 1500 seconds:
-> ip helper dhcp-snooping binding timeout 1500
Each time an automatic save is performed, the dhcpBinding.db file is time stamped.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-31
Configuring DHCP Security Features Configuring DHCP and DHCPv6
Synchronizing the binding table is only done when this command is used. There is no automatic
triggering of this function. In addition, it is important to note that synchronizing the binding table loads
dhcpBinding.db file contents into memory. This is the reverse of saving the binding table contents in
memory to the dhcpBinding.db file, which is done at automatic time intervals as defined by the binding
table timeout value. See “Configuring the Binding Table Timeout” on page 28-31 for more information.
When binding table retention is enabled, enries remain in the table for the term of their DHCP lease and
are not removed even when the MAC address for the entry is cleared from the MAC address table.
To disable binding table retention, use the following command:
-> ip helper dhcp-snooping binding persistency disable
Use the show ip helper command to determine the status of binding table retention.
page 28-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Verifying the DHCP Relay Configuration
show ip helper Displays the current forward delay time, the maximum number of hops,
the forwarding option (standard or AVLAN only), and each of the
DHCP server IP addresses configured. Also displays the current
configuration status for the DHCP relay agent information option
(Option-82) and DHCP Snooping features.
show ip helper stats Displays the number of packets the DHCP Relay service has received
and transmitted, the number of packets dropped due to forward delay
and maximum hops violations, and the number of packets processed
since the last time these statistics were displayed.
show ip udp relay service Displays the current configuration for UDP services by service name or
by service port number.
show ip udp relay statistics Displays the current statistics for each UDP port relay service. These
statistics include the name of the service, the forwarding VLAN(s)
configured for that service, and the number of packets the service has
sent and received.
show ip udp relay destination Displays the VLAN assignments to which the traffic received on the
specified UDP service port is forwarded.
show ip helper dhcp-snooping Displays a list of VLANs that have DHCP Snooping enabled and
vlan whether or not MAC address verification and Option-82 data insertion
is enabled for each VLAN.
show ip helper dhcp-snooping Displays the DHCP Snooping trust mode for the port and the number of
port packets destined for the port that were dropped due to a DHCP
Snooping violation.
show ip helper dhcp-snooping Displays the contents of the DHCP Snooping binding table (database).
binding
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-33
DHCPv6 Relay Overview Configuring DHCP and DHCPv6
page 28-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring DHCPv6 Relay
This can be configured using the ipv6 helper address command family. For details on usage, see
“Configuring the DHCPv6 Snooping Binding Table” on page 28-41
Messages received on clients ports are only forwarded to trusted ports and not to other client ports. On
client ports, the following messages are discarded as server violations:
• Advertise
• Reply
• Reconfigure
• Relay-Reply
A client port can also be configured as client-only-trusted or client-only-untrusted. When a client port is
client-only-untrusted, the Relay-Forward message is discarded.The LDRA intercepts any DHCPv6
message received on client ports. DHCPv6 messages are identified with a source address, destination
address for multicast as All DHCPv6 Relay Agent and Servers (FF02::1:2) and a UDP destination port
547.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-35
Configuring DHCPv6 Relay Configuring DHCP and DHCPv6
Global DHCPv6
For the global DHCPv6 service, you must identify an IP address for the DHCPv6 server.
The DHCPv6 Relay forwards DHCPv6 broadcasts to and from the specified address. If multiple DHCPv6
servers are used, one IP address must be configured for each server. You can configure up to 256
addresses for each relay service.
To delete an IP address, use the no form of the ipv6 helper address command. The IP address specified
with this syntax is deleted. If an IP address is not specified with this syntax, then all IP helper addresses
are deleted. The following command deletes an IP helper address:
-> ipv6 helper no address 2001::5
Per-VLAN DHCPv6
For the Per-VLAN DHCPv6 service, you must identify the number of the VLAN that makes the relay
request.
The following syntax identifies the IPv6 address 2001::5 as the DHCPv6 server for range of VLANs
from 100 to 105:
-> ipv6 helper address 2001::5 vlan 100-105
The following syntax identifies two DHCPv6 servers for VLAN 200 at two different IP addresses:
-> ip helper address 2001::5 2001::6 vlan 200
To delete an IPv6 address, use the no form of the ipv6 helper address command. The IPv6 address
specified with this syntax is deleted. If an IPv6 address is not specified with this syntax, then all IPv6
helper addresses are deleted. The following command deletes a helper address for IPv6 address 2001::5:
-> ipv6 helper no address 2001::5
page 28-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Configuring DHCPv6 Relay
The only parameter that is required for DHCPv6 relay is the IPv6 address to the DHCPv6 server. The
default values can be accepted for hop count and relay forwarding option.
Alternately the relay function can be provided by an external router connected to the switch; in this case,
the relay is configured on the external router.
The hops value represents the maximum number of relays. The range is from one to 32 hops. The default
maximum hops value is set to 32. This maximum hops value only applies to DHCPv6 Relay. All other
switch services ignore this value.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-37
Configuring DHCPv6 Relay Configuring DHCP and DHCPv6
Configuring Interface ID
Use the ipv6 helper interface-id prefix command to configure Interface ID manually with a user-defined
string. For example,
-> ipv6 helper interface-id prefix pool-1
Configuring Remote ID
Use the ipv6 helper remote-id format command to configures the type of information that is inserted into
the Remote ID suboption. The information is inserted into the Remote ID field in ASCII text string format.
Use the following commands to set the remote-id in the relevant formats. For details on syntax definition
refer the ipv6 helper remote-id format command in OmniSwitch AOS Release 6 CLI Reference Guide.
-> ipv6 helper remote-id enterprise-number 100
To configure the switch to use the interface-alias previously configured using the interfaces alias
command:
-> ipv6 helper remote-id format interface-alias
To configure the switch to automatically generate the interface-alias in the system name and slot/port
format use the following command:
-> ipv6 helper remote-id format auto-interface-alias
To disable remote-id or remove the enterprise-number use the disable option as follows:
-> ipv6 helper remote-id format disable
page 28-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCPv6 Snooping Configuration Guidelines
VRF Support
The global relay IPv6 address or per-VLAN relay IPv6 address can only be configured on the default
VRF.
Note. DHCPv6 Snooping drops server packets received on untrusted ports (ports that connect to devices
outside the network or firewall). It is important to configure ports connected to DHCPv6 servers as trusted
ports so that traffic to/from the server is not dropped.
When DHCPv6 Snooping is enabled at the switch level, all DHCPv6 packets received on all switch ports
and link aggregates are screened/filtered by DHCPv6 Snooping. By default, only client DHCPv6 traffic is
allowed on the ports, unless the trust mode for a port is configured to block or allow all DHCPv6 traffic.
See “Configuring the Trust Mode for Ports and Link Aggregates” on page 28-40 for more information.
In addition, the following functionality is also activated by default when switch-level DHCPv6
Snooping is enabled:
• The DHCPv6 Snooping binding table is created and maintained. To configure the status of DHCPv6
snooping, use the ipv6 helper dhcp-snooping binding command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-39
DHCPv6 Snooping Configuration Guidelines Configuring DHCP and DHCPv6
When this feature is enabled at the VLAN level, DHCPv6 Snooping functionality is only applied to ports
that are associated with a VLAN that has this feature enabled. Up to 256 VLANs can have DHCPv6
Snooping enabled. Note that enabling DHCPv6 Snooping at the switch level is not allowed if it is enabled
for one or more VLANs.
Note. If DHCPv6 Snooping is not enabled for a VLAN, then all ports associated with the VLAN are
considered trusted ports.
It is also possible to specify a range of ports. For example, the following command changes the trust mode
for ports 2/1 through 2/10 to trusted:
-> ipv6 helper dhcp-snooping port 2/1-10 trusted
Note. It is necessary to configure ports connected to DHCPv6 servers within the network and/or
firewall as trusted ports so that necessary DHCPv6 traffic to/from the server is not blocked.
Configuring the port mode as trusted also identifies the device connected to that port as a trusted device
within the network.
page 28-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 DHCPv6 Snooping Configuration Guidelines
Similarly, to configure the trust mode for link aggregates, use the ipv6 helper dhcp-snooping linkagg
command. For example,
-> ipv6 helper dhcp-snooping linkagg 1 trusted
Note. Do not manually change the dhcpv6bind.db file. This file is used by DHCPv6 Snooping to
preserve and maintain binding table entries. Changing the file name or contents can cause problems with
this functionality or with the DHCPv6 Snooping application itself.
The amount of time, in seconds, between each automatic save is referred to as the binding table timeout
value. By default, the timeout value is 300 seconds. To configure this value, use the
ipv6 helper dhcp-snooping binding timeout command. For example, the following command sets the
timeout value to 1500 seconds:
-> ipv6 helper dhcp-snooping binding timeout 1500
Each time an automatic save is performed, the dhcpv6bind.db file is time stamped.
Synchronizing the binding table is only done when this command is used. There is no automatic
triggering of this function. In addition, it is important to note that synchronizing the binding table loads
dhcpv6bind.db file contents into memory. This is the reverse of saving the binding table contents in
memory to the dhcpv6bind.db file, which is done at automatic time intervals as defined by the binding
table timeout value. See “Configuring the Binding Table Timeout” on page 28-31 for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-41
DHCPv6 Snooping Configuration Guidelines Configuring DHCP and DHCPv6
When binding table retention is enabled, entries remain in the table for the term of their DHCPv6 lease and
are not removed even when the MAC address for the entry is cleared from the MAC address table.
To disable binding table retention, use the following command:
-> ipv6 helper dhcp-snooping binding persistency disable
Use the show ipv6 helper command to determine the status of binding table retention.
page 28-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP and DHCPv6 Verifying the DHCPv6 Relay Configuration
show ipv6 helper Displays the current DHCPv6 Relay, Relay Agent information and
DHCPv6 snooping configurations.
show ipv6 helper stats Displays the IPv6 helper statistics information.
show ipv6 helper dhcp- Displays a list of VLANs that have DHCPv6 Snooping enabled.
snooping vlan
show ipv6 helper dhcp- Displays the trust mode and DHCPv6 Snooping violation statistics for
snooping port all switch ports that are filtered by DHCPv6 Snooping.
show ipv6 helper dhcp- Displays the contents of DHCPv6 Snooping binding table (database).
snooping binding
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 28-43
Verifying the DHCPv6 Relay Configuration Configuring DHCP and DHCPv6
page 28-44 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
29 Configuring Web Cache
Services
Web Cache Communication Protocol (WCCP) is a content-routing protocol that provides a mechanism to
redirect traffic flows to a cluster of cache servers. WCCP allows utilization of web cache engines (or other
caches running WCCP) to localize web traffic patterns in the network, enabling content requests to be
fulfilled locally. Traffic localization reduces transmission costs and download time.The WCCPv2 enabled
switches would redirect the traffic on configured protocol (TCP/UDP) ports on the cache engine instead of
the intended hosts directly.
The protocol version used in this release is WCCPv2.
In This Chapter
This chapter describes the basic components of WCCP and how to configure it through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide. This chapter provides an
overview of WCCP and includes the following information:
• “WCCP Specifications” on page 29-2
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 29-1
WCCP Specifications Configuring Web Cache Services
WCCP Specifications
Note that the maximum limit values provided in the following specifications table are subject to available
system resources:
WCCP Defaults
The table below lists default values for WCCP.
page 29-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Web Cache Services Understanding WCCP
Understanding WCCP
WCCP enables supported switches to transparently redirect traffic to a cluster of cache-servers. The server
can be a web cache engine or any kind of cache engine. WCCP allows utilization of web cache engines (or
other caches running WCCP) to localize web traffic patterns in the network, enabling content requests to
be fulfilled locally. Traffic localization reduces transmission costs and download time. The WCCPv2
enabled switches would redirect the traffic on configured protocol (TCP/UDP) ports on the cache engine
instead of the intended hosts directly. WCCP Protocol involves two major functions:
• It allows the WCCP enabled router for transparent redirection to discover, verify, and advertise
connectivity to one or more cache servers. This would allow deploying cache servers without the need
to reconfigure the cache-server at the client location.
• It allows the designated web-cache to dictate how the router distributes redirected traffic across the
cache server cluster.
The following illustration represents a simple and basic WCCP connection mechanism in a network:
Cache Engine
Client
Layer 2/3 Switch Layer 2/3 Switch
Router
Running
WCCP Cache Engine
Client
Internet
Layer 2/3 Switch
In the network, the client, layer 2/3 switch, router running WCCP and the cache-engines are connected as
follows:
• The clients are connected to the router running WCCP through the layer 2/3 switch.
• The cache-engines are connected to the router running WCCP through the layer 2/3 switch.
• The cache-engines are connected to the internet through the layer 2/3 switch.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 29-3
Understanding WCCP Configuring Web Cache Services
Working Concept
1. In a network, when a client makes a request for any content, the request goes to the router.
2. The router running WCCP protocol intercepts the request and redirects the request to a designated cache
engine.
3. The cache engine acts as the intended host if the requested information is available with it and responds
to that request. If the requested information is not present in the cache engine, then the request is sent to
the intended host. When the required information is received from the host to be sent to the requested
client, the received information will be cached in the cache engine to be used the next time when there is
a similar request.
WCCP Components
The following section highlights various aspects of WCCP:
Cache Engine is a dedicated network server or a service acting as a server that saves the requested infor-
mation or content locally. The previously requested information is placed in temporary storage or cache.
This helps to both speed up access to data and reduce demand on bandwidth.
Service Groups are the defined using a service ID. The service ID can range between 0 to 255. A service
group could be a well known service “web-cache” (service-number = 0) or it could be a dynamic service
(service–number between 1 to 255).
MD5 (Message-Digest algorithm 5) is the encryption used for WCCP protocol message exchanges. All
WCCP messages can be authenticated using a MD5 signature. The password for the service group is
optional.
Benefits of WCCP
The benefit of using WCCP protocol in the network are as follows:
• WCCP reduces the response time for the requested content.
• WCCP provides security or authentication using the MD5 authentication for the messages exchanged.
Disabling WCCP
When the WCCP is disabled on the switch, all the learnt cache-engines is removed from participating in
the service group and the traffic redirection becomes inactive.
page 29-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Web Cache Services Quick Steps for Configuring WCCP
Take-over
During the takeover event the traffic redirection would be affected only to the NI that gets rebooted.
NI Hot Swap
If the NI hot swapped have the caches connected to it then the traffic directed to those web caches is
affected till the NI is swapped in.
Reboot
When the NI is rebooted the traffic redirection to the ports belonging to that NI is ceased.
2 Create a service group using the ip wccp service-group web-cache md5 command.
For example, to create a service group with the service ID 10, enter the following command at the CLI
prompt:
-> ip wccp service-group 10
3 Set the MD5 authentication (optional) using the ip wccp service-group web-cache md5 command.
The maximum password length is eight characters.
For example, to set the MD5 password as “san” for the created service group 10, enter the following
command at the CLI prompt:
-> ip wccp service-group 10 md5 password san
4 Verify the configured WCCP services using the show ip wccp services command as shown below:
5 Verify the web-caches learned for the service group using the show ip wccp cache-engines command
as shown below:
-> show ip wccp cache-engines
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 29-5
Quick Steps for Configuring WCCP Configuring Web Cache Services
6 Verify the global WCCP information using the show ip wccp service-group command as shown
below:
-> show ip wccp
Note. To view the other configuration and statistics details for WCCP see “Displaying WCCP Configura-
tion and Statistics” on page 25-9. The WCCP statistics for the service group can be cleared by using the
clear ip wccp command. For more information about the command, see the OmniSwitch AOS Release 6
CLI Reference Guide.
page 29-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Web Cache Services Configuring WCCP
Configuring WCCP
This section describes commands to configure WCCP on a switch.
• “Configuring Service Groups” on page 29-7
For example, to configure a service group “web-cache”, enter the following command at the CLI prompt:
-> ip wccp service-group web-cache
For example, to set the MD5 authentication password as “san” for the created service group web-cache,
enter the following command at the CLI prompt:
-> ip wccp service-group web-cache md5 password san
For example, to restrict the port 20 on slot 1 from processing WCCP messages in service group web-
cache, enter the following command at the CLI prompt:
-> ip wccp service-group web-cache restrict port 1/20
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 29-7
Configuring WCCP Configuring Web Cache Services
For example, to restrict the VLAN 20 from processing WCCP messages in service group 10, enter the
following command at the CLI prompt:
-> ip wccp service-group 10 restrict vlan 20
Configuring IP Restrictions
The cache engine for the specified service group can be excluded from processing WCCP messages.
To restrict the cache engine from processing the WCCP messages in the service group, use the ip wccp
service-group web-cache restrict command along with the “IP” parameter.
For example, to restrict the ip address 30.0.0.20 from processing the WCCP messages in service group 10,
enter the following command at the CLI prompt:
-> ip wccp service-group 10 restrict ip 30.0.0.20
For example, to clear the statistics for the service group 10, enter the following command at the CLI
prompt:
-> clear ip wccp service-group 10
page 29-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Web Cache Services Displaying WCCP Configuration and Statistics
For more information about the output details that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 29-9
Displaying WCCP Configuration and Statistics Configuring Web Cache Services
page 29-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
30 Configuring DHCP Server
The Dynamic Host Configuration Protocol (DHCP) offers a framework to provide configuration
information to client interfaces on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP)
and provides additional capabilities like dynamic allocation of reusable network addresses and
configuration options.
A DHCP server provides dynamic IP addresses on lease for client interfaces on a network. It manages a
pool of IP addresses and information about client configuration parameters. The DHCP server obtains an
IP address request from the client interfaces. After obtaining the requests, the DHCP server assigns an IP
address, a lease period, and other IP configuration parameters, such as the subnet mask and the default
gateway.
This chapter describes how to configure the internal DHCP server on the OmniSwitch.
In This Chapter
This chapter describes configuration of the DHCP server and how to modify the configuration through the
Command Line Interface (CLI). CLI commands are used in the configuration examples; for more details
on the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• “DHCP Server Specifications” on page -2.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-1
DHCP Server Specifications Configuring DHCP Server
Dynamic DHCP:
The DHCP server assigns an IP address to a client for
a limited period of time or until the client explicitly
releases the address.
page 30-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Quick Steps to Configure Internal DHCP Server
Note. For detailed information on how to configure the DHCP server on OmniSwitch, see the Configuring
DHCP Server on OmniSwitch section.
2 Copy the dhcpd.conf.template file and save it as dhcpd.conf. The dhcpd.conf file can then be
customized as necessary.
3 Copy the dhcpd.pcy.template file and save it as dhcpd.pcy. The dhcpd.pcy file can then be custom-
ized as necessary.
4 Customize the dhcp.conf and dhcpd.pcy files according to your requirements. Use the vi command to
modify the existing configuration file.
-> vi dhcpd.conf
Declare dynamic DHCP options, global options, and server configuration parameters for client
interfaces in the dhcpd.conf file. Add DHCP related information for a particular subnet.
For example, for the subnet 200.0.0.0, define the dynamic DHCP range, router option, domain name and
other details using the following code:
server-identifier sample.example.com;
Note. See “Configuration File Parameters and Syntax” on page -13 topic of the Configuring DHCP Server
section for details on what each of the optional keywords specify.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-3
Quick Steps to Configure Internal DHCP Server Configuring DHCP Server
5 After entering the required information in the dhcpd.conf file. Type :wq to save the changes made to
the dhcpd.conf file.
Note.
• If the dhcpd.conf file is corrupted, the dhcpd.conf.lastgood file is used as a backup file.
• If the dhcpd.conf file is updated successfully, then the dhcpd.conf.lastgood file is over written with
the configurations present in the dhcpd.conf file.
• Properly configured dhcpd.conf and dhcpd.pcy files can be transferred to the switch remotely instead
of using the vi editor.
6 Restart the DHCP server using the dhcp-server command. The changes made in the dhcpd.conf file
are applied to the OmniSwitch.
-> dhcp-server restart
Note. The dhcp-server restart command automatically updates the dhcpd.conf, dhcpd.conf.lastgood
and dhcpd.pcy files.
page 30-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server DHCP Server Overview
A DHCP server uses the Dynamic Host Configuration Protocol to provide initialization parameters to the
clients in the network.
4 The server responds with a dynamic address in a defined range or one based on a MAC address.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-5
Interaction With Other Features Configuring DHCP Server
• Dynamically modify the DHCP configuration, using the vi editor, or through an accurately configured
text file transferred to the switch.
• Restart the DHCP server.
• View the DHCP server statistics through the command line interface.
BootP/UDP Relay
The BootP/UDP relay is automatically disabled on the default VRF when the internal DHCP server is
enabled on the switch.
DHCP Snooping
Internal DHCP server and DHCP snooping are mutually exclusive and cannot function together in the
default VRF. DHCP snooping security is disabled when the DHCP server feature is enabled on the switch
since the DHCP server is internal and secure.
IP Interfaces
The DHCP client gets a lease only if the switch has an IP interface and the DHCP server is configured for
that particular subnet. If there are no IP address ranges defined for the incoming client interface, then the
client is not assigned a lease.
In case of IP multinetting, the primary interface address is used to calculate the subnet of the interface. If
there are no IP interfaces configured in the system, then the packet sent from the client is dropped.
page 30-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuring DHCP Server on OmniSwitch
• DHCP Configuration files: The dhcpd.conf file is used to configure specific DHCP server settings
on the switch such as IP address ranges and options. The dhcpd.conf.lastgood file is a backup for the
dhcpd.conf file.
• DHCP Server Database file: The dhcpSrv.db file is activated only during takeover and server restart
of the DHCP server. It contains lease details of the client IP addresses.
Policy file
The policy file is used to configure the DHCP related policies according to user requirements. The
dhcpd.pcy.template file provides a basic template to create a policy file. The DHCP server policy
parameters can be defined using the policy file. Ideally, most of the server parameters are kept static.
The updated dhcpd.pcy file is effective only after the dhcp-server command on page 20-77 is ip helper
address performed.
See the Policy File Parameters and Syntax table for additional information on individual policy
parameters and how to apply the policies for internal DHCP server on the OmniSwitch.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-7
Configuring DHCP Server on OmniSwitch Configuring DHCP Server
• dhcpd.conf.lastgood file
The following sections provide detailed information on the dhcpd.conf and dhcpd.conf.lastgood files.
dhcpd.conf File
The dhcpd.conf file is used to declare DHCP options and global options for the DHCP clients. The
dhcpd.conf.template file contains the default configuration parameters to setup the internal DHCP server.
The template file can be copied to the dhcpd.conf file for editing.
The dhcpd.conf can be used to define the following:
• IP subnets
• Declarations: Describe the topology of the network and provide addresses for the clients. Parameters
can be listed under declarations that override the global parameters.
• Comments: Provide a description for the parameters and declarations. Lines beginning with a hash
mark (#) are considered comments and they are optional.
#IP subnet
subnet 200.0.0.0 netmask 255.255.255.0
{
#Dynamic scope and parameters that apply to this scope overriding global params.
page 30-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuring DHCP Server on OmniSwitch
Note. A subnet declaration must be included for every subnet in the network related to the DHCP server.
Details about valid parameters and declarations are listed in the table - Configuration File Parameters and
Syntax
dhcpd.conf.lastgood File
The dhcpd.conf.lastgood file is used as a backup file when the dhcpd.conf file is corrupted. If the
dhcpd.conf file is affected, then the DHCP server generates an error. In such an instance, the DHCP
server configuration is updated according to the dhcpd.conf.lastgood file. The dhcpd.conf.lastgood file
is now used to configure the internal DHCP server, provide IP addresses on lease, and maintain DHCP
related information.
The dhcpd.conf.lastgood file is overwritten with the configurations in the dhcpd.conf file when the
DHCP configurations are setup or updated and the internal DHCP server is restarted successfully. At this
point, the dhcpd.conf and dhcpd.conf.lastgood files are identical.
If any modifications are made in the dhcpd.conf file, the DHCP server must be restarted so that the
configuration is updated on the OmniSwitch. The dhcp-server command automatically updates the
dhcpd.conf and dhcpd.conf.lastgood files.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-9
DHCP Server Application Example Configuring DHCP Server
3 The dhcpd.conf file defines the 200.0.0.X network and 220.0.0.X network.
4 The subnet mask and DNS server address are global declarations since they are the same for each
subnet.
5 The default router address and lease times are declared as a part of the scope since they are different for
each subnet.
6 The resulting sample code for the dhcpd.conf file is as follows:
#Global parameters
option subnet-mask 255.255.255.0;
option domain-name-servers 200.0.0.99;
subnet 200.0.0.0 netmask 255.255.255.0
{
dynamic-dhcp range 200.0.0.11 200.0.0.20
{
option routers 200.0.0.254;
option dhcp-lease-time 20000;
}
}
page 30-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server DHCP Server Application Example
OmniSwitch
200.0.0.254
with
DHCP Relay
IP ROUTER AND
10 DHCP SERVER
11 13
12
IN OUT
...
200.0.0.11-20 200.0.0.99
DHCP Clients DNS Server
220.0.0.103
DHCP Clients
Illustration of Internal DHCP Server application example
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-11
Verifying DHCP Server Configuration Configuring DHCP Server
show dhcp-server leasesshow Displays the leases offered by the DHCP server.
dhcp-server leases
show dhcp-server statistics Displays the statistics of the DHCP server.
page 30-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuration File Parameters and Syntax
4 time-server option time- N/A Same as in Specifies IP address of the RFC 868
server Subnet time server available to the client.
10.10.0.10;
Profile
5 name-servers option name- ip_ N/A Specifies IP address of the IEN-116
servers address_ name server available to the client.
10.10.0.100;
list
6 domain-name- option domain- N/A Same as in Lists the DNS (STD 13, RFC 1035)
servers name-servers Subnet name server IP address(es)
10.10.0.30; Profile available to the client. Servers should
be listed in order of
preference.
7 log-servers option ip_ N/A Specifies the IP address of the MIT-
log-servers address_ LCS UDP log server available to the
10.10.0.100;
list client.
8 cookie- option cookie- ip_ N/A Specifies the IP address of the RFC
servers servers address_ 865 cookie server available to the
10.10.0.100;
list client.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-13
Configuration File Parameters and Syntax Configuring DHCP Server
page 30-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-15
Configuration File Parameters and Syntax Configuring DHCP Server
33 static-routes option static- ip_address_ N/A Specifies the list of static routes that
routes pair_list the client should install in its routing
10.10.0.100
10.10.0.200;
cache. If multiple routes to the same
destination are specified, they are
listed in descending order of priority.
The routes consist of a list of IP
address pairs. The first address is the
router for the destination. The default
route (0.0.0.0) is an illegal
destination for a static route.
34 "trailer-encap- option boolean False Select True to identify whether the
sulation" trailer-encap- client should negotiate the use of
sulation
false;
trailers (RFC 893) when using the
Address Resolution Protocol (ARP) .
Select False to prevent the use of
trailers.
35 arp-cache- option arp- numeric N/A Specifies the time-out in seconds for
timeout cache-timeout ARP cache entries, from 0 to
10;
2,147,483,647.
page 30-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-17
Configuration File Parameters and Syntax Configuring DHCP Server
page 30-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-19
Configuration File Parameters and Syntax Configuring DHCP Server
page 30-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-21
Configuration File Parameters and Syntax Configuring DHCP Server
page 30-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-23
Configuration File Parameters and Syntax Configuring DHCP Server
option 177
[010378797a020
378797a0303787
97a040378797a0
50378797a06037
8797a070100080
100090378797a]
;
TSP Primary ip_address N/A Specifies the IP address of the TSP’s
DHCP Server primary DHCP server from which an
Address MTA is permitted to accept a DHCP
OFFER.
TSP ip_address N/A Specifies the IP address of the TSP’s
Secondary secondary DHCP server from which
DHCP Server an MTA is permitted to accept a
Address DHCP OFFER.
TSP IP_address MTAs communicate with the
Provisioning Provisioning server at various stages
Server in their provisioning process. Enter
Address either the IP address or the FQDN of
the TSP's Provisioning server.
TSP ASREQ/ sub-option N/A Configures an MTA’s Kerberos
AS-REP ASREQ/AS-REP timeout, backoff,
Backoff and and retry mechanism. Enter a
Retry Nominal Timeout value in millisec-
onds, a Maximum Timeout value in
seconds and a Maximum Retry
value. All these values are unsigned.
TSP Kerberos text N/A The Packet Cable architecture
Realm Name requires an MTA to authenticate
itself to the TSP’s network through
the Kerberos protocol. A Kerberos
Realm name is required at the MTA
to permit a DNS lookup for the
address of the TSP’s Kerberos Key
Distribution Center (KDC) entity.
Note: The realm name must be all
capital letters and conform to domain
name syntax (HOST.SUBDOMAIN
.DOMAIN).
page 30-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Configuration File Parameters and Syntax
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-25
Policy File Parameters and Syntax Configuring DHCP Server
page 30-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Policy File Parameters and Syntax
Default
Num Policy Usage Description
Value
6 Honor Honor True If this policy is set to True, the DHCP server provides
Requested Requested the requested lease time to the client.
Lease
LeaseTime Time = False
If this policy is set to False, the server offers the
configured lease time.
7 Lease Lease 60000 Specifies the time interval in milli seconds after which
Expiration Expiration msecs the lease expiration processing occurs.
SleepTime =
SleepTime 120000
Note: This value must not be less than 1 minute.
8 MaxPending MaxPending 10 Specifies the number of seconds that an offered lease
Seconds Seconds = 20 remains in a pending state.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-27
Policy File Parameters and Syntax Configuring DHCP Server
Default
Num Policy Usage Description
Value
15 PingRetention Ping 0 Specifies the number of seconds for which a ping is
Retention valid. If a ping is attempted and no response is returned,
= 200
then the address is considered to be available. During
the ping retention period, other ping requests are
ignored.
18 PingBefore PingBefore True If this value is set to True, the DHCP server performs a
ManualDhcp ManualDhcp ping before assigning a static DHCP address. If an
= False
ICMP_REPLY is received from the ping, then the
DHCP offer is not sent to the client and the address is
marked as unavailable.
19 PingBefore PingBefore False If this value is set to True, the DHCP server performs a
ManualBootp ManualBootp ping before assigning a static BootP address. If an
= True
ICMP_REPLY is received, the BootP reply is not sent
to the client, and the BootP address is marked as
unavailable.
20 Registered Registered False This poilcy is used when the MAC pool addresses are
ClientsOnly Clients defined at either the global or the subnet level.
Only = True
If this value is set to True, the DHCP information is
provided to the clients that have a known MAC address
(configured in a MAC pool). If MAC pool addresses
are not defined at either the global or the subnet level,
the none of the devices are provided a DHCP lease.
21 SendRequested Send False If this value is set to True, the DHCP server sends only
ParamsOnly Requested the options requested by the client.
Params
Only = True
For example, if the client sends a DHCP parameter
request list - option (55) in the Discover packet, then
the server sends only the options that are both
configured and requested by the client.
The subnet-mask (1) and lease-time (51) options are
always sent to the client, in addition to the IP address.
page 30-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring DHCP Server Policy File Parameters and Syntax
Default
Num Policy Usage Description
Value
22 SupportRelay SupportRelay False If this policy is set to True, the server supports the
AgentDevice AgentDevice assignment of DHCP options by the DOCSIS device
Class = True
Class class.
23 ZeroCiAddr ZeroCiAddr False This policy affects the contents of the “ciaddr” field in
= True outgoing packets.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 30-29
Policy File Parameters and Syntax Configuring DHCP Server
page 30-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
31 Configuring VRRP
The Virtual Router Redundancy Protocol (VRRPv2/VRRPv3) is a standard router redundancy protocol
supported in IPv4/IPv6, based on RFC 3768 and RFC 2787. It provides redundancy by eliminating the
single point of failure inherent in a default route environment. The VRRPv2/VRRPv3 router, which
controls the IPv4/IPv6 address associated with a virtual router is called the master router, and is
responsible for forwarding virtual router advertisements. If the master router becomes unavailable, the
highest priority backup router transitions to the master state. The Alcatel-Lucent implementation of VRRP
also supports the collective management of virtual routers on a switch.
Note. This VRRPv3 implementation is based on the latest Internet Draft, Virtual Router Redundancy
Protocol for IPv6, September 2004.
Note. RFC 3768, which obsoletes RFC 2338, does not include support for authentication types. As a
result, configuring VRRP authentication is no longer supported in this release.
In This Chapter
This chapter describes VRRPv2/VRRPv3 and how to configure it through the Command Line Interface
(CLI). CLI commands are used in the configuration examples; for more details about the syntax of
commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
This chapter provides an overview of VRRP and includes information about the following:
• Virtual routers—see “Creating/Deleting a Virtual Router” on page 31-10.
• IP addresses for virtual routers—see “Specifying an IP Address for a Virtual Router” on page 31-11.
• Preempting virtual routers—see “Setting Preemption for Virtual Routers” on page 31-13.
• IPv6 addresses for VRRPv3 virtual routers—see “Specifying an IPv6 Address for a VRRPv3 Virtual
Router” on page 31-21.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-1
In This Chapter Configuring VRRP
• Accept mode for master router—see “Configuring the VRRPv3 Advertisement Interval” on
page 31-21.
• VRRPv3 advertisement interval—see “Configuring the VRRPv3 Advertisement Interval” on
page 31-21.
• VRRPv3 Virtual router priority—see “Configuring the VRRPv3 Virtual Router Priority” on
page 31-22.
• Preempting VRRPv3 virtual routers—see “Setting Preemption for VRRPv3 Virtual Routers” on
page 31-22.
• VRRPv3 traps—see “Setting VRRPv3 Traps” on page 31-23.
• Verifying the VRRP configuration—see “Verifying the VRRPv3 Configuration” on page 31-24.
page 31-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Specifications
VRRP Specifications
RFCs Supported RFC 3768–Virtual Router Redundancy Protocol
RFC 2787–Definitions of Managed Objects for the Virtual
Router Redundancy Protocol
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Compatible with HSRP? No
Maximum number of VRRPv2 and VRRPv3 255 per switch
virtual routers combined
Maximum number of IP addresses 255 per virtual router
VRRP Defaults
The following table lists the defaults for VRRP configuration through the vrrp command and the relevant
command keywords:
The following table lists the defaults for VRRP configuration using the VRRP collective management
features and the relevant command:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-3
VRRP Defaults Configuring VRRP
page 31-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP Quick Steps for Creating a Virtual Router
-> vrrp 6 4
The VLAN must already be created on the switch. For information about creating VLANs, see
Chapter 4, “Configuring VLANs.”
3 Repeat steps 1 through 2 on all of the physical switches that participate in backing up the address(es)
associated with the virtual router.
4 Enable VRRP on each switch.
Note. Optional. To verify the VRRP configuration, enter the show vrrp command.The display is similar
to the one shown here:
VRRP trap generation: Enabled
VRRP startup delay: 45 (expired)
IP Admin Adv
VRID VLAN Address(es) Status Priority Preempt Interval
----+ ----+ -------------+----------+----------+--------+---------
6 4 10.10.2.3 Enabled 100 yes 1
For more information about this display, see the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-5
VRRP Overview Configuring VRRP
VRRP Overview
VRRP allows the routers on a LAN to backup a default route. VRRP dynamically assigns responsibility
for a virtual router to a physical router (VRRP router) on the LAN. The virtual router is associated with an
IP address (or set of IP addresses) on the LAN. A virtual router master is elected to forward packets for the
virtual router IP address. If the master router becomes unavailable, the highest priority backup router
transitions to the master state.
Note. The IP address that is backed up can be the IP address of a physical router, or it can be a virtual IP
address.
The example provided here is intended for understanding VRRP and does not show a configuration that
would be used in an actual network.
VRRP Routers
OmniSwitch A OmniSwitch B
VRID 1
Master 1 Backup 1 Virtual Router
IP A
IP A IP B
default gateway to IP A
client station
In this example, each physical router is configured with a virtual router, VRID 1 which is associated with
IP address A. OmniSwitch A is the master router because it contains the physical interface to which IP
address A is assigned. OmniSwitch B is the backup router. The client is configured with a gateway address
of IP A.
When VRRP is configured on these switches, and both the switches are available, OmniSwitch A responds
to ARP requests for IP address A using the virtual router MAC address (00:00:5E:00:01:01) instead of the
physical MAC address assigned to the interface. OmniSwitch A accepts packets sent to the virtual MAC
address and forward them as appropriate; it also accepts packets addressed to IP address A (such as ICMP
ping requests).
OmniSwitch B responds to ARP requests for IP address B using the interface physical MAC address. It
does not respond to ARP requests for IP address A or to the virtual router MAC address.
page 31-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Overview
If OmniSwitch A becomes unavailable, OmniSwitch B becomes the master router. OmniSwitch B then
responds to ARP requests for IP address A using the virtual router MAC address (00:00:5E:00:01:01). It
also forwards packets for IP address B and respond to ARP requests for IP address B using the
OmniSwitch physical MAC address.
OmniSwitch B uses IP address B to access the LAN. However, IP address B is not backed up. Therefore,
when OmniSwitch B becomes unavailable, IP address B also becomes unavailable.
Note. A limitation of the OmniSwitch is that a single VRID can be associated with a VLAN.
Each VRRP router can backup one or more virtual routers. The VRRP router containing the physical inter-
faces to which the virtual router IP addresses are assigned is called the IP address owner. If it is
available, the IP address owner functions as the master router. The master router assumes the
responsibility of forwarding packets sent to the IP addresses associated with the virtual router and
answering ARP requests for these addresses.
To minimize network traffic, only the master router sends VRRP advertisements on the LAN. The IP
address assigned to the physical interface on the current master router is used as the source address in
VRRP advertisements. The advertisements communicate the priority and state of the master router
associated with the VRID to all VRRP routers. The advertisements are IP multicast datagrams sent to the
VRRP multicast address 224.0.0.18 (as determined by the Internet Assigned Numbers Authority).
If a master router becomes unavailable, it stops sending VRRP advertisements on the LAN. The backup
routers know that the master is unavailable based on the following algorithm:
Master Down Interval = (3 * Advertisement Interval) + Skew Time
where Advertisement Interval is the time interval between VRRP advertisements, and Skew Time is
calculated based on the VRRP router priority value as follows:
Skew Time = (256 - Priority) / 256
If the backup routers are configured with priority values that are close in value, there can be a timing
conflict, and the first backup to take over can not be the one with the highest priority; and a backup with a
higher priority then preempts the new master. The virtual router can be configured to prohibit any
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-7
VRRP Overview Configuring VRRP
preemption attempts, except by the IP address owner. An IP address owner, if it is available, always
becomes master of any virtual router associated with its IP addresses.
Note. Duplicate IP address/MAC address messages can display when a backup takes over for a master,
depending on the timing of the takeover and the configured advertisement interval. This is particularly true
if more than one backup is configured.
This mapping provides for up to 255 virtual routers (VRRPv2 and VRRPv3 combined) on an OmniSwitch.
ARP Requests
Each virtual router has a single well-known MAC address, which is used as the MAC address in ARP
instead of a VRRP router physical MAC address. When an end host sends an ARP request to the master
router IP address, the master router responds to the ARP request using the virtual router MAC address. If a
backup router takes over for the master, and an end host sends an ARP request, the backup replies to the
request using the virtual router MAC address.
Gratuitous ARP requests for the virtual router IP address or MAC address are broadcast when the
OmniSwitch becomes the master router. For VRRP interfaces, gratuitous ARP requests are delayed at
system boot until both the IP address and the virtual router MAC address are configured.
If an interface IP address is shared by a virtual router, the routing mechanism does not send a gratuitous
ARP for the IP address (since the virtual router sends a gratuitous ARP). This prevents traffic from being
forwarded to the router before the routing tables are stabilized.
ICMP Redirects
ICMP redirects are not sent out over VRRP interfaces.
page 31-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP Interaction With Other Features
VRRP Tracking
A virtual router priority can be conditionally modified to prevent another router from taking over as
master. Tracking policies are used to conditionally modify the priority setting whenever a slot/port, IP
address and or IP interface associated with a virtual router goes down.
A tracking policy consists of a tracking ID, the value used to decrease the priority value, and the slot/port
number, IP address, or IP interface name to be monitored by the policy. The policy is then associated with
one or more virtual routers.
Note. VRRP3 does not support the collective management functionality in this release.
• Router Discovery Protocol (RDP)—If RDP is enabled on the switch, and VRRP is enabled, RDP
advertises VLAN IP addresses of virtual routers depending on whether there are virtual routers active
on the LAN, and whether those routers are backups or masters. When there are no virtual routers active
on the VLAN (either acting as master or backup), RDP advertises all VLAN IP addresses. However, if
virtual routers are active, RDP advertises IP addresses for any master routers; RDP does not
advertise IP addresses for backup routers.
For more information about RDP, see Chapter 26, “Configuring RDP.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-9
VRRP Configuration Overview Configuring VRRP
page 31-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Configuration Overview
• Preempt mode. By default, preempt mode is enabled. Use no preempt to turn it off, and preempt to
turn it back on. For more information about the preempt mode, see “Setting Preemption for Virtual
Routers” on page 31-13.
• Advertising interval (in seconds). Use the interval keyword with the desired number of seconds for the
delay in sending VRRP advertisement packets. The default is 1 second. See “Configuring the Adver-
tisement Interval” on page 31-12.
The following example creates a virtual router (with VRID 7) on VLAN 2 with a priority of 75. The
preempt mode of the router is enabled and VRRP advertisements are sent at intervals of 2 seconds:
-> vrrp 7 2 priority 75 preempt interval 2
Note. All virtual routers with the same VRID on the same LAN must be configured with the same adver-
tising interval; otherwise the network can produce duplicate IP or MAC address messages.
The vrrp command can also be used to specify whether the virtual router is enabled or disabled (it is
disabled by default). However, the virtual router must have an IP address assigned to it before it can be
enabled. Use the vrrp address command as described in the next section to specify an IP address or
addresses.
To delete a virtual router, use the no form of the vrrp command with the relevant VRID and VLAN ID.
For example:
-> no vrrp 7 3
Virtual router 7 on VLAN 3 is deleted from the configuration. (The virtual router does not have to be
disabled before you delete it.)
For more information about the vrrp command syntax, see the OmniSwitch AOS Release 6 CLI Reference
Guide.
In this example, the vrrp address command specifies that virtual router 6 on VLAN 4 is used to backup
IP address 10.10.2.3. The virtual router is then enabled with the vrrp command.
Note that if a virtual router is to be the IP address owner, then all addresses on the virtual router must
match an address on the switch interface.
To remove an IP address from a virtual router, use the no form of the vrrp address command. For exam-
ple:
-> vrrp 6 4 disable
-> vrrp 6 4 no address 10.10.2.3
In this example, virtual router 6 is disabled. (A virtual router must be disabled before IP addresses can be
added/removed from the router.) IP address 10.10.2.3 is then removed from the virtual router with the no
form of the vrrp address command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-11
VRRP Configuration Overview Configuring VRRP
In this example, virtual router 6 is disabled. (If you are modifying an existing virtual router, the virtual
router must be disabled before it can be modified.) The vrrp command is then used to set the advertising
interval for virtual router 6 to 5 seconds.
In this example, virtual router 6 is disabled. (If you are modifying an existing virtual router, it must be
disabled before it is modified.) The virtual router priority is then set to 50. Since the default priority is 100,
setting the value to 50 provides the router with lower priority in the VRRP network.
page 31-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Configuration Overview
Note. In certain cases, this can not be a desirable behavior, as when the original master comes back and
immediately causes all the traffic to switch back to it.
If all virtual routers have the preempt mode enabled (the default), the virtual router with the highest
priority becomes the master. If the master router goes down, the highest priority backup router becomes
the master. If the previous master or any other virtual router comes up with the preempt mode enabled and
has a higher priority value, this router becomes the new master.
To prevent a router with a higher priority value from automatically taking control from a master router
with a lower priority value, disable the preempt mode for the higher priority router. This is done by using
the no preempt keywords with the vrrp command. For example:
-> vrrp 6 4 disable
-> vrrp 6 4 no preempt
Note. The virtual router that owns the IP address(es) associated with the physical router always becomes
the master router if it is available, regardless of the preempt mode setting and the priority values of the
backup routers.
In the above example, the first command administratively disables virtual router 6. (If you are modifying
an existing virtual router, it must be disabled before it is modified.). The second command disables the
preempt mode for the same router. Henceforth, router 6 does not preempt another virtual router with a
lower priority. For more information about priority, see “Configuring Virtual Router Priority” on
page 31-12.
In this example, a virtual router is created on VLAN 3 with a VRID of 7. An IP address is then assigned to
the virtual router. The virtual router is then enabled on the switch.
To disable a virtual router, use the disable keyword.
-> vrrp 7 3 disable
A virtual router must be disabled before it can be modified. Use the vrrp command to disable the virtual
router first; then use the command again to modify the parameters. For example:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-13
VRRP Configuration Overview Configuring VRRP
In this example, virtual router 7 on VLAN 3 is disabled. The virtual router is then modified to change its
priority setting. (For information about configuring the priority setting, see “Configuring Virtual Router
Priority” on page 31-12.) The virtual router is then re-enabled and is active on the switch.
The switch now waits 75 seconds after its reboot before it becomes available to take over as master for
another router.
page 31-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Configuration Overview
You can change the default priority value of all the virtual routers on a switch using the vrrp priority
command. For example:
-> vrrp priority 50
You can change the default preempt mode of all the virtual routers on a switch using the vrrp preempt
command. For example:
-> vrrp no preempt
These commands set the new default values only for the virtual routers that are newly created. However,
you can apply the new default value to the existing virtual routers. To apply the new default value to the
existing virtual routers; you must first disable the virtual routers, then apply the new default value using
the vrrp set command and enable the virtual routers again.
For example, to change the default priority value to 50 on all the existing virtual routers on a switch, enter
the following:
-> vrrp priority 50
-> vrrp disable
-> vrrp set priority
-> vrrp enable
The first command configures the default priority value as 50 for all the virtual routers on the switch. The
next command disables all the virtual routers on the switch. The vrrp set command in this sequence
applies the new default priority value to the existing virtual routers. This value is applied only to the
virtual routers that already have the default value and not the values configured either individually or
through a group. This is because the configured values take priority over the default values.
For the modified default values to effect the virtual routers which are configured with a value either indi-
vidually or via group, you can use the same command in addition with the override option. For example:
-> vrrp set priority override
Note. You can specify a parameter such as interval, priority, preempt or all in the vrrp set command to set
and/or override the existing value with the new default values. By default the option all is applied. The all
option resets and/or overrides the existing advertising interval value, priority value and preempt mode
with the modified default values.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-15
VRRP Configuration Overview Configuring VRRP
The next command enables all the virtual routers on the switch except the virtual routers that are disabled
individually or via group. To enable all the virtual routers on the switch including those which are disabled
individually or via group, you can use the same command with the enable all option as follows:
-> vrrp enable all
Note. This collective virtual routers management functionality does not affect the ability to change the
administrative status and parameter values of an individual virtual router.
This command creates a virtual router group 25. Use the no form of the same command to delete a virtual
router group. For example:
-> no vrrp group 25
Note. When a virtual router group is deleted, the virtual routers assigned to the group become unassigned.
However, this does not have any impact on the virtual routers.
After creating a virtual router group, you have to add virtual routers to the group using the vrrp group-
association command, as follows:
-> vrrp 10 1 group-association 25
The above command adds the virtual router 10 on VLAN 1 to the virtual router group 25. A virtual router
need not be disabled in order to be added to a virtual router group. However, the virtual router does not
adopt the group default parameter values until those values are applied by re-enabling the virtual router.
To remove a virtual router from a virtual router group, use the no form of the same command as follows:
-> vrrp 10 1 no group-association 25
Note that a virtual router need not to be disabled to be removed from a group.
You can change the default values of the parameters like advertising interval, priority and preempt of all
the virtual routers in a virtual router group using the vrrp group command, as follows:
-> vrrp group 25 advertising interval 50 priority 50 no preempt
The above command configures the default values for advertising interval as 50 seconds, priority as 150
and preempting mode as no preempt. These parameters can be modified at any time but do not have any
effect on the virtual routers in the group until you disable, then apply the group default value using the
vrrp group set command and enable the virtual router group again.
page 31-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Configuration Overview
For the modified default values to be applied to the virtual routers in a group, you must disable the virtual
router group, then apply the group default value using the vrrp group set command and enable the virtual
router group again. For example:
-> vrrp group 25 interval 50
-> vrrp group 25 disable
-> vrrp group 25 set interval
-> vrrp group 25 enable
The first command configures the default interval value as 50 for all the virtual routers in the virtual router
group 25. The next command disables all the virtual routers in the group. The vrrp group set command in
this sequence applies the new default interval value to all the virtual routers in the group. This value is
applied only to the virtual routers in the group that already have the default value and not the values
configured individually. This is because the configured values take priority over the default values.
For the modified default values to affect the virtual routers in the group, including the virtual routers that
are configured with a value individually, you can use the same command in addition with the override
option. For example:
-> vrrp group set interval override
Note. You can specify a parameter such as interval, priority, preempt or all in the vrrp group set
command to set and/or override the existing value with the new default values. By default the option all is
applied. The all option resets and/or overrides the existing advertising interval value, priority value and
preempt mode with the modified default values.
The next command enables all the virtual routers in the group except the virtual routers that are disabled
individually. To enable all the virtual routers in the group including those which are disabled individually,
you can use the same command with the enable all option as follows:
-> vrrp group 25 enable all
Note. Even though a virtual router can be assigned to a group, its parameter values and administrative
status can still be modified individually.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-17
Verifying the VRRP Configuration Configuring VRRP
show vrrp Displays the virtual router configuration for all virtual routers or for a
particular virtual router.
show vrrp statistics Displays statistics about VRRP packets for all virtual routers configured
on the switch or for a particular virtual router.
show vrrp track Displays information about tracking policies on the switch.
show vrrp track-association Displays the tracking policies associated with virtual routers.
show vrrp group Displays the default parameter values for all the virtual router groups or
for a specific virtual router group.
show vrrp group-association Displays the virtual routers that are associated with a group.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 31-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRPv3 Configuration Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-19
VRRPv3 Configuration Overview Configuring VRRP
• Preempt mode. By default, preempt mode is enabled. Use no preempt to turn it off, and preempt to
turn it back on. For more information about the preempt mode, see “Setting Preemption for VRRPv3
Virtual Routers” on page 31-22.
• Accept mode. By default, the accept mode is enabled. This mode allows the master router to accept
packets addressed to the IPv6 address owner as its own. Use the no accept mode to prevent the master
router from accepting packets addressed to the IPv6 address owner.
• Advertising interval (in centiseconds). Use the interval keyword with the desired number of centisec-
onds for the delay in sending VRRPv3 advertisement packets. The default is 100 centiseconds. See
“Configuring the VRRPv3 Advertisement Interval” on page 31-21.
Note. The maximum number of virtual routers supported is based on the 100 centisecond interval. A
smaller interval results in a relatively lesser number of virtual routers.
The following example creates a VRRPv3 virtual router (with VRID 7) on VLAN 2 with a priority of 75,
and no preempt. VRRPv3 advertisements are sent at intervals of 200 centiseconds:
-> vrrp3 7 2 priority 75 no preempt interval 200
Note. All VRRPv3 virtual routers with the same VRID on the same LAN must be configured with the
same advertisement interval; otherwise the network can produce duplicate IPv6 or MAC address
messages.
The vrrp3 command can also be used to specify whether the VRRPv3 virtual router is enabled or disabled
(it is disabled by default). For more information about the vrrp3 command syntax, see the OmniSwitch
AOS Release 6 CLI Reference Guide.
To delete a VRRPv3 virtual router, use the no form of the vrrp3 command with the relevant VRID and
VLAN ID. For example:
-> no vrrp3 7 3
VRRPv3 virtual router 7 on VLAN 3 is deleted from the configuration. (The virtual router does not have
to be disabled before you delete it.)
page 31-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRPv3 Configuration Overview
In the above example, the vrrp3 address command specifies that VRRPv3 virtual router 6 on VLAN 4 is
used to backup IPv6 address fe80::200:5eff:fe00:20a. The virtual router is then enabled with the
vrrp3 command.
If a virtual router is to be the IP address owner, then all addresses on the virtual router must match an
address on the switch interface. This includes the virtual router's link local address. In other words, a
virtual router can not be the IP address owner if its link local address does not match the interface link
local address.
To remove an IPv6 address from a virtual router, use the no form of the vrrp3 address command. For
example:
-> vrrp3 6 4 disable
-> vrrp3 6 4 no address fe80::200:5eff:fe00:20a
In this example, VRRPv3 virtual router 6 is disabled. (A VRRPv3 virtual router must be disabled before
IPv6 addresses can be added/removed from the router.) IP address fe80::200:5eff:fe00:20a is then
removed from the virtual router with the no form of the vrrp3 address command.
In this example, VRRPv3 virtual router 6 is disabled. (If you are modifying an existing virtual router, the
virtual router must be disabled before it can be modified.) The vrrp3 command is then used to set the
advertising interval for virtual router 6 to 500 centiseconds.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-21
VRRPv3 Configuration Overview Configuring VRRP
In this example, VRRPv3 virtual router 6 is disabled. (If you are modifying an existing virtual router, the
virtual router must be disabled before it can be modified). The virtual router priority is then set to 50. The
priority value is relative to the priority value configured for other virtual routers backing up the same IPv6
address. Since the default priority is 100, setting the value to 50 typically provides a router with lower
priority in the VRRPv3 network.
Note. The VRRPv3 virtual router that owns the IPv6 address(es) associated with the physical router
always becomes the master router if is available, regardless of the preempt mode setting and the priority
values of the backup routers.
page 31-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRPv3 Configuration Overview
To disable preemption for a VRRPv3 virtual router, use the vrrp3 command with the no preempt
keywords. For example:
-> vrrp3 6 4 disable
-> vrrp3 6 4 no preempt
In this example, virtual router 6 is disabled. (If you are modifying an existing virtual router, the virtual
router must be disabled before it can be modified). The virtual router is then configured to disable preemp-
tion. If this virtual router takes over for an unavailable router, a router with a higher priority is not able to
preempt it. For more information about priority, see “Configuring the VRRPv3 Virtual Router Priority” on
page 31-22.
In this example, a VRRPv3 virtual router is created on VLAN 3 with a VRID of 7. An IPv6 address is
then assigned to the virtual router. The virtual router is then enabled on the switch.
To disable a VRRPv3 virtual router, use the disable keyword.
-> vrrp 7 3 disable
A VRRPv3 virtual router must be disabled before it can be modified. Use the vrrp3 command to disable
the virtual router first; then use the command again to modify the parameters. For example:
-> vrrp3 7 3 disable
-> vrrp3 7 3 priority 200
-> vrrp3 7 3 enable
In this example, VRRPv3 virtual router 7 on VLAN 3 is disabled. The VRRPv3 virtual router is then
modified to change its priority setting. (For information about configuring the priority setting, see
“Configuring the VRRPv3 Virtual Router Priority” on page 31-22.) The virtual router is then re-enabled
and is active on the switch.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-23
Verifying the VRRPv3 Configuration Configuring VRRP
show vrrp3 Displays the VRRPv3 virtual router configuration for all virtual routers
or for a particular virtual router.
show vrrp3 statistics Displays statistics about VRRPv3 packets for all VRRPv3 virtual rout-
ers configured on the switch or for a particular virtual router.
show vrrp3 track-association Displays the tracking policies associated with VRRPv3 virtual routers.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 31-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP Creating Tracking Policies
In this example, a tracking policy ID (3) is created and enabled for IP address 20.1.1.3. If this address
becomes unreachable, a virtual router associated with this track ID has its priority decremented by 50.
Note that the enable keyword administratively activates the tracking policy, but the policy does not take
effect until it is associated with one or more virtual routers (see the next section).
Similarly, to create a tracking policy ID (3) for IPv6 address 213:100:1::56, use the following command:
-> vrrp track 3 enable priority 50 address 213:100:1::56
If this address becomes unreachable, a virtual router associated with this track ID has its priority
decremented by 50.
Note the following:
• A virtual router must be administratively disabled before a tracking policy for the virtual router can be
added.
• VRRP tracking does not override IP address ownership (the IP address owner always has a
priority to become master, if it is available).
When the virtual router is re-enabled, tracking policy 3 is used for that virtual router.
A tracking policy must not be associated with a virtual router on the same port or interface. For example:
-> ip interface vlan-4 address 10.1.1.1 vlan 4
-> vrrp track 2 ipv4-interface vlan-4
-> vrrp 5 4 track-association 2
This configuration is allowed but does not really have an effect. If the associated interface goes down, this
virtual router goes down as well and the tracking policy is not applied.
Note. A master and a backup virtual router must not be tracking the same IP address; otherwise, when the
IP address becomes unreachable, both virtual routers have their priorities decremented, and the backup can
temporarily take over if the master discovers that the IP address is unreachable before the backup.
Typically you must not configure the same IP address tracking policies on physical VRRP routers that
backup each other; otherwise, the priority is decremented for both master and backup when the entity
being tracked goes down.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-25
VRRP Application Example Configuring VRRP
VRID 1
Master 1 Backup 1
10.10.2.250
Virtual Routers
VRID 2
Backup 2 Master 2
10.10.2.245
10.10.2.250 10.10.2.245
VLAN 5
page 31-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Application Example
1 First, create two virtual routers for VLAN 5. (Note that VLAN 5 must already be created and available
on the switch.)
-> vrrp 1 5
-> vrrp 2 5
Note. The same VRRP configuration must be set up on each switch. The VRRP router that contains, or
owns, the IP address automatically becomes the master for that virtual router. If the IP address is a virtual
address, the virtual router with the highest priority becomes the master router.
In this scenario, the master of VRID 1 responds to ARP requests for IP address A using the virtual router
MAC address for VRID 1 (00:00:5E:00:01:01). OmniSwitch 1 is the master for VRID 1 since it contains
the physical interface to which 10.10.2.250 is assigned. If OmniSwitch A must become
unavailable, OmniSwitch B becomes master for VRID 1.
In the same way, the master of VRID 2 responds to ARP requests for IP address B using the virtual router
MAC address for VRID 2 (00:00:5E:00:01:02). OmniSwitch B is the master for VRID 2 since it contains
the physical interface to which 10.10.2.245 is assigned. If OmniSwitch B must become unavailable,
OmniSwitch A becomes master for 10.10.2.245. This configuration provides uninterrupted service for the
end hosts.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-27
VRRP Application Example Configuring VRRP
VRID 1
Master 1 Backup 1
10.10.2.250
Virtual Routers
VRID 2
Backup 2 Master 2
10.10.2.245
10.10.2.250 10.10.2.245
VLAN 5
In this example, the master for virtual router 1 has a priority of 100 and the backup for virtual router 1 has
a priority of 75. The virtual router configuration for VRID 1 and 2 on VRRP router A is as follows:
-> vrrp 1 5 priority 100 preempt
The virtual router configuration for VRID 1 and 2 on VRRP router B is as follows:
-> vrrp 1 5 priority 75
To ensure workstation clients 1 and 2 have connectivity to the internet, configure a tracking policy on
VRRP router A to monitor port 3/1 and associate the policy with VRID 1.
-> vrrp track 1 enable priority 50 port 3/1
-> vrrp 1 5 track-association 1
page 31-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRP Application Example
If port 3/1 on VRRP router A goes down, the master for virtual router A is still functioning but
workstation clients 1 and 2 cannot get to the Internet. With this tracking policy enabled, however, master
router 1 priority is temporarily decremented to 50, allowing backup router 1 to take over and provide
connectivity for those workstations. When port 3/1 on VRRP router A comes backup, master 1 takes over
again.
Note. Preempt must be set on switch A virtual router 1, and switch B virtual router 2, in order for the
correct master to assume control once their respective ports 3/1 return to viability. In our example, once
port 3/1 on switch A is functioning again we want switch A to reestablish itself as the master. See “Setting
Preemption for Virtual Routers” on page 31-13 for more information about enabling preemption.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-29
VRRPv3 Application Example Configuring VRRP
VRID 1
Master 1 Backup 1
213:100:1::56
Virtual Routers
VRID 2
Backup 2 Master 2
213:100:1::57
213:100:1::56 213:100:1::57
VLAN 5
1 First, create two VRRPv3 virtual routers for VLAN 5. (Note that VLAN 5 must already be created and
available on the switch.)
-> vrrp3 1 5
-> vrrp3 2 5
page 31-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VRRP VRRPv3 Application Example
Note. The same VRRPv3 configuration must be set up on each switch. The VRRPv3 router that contains,
or owns, the IPv6 address automatically becomes the master for that virtual router. If the IPv6 address is a
virtual address, the virtual router with the highest priority becomes the master router.
In this scenario, the master of VRID 1 responds to neighbor solicitation with a neighbor advertisement for
IPv6 address A using the virtual router MAC address for VRID 1 (00:00:5E:00:02:01). OmniSwitch 1 is
the master for VRID 1 since it contains the physical interface to which 213:100:1::56s assigned. If
OmniSwitch A must become unavailable, OmniSwitch B becomes master for VRID 1.
In the same way, the master of VRID 2 responds to neighbor solicitation for IPv6 address B using the
virtual router MAC address for VRID 2 (00:00:5E:00:02:02). OmniSwitch B is the master for VRID 2
since it contains the physical interface to which 213:100:1::57 is assigned. If OmniSwitch B becomes
unavailable, OmniSwitch A becomes master for 213:100:1::57. This configuration provides
uninterrupted service for the end hosts.
VRID 1
Master 1 Backup 1
213:100:1::56
Virtual Routers
VRID 2
Backup 2 Master 2
213:100:1::57
213:100:1::56 213:100:1::57
VLAN 5
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 31-31
VRRPv3 Application Example Configuring VRRP
In this example, the master for virtual router 1 has a priority of 100 and the backup for virtual router 1 has
a priority of 75. The virtual router configuration for VRID 1 and 2 on VRRPv3 router A is as follows:
-> vrrp3 1 5 priority 100 preempt
The virtual router configuration for VRID 1 and 2 on VRRPv3 router B is as follows:
-> vrrp3 1 5 priority 75
To ensure workstation clients 1 and 2 have connectivity to the internet, configure a tracking policy on
VRRPv3 router A to monitor port 3/1 and associate the policy with VRID 1.
-> vrrp3 track 1 enable priority 50 port 3/1
If port 3/1 on VRR3 router A goes down, the master for virtual router A is still functioning, but
workstation clients 1 and 2 cannot get connected to the Internet. With this tracking policy enabled,
however, master router 1 priority is temporarily decremented to 50, allowing backup router 1 to take over
and provide connectivity for those workstations. When port 3/1 on VRRPv3 router A comes backup,
master 1 takes over again.
Note. Preempt must be set on switch A virtual router 1, and switch B virtual router 2, in order for the
correct master to assume control once their respective ports 3/1 return to viability. In our example, once
port 3/1 on switch A is functioning again we want switch A to reestablish itself as the master. See “Setting
Preemption for Virtual Routers” on page 31-13 for more information about enabling preemption.
page 31-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
32 Configuring Server Load
Balancing
Alcatel-Lucent’s Server Load Balancing (SLB) software provides a method to logically manage a group of
physical servers sharing the same content (known as a server farm) as one large virtual server (known as
an SLB cluster). SLB clusters are identified and accessed using either a Virtual IP (VIP) address or a QoS
policy condition. Traffic is always routed to VIP clusters and either bridged or routed to policy condition
clusters. The OmniSwitch operates at wire speed to process client requests and then forward them to the
physical servers within the cluster.
Using SLB clusters can provide cost savings (costly hardware upgrades can be delayed or avoided),
scalability (as the demands on your server farm grow you can add additional physical servers), reliability
(if one physical server goes down the remaining servers can handle the remaining workload), and
flexibility (you can tailor workload requirements individually to servers within a cluster).
In This Chapter
This chapter describes the basic components of Server Load Balancing and how to configure them through
the Command Line Interface (CLI). CLI commands are used in the configuration examples; for more
details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Steps to configure physical servers on page 32-11.
• Procedures for troubleshooting and maintenance on page 32-30 and page 32-36.
Note. You can also configure and monitor Server Load Balancing with WebView, Alcatel-Lucent’s
embedded web-based device management application. WebView is an interactive and easy-to-use GUI
that can be launched from OmniVista or a web browser. Please refer to WebView’s online documentation
for more information on configuring and monitoring Server Load Balancing with WebView.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-1
Server Load Balancing Specifications Configuring Server Load Balancing
page 32-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Server Load Balancing Default Values
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-3
Quick Steps for Configuring Server Load Balancing (SLB) Configuring Server Load Balancing
2 Configure the SLB VIP cluster using the ip slb cluster command with the vip parameter. For example:
3 Assign physical servers to the SLB cluster and specify a relative weight for each server (default value
for weight is 1) with the ip slb server ip cluster command. For example:
-> ip slb server ip 128.241.130.127 cluster WorldWideWeb
-> ip slb server ip 128.241.130.109 cluster WorldWideWeb weight 4
-> ip slb server ip 128.241.130.115 cluster WorldWideWeb weight 6
-> ip slb server ip 128.241.130.135 cluster WorldWideWeb admin status disable
weight 8
As an option, you can verify your SLB settings by entering show ip slb cluster followed by the name of
the SLB cluster. For example:
-> show ip slb cluster WorldWideWeb
Cluster WorldWideWeb
VIP : 128.241.130.204,
Type : L3,
Admin status : Enabled,
Operational status : In Service,
Ping period (seconds) : 60,
Ping timeout (milliseconds) : 3000,
Ping retries : 3,
Probe : None,
Number of packets : 3800,
Number of servers : 4
Server 128.241.130.109
Admin status = Enabled, Operational Status = In Service,
Weight = 4, Availability (%) = 100
Server 128.241.130.115
Admin status = Enabled, Operational Status = In Service,
Weight = 6, Availability (%) = 98
Server 128.241.130.127
Admin status = Enabled, Operational Status = Discovery,
Weight = 1, Availability (%) = 0
Server 128.241.130.135
Admin status = Disabled, Operational Status = Disabled,
Weight = 8, Availability (%) = 0
An example of what these configuration commands look like entered sequentially on the command line:
-> ip slb admin enable
-> ip slb cluster WorldWideWeb vip 128.241.130.204
-> ip slb server ip 128.241.130.127 cluster WorldWideWeb
-> ip slb server ip 128.241.130.109 cluster WorldWideWeb weight 4
page 32-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Quick Steps for Configuring Server Load Balancing (SLB)
1 Create the QoS policy condition that classifies traffic for the SLB cluster. For example:
2 Configure the SLB cluster using the ip slb cluster command with the condition parameter.
For example:
-> ip slb cluster Intranet condition c1
3 Assign physical servers to the SLB condition cluster and specify a relative weight for each server
(default value for weight is 1) with the ip slb server ip cluster command. For example:
• -> ip slb server ip 103.10.50.1 cluster Intranet
-> ip slb server ip 103.10.50.2 cluster Intranet weight 4
-> ip slb server ip 103.10.50.3 cluster Intranet admin status disable weight 2
Note. As an option, you can configure an SLB server as a backup server. See “Configuring a Server in an
SLB Cluster as a Backup Server” on page 32-29 for more information.
As an option, you can verify your SLB settings by entering show ip slb cluster followed by the name of
the SLB cluster. For example:
-> show ip slb cluster Intranet
Cluster Intranet
Condition : c1,
Type : L3,
Admin status : Enabled,
Operational status : In Service,
Ping period (seconds) : 60,
Ping timeout (milliseconds) : 3000,
Ping retries : 3,
Probe : None,
Number of packets : 10000,
Number of servers : 2
Server 103.10.50.1
Admin status = Enabled, Operational status = In Service,
Weight = 1, Availability (%) = 100
Server 103.10.50.2
Admin status = Enabled, Operational status = In Service,
Weight = 4, Availability (%) = 99
Server 103.10.50.3
Admin status = Disabled, Operational status = Disabled,
Weight = 2, Availability (%) = 0
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-5
Quick Steps for Configuring Server Load Balancing (SLB) Configuring Server Load Balancing
As an option, you can also display traffic statistics for an SLB condition cluster by entering show ip slb
cluster followed by the cluster name and the statistics parameter. For example, the following command
displays the packet count for traffic that is classified for the “Intranet” cluster:
-> show ip slb cluster Intranet statistics
Admin Operational
Cluster Name Status Status Count
-----------------------+--------+--------------------+--------
Intranet Enabled In Service 2 Servers
Src IP 100.0.0.1/255.255.255.255 2500
IP Dst TCP Port 80
Src IP 100.0.0.2/255.255.255.255 2500
IP Dst TCP Port 80
Src IP 100.0.0.3/255.255.255.255 2500
IP Dst TCP Port 80
Src IP 100.0.0.4/255.255.255.255 2500
IP Dst TCP Port 80
An example of what the configuration commands look like entered sequentially on the command line:
-> policy network group SOURCE 100.0.0.1 100.0.0.2 100.0.0.3 100.0.0.4
-> policy condition c1 source network group SOURCE destination tcp port 80
-> qos apply
-> ip slb cluster Intranet condition cl
-> ip slb server ip 103.10.50.1 cluster Intranet
-> ip slb server ip 103.10.50.2 cluster Intranet weight 4
-> ip slb server ip 103.10.50.3 cluster Intranet admin status disable weight 2
You can verify your SLB settings by entering show ip slb cluster server followed by the name of the SLB
cluster. For example:
show ip slb cluster Intranet server 103.10.50.3
Cluster Intranet
VIP 103.10.50.50
Server 103.10.50.3
Admin weight : 2,
MAC addr : 00:A0:C9:55:00:82,
Slot number : 3,
Port number : 14,
Admin status : Disabled,
Oper status : In Service,
Probe : None,
Availability time (%) : 98,
Ping failures : 0,
Last ping round trip time (milliseconds) : 1,
Probe status : OK,
page 32-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Server Load Balancing Overview
Note. Alcatel-Lucent also offers link aggregation, which combines multiple Ethernet links into one virtual
channel. Please refer to Chapter 10, “Configuring Dynamic Link Aggregation,”for more information on
link aggregation and dynamic link aggregation, and to Chapter 9, “Configuring Static Link Aggregation,”
for information on static (OmniChannel) link aggregation.
Note. See “Configuring the Server Farm” on page 32-11 for more information on configuring servers. See
“Configuring and Deleting SLB Clusters” on page 32-25 for more information on configuring VIP and
condition clusters.
• The destination MAC address is changed to the MAC address of the destined server.
When the Layer-2 mode is active (condition clusters only), request packets are not modified and are only
switched within the same VLAN domain. The Layer-2 or Layer-3 mode is selected when the condition
cluster is configured on the switch. See “Configuring an SLB Cluster with a QoS Policy Condition” on
page 32-25 for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-7
Server Load Balancing Overview Configuring Server Load Balancing
OmniSwitch 7800
Switch
Intranet
or
Internet
Client A Client B
page 32-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Server Load Balancing Overview
OmniSwitch 7800
Switch
Note. See “Modifying the Relative Weight of a Physical Server” on page 32-29 for information on
modifying the relative weights of servers in an SLB cluster.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-9
Server Load Balancing Overview Configuring Server Load Balancing
Note. You can use the show ip slb cluster server command, which is described in “Displaying Server
Load Balancing Status and Statistics” on page 32-36, to display link and ping status of physical servers.
These health checks performed by the switch are used by the SLB software to determine the operational
states of servers. The possible operational states are described in the table below:
Operational States
Disabled The server has been administratively disabled by the user.
No Answer The server has not responded to ping requests from the switch.
Link Down There is a bad connection to the server.
Discovery The switch is pinging a physical server.
In Service The server can be used for client connections.
Retrying The switch is making another attempt to bring up the server.
You can configure probes to monitor the health of clusters and servers. See “Configuring SLB Probes” on
page 32-32 for more information.
page 32-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring the Server Farm
Note. A server can be configured with more than one VIP. Therefore, a server can belong to more than
one SLB cluster.
This section describes procedures for configuring several commonly-used server operating systems,
including Windows NT (see “Configuring a Windows NT Server” on page 32-11), Windows 2000 (see
“Configuring a Windows 2000 Server” on page 32-14), Unix and Linux (see “Configuring a Loopback
Interface on Unix- and Linux-Based Servers” on page 32-22), and Novell Netware 6 (see “Configuring a
Virtual IP Address on a Novell Netware 6 Server” on page 32-23). Please refer to your server’s user docu-
mentation for operating systems not covered in this chapter.
Note. The following two sections on configuring Windows NT and 2000 servers assume that the
Microsoft loopback adapter driver has been installed on your workstation. If you need to install this driver,
please refer to “Adding the Microsoft Loopback Adapter Driver” on page 32-16.
Note. This procedure assumes that your Windows NT workstation already has the Microsoft loopback
adapter installed. If this driver has not been installed, please perform the steps in “Adding the Loopback
Adapter Driver to a Windows NT Server” on page 32-16 before proceeding.
1 Open the Control Panel window by clicking the Start button and then selecting Settings.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-11
Configuring the Server Farm Configuring Server Load Balancing
Double click
the Network
icon.
Click the
“Properties”
button when
ready.
page 32-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring the Server Farm
Note. Use the same subnet mask as for the physical IP interface.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-13
Configuring the Server Farm Configuring Server Load Balancing
Note. This procedure assumes that your Windows 2000 workstation already has the Microsoft loopback
adapter installed. If this driver has not been installed, please perform the steps in “Adding the Loopback
Adapter Driver to a Windows 2000 Server” on page 32-18 before proceeding.
1 Open the Control Panel window by clicking the Start button and then selecting Settings.
2 Double-click the Network and Dial-up Connections icon in the Control Panel window.
3 Right-click the Microsoft Loopback Adapter icon in the Network and Dial-up Connections
window.
page 32-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring the Server Farm
4 Select Internet Protocol (TCP/IP) in the Microsoft Loopback Adapter Properties window.
6 Click the Use the following IP address radio button in the Internet Properties (TCP/IP) Properties
window.
Note. Use the same subnet mask as for the physical IP interface.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-15
Configuring the Server Farm Configuring Server Load Balancing
1 Open the Control Panel window by clicking the Start button and then selecting Settings.
Double-click
the “Network”
icon.
Click the
“Adapters”
Click the “Add...” tab.
button when ready.
page 32-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring the Server Farm
7 Select the proper frame type in the Frame Type pull-down menu.
Select “Frame Type”.
10 If needed, enter the file and path name of the Microsoft loopback adapter in the Windows NT Setup
window.
11 Click the Continue button. All the necessary files are copied and installed on your workstation.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-17
Configuring the Server Farm Configuring Server Load Balancing
1 Open the Control Panel window by clicking the Start button and then selecting Settings.
5 Select the Add/Troubleshoot a device radio button in the Add/Remove Hardware Wizard window.
Select the
“Add/Troubleshoot a
device” radio button.
page 32-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring the Server Farm
9 Select the No option radio button in the Find New Hardware window.
Select Network
Adapters.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-19
Configuring the Server Farm Configuring Server Load Balancing
If the Microsoft loopback adapter has been installed it is listed in the Network Adapter window as
shown in the figure below. If this adapter is listed, proceed to Step 17 on page 32-20. Otherwise,
proceed to Step 14.
Select “Microsoft.”
16 If needed, enter the file and path name of the Microsoft loopback adapter or click the Browse... button
to search for the file.
17 Click the Next button in the Select Network Adapter window (see the figure in Step 13 on page
32-20).
18 Click the Next button (this installs all default values) in the Start Hardware Installation window.
page 32-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring the Server Farm
20 Click the Finish button in the Completing the Add/Remove Hardware Wizard window.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-21
Configuring the Server Farm Configuring Server Load Balancing
Note. For other versions of the Unix and Linux operating systems, please refer to your user documenta-
tion.
1 At the command prompt, enter ifconfig lo:1, the Virtual IP (VIP) address of the Server Load Balanc-
ing (SLB) cluster, netmask, the net mask for the VIP, and up. For example, to configure the loopback
address on a Red Hat Linux server with a VIP of 10.123.11.14 with a net mask of 255.0.0.0 enter:
ifconfig lo:1 10.123.11.14 netmask 255.0.0.0 up
2 If you do not have a file with local host names, create one. In this example we create a file called
“/etc/localhosts.cw”.
3 Add a user-configured name for the loopback interface to the file created in Step 2. In this example we
use “loopbackVIP”.
4 Create a line in the /etc/hosts file with the VIP you configured in Step 1, a space, and the name you
configured in Step 2. For example, if the VIP address is 10.123.11.14 and the name you configured in the
/etc/localhosts.cw file is “loopbackVIP”, add the following line to the /etc/hosts file:
10.123.11.14 loopbackVIP
1 At the command prompt, enter ifconfig lo0:1, the Virtual IP (VIP) address of the Server Load
Balancing (SLB) cluster, netmask, the net mask for the VIP, and up. For example, to configure the
loopback address on a Sun Solaris server with a VIP of 10.123.11.14 with a net mask of 255.0.0.0 enter:
ifconfig lo0:1 10.123.11.14 255.0.0.0 up
2 Create a file called “/etc/hostname.lo0:1” file with the user-configured name for the loopback
interface. In this example we use “loopbackVIP”.
3 Create a line in the /etc/hosts file with the VIP you configured in Step 1, a space, and the name you
configured in Step 2. For example, if the VIP address is 10.123.11.14 and the name you configured in the
/etc/hostname.lo0:1 file is “loopbackVIP”, add the following line to the /etc/hosts file:
10.123.11.14 loopbackVIP
page 32-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring the Server Farm
1 At the command prompt, enter ifconfig lo0 alias, the Virtual IP (VIP) address of the Server Load
Balancing (SLB) cluster, netmask, and the net mask for the VIP. For example, to configure the loopback
address on a IBM AIX server with a VIP of 10.123.11.14 with a net mask of 255.0.0.0 enter:
ifconfig lo0 alias 10.123.11.14 netmask 255.0.0.0
2 Create a file called “/etc/hostname.lo0:1” file with the user-configured name for the loopback
interface. In this example use “loopbackVIP”.
3 Create a line in the /etc/hosts file with the VIP you configured in Step 1, a space, and the name you
configured in Step 2. For example, if the VIP address is 10.123.11.14 and the name you configured in the
/etc/hostname.lo0:1 file is “loopbackVIP”, add the following line to the /etc/hosts file:
10.123.11.14 loopbackVIP
Note. For other versions of Netware, please refer to your server documentation.
1 At the server prompt enter add secondary ipaddress followed by the VIP address and noarp. For
example, to configure a VIP address of 10.123.11.14 enter:
add secondary IPAddress 10.123.11.14 noarp
Note. As an option you can enter prompt (which allows you to select from available interfaces) after the
noarp keyword. If you do not use the prompt keyword then the VIP is added to the first bound
interface of the same network.
2 As an option you can enter display secondary ipaddress at the server prompt to verify your VIP
address.
Note. If you wish to delete a VIP address enter del secondary ipaddress followed by the VIP address.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-23
Configuring Server Load Balancing on a Switch Configuring Server Load Balancing
Note. See “Quick Steps for Configuring Server Load Balancing (SLB)” on page 32-4 for a brief tutorial on
configuring these mandatory parameters.
When configuring SLB parameters for an SLB cluster, you must perform the following steps:
1 Enable Server Load Balancing on Your Switch. To enable Server Load Balancing (SLB) on a
switch, use the ip slb admin command, which is described in “Enabling and Disabling Server Load
Balancing” on page 32-24.
2 Configure the Logical Server Load Balancing Cluster. To configure a logical SLB cluster, use the
ip slb cluster command, which is described in “Configuring and Deleting SLB Clusters” on page 32-25.
3 Assign Physical Servers to the Logical Server Load Balancing Cluster. To add physical servers to a
logical SLB cluster, use the ip slb server ip cluster command, which is described in “Assigning Servers
to and Removing Servers from a Cluster” on page 32-27.
Note. Routing (enabled by default) must be enabled for Server Load Balancing to operate on a switch.
Alcatel-Lucent’s SLB software is preconfigured with the default values shown in the table in “Server Load
Balancing Default Values” on page 32-3. Depending on the requirements of your network and server farm,
you may need to configure more parameters than the mandatory ones described in this section. See “Modi-
fying Optional Parameters” on page 32-28 for information on configuring additional
SLB parameters.
Note. You must enable or disable Server Load Balancing on an entire switch. You cannot enable SLB on a
per port or per slot basis.
Enabling SLB
To enable SLB switch wide, use the ip slb admin command by entering:
-> ip slb admin enable
Disabling SLB
To disable SLB switch wide, use the ip slb admin command by entering:
-> ip slb admin disable
page 32-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring Server Load Balancing on a Switch
• To use spaces in an SLB cluster name, enclose the entire name within quotation marks
(for example, “web server”).
• The VIP address of the SLB cluster must be an address in the same subnet as the servers.
• VIP only supports the Layer-3 SLB mode, which is enabled by default.
• To use spaces in an SLB cluster name, enclose the entire name within quotation marks
(for example, “web server2”).
• The QoS policy condition name specified must already exist in the switch configuration.
The condition created in the above example, “cond1”, uses the source port value to classify traffic. When
this same condition is associated with an SLB cluster, client requests received on the specified source port
are then sent to a server that is a member of the associated cluster.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-25
Configuring Server Load Balancing on a Switch Configuring Server Load Balancing
The following QoS policy conditions are supported individually and in combination with each other when
used to configure SLB condition clusters:
See Chapter 36, “Configuring QoS,” for more information about configuring and displaying QoS policy
conditions.
You can also use the show policy condition command to display policy conditions and the show policy
action command to display policy actions. See Chapter 36, “Configuring QoS,” for more information on
configuring and displaying QoS policies.
page 32-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring Server Load Balancing on a Switch
Note. When you delete an SLB cluster you also delete the QoS policy, condition, and rule associated with
the cluster.
Note. You can also use the ip slb server ip cluster command to administratively disable or enable a
server (see “Taking a Server On/Off Line” on page 32-30).
You can assign up to 256 physical servers. For example, to assign three physical servers with IP addresses
of 10.105.16.121, 10.105.16.122, and 10.105.16.123, respectively, to an SLB cluster called
“Web_Server”, enter the following CLI commands:
-> ip slb server ip 10.105.16.121 cluster Web_Server
-> ip slb server ip 10.105.16.122 cluster Web_Server
-> ip slb server ip 10.105.16.123 cluster Web_Server
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-27
Modifying Optional Parameters Configuring Server Load Balancing
Note. If you set the ping period to any value other than 0, then the ping period must be greater than or
equal to the ping timeout value divided by 1000. For example, if the ping timeout is 5000 milliseconds, the
ping period must be at least 5 seconds. The ping timeout value can be modified with the ip slb cluster
ping timeout command, which is described in “Modifying the Ping Timeout” on page 32-28.
Note. You can modify the ping period with the ip slb cluster ping period command, which is described in
“Modifying the Ping Period” on page 32-28.
page 32-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Modifying Optional Parameters
Server weights are relative. For example, if Servers A and B have respective weights of 5 and 10 within a
cluster, Server A would get half the traffic of server B. Since weights are relative, assigning Servers A and
B respective weights of 1 and 2, or 5 and 10, etc., would produce identical results.
Note. The ip slb server ip cluster command is also used to add or remove servers from an SLB cluster
(see “Assigning Servers to and Removing Servers from a Cluster” on page 32-27) and for
administratively enabling and disabling a server in an SLB cluster (see “Taking a Server On/Off Line” on
page 32-30).
Assigning a weight of 0 (zero) to a server prevents this server from being assigned any new
connections.This server becomes a backup server.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-29
Taking Clusters and Servers On/Off Line Configuring Server Load Balancing
Note. The ip slb server ip cluster command is also used to add or remove physical servers from an SLB
cluster (see “Assigning Servers to and Removing Servers from a Cluster” on page 32-27).
page 32-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Taking Clusters and Servers On/Off Line
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-31
Configuring SLB Probes Configuring Server Load Balancing
page 32-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring SLB Probes
Note. See “Creating SLB Probes” on page 32-32 for a list of valid probe types.
For example, to set the timeout for an HTTP SLB probe called “server_probe1” to 12000 seconds, enter:
-> ip slb probe server_probe1 http timeout 12000
Note. See “Creating SLB Probes” on page 32-32 for a list of valid probe types.
For example, to set the period for an HTTP SLB probe called “server_probe1” to 120 seconds, enter:
-> ip slb probe server_probe1 http period 120
Note. See “Creating SLB Probes” on page 32-32 for a list of valid probe types.
For example, to set the TCP/UDP port for an HTTP SLB probe called “server_probe1” to 200 enter:
-> ip slb probe server_probe1 http port 200
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-33
Configuring SLB Probes Configuring Server Load Balancing
Note. See “Creating SLB Probes” on page 32-32 for a list of valid probe types.
For example, to set the number of retries for an HTTP SLB probe called “server_probe1” to 10, enter:
-> ip slb probe server_probe1 http retries 10
Note. The URL should be the relative web page name to be retrieved.
For example, to set the URL for an HTTP SLB probe called “server_probe1” to “pub/index.html”, enter:
-> ip slb probe server_probe1 http url pub/index.html
page 32-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Configuring SLB Probes
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-35
Displaying Server Load Balancing Status and Statistics Configuring Server Load Balancing
The show ip slb, show ip slb servers, and show ip slb clusters commands provide a “global” view of
switch-wide SLB parameters. These commands are particularly helpful in fine-tuning configurations. For
example, if you wanted to get a quick look at the status of all SLB clusters you would use the show ip slb
clusters command as shown below:
-> show ip slb clusters
Admin Operational # %
Cluster Name VIP/COND Status Status Srv Avail
----------------+----------------+--------+-------------------+-----+---------
WorldWideWeb 128.241.130.204 Enabled In Service 3 95
Intranet c1 Enabled In Service 2 100
FileTransfer 128.241.130.206 Enabled Out of Service 2 50
In the example above, two SLB clusters (“WorldWideWeb” and “Intranet”) are administratively enabled
and are “in service” (at least one physical server is operational in the cluster). The third SLB cluster (“File-
Transfer”) is administratively enabled but is “out of service (no physical servers are operational in the
cluster).
The show ip slb cluster command provides detailed configuration information and statistics for individ-
ual SLB clusters. To use the show ip slb cluster command, enter the command followed by the name of
the SLB cluster, as shown below:
-> show ip slb cluster WorldWideWeb
A statistics parameter is available with both the show ip slb clusters and show ip slb cluster commands
to provide a packet count of traffic that was qualified and sent to a QoS policy condition cluster. To use
this parameter, enter either of these commands with their required parameters and optionally specify the
statistics parameter, as shown below:
-> show ip slb clusters statistics
-> show ip slb cluster Intranet statistics
page 32-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Server Load Balancing Displaying Server Load Balancing Status and Statistics
Note. See page 32-4 and page 32-6 for samples of the show ip slb cluster command output.
The show ip slb cluster server command provides detailed configuration information and statistics for
individual SLB servers. To use the show ip slb cluster server command, enter the command, the name of
the SLB cluster that the server belongs to, server, and the IP address of the server. For example, to display
statistics and parameters for a server with an IP address of 10.123.11.14 that belongs to an SLB cluster
called “Web_Server” you would enter:
-> show ip slb cluster Web_Server server 10.123.11.14
In the example above, the server with an IP address of 10.123.11.4 is shown to be administratively
enabled and “in service” (this server is being used for SLB cluster client connections) with the
administrative weight assigned as 3.
The show ip slb probes command provides both a global view of SLB probes and a detailed
configuration information and statistics for individual probes. For example, to view the status of all probes
enter show ip slb probes as shown below:
-> show ip slb probes
Probe Name Period Retries Timeout Method
-----------------------+-------+-------+--------+------
web_server 60000 3 12000 HTTP
mail_server 60000 3 3000 SMTP
mis_servers 3600000 5 24000 Ping
In the example above there are three probes configured on the switch.
To view detailed information on a single probe enter show ip slb probes followed by the probe name as
shown in the example below:
-> show ip slb probes phttp
Probe phttp
Type : HTTP,
Period (seconds) : 60,
Timeout (milliseconds) : 3000,
Retries : 3,
Port : 0,
Username : ,
Password : ,
Expect : ,
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 32-37
Displaying Server Load Balancing Status and Statistics Configuring Server Load Balancing
Status : 200,
URL : /,
Note. See the “Server Load Balancing Commands” chapter in the OmniSwitch AOS Release 6 CLI Refer-
ence Guide for complete syntax information on SLB show commands.
page 32-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
33 Configuring SIP Snooping
Session Initiation Protocol (SIP) address the key challenge of real time delivery and monitoring
requirements for media streams from SIP devices.
SIP Snooping prioritizes voice and video traffic over non-voice traffic.
• Identifies and marks the SIP and its corresponding media streams. Each media stream contains Real
Time Protocol (RTP) and Real Time Control Protocol (RTCP) flows. Marking is done using the DSCP
field in the IP header.
• Provides user configured QOS treatment for SIP/RTP/RTCP traffic flows based on its marking.
• Also snoops voice quality metrics of media streams from their RTCP packets and displays them to the
user with knowledge of media reception quality in real time and helps to diagnose the problems on
their quality. Also in addition, trap will be generated when voice quality parameters like Jitter, Round
trip time, Packet-lost, R-factor and MOS values of media streams crosses user configured threshold.
In This Chapter
This chapter describes the SIP Snooping feature, and how to configure it through the Command Line Inter-
face (CLI). For more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Refer-
ence Guide.
The following information and procedures are included in this chapter:
• “Quick Steps for Configuring SIP Snooping” on page 33-4.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-1
SIP Snooping Specifications Configuring SIP Snooping
page 33-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring SIP Snooping Parameter Description and Values
Note. When the Jitter, Packet Lost and RTT crosses the configured threshold traps are raised. And when
R-factor and MOS goes below the configured threshold traps are raised.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-3
Quick Steps for Configuring SIP Snooping Configuring SIP Snooping
2 Create a policy action for the SIP condition using the policy action command. For example,
3 Configure the policy rule for the SIP policy to classify inbound and outbound media streams. Use the
policy rule command. For example,
-> policy rule Voice_46 condition Voice action DSCP46
-> policy rule Video_32 condition Video action DSCP32
-> qos apply
Note. For more information on policy condition, policy action, and policy rule, see “Configuring QOS”
chapter in the OmniSwitch AOS Release 6 Network Configuration Guide
4 Enable SIP Snooping using the sip-snooping enable command. For example:
6 Configure the port/linkagg mode to force-edge for the port to which the SIP phone is connected. Use
the sip-snooping port/linkagg command. For example,
-> sip-snooping port 1/5-6 mode force-edge
-> sip-snooping linkagg 10 mode force-edge
7 Configure the port/linkagg mode to force-non-edge for uplink port connecting to the call server. Use
the sip-snooping port/linkagg command. For example,
-> sip-snooping port 1/5-6 mode force-non-edge
-> sip-snooping linkagg 10 mode force-non-edge
page 33-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring SIP Snooping SIP Snooping Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-5
Using SIP Snooping Configuring SIP Snooping
• SIP user agents (e.g., SIP phones). SIP user agents are directly connected to edge switches
One SIP Server is connected to the Core switch within the campus infrastructure The server is responsible
for all the SIP functions such as registrar, proxy, redirect, gateway.
page 33-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring SIP Snooping Using SIP Snooping
be subject to the SIP QOS treatment. On the edge switch, the QOS treatment is enforced for both
ingress and egress media streams.
Interoperability
SIP Snooping is interoperable with the following equipment:
No Equipment Description
1 OpenTouch Business Edition 1.1 Server SIP based server from Alcatel Lucent
500 Users (OTBE)
2 Alcatel Lucent OXE IP Media Gateway MR3 Part of OTBE
3 Alcatel Lucent PCX Enterprise RM3 Part of OTBE
4 Open Touch soft-phone - My Instant Communicator Part of OTBE
5 8082 My IC Phone OpenTouch SIP Phone
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-7
SIP Snooping Configuration Guidelines Configuring SIP Snooping
On the edge switch, it is recommended to disable auto phone with the qos no phones command. For
example
-> qos no phones
Set all edge ports, including network edge ports to the un-trusted mode. Also ensure uplink port and all the
traversing ports to other SIP endpoint are in trust mode.
All SIP based calls using other than configured trusted call server will not be subject to the configured SIP
QOS treatment
page 33-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring SIP Snooping SIP Snooping Configuration Guidelines
To configure the Server listening TCP ports, use the sip-snooping TCP port as follows
-> sip-snooping tcp-port 5678 5051
The SIP Snooping TCP port cofiguration is used to snoop the SIP packets, when the SIP endpoints
switches from UDP to TCP to send SIP packets of more than 1300 bytes in size.
This allows the SIP snooping functionality for the configured UDP ports only.
This marks the SIP messages with the configured SIP control DSCP.
This marks the SOS-Call RTP/RTCP packets with the configured SOS call dscp.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-9
SIP Snooping Configuration Guidelines Configuring SIP Snooping
Depending on the RTCP capabilities of the SIP user agent endpoints, the following metrics can be
determined by software:
• Packet loss
The SIP snooping feature offers configurable thresholds for each performance metric and each media
types.
-> sip-snooping threshold audio jitter 30
-> sip-snooping threshold video jitter 50
-> sip-snooping threshold audio packet-lost 40
-> sip-snooping threshold video packet-lost 30
-> sip-snooping threshold audio round-trip-delay 180
-> sip-snooping threshold video round-trip-delay 180
-> sip-snooping threshold audio R-factor 30
-> sip-snooping threshold video R-factor 30
-> sip-snooping threshold audio MOS 10
-> sip-snooping threshold video MOS 20
Policy Condition
All other policy conditions are still supported for the SIP policy rules. This allows specific QOS treat-
ments (policy actions) for a media streams based on the origin of the call. For instance, a SIP policy condi-
tion can be combined with:
• Source port
• Source IP address/subnet
Other source conditions are also supported but are not foreseen to provide real benefits.
page 33-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring SIP Snooping SIP Snooping Configuration Guidelines
The policy condition is not used as such in the hardware filtering entry, but is used by the SIP snooping
module to determine the policy rule that the new RTP flow is matching. Also, SIP policy rules are
supported in ingress and UNP policy lists.
Policy action
All other policy actions are still supported for SIP policy rules. For instance:
• DSCP
This marks the DSCP value for the RTP/RTCP packets and maps the internal priority to this DSCP
• Priority
This forces the internal priority of the RTP/RTCP packets.
• Rate Limiter
Policy Rule
A SIP policy rule is a rule that have keyword SIP (audio/video/other) in policy condition and with corre-
sponding policy action.
The SIP policy rule is configured as follows.
-> policy condition Voice_srcip_SIP1 source ip 10.10.0.0 mask 255.255.0.0 sip
audio
-> policy condition Video_srcip_SIP1 source ip 10.10.0.0 mask 255.255.0.0 sip
video
-> policy action DSCP56 dscp 56
-> policy action DSCP32 dscp 32
-> policy rule Voice_srcip_SIP1_rule condition Voice_srcip_SIP1 action DSCP56
-> policy rule Video_srcip_SIP1_rule condition Video_srcip_SIP1 action DSCP32
-> qos apply
Note that a SIP policy rule does not apply for the SIP signaling messages. A SIP policy rule can however
apply for a SOS call since a SOS call is a audio media. However, the DSCP marking and rate limiter for
an SOS call cannot be overwritten by a SIP policy rule.
Unsupported Topologies
The SIP snooping functions and the QOS actions require that the network paths used by the SIP
signaling messages and the RTP/RTCP flows are the same and are “symmetric”. For this reason, the
following topologies are not supported:
• MC-LAG
• ECMP Routing
• VRRP
In such topologies, it would be possible that one switch/router sees the SIP signaling messages and creates
the dialog with the appropriate QOS actions (i.e. ACLs), but the RTP/RTCP traffic will not be seen by this
switch/router. It would also be possible that the SIP signaling messages and/or RTP/RTCP packets are
load balanced between 2 switch/routers.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-11
SIP Snooping Use Case Configuring SIP Snooping
Expectations
• Voice media streams from SIP1 to SIP2 will be marked with DSCP 56
• Video media streams from Video SIP1 to Video SIP2 will be marked with DSCP 32
• Voice media streams from SIP2 to SIP1 will be marked with DSCP 46
• Voice media streams from Video SIP2 to Video SIP1 will be marked with DSCP 48
page 33-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring SIP Snooping SIP Snooping Use Case
SIP Condition
In this example, specific QOS treatments are configured based on the source IP subnet.
• Voice source IP subnet 10.10.0.0 = DSCP 56
--------------------------------------------------------------------------------
2002-04-06 01:06:10 UTC 0d 0h 4m 15s Audio -
0010CFC0-4A05-10DA-B960-F1A3FE87AA77-23025@ot380.aos.com / 0010CFE8-4A05-10DA-B960-
F1A3FE87AA77-258649 / 1668946822
IP/DSCP 10.20.0.2 6000 56/56 10.10.0.2 6000 46/46
Policy-Rule Voice_srcip_SIP1_rule Voice_srcip_SIP2_rule
Pkt-Count 12272 61385
Pkt-Loss 0 0 0.00 0% 0 0 0.00
0%
Jitter 0 0 0.00 0% 0 0 0.00
0%
Delay 0 0 0.00 0% 0 0 0.00
0%
R-factor 0 0 0.00 0% 96 96 96.00
0%
MOS 0 0 0.00 0% 44 44 44.00
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-13
SIP Snooping Use Case Configuring SIP Snooping
-----------------------------------------------------------------------------------
Number of Call Records: 1
Similar to the above example, more conditions can be combined in a single SIP rule.
• Video source IP subnet 10.10.0.0= RTCP packets for these RTP flows are trapped to CPU and have
their DSCP unchanged.
-> policy action DSCP32 rtcp-monitoring enable trust-DSCP
• Video source IP subnet 10.20.0.0 = DSCP 48 + RTCP monitoring and explicit DSCP 46
RTCP packets for these RTP flows are trapped to CPU and assigned with DSCP 46
-> policy action DSCP48 dscp 48 rtcp-monitoring enable rtcp-dscp 46
page 33-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring SIP Snooping SIP Snooping Limitations
• SIP Registrar, outbound proxy, proxy, redirect functions should be provided by the same server called
the SIP Server.
• All initial SIP messages between User Agents must go through the SIP Server. Direct SIP session
establishment between end users will be not supported.
• Outbound proxy configured on phone and trusted call server configured on switch must be the same.
• Only SIP over UDP is supported. Solution does not support SIP over TCP, SCTP or MPLS and SIP
over TLS.
• Encrypted RTCP or SDP is not supported.
• Only RTP or RTP profile AVP is supported to carry media. SAVP, AVPF, SAVPF are not supported.
• Only IP address is supported. DNS resolution and FQDN name are not supported in SDP
• RTCP port assignment is taken as one higher than corresponding RTP. Other methods for RTCP port
assignment is not supported
• Media quality metrics displayed to the user only convey the presence of problem in voice and video
transmission quality. Exact location and device responsible for it will not be known and it is expected
that the user will find it by other means and take corrective action.
• QOS SIP policy modifications should be applied for the new calls only and not for existing ones.
• DSCP marking will be done for only 60 SIP audio calls, if a call is through linkagg on a stack.
• No VRF awareness. Similarly, NAT transversal (ICE, TURN, STUN solution) is not supported.
• Emergency call identification is based on user configured string. Usage of priority or resource-priority
header is not considered.
• SIP IP address and RTP IP address of end point at edge port must be same, otherwise TCAM entries
will not be created.
• Media that flows before TCAM entries are installed does not get configured QOS treatment.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 33-15
Verifying the SIP Snooping Configuration Configuring SIP Snooping
show sip-snooping config Shows the configuration done for SIP snooping.
show sip-snooping ports Displays the SIP snooping port level data.
show sip-snooping call-records Displays the SIP-snooping active/ended call records.
show sip-snooping statistics Displays the SIP snooping statistics.
show qos dscp-table Displays the QoS DSCP table configured.
page 33-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
34 Configuring IP Multicast
Switching
In This Chapter
This chapter describes the basic components of IPMS and how to configure them through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Enabling and disabling IP Multicast Switching and Routing on page 34-9.
• Enabling and disabling IPv6 Multicast Switching and Routing on page 34-25.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-1
IPMS Specifications Configuring IP Multicast Switching
Note. You can also configure and monitor IPMS with WebView, Alcatel-Lucent’s embedded Web-based
device management application. WebView is an interactive and easy-to-use GUI that can be launched
from OmniVista or a Web browser. Please refer to WebView’s online documentation for more informa-
tion on configuring and monitoring IPMS/IPMSv6 with WebView.
IPMS Specifications
The table below lists specifications for Alcatel-Lucent’s IPMS software.
page 34-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMSv6 Specifications
IPMSv6 Specifications
The table below lists specifications for Alcatel-Lucent’s IPMSv6 software.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-3
IPMSv6 Default Values Configuring IP Multicast Switching
page 34-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMS Overview
IPMS Overview
A multicast group is defined by a multicast group address, which is a Class D IP address in the range
224.0.0.0 to 239.255.255.255. (Addresses in the range 239.0.0.0 to 239.255.255.255 are reserved for
boundaries.) The multicast group address is indicated in the destination address field of the IP header. (See
“Reserved IP Multicast Addresses” on page 34-6 for more information.)
IPMS tracks the source VLAN on which the Internet Group Management Protocol (IGMP) requests are
received. The network interfaces verify that a multicast packet is received by the switch on the source (or
expected) port.
IPMS Example
The figure on the following page shows an IPMS network where video content can be provided to clients
that request it. A server is attached to the switch that provides the source (multicast) IP addresses. Clients
from two different attached networks send IGMP reports to the switch to receive the video content.
OmniSwitch
Video
Source Port
Multicast Group
(dynamically built)
Multicast Stream
(destination IP address)
Multicast Server
Ports on end stations send (source IP address)
IGMP requests to receive
multicast traffic.
Network A
Network B
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-5
IPMS Overview Configuring IP Multicast Switching
IP Multicast Routing
IP multicast routing can be used for IP Multicast Switching and Routing (IPMSR). IP multicast routing is
a way of controlling multicast traffic across networks. The IP multicast router discovers which networks
want to receive multicast traffic by sending out Internet Group Management Protocol (IGMP) queries and
receiving IGMP reports from attached networks. The IGMP reports signal that users want to join a
multicast group.
If there is more than one IP multicast router in the network, the router with the lowest IP address is elected
as the querier router, which is responsible for querying the subnetwork for group members.
The IP multicast routing package provides the following two separate protocols:
• Protocol Independent Multicast — Sparse Mode (PIM-SM) and Dense Mode (PIM-DM), which is
described in “PIM” on page 34-7.
• Distance Vector Multicast Routing Protocol (DVMRP), which is described in “DVMRP” on page 34-7.
The multicast routing protocols build and maintain a multicast routing database. The multicast routing
protocols forward multicast traffic to networks that have requested group membership to a specific
multicast group. IPMS uses decisions made by the routing protocols and forwards multicast traffic to ports
that request group membership. See the OmniSwitch AOS Release 6 Advanced Routing Configuration
Guide for more information on IP multicast routing protocols.
page 34-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMS Overview
PIM
Protocol-Independent Multicast (PIM) is an IP multicast routing protocol that uses routing information
provided by unicast routing protocols, such as RIP and OSPF. Sparse Mode PIM (PIM-SM) contrasts with
flood-and-prune dense mode multicast protocols, such as DVMRP and PIM Dense Mode (PIM-DM), in
that multicast forwarding in PIM-SM is initiated only through specific requests. Downstream routers must
explicitly join PIM-SM distribution trees in order to receive multicast streams on behalf of
directly-connected receivers or other downstream PIM-SM routers. This paradigm of receiver-initiated
forwarding makes PIM-SM ideal for network environments where receiver groups are thinly populated
and bandwidth conservation is a concern, such as in Wide Area Networks (WANs). PIM-DM packets are
transmitted on the same socket as PIM-SM packets as both use the same protocol and message format.
Unlike PIM-SM, in PIM-DM there are no periodic joins transmitted; only explicitly triggered prunes and
grafts. In PIM-DM, unlike PIM-SM, there is no Rendezvous Point (RP).
DVMRP
Distance Vector Multicast Routing Protocol (DVMRP) is a distributed multicast routing protocol that
dynamically generates per-source delivery trees based upon routing exchanges. When a multicast source
begins to transmit, the multicast data is flooded down the delivery tree to all points in the network.
DVMRP then prunes (removes the branches from) the delivery tree where the traffic is unwanted. This is
in contrast to PIM-SM, which uses receiver-initiated (forward path) multicasting.
IGMP Version 3
IGMP is used by IPv4 systems (hosts and routers) to report their IP multicast group memberships to any
neighboring multicast routers. IGMP Version 2 (IGMPv2) handles forwarding by IP multicast destination
address only. IGMP Version 3 (IGMPv3) handles forwarding by source IP address and IP multicast desti-
nation address. All three versions (IGMPv1, IGMPv2, and IGMPv3) are supported.
Note. See “Configuring the IGMP Version” on page 34-11 for information on configuring the IGMP
version.
In IGMPv2, each membership report contains only one multicast group. In IGMPv3, membership reports
contain many multicast groups up to the Maximum Transmission Unit (MTU) size of the interface.
IGMPv3 uses source filtering and reports multicast memberships to neighboring routers by sending
membership reports. IGMPv3 also supports Source Specific Multicast (SSM) by allowing hosts to report
interest in receiving packets only from specific source addresses or from all but specific source addresses.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-7
IPMS Overview Configuring IP Multicast Switching
The OmniSwitch IP multicast is impacted in such a way that when a IGMP v1/v2 report arrives on an
interface, if the switch mode is IGMP v3 mode and if PIM-SSM is configured with the group address of
the incoming report, then PIM will be informed with (S,G) join instead of (*,G) join.
See “Enabling IGMP v1/v2 translation to PIM-SSM static mapping” on page 34-14 for information on
enabling the IGMP v1/v2 to PIM-SSm Static Mapping.
Following image depicts an unsupported topology for the IGMP setup.
page 34-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMS Overview
Note. See the “IP Multicast Switching Commands” chapter in the OmniSwitch AOS Release 6 CLI Refer-
ence Guide for complete documentation of IPMS CLI commands.
Note. If IP Multicast switching and routing is enabled on the system, the VLAN configuration overrides
the system configuration.
You can also enable IP Multicast switching and routing on the specified VLAN by entering:
-> ip multicast vlan 2 status enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-9
IPMS Overview Configuring IP Multicast Switching
You can also enable the IGMP querier-forwarding on the specified VLAN by entering:
-> ip multicast vlan 2 querier-forwarding enable
page 34-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMS Overview
You can also change the IGMP protocol version on the specified VLAN by entering:
-> ip multicast vlan 5 version 1
You can also configure a link aggregation group as an IGMP static neighbor port by entering
ip multicast static-neighbor followed by vlan, a space, VLAN number (which must be between 0 and
4095), a space, followed by port, a space, and the link aggregation group number.
For example, to configure link aggregation group 7 with designated VLAN 2 as a static neighbor you
would enter:
-> ip multicast static-neighbor vlan 2 port 7
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-11
IPMS Overview Configuring IP Multicast Switching
You can also configure a link aggregation group as an IGMP static querier port by entering ip multicast
static-querier followed by vlan, a space, VLAN number (which must be between 0 and 4095), a space,
followed by port, a space, and the link aggregation group number.
For example, to configure link aggregation group 7 with designated VLAN 2 as a static querier you would
enter:
-> ip multicast static-querier vlan 2 port 7
page 34-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMS Overview
You can also configure a link aggregation group as an IPMS static group by entering
ip multicast static-group followed by vlan, a space, VLAN number (which must be between 0 and
4095), a space, followed by port, a space, and the link aggregation group number.
For example, to configure link aggregation group 7 with designated VLAN 2 as a static group you would
enter:
-> ip multicast static-group 225.0.0.2 vlan 2 port 7
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-13
IPMS Overview Configuring IP Multicast Switching
Configure the static-ssm mapping in the system using the command ip multicast static-ssm-map.
For more information on these cli commands, see ip multicast static-ssm-map in the IP Multicast
Switching Commands in OmniSwitch AOS Release 6 CLI Reference Guide.
page 34-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also modify the IGMP query interval on the specified VLAN by entering:
-> ip multicast vlan 2 query-interval 60
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-15
Modifying IPMS Parameters Configuring IP Multicast Switching
You can also modify the IGMP last member query interval on the specified VLAN by entering:
-> ip multicast vlan 3 last-member-query-interval 60
To restore the IGMP last member query interval to its default value.
You can also restore the IGMP last member query interval on the specified VLAN by entering:
-> ip multicast vlan 2 last-member-query-interval 0
To restore the IGMP last member query interval to its default value.
You can also modify the IGMP query response interval on the specified VLAN by entering:
-> ip multicast vlan 3 query-response-interval 6000
page 34-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also modify the IGMP router timeout on the specified VLAN by entering:
-> ip multicast vlan 2 router-timeout 360
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-17
Modifying IPMS Parameters Configuring IP Multicast Switching
You can also modify the source timeout on the specified VLAN by entering:
-> ip multicast vlan 2 source-timeout 360
page 34-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also enable the IGMP querying on the specified VLAN by entering:
-> ip multicast vlan 2 querying enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-19
Modifying IPMS Parameters Configuring IP Multicast Switching
Note. If the links are known to be lossy, then robustness variable can be set to a higher value (7).
You can also modify the IGMP robustness variable from 1 to 7 on the specified VLAN by entering:
-> ip multicast vlan 2 robustness 3
You can also enable IGMP spoofing on the specified VLAN by entering:
-> ip multicast vlan 2 spoofing enable
page 34-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMS Parameters
You can also enable IGMP zapping on the specified VLAN by entering:
-> ip multicast vlan 2 zapping enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-21
Modifying IPMS Parameters Configuring IP Multicast Switching
You can also disable IGMP zapping on the specified VLAN by entering:
-> ip multicast vlan 2 zapping disable
To set the IGMP group limit for a VLAN and replace an existing session use the ip multicast vlan max-
group command as shown below:
-> ip multicast vlan 10 max-group 25 action replace
To set the IGMP group limit for a port and drop any requests above the limit, use the ip multicast port
max-group command as shown below:
-> ip multicast port 1/1 max-group 25 action drop
page 34-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMSv6 Overview
IPMSv6 Overview
An IPv6 multicast address identifies a group of nodes. A node can belong to any number of multicast
groups. IPv6 multicast addresses are classified as fixed scope multicast addresses and variable scope
multicast addresses.(See the “Reserved IPv6 Multicast Addresses” on page 34-24.)
IPMSv6 tracks the source VLAN on which the Multicast Listener Discovery Protocol (MLD) requests are
received. The network interfaces verify that a multicast packet is received by the switch on the source (or
expected) port.
IPMSv6 Example
The figure on the following page shows an IPMSv6 network where video content can be provided to
clients that request it. A server is attached to the switch that provides the source (multicast) IPv6
addresses. Clients from two different attached networks send MLD reports to the switch to receive the
video content.
OmniSwitch
Video
Source Port
Multicast Group
(dynamically built)
Multicast Stream
(destination IPv6 address)
Multicast Server
Ports on end stations send (source IPv6 address)
MLD requests to receive
multicast traffic.
Network A
Network B
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-23
IPMSv6 Overview Configuring IP Multicast Switching
Address Description
FF00:0:0:0:0:0:0:0 reserved
FF01:0:0:0:0:0:0:0 node-local scope address
FF02:0:0:0:0:0:0:0 link-local scope
FF03:0:0:0:0:0:0:0 unassigned
FF04:0:0:0:0:0:0:0 unassigned
FF05:0:0:0:0:0:0:0 site-local scope
FF06:0:0:0:0:0:0:0 unassigned
FF07:0:0:0:0:0:0:0 unassigned
FF08:0:0:0:0:0:0:0 organization-local scope
FF09:0:0:0:0:0:0:0 unassigned
FF0A:0:0:0:0:0:0:0 unassigned
FF0B:0:0:0:0:0:0:0 unassigned
FF0C:0:0:0:0:0:0:0 unassigned
FF0D:0:0:0:0:0:0:0 unassigned
FF0E:0:0:0:0:0:0:0 global scope
FF0F:0:0:0:0:0:0:0 reserved
MLD Version 2
MLD is used by IPv6 systems (hosts and routers) to report their IPv6 multicast group memberships to any
neighboring multicast routers. MLD Version 1 (MLDv1) handles forwarding by IPv6 multicast destina-
tion addresses only. MLD Version 2 (MLDv2) handles forwarding by source IPv6 addresses and IPv6
multicast destination addresses. Both MLDv1 and MLDv2 are supported.
Note. See “Configuring the MLD Version 2” on page 34-26 for information on configuring the IGMP
version.
MLDv2 uses source filtering and reports multicast memberships to neighboring routers by sending
membership reports. MLDv2 also supports Source Specific Multicast (SSM) by allowing hosts to report
interest in receiving packets only from specific source addresses or from all but specific source addresses.
page 34-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Configuring IPMSv6 on a Switch
Note. See the “IP Multicast Switching Commands” chapter in the OmniSwitch AOS Release 6 CLI Refer-
ence Guide for complete documentation of IPMSv6 CLI commands.
Note. If IPv6 Multicast switching and routing is enabled on the system, the VLAN configuration
overrides the system configuration.
You can also enable IPv6 Multicast switching and routing on the specified VLAN by entering:
-> ipv6 multicast vlan 2 status enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-25
Configuring IPMSv6 on a Switch Configuring IP Multicast Switching
You can also enable the MLD querier-forwarding on the specified VLAN by entering:
-> ipv6 multicast vlan 2 querier-forwarding enable
page 34-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Configuring IPMSv6 on a Switch
You can also configure a link aggregation group as an MLD static neighbor port by entering
ipv6 multicast static-neighbor followed by vlan, a space, VLAN number (which must be between 0 and
4095), a space, followed by port, a space, and the link aggregation group number.
For example, to configure link aggregation group 7 with designated VLAN 2 as a static neighbor you
would enter:
-> ipv6 multicast static-neighbor vlan 2 port 7
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-27
Configuring IPMSv6 on a Switch Configuring IP Multicast Switching
You can also configure a link aggregation group as an MLD static querier port by entering
ipv6 multicast static-querier, followed by vlan, a space, VLAN number (which must be between 0 and
4095), a space, followed by port, a space, and the link aggregation group number.
For example, to configure link aggregation group 7 with designated VLAN 2 as a static querier you would
enter:
-> ipv6 multicast static-querier vlan 2 port 7
page 34-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Configuring IPMSv6 on a Switch
You can also configure a link aggregation group as an MLD static group by entering
ipv6 multicast static-group, followed by vlan, a space, VLAN number (which must be between 0 and
4095), a space, followed by port, a space, and the link aggregation group number.
For example, to configure link aggregation group 7 with designated VLAN 2 as a static group you would
enter:
-> ipv6 multicast static-group ff05::6 vlan 2 port 7
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-29
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
You can also modify the MLD query interval on the specified VLAN by entering:
-> ipv6 multicast vlan 2 query-interval 160
You can also restore the MLD query interval on the specified VLAN by entering:
-> no ipv6 multicast vlan 2 query-interval
You can also modify the MLD last member query interval on the specified VLAN by entering:
-> ipv6 multicast vlan 3 last-member-query-interval 2200
page 34-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
To restore the MLD last member query interval to its default (1000 milliseconds) value.
You can also restore the MLD last member query interval on the specified VLAN by entering:
-> ipv6 multicast vlan 2 last-member-query-interval 0
To restore the MLD last member query interval to its default (1000 milliseconds) value.
You can also modify the MLD query response interval on the specified VLAN by entering:
-> ipv6 multicast vlan 3 query-response-interval 20000
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-31
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
You can also modify the MLD router timeout on the specified VLAN by entering:
-> ipv6 multicast vlan 2 router-timeout 360
page 34-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
You can also modify the source timeout on the specified VLAN by entering:
-> ipv6 multicast vlan 2 source-timeout 60
You can also enable the MLD querying on the specified VLAN by entering:
-> ipv6 multicast vlan 2 querying enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-33
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
Note. If the links are known to be lossy, then robustness can be set to a higher value (7).
You can also modify the MLD robustness variable from 1 to 7 on the specified VLAN by entering:
-> ipv6 multicast vlan 2 robustness 3
page 34-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
You can also enable MLD spoofing on the specified VLAN by entering:
-> ipv6 multicast vlan 2 spoofing enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-35
Modifying IPMSv6 Parameters Configuring IP Multicast Switching
You can also enable MLD zapping on the specified VLAN by entering:
-> ipv6 multicast vlan 2 zapping enable
You can also disable MLD zapping on the specified VLAN by entering:
-> ipv6 multicast vlan 2 zapping disable
page 34-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Modifying IPMSv6 Parameters
To set the MLD group limit for a VLAN and replace any requests above the limit, use the ipv6 multicast
vlan max-group command as shown below:
-> ipv6 multicast vlan 10 max-group 25 action replace
To set the MLD group limit for a port and drop any requests above the limit, use the ipv6 multicast port
max-group command as shown below:
-> ipv6 multicast port 1/1 max-group 25 action drop
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-37
IPMS Application Example Configuring IP Multicast Switching
Video OmniSwitch
Multicast Server
(source IP address)
Static Neighbor
Attached to Slot 1, Port 5.
Static Querier
Attached to Slot 1, Port 2.
Network Clients
Network clients send IGMP
requests to receive multicast
traffic.
The network administrator has determined that the network is too lossy and therefore the robustness vari-
able needs to be set to a higher value (7).
Follow the steps below to configure this network:
Note. All the steps following Step 1 (which must be executed first) can be entered in any order.
2 Configure the client attached to Port 5 as a static neighbor belonging to VLAN 5 by entering:
3 Configure the client attached to Port 2 as a static querier belonging to VLAN 5 by entering:
An example of what these commands look like entered sequentially on the command line:
page 34-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMS Application Example
As an option, you can use the show ip multicast, show ip multicast neighbor, and
show ip multicast querier commands to confirm your settings as shown below:
-> show ip multicast
Status: = Enabled
Querying: = Disabled
Proxying: = Disabled
Spoofing: = Disabled
Zapping: = Disabled
Querier Forwarding: = Disabled
Version: = 1
Robustness: = 2
Query Interval (seconds): = 125
Query Response Interval (milliseconds): = 10000
Last Member Query Interval(milliseconds): = 1000
Unsolicited Report Interval (seconds) = 1,
Router Timeout (seconds): = 90
Source Timeout (seconds): = 30
Total 1 Neighbors
Host Address VLAN Port Static Count Life
---------------+-----+-----+-------+------+-----
1.0.0.2 5 1/5 no 1 86
Total 1 Queriers
Host Address VLAN Port Static Count Life
---------------+-----+-----+-------+------+-----
1.0.0.3 5 1/2 no 1 250
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-39
IPMSv6 Application Example Configuring IP Multicast Switching
OmniSwitch
Video
Multicast Server
(source IPv6 address)
Static Neighbor
Attached to Slot 1, Port 5.
Static Querier
Attached to Slot 1, Port 2.
Network Clients
Network clients send MLD
requests to receive multicast
traffic.
The network administrator has determined that the network is too lossy and therefore the robustness
variable needs to be set to a higher value (7).
Follow the steps below to configure this network:
Note. All the steps following Step 1 (which must be executed first) can be entered in any order.
2 Configure the client attached to Port 5 as a static MLD neighbor belonging to VLAN 5 by entering:
3 Configure the client attached to Port 2 as a static MLD querier belonging to VLAN 5 by entering:
An example of what these commands look like entered sequentially on the command line:
page 34-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching IPMSv6 Application Example
As an option, you can use the show ip multicast index-sharing, show ipv6 multicast neighbor, and
show ipv6 multicast querier commands to confirm your settings as shown below:
-> show ipv6 multicast
Status: = Enabled
Querying: = Disabled
Proxying: = Disabled
Spoofing: = Disabled
Zapping: = Disabled
Querier Forwarding: = Disabled
Version: = 1
Robustness: = 2
Query Interval (seconds): = 125
Query Response Interval (milliseconds): = 10000
Last Member Query Interval(milliseconds): = 1000
Unsolicited Report Interval (seconds) = 1,
Router Timeout (seconds): = 90
Source Timeout (seconds): = 30
Total 1 Neighbors
Host Address VLAN Port Static Count Life
-------------------------+-----+-----+-------+------+-----
fe80::2a0:ccff:fed3:2853 5 1/5 no 1 6
Total 1 Queriers
Host Address VLAN Port Static Count Life
-------------------------+-----+-----+-------+------+-----
fe80::2a0:ccff:fed3:2854 5 1/2 no 1 6
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-41
Displaying IPMS Configurations and Statistics Configuring IP Multicast Switching
show ip multicast Displays the general IP Multicast switching and routing configuration
parameters on a switch.
show ip multicast group Displays all detected multicast groups that have members. If you do not
specify an IP address then all multicast groups on the switch are
displayed.
show ip multicast neighbor Displays all neighboring multicast routers.
show ip multicast querier Displays all multicast queriers.
show ip multicast forward Displays the IPMS multicast forwarding table. If you do not specify a
multicast group IP address, then the forwarding table for all multicast
groups is displayed.
show ip multicast source Displays the IPMS multicast source table. If you do not specify a
multicast group IP address, then the source table for all multicast groups
are displayed.
show ip multicast tunnel Displays the IP multicast switch and routing tunneling table entries
matching the specified IP multicast group address, or all the entries if no
IP multicast address is specified.
If you are interested in a quick look at IPMS groups on your switch you could use the
show ip multicast group command. For example:
-> show ip multicast group
Total 3 Groups
* Denotes IPMVLAN
Group Address Source Address VLAN Port RVLAN Mode Static Count Life
---------------+---------------+-----+-----+--------+-------+------+-------+------
231.0.0.3 1.0.0.5 1 2/1 exclude no 1 257
234.0.0.4 0.0.0.0 1 2/1 exclude no 1 218
229.0.0.1 0.0.0.0 1 2/13 exclude yes 0 0
224.1.1.1 0.0.0.0 *10 1/1 20 exclude yes 0 0
Note. See the “IP Multicast Switching Commands” chapter in the OmniSwitch AOS Release 6 CLI Refer-
ence Guide for complete documentation on IPMS show commands.
page 34-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast Switching Displaying IPMSv6 Configurations and Statistics
show ip multicast index- Displays the general IPv6 Multicast switching and routing configuration
sharing parameters on a switch.
show ipv6 multicast group Displays all detected multicast groups that have members. If you do not
specify an IPv6 address, then all multicast groups on the switch are
displayed.
show ipv6 multicast neighbor Displays all neighboring IPv6 multicast routers.
show ipv6 multicast querier Displays all IPv6 multicast queriers.
show ipv6 multicast forward Displays the IPMSv6 multicast forwarding table. If you do not specify a
multicast group IPv6 address, then the forwarding table for all multicast
groups is displayed.
show ipv6 multicast source Displays the IPMSv6 multicast source table. If you do not specify a
multicast group IPv6 address, then the source table for all multicast
groups is displayed.
show ipv6 multicast tunnel Display the IPv6 multicast switch and routing tunneling table entries
matching the specified IPv6 multicast group address, or all the entries if
no IPv6 multicast address is specified.
If you are interested in a quick look at IPMSv6 groups on your switch you could use the
show ipv6 multicast group command. For example:
-> show ipv6 multicast group
Total 3 Groups
Group Address Source Address VLAN Port Mode Static Count Life
----------------+---------------+-----+-----+--------+-------+------+-----
ff05::5 :: 1 2/1 exclude no 1 145
ff05::6 3333::1 1 2/1 exclude no 1 242
Note. See the “IPv6 Multicast Switching Commands” chapter in the OmniSwitch AOS Release 6 CLI
Reference Guide for complete documentation on IPMS show commands.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 34-43
Displaying IPMSv6 Configurations and Statistics Configuring IP Multicast Switching
page 34-44 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
35 Configuring IP Multicast
VLAN
In This Chapter
This chapter describes the basic components of IP Multicast VLAN and shows how to configure them
through the Command Line Interface (CLI). CLI commands are used in configuration examples; for more
details about command syntax, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Creating and Deleting IPMVLAN on page 35-9.
Note. You can also configure and monitor IPMV through WebView, Alcatel-Lucent embedded
web-based device management application. WebView is an interactive and easy-to-use GUI that can be
launched from OmniVista or a web browser. Please refer to WebView online documentation for more
information on configuring and monitoring IPMV through WebView.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-1
IP Multicast VLAN Specifications Configuring IP Multicast VLAN
page 35-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast VLAN IP Multicast VLAN Overview
Note. It is recommended to use any one of the methods on the receiver port and not both.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-3
IP Multicast VLAN Overview Configuring IP Multicast VLAN
Note. CVLAN-tag translation rule applies only in the VLAN Stacking mode.
You can use the vlan ipmvlan ctag command to define the translation rule for replacing the outer s-tag
with an IPMVLAN ID, the inner being the customer tag (c-tag).
Note. No checks are performed on c-tags as they are simple translation rules. VLAN addition or deletion
rules do not affect them.
• IP address translation rule applies to untagged IGMP reports received from customer.
Enterprise Mode
IP Multicast VLANs in the Enterprise mode contain normal user ports (fixed/tagged) as their member
ports.
page 35-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast VLAN IPMV Packet Flows
Core Unicast
and
Multicast Router
5 Receiver port
4
Legends
Sender port
Multicast Data Packets
3 Customer A
Multicast Control Packets 2
Ethernet Switch
1 6
Customer C
Customer B
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-5
IPMV Packet Flows Configuring IP Multicast VLAN
The paths taken by the packets are described in the following subsections:
1 Untagged IPMS join reports for the multicast group G1 are sent to the receiver port.
2 The IPMS reports sent to the CPU of the Ethernet switch are single-tagged with the default SVLAN tag
(s-tag).
3 IPMS overwrites the SVLAN tag with the IPMV tag after IPMV table lookup.
4 A single IPMS report, single-tagged with IPMV, is sent to the multicast server for group G1.
5 The single multicast data packet, single-tagged with IPMV, is generated by the multicast server for
group G1.
6 The generated multicast data packets are flooded on the receiver port. These data packets are untagged.
1 The IPMS join reports for multicast group G1, which are single-tagged with the CVLAN tag (c-tag) are
sent to the receiver port.
2 SVLAN tags are attached before the CVLAN tags in all the IPMS reports going to the CPU of the
Ethernet switch.
3 IPMS overwrites the SVLAN tags with the IPMV tags after IPMV table lookup for the inner c-tag.
4 A single IPMS double-tagged report with an IPMV outer tag and a CVLAN inner tag is sent to the
multicast server for group G1.
5 The single multicast double-tagged data packets with an IPMV outer tag and a CVLAN inner tag are
generated by the multicast server for group G1.
6 The VLAN Stacking egress logic removes the IPMV outer tag. The generated multicast data packets
flooded on the receiver port are single-tagged with CVLAN.
4 A single IPMS double-tagged report with an IPMV outer tag and a CVLAN inner tag is sent to the
multicast server for group G1.
page 35-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast VLAN IPMV Packet Flows
5 The single multicast double-tagged data packets with an IPMV outer tag and a CVLAN inner tag are
generated by the multicast server for group G1.
6 The VLAN Stacking egress logic removes the IPMV outer tag. The generated multicast data packets
flooded on the receiver port are single-tagged with CVLAN.
Note. All the IPMS control traffic specified for a single multicast service must be tagged with the same
CVLAN.
3 IPMS overwrites the SVLAN tags with the IPMV tags after IPMV table lookup.
4 A single IPMV-tagged IPMS report is sent to the multicast server for Group G1.
5 The single multicast packets single-tagged with IPMV are generated by the multicast server for group
G1.
6 The VLAN Stacking egress logic replaces the IPMV tag with the CVLAN tag. The multicast data
packets flooded on the receiver port are single-tagged with CVLAN.
Note. All the IPMS control traffic specified for a single multicast service must be tagged with the same
CVLAN.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-7
IPMV Packet Flows Configuring IP Multicast VLAN
Enterprise Mode
In the Enterprise mode, two types of control packets ingress on the receiver ports. The paths taken by the
packets (as shown in the diagram on page 35-5) are described in the following subsections.
1 Untagged IPMS join reports for the multicast group G1 are sent to the receiver port.
2 The IPMS reports sent to the CPU of the Ethernet switch are single-tagged with the default VLAN.
3 IPMS overwrites the tag with the IPMV tag after IPMV table lookup.
4 A single IPMS report, single-tagged with IPMV, is sent to the multicast server for group G1.
5 The single multicast data packet, single-tagged with IPMV, is generated by the multicast server for
group G1.
6 The generated multicast data packets are flooded on the receiver port. These data packets are untagged.
1 The single-tagged IPMS join reports for the multicast group G1 are sent to the receiver port.
2 The IPMS reports are sent to the CPU of the Ethernet switch.
3 IPMS overwrites the tag with the IPMV tag after IPMV table lookup.
4 A single IPMS report, single-tagged with IPMV, is sent to the multicast server for group G1.
5 The single multicast data packet, single-tagged with IPMV, is generated by the multicast server for
group G1.
6 The generated multicast data packets are flooded on the receiver port. These data packets are untagged.
IPMVLAN is supported on 802.1x ports. This is only applicable for enterprise mode since an 802.1x port
can not be configured as UNI port. In IPMVLAN enterprise mode, the receiver port is set on the 802.1x
port. The 802.1x/receiver port is considered as untagged member for the IPMVLAN.
page 35-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast VLAN Configuring IPMVLAN
Configuring IPMVLAN
This section describes how to use Command Line Interface (CLI) commands to complete the following
configuration tasks:
• Creating and deleting IPMVLAN (see “Creating and Deleting IPMVLAN” on page 35-9).
• Assigning IPv4 address to an existing IPMVLAN and removing it (see “Assigning and Deleting IPv4
Address” on page 35-10)
• Assigning and removing the c-tag in an IPMVLAN (see “Assigning and Deleting a Customer VLAN
Tag” on page 35-10).
• Creating and deleting a sender port in an IPMVLAN (see “Creating and Deleting a Sender Port” on
page 35-11).
• Creating and deleting a receiver port in an IPMVLAN (see “Creating and Deleting a Receiver Port” on
page 35-12).
• Configuring a VLAN translation of a CVLAN to an IPMVLAN (see “Associating an IPMVLAN with
a Customer VLAN” on page 35-12).
In addition, a tutorial is provided in “IPMVLAN Application Example” on page 35-14 that shows you
how to use CLI commands to configure a sample network.
Note. See the “IP Multicast VLAN Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference
Guide for complete documentation of IPMVLAN CLI commands.
Creating IPMVLAN
To create an IPMVLAN, use the vlan ipmvlan command as shown below:
-> vlan ipmvlan 1003 name "multicast vlan"
For example, to create an IPMVLAN in the 1x1 Spanning Tree mode, enter:
-> vlan ipmvlan 1333 1x1 stp enable name “nvlan”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-9
Configuring IPMVLAN Configuring IP Multicast VLAN
Deleting IPMVLAN
To remove an IPMVLAN, use the no form of the vlan ipmvlan command by entering no vlan ipmvlan
followed by the IPMVLAN ID, as shown below:
-> no vlan ipmvlan 1003
page 35-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast VLAN Configuring IPMVLAN
To create multiple sender ports in an IPMVLAN, specify a range of ports. For example:
-> vlan ipmvlan 1003 sender-port port 1/45-48
In the VLAN Stacking mode, the port that you want to configure as a sender port must be a VLAN Stack-
ing Network Network Interface (NNI). To create a sender port in an IPMVLAN configured in the VLAN
Stacking mode, use the VLAN Stacking ethernet-service commands and the vlan ipmvlan sender-port
command, as shown below:
For more information about how to configure an NNI, see Chapter 50, “Configuring VLAN Stacking.”
Note. Multiple sender port can be configured for an IPMVLAN only in enterprise mode. In vlan stacking
mode, only one sender port can be configured per IPMVLAN.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-11
Configuring IPMVLAN Configuring IP Multicast VLAN
In the VLAN Stacking mode, the port that you want to configure as a receiver port must be a VLAN
Stacking User Network Interface (UNI). To create a receiver port in an IPMVLAN configured in the
VLAN Stacking mode, use the VLAN Stacking ethernet-service command and the vlan ipmvlan
receiver-port command, as shown below:
Note that in the above example, port 1/49 was previously configured as a VLAN Stacking UNI. For more
information about how to configure a UNI, see Chapter 50, “Configuring VLAN Stacking.”
In Enterprise mode, receiver vlan should be created as normal vlan in the system and receiver port should
be configured as a tagged member of this vlan.
Note. Use the no form of this command to delete the receiver port & receiver vlan association.
-> no vlan ipmvlan 1000 receiver-port port 1/1 receiver-vlan 10
page 35-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast VLAN Configuring IPMVLAN
For more information about configuring IPMVLANs in VLAN Stacking mode, see Chapter 50, “Config-
uring VLAN Stacking.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-13
IPMVLAN Application Example Configuring IP Multicast VLAN
Ethernet Switch
Customer C
Customer B
Customer A
Note. All the steps following step 1 (which must be executed first) can be entered in any order.
page 35-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring IP Multicast VLAN IPMVLAN Application Example
An example of what these commands look like when entered sequentially on the command line:
-> vlan ipmvlan 1003 name "multicast vlan"
-> vlan ipmvlan 1003 address 225.0.0.1
-> vlan ipmvlan 1003 sender-port port 1/50
-> vlan ipmvlan 1003 receiver-port port 1/51-60
As an option, you can use the show vlan, show vlan ipmvlan address, and show vlan ipmvlan port-
config commands to confirm your settings. For example:
-> show vlan
stree mble
vlan type admin oper 1x1 flat auth ip ipx tag name
+----+-----+-----+-------+----------+------+----+-----+-----+---------+
1 std on on on on off NA off off VLAN 1
2 ipmtv on on off off off NA off off IPMVLAN 2
3 ipmtv on on off off off NA off off IPMVLAN 3
4 vstk on on on on off NA off off SVLAN 4
IpAddress ipAddressType
----------+---------------
224.1.1.1 Ipv4
224.1.1.2 Ipv4
224.1.1.3 Ipv4
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 35-15
Verifying the IP Multicast VLAN Configuration Configuring IP Multicast VLAN
show vlan ipmvlan Displays IPMVLAN information for a specific IPMVLAN, a range
of IPMVLANs, or all IPMVLANs.
show vlan ipmvlan c-tag Displays the customer VLAN IDs associated with a single IP
Multicast VLAN or all the configured IP Multicast VLANs.
show vlan ipmvlan address Displays the IPv4 addresses assigned to a single IP
Multicast VLAN or all the configured IP Multicast VLANs.
show vlan ipmvlan port-config Displays the sender and receiver ports for a specific IP Multicast
VLAN or all the IP Multicast VLANs.
page 35-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
36 Configuring QoS
Alcatel-Lucent’s QoS software provides a way to manipulate flows coming through the switch based on
user-configured policies. The flow manipulation (generally referred to as Quality of Service or QoS) can
be as simple as allowing/denying traffic, or as complicated as remapping 802.1p bits from a Layer 2
network to ToS values in a Layer 3 network.
While policies can be used in many different types of network scenarios, there are several typical types
discussed in this chapter:
• Basic QoS—includes traffic prioritization and bandwidth shaping.
• ICMP policies—includes filtering, prioritizing, and/or rate limiting ICMP traffic for security.
• Policy Based Mirroring—includes mirror-to-port (MTP) policies for mirroring ingress, egress, or both
ingress and egress traffic.
• Access Control Lists (ACLs)—ACLs are a specific type of QoS policy used for Layer 2 and
Layer 3/4 filtering. Since filtering is used in many different network situations, ACLs are described in a
separate chapter (see Chapter 37, “Configuring ACLs”).
In This Chapter
This chapter describes QoS in general and how policies are used on the switch. It provides information
about configuring QoS through the Command Line Interface (CLI). CLI commands are used in the
configuration examples; for more details about the syntax of commands, see the OmniSwitch AOS Release
6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Setting up global QoS parameters (see page 36-16)
• Setting up policy components, such as policy conditions and actions (see page 36-33)
Note. Policies can also be configured through the PolicyView NMS application and stored on an attached
LDAP server. LDAP policies are downloaded to the switch and managed through the Policy Manager
feature in the switch. For more information about managing LDAP policies, see Chapter 39, “Managing
Policy Servers.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-1
QoS Specifications Configuring QoS
QoS Specifications
The QoS functionality described in this chapter is supported on the OmniSwitch 9000E, 6850E, 6855,
6400 switches, unless otherwise stated in the following QoS Specifications table or specifically noted
within any other section of this chapter. Any maximum limits provided in the Specifications table are
subject to available system resources.
Maximum number of policy rules 2048 (ingress and egress rules combined)
Maximum number of egress policy rules 1022 (OmniSwitch 9000E with OS9-GNI-C24E or
OS9-GNI-U24E modules)
510 (OmniSwitch 6400, 6855-U24X, and
OmniSwitch 9000E with OS9-XNI-U12E module)
Maximum number of policy conditions 2048
Maximum number of policy actions 2048
Maximum number of policy services 256
Maximum number of groups (network, MAC, ser- 1024
vice, port, VLAN)
Maximum number of group entries 1011 per group
Maximum number of rules per slot 1664 (OmniSwitch 9000E, 6850E, 6855, 6855-
U24X, 6400 )
1280 (OmniSwitch 6400)
Maximum number of bandwidth shaping rules per 832 (OmniSwitch 6850E, 6855, 9000E CMM)
slot 640 (OmniSwitch 6400)
Maximum number of priority queues per port 8
Maximum number of QoS policy lists per switch 13 (includes the default list)
Maximum number of QoS policy lists per Access 1
Guardian User Network Profile (UNP)
Platforms Supported
QoS policy lists - UNP OmniSwitch 6400, 6850E, 6855
QoS policy lists - egress OmniSwitch 6400, 6855-U24X, OmniSwitch
6850E (running in 6850E mode), 9000E
CLI Command Prefix Recognition Some QoS commands support prefix recognition.
See the “Using the CLI” chapter in the OmniSwitch
AOS Release 6 Switch Management Guide for more
information.
page 36-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS QoS General Overview
OmniSwitch
email server
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-3
QoS Policy Overview Configuring QoS
Or
• on an external LDAP server through the PolicyView application.
The switch makes a distinction between policies created on the switch and policies created on an LDAP
server.
Note. Polices can be only be modified using the same source used to create them. Policies configured
through PolicyView can only be edited through PolicyView. Policies created directly on the switch
through the CLI or WebView can only be edited on the switch. Policies can be created through the CLI or
WebView to override policies created in PolicyView.
This chapter discusses policy configuration using the CLI. For information about using WebView to
configure the switch, see the OmniSwitch AOS Release 6 Switch Management Guide. For information
about configuring policies through PolicyView, see the PolicyView online help.
page 36-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Interaction With Other Features
Valid Policies
The switch does not allow you to create invalid condition/action combinations; if you enter an invalid
combination, an error message displays.
A list of valid condition and condition/action combinations is given in “Condition Combinations” on
page 36-6 and “Action Combinations” on page 36-9.
It is possible to configure a valid QoS rule that is active on the switch, however the switch is not able to
enforce the rule because some other switch function (for example, routing) is disabled. See the condition
and condition/action combinations tables for more information about valid combinations (“Condition
Combinations” on page 36-6 and “Action Combinations” on page 36-9).
Policy Lists
By default, QoS policy rules are applied to traffic ingressing on QoS ports. The ingress traffic is then
bridged or routed to a destination port where the frames are serviced by the egress port/queue scheduler.
Once the frames are serviced, policy rules can be applied to the frames before they are transmitted on the
egress port.
Policy rules are not automatically applied to egress traffic. To apply a rule to egress traffic, the rule must
belong to a QoS egress policy list. A policy list consists of a group of policy rules that is identified by the
list name. There are three types of lists available:
• Default—All rules are associated with a default policy list when the rules are created. This list is not
configurable, but it is possible to direct QoS not to assign a rule to this list. Default policy list rules are
applied to ingress traffic.
• User Network Profile (UNP)—This type of policy list is associated with an Access Guardian UNP.
The rules in this list are applied to ingress traffic that is classified into the user profile. See Chapter 43,
“Configuring Access Guardian,” for more information.
• Egress—When a list is configured as an egress policy list, all rules associated with that list are applied
to traffic egressing on QoS destination ports. Egress rules (members of an egress policy list) do not
support all available policy actions and conditions. See “Condition Combinations” on page 36-6 and
“Action Combinations” on page 36-9 to determine which conditions and actions are supported.
Whether or not a list is a UNP or egress list is determined when the policy list is created. For more infor-
mation, see “Creating Policy Lists” on page 36-40.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-5
Condition Combinations Configuring QoS
• Mobile Ports—Mobile ports are always trusted, regardless of QoS settings. For information about
setting up mobile ports, see Chapter 5, “Assigning Ports to VLANs.”
• LDAP Policy Management—Policies can also be configured through the PolicyView application and
stored on an attached LDAP server. LDAP policies can only be modified through PolicyView. For
information about setting up a policy server and managing LDAP policies, see Chapter 39, “Managing
Policy Servers.”
• VLAN Stacking Ethernet Service—VLAN Stacking ports are always trusted and default classifica-
tion is set to 802.1p. QoS policy conditions to match the inner VLAN tag and inner 802.1p tag are
available for classifying customer information contained in VLAN Stacking frames. For information
about VLAN Stacking see Chapter 50, “Configuring VLAN Stacking.”
• Quarantine Manager and Remediation (QMR)—Configuring QMR and QoS inner VLAN or inner
802.1p policies is mutually exclusive. QMR overlays the inner VLAN tag, thus creating a conflict with
related QoS policies. This is also true with QMR and VLAN Stacking services. For more information
about QMR, see “Using Quarantine Manager and Remediation” on page 36-18.
• User Network Profiles—The Access Guardian User Network Profile (UNP) feature provides the abil-
ity to assign a list of QoS policy rules to a profile. The rules contained in the list are applied to any
device that is assigned to the UNP. For more information about policy lists, see “Policy Lists” on
page 36-5 and Chapter 43, “Configuring Access Guardian.”
Condition Combinations
The CLI prevents you from configuring invalid condition combinations that are never allowed; however, it
does allow you to create combinations that are supported in some scenarios. For example, you can
configure source ip and a destination ip for the same condition.
The following conditions are supported and can be combined with other conditions and/or actions. Note
that certain conditions are not supported when the condition is associated with an egress rule (a rule that is
a member of an egress policy list. See “Creating Policy Lists” on page 36-40 for more information).
page 36-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Condition Combinations
• In a given rule, ToS or DSCP can be specified for a condition with priority specified for the action.
• The Layer 1 destination port condition only applies to bridged traffic on the OmniSwitch 6400 and
6855. However, this condition is applied to both bridged and routed traffic on the OmniSwitch 6850E,
6855-U24X, and 9000E.
• The IP multicast condition works in combination with Layer 1, Layer 2, and Layer 3 destination condi-
tions only if these conditions specify the device that sends the IGMP report packet.
• Individual items and their corresponding groups cannot be combined in the same condition. For exam-
ple, a source IP address cannot be included in a condition with a source IP network group.
• Layer 2 and Layer 3 rules are always effected on bridged and routed traffic. As a result, combining
source or destination TCP/UDP port and IP protocol in a condition is allowed.
• The Quarantine Manager and Remediation (QMR) application and inner VLAN or inner 802.1p condi-
tions are mutually exclusive. If one of these is active, the other one is not available.
Use the following “Policy Condition Combinations Table” together with the “Supported Policy Condi-
tions Table” as a guide when configuring policy conditions:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-7
Condition Combinations Configuring QoS
IP Multicast
Layer 1 Layer 2 Layer 3* Layer 4* (IGMP)
Layer 1 All All All All destination only
*IP multicast traffic (not IGMP) is treated as regular traffic; QoS functionality works the same way with
this type of traffic, with the exception that the destination port condition does not apply.
For more information about combining policy actions or policy actions with conditions, see “Action
Combinations” on page 36-9 and “Condition and Action Combinations” on page 36-11.
For specific information about how to configure policy conditions and actions to create a policy rule, see
“Creating Policies” on page 36-33.
page 36-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Action Combinations
Action Combinations
The CLI prevents you from configuring invalid action combinations that are never allowed; however, it
does allow you to create combinations that are supported in some scenarios. For example, an action
specifying maximum bandwidth can be combined with an action specifying priority.
The following actions are supported and can be combined with other actions. Note that certain actions are
not supported when the action is associated with an egress rule (a rule that is a member of an egress policy
list. See “Creating Policy Lists” on page 36-40 for more information).
Egress Rules
Policy Action Ingress Rules (Egress Policy List)
ACL (disposition accept, drop, deny) Yes Yes
Priority/CoS Yes No
802.1p ToS/DCSP Stamping and Mapping (only applies to Yes Yes
the outer 802.1p value; cannot modify the inner value)
Maximum Bandwidth Yes Yes
Maximum Depth Yes Yes
Tri-Color Marking (TCM) Rate Limiting Yes No
Shared (schedules multiple flows on the same queue when Yes Yes
multiple rules use the same action)
Port Redirection Yes No
Link Aggregate Redirection (not supported on the Yes No
OmniSwitch 6400, 6850E, and 6855)
No Cache (disables the logging of rule entries to the Yes No
hardware cache)
Port Disable Yes No
Permanent Gateway IP (not supported on the OmniSwitch Yes No
6400, 6850E, and 6855)
Mirror Yes No
Use the following “Policy Action Combinations Table” together with the “Supported Policy Actions
Table” as a guide when creating policy actions.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-9
Action Combinations Configuring QoS
For more information about combining policy conditions or policy conditions and actions, see “Condition
Combinations” on page 36-6 and “Condition and Action Combinations” on page 36-11.
For specific information about how to configure policy conditions and actions to create a policy rule, see
“Creating Policies” on page 36-33.
page 36-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Condition and Action Combinations
*The Layer 1 destination port condition only applies to bridged traffic on the OmniSwitch 6400 and 6855.
However, this condition is applied to both bridged and routed traffic on the OmniSwitch 6850E, 6855-
U24X, and 9000E.
Note. Additional policy condition/action combination restrictions can apply depending on whether the
policy rule applies to ingress or egress traffic. See “Condition Combinations” on page 36-6 and “Action
Combinations” on page 36-9 for more information
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-11
QoS Defaults Configuring QoS
QoS Defaults
The following tables list the defaults for global QoS parameters, individual port settings, policy rules, and
default policy rules.
page 36-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS QoS Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-13
QoS Defaults Configuring QoS
Note that in the current software release, the deny and drop options produce the same effect that is, the
traffic is silently dropped.
page 36-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS QoS Configuration Overview
2 Configuring QoS Port Parameters. This configuration includes setting up QoS parameters on a per
port basis. Typically you need not change the port defaults. See “QoS Port Defaults” on page 36-13 for a
list of port defaults. See “QoS Ports and Queues” on page 36-25 for information about configuring port
parameters.
3 Setting Up Policies. Most QoS configuration involves setting up policies. See “Creating Policies” on
page 36-33.
4 Applying the Configuration. All policy rule configuration and some global parameters must be
specifically applied through the qos apply command before they are active on the switch. See “Applying
the Configuration” on page 36-61.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-15
Configuring Global QoS Parameters Configuring QoS
Enabling/Disabling QoS
By default QoS is enabled on the switch. If QoS policies are configured and applied, the switch attempts to
classify traffic and apply relevant policy actions.
To disable the QoS, use the qos command. For example:
-> qos disable
QoS is immediately disabled. When QoS is disabled globally, any flows coming into the switch are not
classified (matched to policies).
To re-enable QoS, enter the qos command with the enable option:
-> qos enable
QoS is immediately re-enabled. Any policies that are active on the switch are used to classify traffic
coming into the switch.
Note. Individual policy rules can be enabled or disabled with the policy rule command.
To activate the setting, enter the qos apply command. For more information about the qos apply
command, see “Applying the Configuration” on page 36-61.
Typically, the disposition is only configured when you are using policies for Access Control Lists (ACLs).
Note that if you set qos default bridged disposition to deny, you effectively drop all Layer 2 traffic that
does not match any policy. If you want to create ACLs to allow some Layer 2 traffic through the switch,
you must configure two rules for each type of Layer 2 traffic, one for source and one for destination. For
more information about ACLs, see Chapter 37, “Configuring ACLs.”
page 36-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Configuring Global QoS Parameters
For more information about the available queuing schemes and configuring the servicing mode for indi-
vidual ports, see “Prioritizing and Queue Mapping” on page 36-25.
The qos nms priority command is used to enable or disable the automatic prioritization of NMS traffic.
This functionality is enabled for the switch by default. To disable automatic prioritization, use the no form
of the qos nms priority command. For example:
-> qos no nms priority
Note the following when configuring the status of automatic NMS traffic prioritization:
• Only the NMS traffic associated with the first eight active IP interfaces is prioritized; any such traffic
from additional interfaces is not prioritized.
• The precedence of an active IP interface is determined by the value of the SNMP interface index (ifin-
dex), which was assigned to the interface when it was created. The lower the ifindex value the higher
the precedence; the higher the ifindex value the lower the precedence. Therefore, the eight IP inter-
faces with the lowest ifindex values are eligible for automatic prioritization of NMS traffic.
• To change the precedence of an IP interface, use the ip interface ifindex command and specify a
higher (lower precedence) or lower (higher precedence) ifindex value.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-17
Configuring Global QoS Parameters Configuring QoS
• When automatic NMS prioritization is enabled, QoS policies that specify priority are not applied to the
NMS traffic. Other QoS policies, however, are applied to this type of traffic as usual. If a policy speci-
fies rate limiting, then the policy with the lowest rate limiting value is applied.
To disable automatic IP phone traffic prioritization for the switch, enter the following command:
-> qos no phones
Note that When automatic prioritization of IP phone traffic is enabled, QoS policies that specify priority
are not applied to the IP phone traffic. Other QoS policies, however, are applied to this type of traffic as
usual. If a policy specifies rate limiting, then the policy with the lowest rate limiting value is applied.
page 36-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Configuring Global QoS Parameters
• Remediation server URL. The qos quarantine path command is used to specify a URL for the reme-
diation server. Note that this done in addition to specifying the server IP address in the “alaException-
Subnet” network group.
• Quarantined Page. When a client is quarantined and a remediation server URL is not configured,
QMR can send a Quarantine Page to notify the client of its quarantined state. To enable or disable the
sending of a Quarantine Page, use the qos quarantine page command.
• HTTP proxy port group. This is a known QoS service group, called “alaHTTPProxy”, that specifies
the HTTP port to which quarantined client traffic is redirected for remediation. The default HTTP port
used is TCP 80 and TCP 8080. To specify a different HTTP port, use the policy service group
command.
1 Optional. Configure the name of the MAC address group that contains quarantined addresses (the
default name is “Quarantined”):
-> qos quarantine mac-group Quarantined
3 Optional. If a remediation server URL is not configured, configure QMR to send a Quarantine Page to
notify the client of its quarantined status:
-> qos quarantine page
4 Add the IP address of the remediation server (required) and any exception subnets (optional) to the
QoS alaExceptionSubnet network group:
-> policy network group alaExceptionSubnet 192.168.1.10 192.169.1.0 mask
255.255.255.0 192.170.1.0 mask 255.255.255.0
5 Optional. Specify an HTTP port (the default is TCP 80 and TCP 8080) for client HTTP redirects:
6 Optional. The QMR MAC address group is populated from the same group located on the LDAP
server. However, it is also possible to add addresses to the QMR MAC address group from the switch
CLI:
-> policy mac group Quarantined 00:9a:2d:00:00:10
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-19
Configuring Global QoS Parameters Configuring QoS
8 Optional. Quarantine MAC addresses are flagged as “quarantined” in the switch MAC address table.
To view a list of such MAC addresses, use the show mac-address-table command with the quarantined
parameter.
-> show mac-address-table quarantined
• Specifying only one remediation server is allowed at this time. An IP interface is required for the
VLAN to which the port connected to the remediation server belongs.
• Specifying up to three exception subnets in the alaExceptionSubnet group is allowed.
To verify the QMR configuration for the switch, use the following show commands:
show qos config Displays the name of the quarantine MAC address group configured for
the switch.
show policy mac group Displays the contents of the specified QoS MAC address group (for
example, show policy mac group Quarantined).
show policy network group Displays the contents of the specified QoS network address group (for
example, show policy network group alaExceptionSubnet).
show policy service group Displays the contents of the specified QoS service group (for example,
show policy service group alaHTTPProxy).
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about Quarantine Manager
and Remediation commands. Refer to the OmniVista Quarantine Manager application for more informa-
tion about configuring Quarantine Manager.
page 36-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Configuring Global QoS Parameters
To display information about any QoS rules on the switch, enter debug qos rule:
-> debug qos rules
To change the type of debugging, use no with the relevant type of information that you want to remove.
For example:
-> debug qos no rule
To turn off debugging (which effectively turns off logging), enter the following:
-> no debug qos
The number of lines in the log is changed. To activate the change, enter the qos apply command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-21
Configuring Global QoS Parameters Configuring QoS
Note. If you change the number of log lines, the QoS log can be completely cleared. To change the log
lines without clearing the log, set the log lines in the boot.cfg file; the log is set to the specified number of
lines at the next reboot.
The log level is changed immediately but the setting is not saved in flash. To activate the change, enter the
qos apply command. For more information about the qos apply command, see “Applying the Configura-
tion” on page 36-61.
Note. A high log level value impacts the performance of the switch.
To activate the change, enter the qos apply command. For more information about the qos apply
command, see “Applying the Configuration” on page 36-61.
If event forwarding is disabled, NMS applications can still query the QoS software for events, but the
events are not sent in real time.
To disable immediate forwarding of events to switch logging, enter the following command:
-> qos no log console
To activate the change, enter the qos apply command. For more information about the qos apply
command, see “Applying the Configuration” on page 36-61.
page 36-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Configuring Global QoS Parameters
Use the swlog remote command-log command to configure switch logging to output logging events to
the console. Note that this is in addition to sending log events to a file in the flash file system of the
switch. See the “Using Switch Logging” chapter in the OmniSwitch AOS Release 6 Network Configura-
tion Guide for more information.
Insert rule 0
Rule index at 0
Insert rule 1
Rule index at 1
Insert rule 2
Rule index at 2
Enable rule r1 (1) 1,1
Enable rule r2 (0) 1,1
Enable rule yuba1 (2) 1,1
Verify rule r1(1)
Enable rule r1 (1) 1,1
Really enable r1
Update condition c1 for rule 1 (1)
Verify rule r2(1)
Enable rule r2 (0) 1,1
Really enable r2
Update condition c2 for rule 0 (1)
Verify rule yuba1(1)
Enable rule yuba1 (2) 1,1
Really enable yuba1
Update condition yubamac for rule 2 (1)
QoS Manager started TUE MAR 10 13:46:50 2002
Match rule 2 to 1
Match rule 2 to 2
Match rule 2 to 3
The log display can be modified through the qos log lines, qos log level, and debug qos commands. The
log display can also be output to the console through the qos log console command or sent to the policy
software in the switch (which manages policies downloaded from an LDAP server) through the qos
forward log command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-23
Configuring Global QoS Parameters Configuring QoS
• The switch can bridge and route traffic to the same destination.
Note that Layer 3 ACLs are effected on bridged IP traffic and Layer 2 ACLs are effected on routed traffic.
Statistics are displayed through the show qos statistics command. For more information about this
command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Note. The qos reset command only affects the global configuration. It does not affect any policy
configuration.
show qos config Displays global information about the QoS configuration.
show qos statistics Displays statistics about QoS events.
For more information about the syntax and displays of these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide.
page 36-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS QoS Ports and Queues
Shared Queues
Eight priority queues are available at startup for each port. Flows always share queues; however, when a
shared action is specified in policies, the policies use the same values to implement maximum bandwidth.
1 If a packet matches a QoS policy rule that sets a priority value, the egress priority for the packet is set
using the value specified in the rule.
2 If a packet ingressing on a trusted port does not match any QoS policy rule that sets the priority, then
the egress priority for the packet is set using the existing DSCP value (IP packets), the existing 802.1p
value (non-IP packets), or the default classification priority value for the port. See “Trusted and Untrusted
Ports” on page 36-30 for more information.
3 If the default classification priority value for the port is set to DSCP, the DSCP value of a tagged IP
packet is mapped to the 802.1p value for that same packet. In other words, the 802.1p priority is overwrit-
ten with the DSCP value. This does not apply to Layer 2 packets. See “Maintaining the 802.1p Priority for
IP Packets” on page 36-26 for more information.
4 The egress priority for a packet ingressing on a VLAN Stacking port (a trusted port) is set using the
existing 802.1p value or configured through an associated VLAN Stacking service.
5 If a packet ingressing on an untrusted port does not match any QoS rule that sets the priority, then the
egress priority for the packet is set using the default 802.1p value configured for the port on which the
packet was received. See “Configuring the Egress Queue Minimum/Maximum Bandwidth” on page 36-29
for more information.
6 Note that the 802.1p bit for tagged packets ingressing on untrusted ports is set with the default 802.1p
value, which is configured using the qos port default 802.1p command. If the packet is untagged,
however, then the DSCP bit is set with the default DSCP value, which is configured using the qos port
default dscp command.
Use the following table to see how packets are directed to the appropriate queues:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-25
QoS Ports and Queues Configuring QoS
Rule(action)
802.1p ToS/DSCP Priority Queue
0 000xxx 0 0
1 001xxx 1 1
2 010xxx 2 2
3 011xxx 3 3
4 100xxx 4 4
5 101xxx 5 5
6 110xxx 6 6
7 111xxx 7 7
2 Define policy conditions for the port group; one condition for each L2 priority (802.1p) value.
3 Define policy actions that stamp the IP traffic with the L2 priority value.
4 Define policy rules using the conditions and actions created in Steps 2 and 3.
For example:
page 36-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS QoS Ports and Queues
Note that for pure Layer 2 packets, trusted ports retain the 802.1p value of the packet and queue the
packets according to that priority value.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-27
QoS Ports and Queues Configuring QoS
13=26K, 14=28K, 15=30K. For example, if the configured DRR queue weights are 1 1 2 2 3 3 4 4,
queues 1 and 2 service up to 2K each, queues 3 and 4 service up to 4K each, queues 5 and 6 service up
to 6K each, and queues 7 and 8 service up to 8K.
The queuing scheme selected is the scheme that is used to shape traffic on destination (egress) ports and is
referred to as the QoS servicing mode for the port. It is possible to configure a default servicing mode that
applies to all switch ports (see “Setting the Global Default Servicing Mode” on page 36-17) or configure
the servicing mode on an individual port basis (see “Configuring the Servicing Mode for a Port” on
page 36-28).
Note that the QoS servicing mode only applies to destination ports because it is at this point where traffic
shaping is effected on the flows. In addition, different ports can use different servicing modes.
The following command selects the WRR scheme for port 1/8:
-> qos port 1/8 servicing mode wrr
In the above example, a weight for each of the eight WRR queues was not specified; therefore, the default
value of 1 is used for each queue. The following example selects the WRR scheme for port 1/10 and
assigns a weighted value to each queue:
-> qos port 1/10 servicing mode wrr 0 2 3 4 8 1 1 7
To reset the servicing mode for the port back to the global default mode, use the default parameter with
this command and do not specify a queueing scheme. For example,
-> qos port 1/10 servicing mode default
The qos default servicing mode command is used to set the global default queuing scheme that is used
for all ports. See “Setting the Global Default Servicing Mode” on page 36-17 for more information.
Note the following when configuring the port servicing mode:
• The qos port servicing mode command overrides the default servicing mode configured with the qos
default servicing mode command.
• Once the qos port servicing mode command is used on a port, this same command is required to make
any additional mode changes for that port. If the port is changed back to the default servicing mode,
however, this restriction is removed and the qos default servicing mode command is also allowed on
the port.
Bandwidth Shaping
Bandwidth shaping is configured on a per port basis. Bandwidth policing is applied using QoS policies
(see “Port Groups and Maximum Bandwidth” on page 36-54 and “Policy Applications” on page 36-64 for
more information).
QoS supports configuring maximum bandwidth on ingress and egress ports. However, configuring mini-
mum and maximum egress bandwidth is done on a per CoS queue basis for each port (see “Configuring
the Egress Queue Minimum/Maximum Bandwidth” on page 36-29 for more information).
page 36-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS QoS Ports and Queues
To limit the ingress or egress bandwidth for a QoS port, use the qos port maximum egress-bandwidth or
qos port maximum ingress-bandwidth commands. For example,
-> qos port 1/1 maximum egress-bandwidth 10M
Note the following when configuring the ingress or egress bandwidth limit for a port:
• Maximum bandwidth limiting is done using a granularity of 64K bps. Any value specified that is not a
multiple of 64K is rounded down to the next multiple of 64K.
• If a maximum bandwidth below 64K is configured, the value is set to ‘0’.
• The maximum bandwidth value cannot exceed the maximum bandwidth of the interface type associ-
ated with the port.
• Modifying the maximum bandwidth is most useful for low-bandwidth links.
• The bandwidth limit configured using the qos port maximum egress-bandwidth command takes
precedence over an egress queue limit configured on the same port.
Note that specifying both the minimum and maximum bandwidth value is allowed on the same command
line. Configuring the bandwidth values for different queues requires a separate command for each queue.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-29
QoS Ports and Queues Configuring QoS
To configure the switch to map ingress traffic marked with the DEI bit, use the qos dei command with the
ingress parameter option. For example:
-> qos dei ingress
To configure the DEI bit operation for an individual port, use the qos port dei with the ingress or egress
parameter option. For example:
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about these commands.
Note about mobile ports. Mobile ports cannot be Q-tagged like fixed ports; however, a mobile port joins
a tagged VLAN if tagged traffic for that VLAN comes in on the mobile port and the vlan mobile-tag
command is enabled for that VLAN. For more information about enabling this command, see Chapter 4,
“Configuring VLANs.”
Ports must be both trusted and configured for 802.1Q traffic in order to accept 802.1p traffic.
The following applies to ports that are trusted (for 802.1p traffic, the ports must also be able to accept
802.1Q packets):
• The 802.1p or ToS/DSCP value is preserved.
• If the incoming 802.1p or ToS/DSCP flow does not match a policy, the switch places the flow into a
default queue and prioritizes the flow based on the 802.1p or ToS/DSCP value in the flow.
page 36-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS QoS Ports and Queues
• If the incoming 802.1p or ToS/DSCP flow matches a policy, the switch queues the flow based on the
policy action.
The switch can be configured globally so that all ports are trusted. Individual ports can be configured to
override the global setting.
To configure individual ports as trusted, use the qos port trusted command with the desired slot/port
number. For example:
-> qos port 3/2 trusted
The global setting is active immediately; however, the port setting requires qos apply to activate the
change. For more information about the qos apply command, see “Applying the Configuration” on
page 36-61.
To activate the configuration, enter the qos apply command. For more information about the qos apply
command, see “Applying the Configuration” on page 36-61.
For actions that set 802.1p bits, note that a limited set of policy conditions are supported. For information
about which conditions can be used with an 802.1p action, see “Condition Combinations” on page 36-6
and “Action Combinations” on page 36-9.
Note. 802.1p mapping can also be set for Layer 3 traffic, which typically has the 802.1p bits set to zero.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-31
QoS Ports and Queues Configuring QoS
Use the no form of the qos port monitor command to disable monitoring for a specific port. For example:
-> qos port 1/10 monitor disable
show qos port Displays information about all QoS ports or a particular port.
show qos queue Displays information for all QoS queues or only those queues associated
with a particular slot/port.
show qos port monitor Displays a list of ports for which QoS port monitoring is enabled.
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about the syntax and
displays for these commands.
page 36-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
Creating Policies
This section describes how to create policies in general. For information about configuring specific types
of policies, see “Policy Applications” on page 36-64.
Basic commands for creating policies are as follows:
policy condition
policy action
policy rule
This section describes generally how to use these commands. For additional details about command
syntax, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Note. A policy rule can include a policy condition or a policy action that was created through PolicyView
rather than the CLI. But a policy rule, policy action, or policy condition can only be modified through the
source that created it. For example, if an action was created in PolicyView, it can be included in a policy
rule configured through the CLI, but it cannot be modified through the CLI.
Policies are not used to classify traffic until the qos apply command is entered. See “Applying the Config-
uration” on page 36-61.
To view information about how the switch classifies particular condition parameters, use the show policy
classify command. This is useful to test conditions before actually activating the policies on the switch.
See “Testing Conditions” on page 36-46.
Note. (Optional) Test the rule with the show policy classify command using information from the policy
condition. For example:
-> show policy classify l3 source ip 10.10.2.3
This command displays information about whether or not the indicated parameter can be used to classify
traffic based on policies that are configured on the switch.
2 Create a policy action with the policy action command. For example:
-> policy action action2 priority 7
3 Create a policy rule with the policy rule command. For example:
-> policy rule my_rule condition cond3 action action2
4 Use the qos apply command to apply the policy to the configuration. For example:
-> qos apply
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-33
Creating Policies Configuring QoS
Note. (Optional) To verify that the rule has been configured, use the show policy rule command. The
display is similar to the following:
-> show policy rule
Policy From Prec Enab Act Refl Log Trap Save
r1 cli 0 Yes Yes No No Yes Yes
(L2/3): cond1 -> action1
This command displays information about whether or not the indicated parameter can be used to classify
traffic based on policies that are configured on the switch. For more information about this display, see
“Verifying Policy Configuration” on page 36-45.
Note. For OmniSwitch 9000E, the detailed QoS policy must only be based on either IPv6 source or
destination address.
ASCII-File-Only Syntax
When the policy rule, policy condition, and policy action commands as well as any of the condition
group commands are configured and saved in an ASCII file (typically through the snapshot command),
the commands included in the file include syntax indicating the origin of the command. The origin
specifies where the rule, condition, condition group, or action was created, either an LDAP server or the
CLI (from ldap or from cli). For built-in QoS objects, the syntax displays as from blt. For example:
-> policy action A2 from ldap disposition accept
The from option is configurable (for LDAP or CLI only) on the command line; however, it is not recom-
mended that a QoS object’s origin be modified. The blt keyword indicates built-in; this keyword cannot be
used on the command line. For information about built-in policies and QoS groups, see “How Policies Are
Used” on page 36-4.
page 36-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
Note. Policy condition configuration is not active until the qos apply command is entered. See “Applying
the Configuration” on page 36-61.
To create or modify a policy condition, use the policy condition command with the keyword for the type
of traffic you want to classify, for example, an IP address or group of IP addresses. In this example, a
condition (c3) is created for classifying traffic from source IP address 10.10.2.1:
-> policy condition c3 source ip 10.10.2.1
There are many options for configuring a condition, depending on how you want the switch to classify
traffic for this policy. An overview of the options is given here. Later sections of this chapter describe how
to use the options in particular network situations.
Note. The group options in this command refer to groups of addresses, services, or ports that you config-
ure separately through policy group commands. Rather than create a separate condition for each address,
service, or port, use groups and attach the group to a single condition. See “Using Condition Groups in
Policies” on page 36-48 for more information about setting up groups.
More than one condition parameter can be specified. Some condition parameters are mutually exclusive.
For supported combinations of condition parameters, see “Condition Combinations” on page 36-6.
The condition is not active on the switch until you enter the qos apply command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-35
Creating Policies Configuring QoS
The specified parameter (in this case, a source IP address) is removed from the condition (c3) at the next
qos apply.
Note. You cannot remove all parameters from a policy condition. A condition must be configured with at
least one parameter.
The condition (c3) cannot be deleted if it is currently being used by a policy rule. If a rule is using the
condition, the switch displays an error message. For example:
ERROR: c3 is being used by rule ‘my_rule’
In this case, the condition is not deleted. The condition (c3) must first be removed from the policy rule
(my_rule). See “Creating Policy Rules” on page 36-37 for more information about setting up rules.
If c3 is not used by a policy rule, it is deleted after the next qos apply.
In this example, the action (Block) has a disposition of drop (disposition determines whether a flow is
allowed or dropped on the switch). This action can be used in a policy rule to deny a particular type of
traffic specified by a policy condition.
Note. Policy action configuration is not active until the qos apply command is entered. See “Applying the
Configuration” on page 36-61.
More than one action parameter can be specified. Some parameters can be mutually exclusive. In
addition, some action parameters are only supported with particular condition parameters. For information
about supported combinations of condition and action parameters, see “Condition Combinations” on
page 36-6 and “Action Combinations” on page 36-9. See the OmniSwitch AOS Release 6 CLI Reference
Guide for details about command syntax.
page 36-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
Note. If you combine priority with 802.1p, dscp, tos, or map, in an action, the priority value is used to
prioritize the flow.
This example removes the configured priority value from action a6. If any policy rule is using action a6,
the default action is to allow the flow classified by the policy condition.
The specified parameter (in this case, priority) is removed from the action at the next qos apply.
The action cannot be deleted if it is currently being used by a policy rule. If a rule is using the action, the
switch displays an error message. For example:
ERROR: a6 is being used by rule ‘my_rule’
In this case, the action is not deleted. The action (a6) must first be removed from the policy rule
(my_rule). See “Creating Policy Rules” on page 36-37 for more information about setting up rules.
If a6 is not used by a policy rule, it is deleted after the next qos apply.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-37
Creating Policies Configuring QoS
The rule (rule5) only takes effect after the qos apply command is entered. For more information about the
qos apply command, see “Applying the Configuration” on page 36-61.
The policy rule command can specify the following keywords:
In addition, a policy rule can be administratively disabled or re-enabled using the policy rule command.
By default rules are enabled. For a list of rule defaults, see “Policy Rule Defaults” on page 36-13.
Information about using the policy rule command options is given in the next sections.
Note the following when using validity periods to restrict the times when a rule is active:
• Only one validity period is associated with a policy rule. Each time this command is entered with a
validity period name specified, the existing period name is overwritten with the new one.
• A rule is only in effect when all the parameters of its validity period are true. In the above example,
rule r01 is only applied between 13:00 and 19:00 on Mondays and Fridays. During all other times and
days, the rule is not applied.
• Software and hardware resources are allocated for rules associated with a validity period even if the
validity period is not active. Pre-allocating the resources makes sure the rule can be enforced when the
validity period becomes active.
Disabling Rules
By default, rules are enabled. Rules can be disabled or re-enabled through the policy rule command using
the disable and enable options. For example:
-> policy rule rule5 disable
page 36-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
Note that if qos disable is entered, the rule is not used to classify traffic even if the rule is enabled. For
more information about enabling/disabling QoS globally, see “Enabling/Disabling QoS” on page 36-16.
Rule Precedence
The switch attempts to classify flows coming into the switch according to policy precedence. Only the rule
with the highest precedence is applied to the flow. This is true even if the flow matches more than one
rule.
Precedence is particularly important for Access Control Lists (ACLs). For more details about precedence
and examples for using precedence, see Chapter 37, “Configuring ACLs.”
Saving Rules
The save option marks the policy rule so that the rule is captured in an ASCII text file (using the
configuration snapshot command) and saved to the working directory (using the write memory
command). By default, rules are saved.
If the save option is removed from a rule, the qos apply command can activate the rule for the current
session, but the rule is not saved over a reboot. Typically, the no save option is used for temporary
policies that you do not want saved in the switch configuration file.
To remove the save option from a policy rule, use no with the save keyword. For example:
-> policy rule rule5 no save
To reconfigure the rule as saved, use the policy rule command with the save option. For example:
-> policy rule rule5 save
For more information about the configuration snapshot, write memory, and copy running-config
working commands, see the OmniSwitch AOS Release 6 Switch Management Guide and the OmniSwitch
AOS Release 6 CLI Reference Guide.
For more information about applying rules, see “Applying the Configuration” on page 36-61.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-39
Creating Policies Configuring QoS
Logging Rules
Logging a rule can be useful for determining the source of firewall attacks. To specify that the switch must
log information about flows that match the specified policy rule, use the policy rule command with the log
option. For example:
-> policy rule rule5 log
To stop the switch from logging information about flows that match a particular rule, use no with the log
keyword. For example:
-> policy rule rule5 no log
When logging is active for a policy rule, a logging interval is applied to specify how often to look for
flows that match the policy rule. By default, the interval time is set to 30 seconds. To change the log inter-
val time, use the optional interval keyword with the log option. For example:
-> policy rule rule5 log interval 1500
Note that setting the log interval time to 0 specifies to log as often as possible.
Deleting Rules
To remove a policy rule, use the no form of the command.
-> no policy rule rule1
page 36-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
By default, a policy list is enabled at the time the list is created. To disable or enable a policy list, use the
following commands:
To remove an individual rule from a UNP or egress policy list, use the following command:
-> policy list egress_rules no r5
To remove an entire UNP or egress policy list from the switch configuration, use the following command:
-> no policy list egress_rules
Use the show policy list command to display the QoS policy rule configuration for the switch.
• If a rule is a member of multiple policy lists but one or more of these lists are disabled, the rule is still
active for those lists that are enabled.
• If the QoS status of an individual rule is disabled, then the rule is disabled for all policy lists, even if a
list to which the policy belongs is enabled.
• Policy lists are not active on the switch until the qos apply command is issued.
The following sections provide important information about using the default and egress policy lists. In
addition, the “Policy List Examples” on page 36-43 section provides additional configuration examples of
policy rules and list types.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-41
Creating Policies Configuring QoS
The no default-list option can also remove an existing rule from the default list. For example, the r2 rule
already exists in the switch configuration but was not excluded from the default list at the time the rule
was created. The following command removes the rule from the default list:
-> policy rule r2 condition c1 action a1 no default-list
To add an existing rule to the default list, use the default-list parameter option of the policy rule
command. For example:
-> policy rule r2 condition c1 action a1 default-list
Rules associated with the default policy list are applied only to ingress traffic, unless the rule is also
assigned to an egress policy list.
The rules associated with an egress list are created in the same manner as all other policy rules. However,
the following policy conditions and actions are not supported within egress rules:
• IPv6 conditions (any condition using the ipv6 keyword).
See “Condition Combinations” on page 36-6 and “Action Combinations” on page 36-9 for more informa-
tion about policy conditions and actions supported by both ingress and egress rules.
Consider the following additional guidelines for using egress policy lists:
page 36-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
• QoS changes DSCP and 802.1p values for traffic ingressing on an untrusted port. As a result, the new
values need not match any egress policy list rules as expected. To avoid this scenario, trust the ingress
port or configure a default ToS/DSCP/802.1p value as required.
• If an egress policy list rule contains an 802.1p condition and the ingress port is trusted, set the default
classification of the ingress port to 802.1p. If the default classification of the ingress port is set to
DSCP, the 802.1p value of the traffic is changed per the DSCP classification and does not match the
egress 802.1p condition.
• Egress rate limiting configured through an Ethernet Service SAP profile takes precedence over egress
rate limiting specified within a QoS egress policy list rule.
• If there are no system resources available to assign a rule to an ingress policy list (default or UNP
lists), assigning that same rule to an egress list is not allowed.
-> policy condition cond1 source mac 00:11:22:33:44:55 source vlan 100
-> policy action act1 disposition drop
-> policy rule rule1 condition cond1 action act1
-> qos apply
In this example, the policy rule command does not use the no default-list parameter, so the rule is auto-
matically assigned to the default policy list. The default list always exists and is not configurable. As a
result, the policy list command is not required to assign the rule to the default list.
-> policy condition cond1 source mac 00:11:22:33:44:55 source vlan 100
-> policy condition cond2 source ip 1.2.3.4
-> policy action act1 disposition drop
-> policy action act2 maximum bandwidth 1.00M
-> policy rule rule1 condition cond1 action act1 no default-list
-> policy rule rule2 condition cond2 action act2 no default-list
-> policy list egress_rules1 type egress rules rule1 rule2
-> qos apply
In this example, the policy rule commands use the no default-list parameter so that rule1 and rule2 are
not assigned to the default policy list. The policy list command is then used to assign rule1 and rule2 to
the egress_rules1 policy list. Because these two rules are assigned to the egress_rules1 policy list and not
the default list, the rules are applied only to egress traffic.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-43
Creating Policies Configuring QoS
Example 3: Default List and Egress List - Ingress and Egress Rules
The following example creates and assigns policy rules to the default policy list and an egress policy list.
In this example, rule1, rule2, and rule3 are assigned to the default policy list and rule1 and rule4 are
assigned to the egress_rules1 list. As a result, these rules are applied as follows:
• Rules rule2 and rule3 are applied only to ingress traffic because they are associated with the default
policy list and not the egress_rules1 policy list.
• Rule rule1 is applied to both ingress and egress traffic because the rule is associated with both the
default policy list and the egress_rules1 policy list.
• Rule rule4 is applied only to egress traffic because the rule is associated with the egress_rules1 policy
list and not the default list.
In this example, the policy rule command uses the no default-list parameter so that rule2 and rule3 are
not assigned to the default policy list. The policy list command is then used to assign rule2 and rule3 to
the unp1 policy list. As a result, these two rules are only assigned to the unp1 list, not the default list.
See Chapter 43, “Configuring Access Guardian,” for more information about configuring policy lists for
User Network Profiles.
page 36-44 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
show policy condition Displays information about all pending and applied policy conditions or
a particular policy condition configured on the switch. Use the applied
keyword to display information about applied conditions only.
show policy action Displays information about all pending and applied policy actions or a
particular policy action configured on the switch. Use the applied key-
word to display information about applied actions only.
show policy rule Displays information about all pending and applied policy rules or a par-
ticular policy rule. Use the applied keyword to display information
about applied rules only.
show active policy rule Displays applied policy rules that are active (enabled) on the switch.
show active policy rule meter- Displays the Tri-color Marking (TCM) counter color statistics for active
statistics policy rules. See “Tri-Color Marking” on page 36-66 for information.
show policy list Displays information about pending and applied policy lists.
When the command is used to show output for all pending and applied policy configuration, the following
characters can appear in the display:
character definition
+ Indicates that the policy rule has been modified or has
been created since the last qos apply.
- Indicates the policy object is pending deletion.
# Indicates that the policy object differs between the pend-
ing/applied objects.
For example:
The above display indicates that my_rule is inactive and is not used to classify traffic on the switch (the
Inact field displays Yes). The rule my_rule5 has been configured since the last qos apply command was
entered, as indicated by the plus (+) sign. The rule is not used to classify traffic until the next qos apply.
Only mac1 is actively being used on the switch to classify traffic.
To display only policy rules that are active (enabled and applied) on the switch, use the show active
policy rule command. For example:
-> show active policy rule
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-45
Creating Policies Configuring QoS
Policy From Prec Enab Act Refl Log Trap Save Matches
mac1 cli 0 Yes Yes No No Yes Yes 0
{L2/3}: dmac1 -> pri2
In this example, the rule my_rule does not display because it is inactive. Rules are inactive if they are
administratively disabled through the policy rule command, or if the rule cannot be enforced by the
current hardware. Although my_rule5 is administratively active, it is still pending and not yet applied to
the configuration. Only mac1 is displayed here because it is active on the switch.
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about the output of these
commands.
Testing Conditions
Before applying policies to the configuration through the qos apply command, you must see how the
policies are used to classify traffic. Or you need to see how theoretical traffic would be classified by
policies that are already applied on the switch.
Use the show policy classify commands to see how the switch classifies certain condition parameters.
This command is used to examine the set of pending policies only. Use the applied keyword with the
command to examine the applied set of policies only. The command includes a keyword (l2, l3, multicast)
to indicate whether the Layer 2, Layer 3, or multicast classifier must be used to classify the traffic.
The keywords used with these commands are similar to the keywords used for the policy condition
command. The keyword must be relevant to the type of traffic as listed in the table here:
To test a theoretical condition against the set of pending policies, enter the command and the relevant
keyword and value. The switch displays information about the potential traffic and attempt to match it to a
policy (pending policies only). For example:
-> show policy classify l2 destination mac 08:00:20:d1:6e:51
Packet headers:
L2:
*Port : 0/0 -> 0/0
*IfType : any -> any
*MAC : 000000:000000 -> 080020:D1E51
*VLAN : 0 -> 0
*802.1p : 0
L3/L4:
*IP : 0.0.0.0 -> 0.0.0.0
*TOS/DSCP : 0/0
page 36-46 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Creating Policies
The display shows Layer 2 or Layer 3 information, depending on what kind of traffic you are attempting
to classify. In this example, the display indicates that the switch found a rule, yuba, to classify destination
traffic with the specified Layer 2 information.
To test a theoretical condition against the set of applied policies, enter the command with the applied
keyword. The switch displays information about the potential traffic and attempt to match it to a policy
(applied policies only). For example:
-> show policy classify l3 applied source ip 143.209.92.131 destination ip
198.60.82.5
Packet headers:
L2:
*Port : 0/0 -> 0/0
*IfType : any -> any
*MAC : 000000:000000 -> 000000:000000
*VLAN : 0 -> 0
*802.1p : 0
L3/L4:
*IP : 143.209.92.131 -> 198.60.82.5
*TOS/DSCP : 0/0
In this example, the display indicates that the switch found an applied rule, r1, to classify Layer 3 flows
with the specified source and destination addresses.
To activate any policy rules that have not been applied, use the qos apply command. To delete rules that
have not been applied (and any other QoS configuration not already applied), use the qos revert
command. See “Applying the Configuration” on page 36-61.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-47
Using Condition Groups in Policies Configuring QoS
ACLs
Access Control Lists (ACLs) typically use condition groups in policy conditions to reduce the number
of rules required to filter particular types of traffic. For more information about ACLs, see Chapter 37,
“Configuring ACLs.”
2 Attach the group to a policy condition. For more information about configuring conditions, see “Creat-
ing Policy Conditions” on page 36-35.
-> policy condition cond3 source network group netgroup1
Note. (Optional) Use the show policy network group command to display information about the network
group. Each type of condition group has a corresponding show command. For example:
-> show policy network group
Group Name: From Entries
Switch blt 4.0.1.166
10.0.1.166
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about the output of this
display. See “Verifying Condition Group Configuration” on page 36-57 for more information about using
show commands to display information about condition groups.
page 36-48 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Using Condition Groups in Policies
3 Attach the condition to a policy rule. (For more information about configuring rules, see “Creating
Policy Rules” on page 36-37.) In this example, action act4 has already been configured. For example:
-> policy rule my_rule condition cond3 action act4
4 Apply the configuration. See “Applying the Configuration” on page 36-61 for more information about
this command.
-> qos apply
Note. Network group configuration is not active until the qos apply command is entered.
In this example, a policy network group called netgroup2 is created with two IPv4 addresses. No mask is
specified, so the IPv4 addresses are assumed to be host addresses.
-> policy network group netgroup2 10.10.5.1 10.10.5.2
In the next example, a policy network group called netgroup3 is created with two IPv4 addresses. The
first address also specifies a mask.
-> policy network group netgroup3 173.21.4.39 mask 255.255.255.0 10.10.5.3
In this example, the 173.201.4.39 address is subnetted, so that any address in the subnet is included in the
network group. For the second address, 10.10.5.3, a mask is not specified; the address is assumed to be a
host address.
The network group can then be associated with a condition through the policy condition command. The
network group must be specified as a source network group or destination network group. In this
example, netgroup3 is configured for condition c4 as source network group:
-> policy condition c4 source network group netgroup3
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-49
Using Condition Groups in Policies Configuring QoS
To remove addresses from a network group, use no and the relevant address(es). For example:
-> policy network group netgroup3 no 173.21.4.39
This command deletes the 173.21.4.39 address from netgroup3 after the next qos apply.
To remove a network group from the configuration, use the no form of the policy network group
command with the relevant network group name. The network group must not be associated with any
policy condition or action. For example:
-> no policy network group netgroup3
If the network group is not currently associated with any condition or action, the network group
netgroup3 is deleted from the configuration after the next qos apply.
If a condition or an action is using netgroup3, the switch displays an error message similar to the
following:
ERROR: netgroup3 is being used by condition 'c4'
In this case, remove the network group from the condition first, then enter the no form of the policy
network group command. For example:
-> policy condition c4 no source network group
-> no policy network group netgroup3
The policy condition command removes the network group from the condition. (See “Creating Policy
Conditions” on page 36-35 for more information about configuring policy conditions.) The network group
is deleted at the next qos apply.
Creating Services
Policy services are made up of TCP or UDP ports or port ranges. They include source or destination ports,
or both, but the ports must be the same type (TCP or UDP). Mixed port types cannot be included in the
same service.
Policy services can be associated with policy service groups, which are then associated with policy
conditions; or they can be directly associated with policy conditions.
To create a service, use the policy service command. With this command, there are two different methods
for configuring a service. You can specify the protocol and the IP port; or you can use shortcut keywords.
The following table lists the keyword combinations:
An IP protocol (TCP or UDP), source IP port and/or destination IP port (or port range) must be associated
with a service. IP port numbers are well-known port numbers defined by the IANA. For example, port
numbers for FTP are 20 and 21; Telnet is 23.
page 36-50 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Using Condition Groups in Policies
In this example, a policy service called telnet1 is created with the TCP protocol number (6) and the well-
known Telnet destination port number (23).
-> policy service telnet1 protocol 6 destination ip port 23
A shortcut for this command replaces the protocol and destination ip port keywords with destination
tcp port:
-> policy service telnet1 destination tcp port 23
In the next example, a policy service called ftp2 is created with port numbers for FTP (20 and 21):
-> policy service ftp2 protocol 6 source ip port 20-21 destination ip port 20
A shortcut for this command replaces the protocol, source ip port, and destination ip port keywords
with source tcp port and destination tcp port:
-> policy service ftp2 source tcp port 20-21 destination tcp port 20
Multiple services created through the policy service command can be associated with a policy service
group; or, individual services can be configured for a policy condition. If you have multiple services to
associate with a condition, configure a service group and attach it to a condition. Service groups are
described in “Creating Service Groups” on page 36-51.
Note. Service configuration is not active until the qos apply command is entered.
The ftp2 service is deleted from the configuration at the next qos apply if the service is not currently asso-
ciated with a policy condition or a service group.
In this example, a policy service group called serv_group is created with two policy services (telnet1 and
ftp2). The policy services were created with the policy service command. (See “Creating Services” on
page 36-50 for information about configuring policy services.)
Note. The policy service group can include only services with all source ports, all destination ports, or all
source and destination ports. For example, the group cannot include a service that specifies a source port
and another service that specifies a destination port.
The service group can then be associated with a condition through the policy condition command. For
example:
-> policy condition c6 service group serv_group
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-51
Using Condition Groups in Policies Configuring QoS
This command configures a condition called c6 with service group serv_group. All of the services
specified in the service group is included in the condition. (For more information about configuring
conditions, see “Creating Policy Conditions” on page 36-35.)
Note. Service group configuration must be specifically applied to the configuration with the qos apply
command.
To delete a service from the service group, use no with the relevant service name. For example:
-> policy service group serv_group no telnet1
In this example, the service telnet1 is removed from policy service group serv_group.
To delete a service group from the configuration, use the no form of the policy service group command.
The service group must not be associated with any condition. For example:
-> no policy service group serv_group
Service group serv_group is deleted at the next qos apply. However, if serv_group is associated with a
policy condition, an error message is displayed instead. For example:
ERROR: serv_group is being used by condition 'c6'
In this case, remove the service group from the condition first; then enter the no policy service group
command. For example:
-> policy condition c6 no service group
-> no policy service group serv_group
The policy condition command removes the service group from the policy condition. (See “Creating
Policy Conditions” on page 36-35 for more information about configuring policy conditions.) The service
group is deleted at the next qos apply.
This command creates MAC group macgrp2 with two MAC addresses. The first address includes a MAC
address mask, so that any MAC address starting with 08:00:20 is included in macgrp2.
The MAC group can be then be associated with a condition through the policy condition command. Note
that the policy condition specifies whether the group must be used for source or destination. For
example:
-> policy condition cond3 source mac group macgrp2
This command creates a condition called cond3 that can be used in a policy rule to classify traffic by
source MAC addresses. The MAC addresses are specified in the MAC group. For more information about
configuring conditions, see “Creating Policy Conditions” on page 36-35.
page 36-52 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Using Condition Groups in Policies
Note. MAC group configuration is not active until the qos apply command is entered.
To delete addresses from a MAC group, use no and the relevant address(es):
-> policy mac group macgrp2 no 08:00:20:00:00:00
This command specifies that MAC address 08:00:20:00:00:00 is deleted from macgrp2 at the next qos
apply.
To delete a MAC group, use the no form of the policy mac group command with the relevant MAC
group name. The group must not be associated with any policy condition. For example:
-> no policy mac group macgrp2
MAC group macgrp2 is deleted at the next qos apply. However, if macgrp2 is associated with a policy
condition, an error message is displayed instead:
ERROR: macgrp2 is being used by condition 'cond3'
In this case, remove the MAC group from the condition first; then enter the no policy mac group
command. For example:
-> policy condition cond3 no source mac group
-> no policy mac group macgrp2
The policy condition command removes the MAC group from the condition. See “Creating Policy Condi-
tions” on page 36-35 for more information about configuring policy conditions. The MAC group is
deleted at the next qos apply.
The port group can then be associated with a condition through the policy condition command. Note that
the policy condition specifies whether the group must be used for source or destination. For example:
-> policy condition cond4 source port group techpubs
This command creates a condition called cond4 that can be used in a policy rule to classify traffic by
source port number. The port numbers are specified in the port group. For more information about
configuring conditions, see “Creating Policy Conditions” on page 36-35.
Note. Port group configuration is not active until the qos apply command is entered.
To delete ports from a port group, use no and the relevant port number(s).
-> policy port group techpubs no 2/1
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-53
Using Condition Groups in Policies Configuring QoS
This command specifies that port 2/1 is deleted from the techpubs port group at the next qos apply.
To delete a port group, use the no form of the policy port group command with the relevant port group
name. The port group must not be associated with any policy condition. For example:
-> no policy port group techpubs
The port group techpubs is deleted at the next qos apply. However, if techpubs is associated with a
policy condition, an error message is displayed instead:
ERROR: techpubs is being used by condition 'cond4'
In this case, remove the port group from the condition first; then enter the no policy port group
command. For example:
-> policy condition cond4 no source port group
-> no policy port group techpubs
The policy condition command removes the port group from the policy condition. (See “Creating Policy
Conditions” on page 36-35 for more information about configuring policy conditions.) The port group is
deleted at the next qos apply.
• The show active policy rule command displays the number of packets that were dropped because they
exceeded the ingress bandwidth limit applied by a maximum bandwidth policy.
• Although bandwidth policies are applied to ingress ports, it is possible to specify a destination port or
destination port group in a bandwidth policy as well. Doing so affects the egress rate limiting/egress
policing on the ingress port itself. The limitation of bridged port traffic only on OmniSwitch 6400,
6850E, 6855, 9000E destination ports applies in this case as well.
The following subsections provide examples of ingress maximum bandwidth policies using both source
and destination port groups.
page 36-54 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Using Condition Groups in Policies
In this example, if both ports 1 and 2 are active ports, the 10000 bps maximum bandwidth is shared by
both ports. In other words, maximum bandwidth policies for port groups define a maximum bandwidth
value that is a total bandwidth amount for all ports, not an amount for each port.
In this example, the specified ports for pgroup2 span across two slots. As a result, the maximum band-
width limit specified by the policy action is increased to 20K for all of the ports. The bandwidth limit is
increased by multiplying the number of slots by the specified bandwidth value.
This command creates VLAN group vlangrp1 with two VLAN IDs and a range of VLAN IDs. This group
can then be associated with a condition through the policy condition command. For example:
-> policy condition cond3 source vlan group vlangrp1
This command creates a condition called cond3 that can be used in a policy rule to classify traffic by
source VLAN IDs. The VLAN IDs are specified in the VLAN group. For more information about config-
uring conditions, see “Creating Policy Conditions” on page 36-35.
Note. VLAN group configuration is not active until the qos apply command is entered.
To delete VLAN IDs from a VLAN group, use no and the relevant address(es):
-> policy mac group vlangrp1 no 15
This command specifies that VLAN ID 15 is deleted from vlangrp1 at the next qos apply.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-55
Using Condition Groups in Policies Configuring QoS
When deleting a VLAN ID that falls within a specified range of VLAN IDs for the group, the entire range
must be deleted. For example, to delete VLAN 23 from the group, the range 20-25 is specified:
-> policy mac group vlangrp1 no 20-25
This command specifies that VLAN IDs 20, 21, 22, 23, 24, and 25 is deleted from vlangrp1 at the next
qos apply.
To delete a VLAN group, use the no form of the policy vlan group command with the relevant VLAN
group name. The group must not be associated with any policy condition. For example:
-> no policy vlan group vlangrp1
VLAN group vlangrp1 is deleted at the next qos apply. However, if vlangrp1 is associated with a policy
condition, an error message is displayed instead:
ERROR: vlangrp1 is being used by condition 'cond3'
In this case, remove the VLAN group from the condition first; then enter the no policy vlan group
command. For example:
-> policy condition cond3 no source vlan group
-> no policy vlan group vlangrp1
The policy condition command removes the VLAN group from the condition. See “Creating Policy
Conditions” on page 36-35 for more information about configuring policy conditions. The MAC group is
deleted at the next qos apply.
page 36-56 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Using Condition Groups in Policies
show policy network group Displays information about all pending and applied policy network
groups or a particular network group. Use the applied keyword to dis-
play information about applied groups only.
show policy service Displays information about all pending and applied policy services or a
particular policy service configured on the switch. Use the applied key-
word to display information about applied services only.
show policy service group Displays information about all pending and applied policy service
groups or a particular service group. Use the applied keyword to display
information about applied groups only.
show policy mac group Displays information about all pending and applied MAC groups or a
particular policy MAC group configured on the switch. Use the applied
keyword to display information about applied groups only.
show policy port group Displays information about all pending and applied policy port groups
or a particular port group. Use the applied keyword to display informa-
tion about applied groups only.
show policy vlan group Displays information about all pending and applied policy VLAN
groups or a particular VLAN group. Use the applied keyword to display
information about applied groups only.
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about the syntax and
output for these commands.
When the command is used to show output for all pending and applied condition groups, the following
characters can appear in the display:
character definition
+ Indicates that the policy rule has been modified or has
been created since the last qos apply.
- Indicates the policy object is pending deletion.
# Indicates that the policy object differs between the pend-
ing/applied objects.
In the example shown here, netgroup1 is a new network group that has not yet been applied to the config-
uration.
-> show policy network group
Group Name: From Entries
Switch blt 4.0.1.166
10.0.1.166
143.209.92.166
192.85.3.1
When the qos apply command is entered, the plus sign (+) is removed from netgroup1 in the display. See
“Applying the Configuration” on page 36-61 for more information about the qos apply command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-57
Using Map Groups Configuring QoS
2 Attach the map group to a policy action. See “Creating Policy Actions” on page 36-36 for more infor-
mation about creating policy actions.
-> policy action tosMap map tos to 802.1p using tosGroup
Note. (Optional) Use the show policy map group command to verify the map group.
-> show policy map group
Group Name From Entries
+tosGroup cli 1-2:5
4:5
5-6:7
For more information about this command, see “Verifying Map Group Configuration” on page 36-60 and
the OmniSwitch AOS Release 6 CLI Reference Guide.
3 Attach the action to a policy rule. In this example, the condition Traffic is already configured. For
more information about configuring rules, see “Creating Policy Rules” on page 36-37.
-> policy rule r3 condition Traffic action tosMap
4 Apply the configuration. For more information about this command, see “Applying the Configuration”
on page 36-61.
-> qos apply
page 36-58 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Using Map Groups
The to and from values are separated by a colon (:). If traffic with 802.1p bits comes into the switch and
matches a policy that specifies the Map1 action, the bits is remapped according to Group2. If the incom-
ing 802.1p value is 1 or 2, the value is mapped to 5. If the incoming 802.1p value is 3, the outgoing value
is 3 (the map group does not specify any mapping for a value of 3). If the incoming 802.1p value is 4, the
value is mapped to 5. If the incoming 802.1p value is 5 or 6, the value is mapped to 7.
When mapping to a different type of value, however (ToS/DSCP to 802.1p), any values in the incoming
flow that matches the rule but that are not included in the map group is zeroed out. For example, the
following action specifies the same map group but instead specifies mapping 802.1p to ToS:
-> policy action Map2 map tos to 802.1p using Group2
In this case, if ToS traffic comes into the switch and matches a policy that specifies the Map2 action, the
ToS value is mapped according to Group2 if the value is specified in Group2. If the incoming ToS value
is 2, the value is mapped to 5; however, if the incoming value is 3, the switch maps the value to zero
because there is no mapping in Group2 for a value of 3.
Note. Ports on which the flow is mapped must be a trusted port; otherwise the flow is dropped.
The to and from values are separated by a colon (:). For example, a value of 2 is mapped to 5.
Note. Map group configuration is not active until the qos apply command is entered.
The remapping group can then be associated with a rule through the policy action command. In this
example, a policy condition called Traffic has already been configured.
-> policy action tosMap map tos to 802.1p using tosGroup
-> policy rule r3 condition Traffic action tosMap
To delete mapping values from a group, use no and the relevant values:
-> policy map group tosGroup no 1-2:4
The specified values is deleted from the map group at the next qos apply.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-59
Using Map Groups Configuring QoS
To delete a map group, use the no form of the policy map group command. The map group must not be
associated with a policy action. For example:
-> no policy map group tosGroup
If tosGroup is currently associated with an action, an error message similar to the following is displayed:
ERROR: tosGroup is being used by action 'tosMap'
In this case, remove the map group from the action, then enter the no policy map group command:
-> policy action tosMap no map group
-> no policy map group tosGroup
Note. For Layer 2 flows, you cannot have more than one action that maps DSCP.
character definition
+ Indicates that the policy rule has been modified or has
been created since the last qos apply.
- Indicates the policy object is pending deletion.
# Indicates that the policy object differs between the pend-
ing/applied objects.
In the example here, a new map group, tosGroup, has not yet been applied to the configuration.
-> show policy map group
Group Name From Entries
+tosGroup cli 1-2:5
4:5
5-6:7
When the qos apply command is entered, the plus sign (+) is removed from tosGroup in the display. See
“Applying the Configuration” on page 36-61 for more information about the qos apply command.
page 36-60 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Applying the Configuration
The qos apply command must be included in an ASCII text configuration file when QoS commands are
included. The command must be included after the last QoS command.
When the configuration is not yet applied, it is referred to as the pending configuration.
Global Commands. Many global QoS commands are active immediately on the switch without qos
apply. The settings configured by these commands is active immediately. Other global commands must
specifically be applied. The commands are listed in the following table:
Port and Policy Commands. All port parameters and policy parameters must be applied with the qos
apply command.
The pending configuration is useful for reviewing policy rules before actually applying them to the switch.
The show policy classify commands can be used to review information about new conditions before they
are applied on the switch. See “Testing Conditions” on page 36-46.
Applied policy rules can also be administratively disabled (inactive). If a rule is administratively disabled,
the rule exists in the applied configuration but is not used to classify flows. For more information about
disabling/re-enabling a policy rule, see “Creating Policy Rules” on page 36-37.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-61
Applying the Configuration Configuring QoS
This command ignores any pending policies (any additions, modifications, or deletions to the policy
configuration since the last qos apply) and writes the last applied policies to the pending configuration. At
this point, the pending policies are the same as the last applied policies.
In this example, there are two new pending policies and three applied policies:
In this scenario, you can do one of two things. To write the applied policies back to the pending configura-
tion, use qos revert. Or, to delete all policy rule configuration, enter qos apply. If qos apply is entered,
the empty set of pending policies is written to the applied policies and all policy rule configuration is
deleted.
page 36-62 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Applying the Configuration
show policy condition Displays information about all pending and applied policy conditions or
a particular policy condition configured on the switch. Use the applied
keyword to display information about applied conditions only.
show policy action Displays information about all pending and applied policy actions or a
particular policy action configured on the switch. Use the applied key-
word to display information about applied actions only.
show policy rule Displays information about all pending and applied policy rules or a par-
ticular policy rule. Use the applied keyword to display information
about applied rules only.
show policy network group Displays information about all pending and applied policy network
groups or a particular network group. Use the applied keyword to dis-
play information about applied groups only.
show policy service Displays information about all pending and applied policy services or a
particular policy service configured on the switch. Use the applied key-
word to display information about applied services only.
show policy service group Displays information about all pending and applied policy service
groups or a particular service group. Use the applied keyword to display
information about applied groups only.
show policy mac group Displays information about all pending and applied MAC groups or a
particular policy MAC group configured on the switch. Use the applied
keyword to display information about applied groups only.
show policy port group Displays information about all pending and applied policy port groups
or a particular port group. Use the applied keyword to display informa-
tion about applied groups only.
show policy map group Displays information about all pending and applied policy map groups
or a particular map group. Use the applied keyword to display informa-
tion about applied groups only.
show policy classify Sends Layer 2, Layer 3, or multicast information to the classifier to see
how the switch handles the packet. Use the applied keyword to examine
only applied conditions.
For more information about these commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-63
Policy Applications Configuring QoS
Policy Applications
Policies are used to classify incoming flows and treat the relevant outgoing flows. There are many ways to
classify the traffic and many ways to apply QoS parameters to the traffic.
Classifying traffic can be as simple as identifying a Layer 2 or Layer 3 address of an incoming flow.
Treating the traffic can involve prioritizing the traffic or rewriting an IP address. How the traffic is treated
(the action in the policy rule) typically defines the type of policy:
This section describes how to configure basic QoS policies and 802.1p/ToS/DSCP marking and mapping
policies. Policies used for Layer 2 and Layer 3/4 filters, are commonly referred to as Access Control Lists
(ACLs). Filtering is discussed in Chapter 37, “Configuring ACLs.”
Policies can also be used for prioritizing traffic in dynamic link aggregation groups. For more information
about dynamic link aggregates, see Chapter 10, “Configuring Dynamic Link Aggregation.”
page 36-64 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Policy Applications
OmniSwitch
ingress flow
queues for egress traffic
policy condition
classifies the flow
policy action determines
how packets are queued
Note. If multiple addresses, services, or ports must be given the same priority, use a policy condition
group to specify the group and associate the group with the condition. See “Using Condition Groups in
Policies” on page 36-48 for more information about groups.
Note that some condition parameters can be used in combination only under particular circumstances;
also, there are restrictions on condition/action parameter combinations. See “Using Condition Groups in
Policies” on page 36-48 and “Condition Combinations” on page 36-6.
Basic Commands
The following policy action commands are used for traffic prioritization or shaping:
policy action priority
policy action maximum bandwidth
To set up traffic prioritization and/or bandwidth shaping, follow the steps in the next section. For more
information about command syntax and options, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Note that QoS ports can also be configured for bandwidth shaping through the qos port commands.
OmniSwitch
Network 1 Any
10.10.4.0 Network
priority applied
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-65
Policy Applications Configuring QoS
To create a policy rule to prioritize the traffic from Network 1, first create a condition for the traffic that
you want to prioritize. In this example, the condition is called ip_traffic. Then create an action to priori-
tize the traffic as highest priority. In this example, the action is called high. Combine the condition and the
action into a policy rule called rule1.
-> policy condition ip_traffic source ip 10.10.4.0 mask 255.255.255.0
-> policy action high priority 7
-> policy rule rule1 condition ip_traffic action high
The rule is not active on the switch until the qos apply command is entered on the command line. When
the rule is activated, any flows coming into the switch from 10.10.4.0 is given the highest priority.
Note that the bandwidth can be specified in abbreviated units, in this case, 1k.
The rule is not active on the switch until the qos apply command is entered. When the rule is activated,
any flows coming into the switch from source IP address 10.10.5.3 is queued with no more than 1k of
bandwidth.
Tri-Color Marking
This implementation of a Tri-Color Marking (TCM) provides a mechanism for policing network traffic by
limiting the rate at which traffic is sent or received on a switch interface. The TCM policier meters traffic
based on user-configured packet rates and burst sizes and then marks the metered packets as green, yellow,
or red based on the metering results.
The following diagram illustrates the basic operation of TCM:
The TCM policier meters each packet and passes the metering result along with the packet to the Marker.
Depending upon the result sent by the Meter, the packet is then marked with either the green, yellow, or
red color. The marked packet stream is then transmitted on the egress based on the color-coded priority
assigned.
page 36-66 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Policy Applications
The TCM Meter operates in Color-Blind mode (the Color-Aware mode is not supported). In the Color-
Blind mode, the Meter assumes that the incoming packet stream is uncolored.
There are two types of TCM marking supported:
• Single-Rate TCM (srTCM)—Packets are marked based on a Committed Information Rate (CIR) value
and two associated burst size values: Committed Burst Size (CBS) and Peak Burst Size (PBS).
• Two-Rate TCM (trTCM)—Packets are marked based on a CIR value and a Peak Information Rate
(PIR) value and two associated burst size values: CBS and PBS.
Both srTCM and trTCM operate in the same basic manner, as shown in the above diagram. The main
difference between the two types is that srTCM uses one rate limiting value (CIR) and trTCM uses two
rate limiting values (CIR and PIR) to determine packet marking.
The type of TCM used is determined when the policier is configured; depending on which rates and burst
size values are configured, TCM functions in ether single-rate or two-rate mode. There is no explicit
command to select the type of TCM. See “Configuring TCM Policies” on page 36-67 for more
information.
Based on the TCM type used, packets are marked as follows:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-67
Policy Applications Configuring QoS
To configure a TCM QoS policy action, use the policy action cir command with one or more of the above
parameters. Configuring the cbs and pbs parameters is optional. If a value is not specified for either one,
the default value is used for both parameters. For example:
-> policy action A1 cir 10M
To specify one or both of the burst size values, use the cbs and pbs parameters. For example:
All of these command examples configure the TCM meter to operate in the Single-Rate TCM (srTCM)
mode. To configure the meter to operate in the Two-Rate TCM (trTCM) mode, use the pir parameter and
specify a peak information rate value that is greater than the committed information rate value. For exam-
ple, the following commands configure the meter to use the trTCM mode:
Once a TCM policy action is configured, the action can be used in a policy rule to rate limit traffic accord-
ing to the specified rates and burst sizes. Traffic that matches a TCM policy is marked green, red, or
yellow based on the rate limiting results.
To remove the TCM configuration from a QoS policy action, use the no form of the policy action cir
command. For example:
-> policy action A6 no cir
This command sets the counter color mode to count all green and non-green (red and yellow combined)
packets. The following color combination options are supported with the counter-color parameter:
• green-red—counts the number of packets marked green (low drop precedence) and the number of
packets marked red (packet is dropped). Packets marked yellow (high drop precedence) are not
counted.
• green-yellow—counts the number of green and yellow packets. Red packets are not counted.
• red-yellow—counts the number red and yellow packets. Green packets are not counted.
• red-nonred—counts the number of red and non-red (yellow and green) packets.
• green-nongreen—counts the number of green and non-green (yellow and red) packets.
To view color-based packet counts generated by a TCM policy rule, use the show active policy rule
meter-statistics command. All of the color combinations are displayed with this command, however,
statistics only show for the combination that was selected for the TCM policy action.
To reset TCM meter statistics to zero, use the qos stats reset command. For more information about the
commands in this section, see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 36-68 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Policy Applications
Note that the rates and burst sizes can be specified in abbreviated units, in this case, 10m.
The rule is not active on the switch until the qos apply command is entered. When the rule is activated,
any flows coming into the switch from source IP address 10.10.5.3 is metered and marked according to the
TCM policier parameters specified in the tcm1 policy action.
Redirection Policies
A redirection policy sends traffic that matches the policy to a specific port or link aggregate instead of the
originally intended destination. This type of policy can use any condition; the policy action determines
which port or link aggregate to which the traffic is sent.
The following policy action commands are used for port and link aggregate redirection:
policy action redirect port
policy action redirect linkagg
Note the following regarding the use and configuration of redirection policies:
• Redirection policies apply to both bridged and routed traffic.
• When redirecting routed traffic from VLAN A to VLAN B, the redirect port or link aggregate ID must
belong to VLAN B (tagged or default VLAN).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-69
Policy Applications Configuring QoS
• Routed packets (from VLAN A to VLAN B) are not modified after they are redirected; the source and
MAC address remain the same. In addition, if the redirect port or link aggregate ID is tagged, the
redirected packets have a tag from the ingress VLAN A.
• If a route exists for the redirected flow, then redirected packets are the final post-routing packets.
• If a route does not exist for the redirected flow, the flow is not redirected to the specified port or link
aggregate ID and is “blackholed”. As soon as a route is available, the flow is then redirected as speci-
fied in the policy.
• In most cases, a redirected flow does not trigger an update to the routing and ARP tables. When the
ARP table is cleared or timed out, port/link aggregate redirection ceases until the ARP table is
refreshed. If necessary, create a static route for the flow or assign the redirect port or link aggregate ID
to the ingress VLAN (VLAN A) to send packets to the redirect port until a route is available.
• When redirecting bridged traffic on VLAN A, the redirect port or link aggregate ID must belong to
VLAN A (tagged or default VLAN).
In the following example, flows destined for UDP port 80 is redirected to switch port 3/2:
-> policy condition L4PORTCOND destination udp port 80
-> policy action REDIRECTPORT redirect port 3/2
-> policy rule L4PORTRULE condition L4PORTCOND action REDIRECTPORT
In the following example, flows destined for IP address 40.2.70.200 are redirected to link aggregate 10:
-> policy condition L4LACOND destination IP 40.2.70.200
-> policy action REDIRECTLA redirect linkagg 10
-> policy rule L4LARULE condition L4LACOND action REDIRECTLA
Note that in both examples above, the rules are not active on the switch until the qos apply command is
entered on the command line.
When the above rule is activated, any flows coming into the switch from source IP address 192.168.20.1
are mirrored to port 1/10. It is also possible to combine the MTP action with other actions. For example:
-> policy condition c1 source ip 192.168.20.1
-> policy action a1 mirror ingress 1/10 disposition drop
-> policy rule r1 condition c1 action a1
-> qos apply
This policy rule example combines the MTP action with the drop action. As a result, this rule drops
ingress traffic with a source IP of 192.168.20.1, but the mirrored traffic from this source is not dropped
and is forwarded to port 1/10.
page 36-70 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Policy Applications
Note the following regarding the use and configuration of mirroring policies:
• Only one policy-based MTP session is supported at any given time. As a result, all mirroring policies
must specify the same destination port.
• In addition to one policy-based MTP session, the switch can support one port-based mirroring session,
one remote port mirroring session, and one port monitoring session all running at the same time.
• Policy based mirroring and the port-based mirroring feature can run simultaneously on the same port.
• Rule precedence is applied to all mirroring policies that are configured for the same switch ASIC. If
traffic matches a mirror rule on one ASIC with a lower precedence than a non-mirroring rule on a
different ASIC, the traffic is mirrored in addition to the actions specified by the higher precedence rule.
This policy (icmpRule) drops all ICMP traffic. To limit the dropped traffic to ICMP echo requests (pings)
and/or replies, use the policy condition icmptype to specify the appropriate condition. For example,
-> policy condition echo icmptype 8
-> policy condition reply icmptype 0
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-71
Policy Applications Configuring QoS
In this example, a policy rule (marking) is set up to mark flows from 10.10.3.0 with an 802.1p value of 5:
-> policy condition my_condition source ip 10.10.3.0 mask 255.255.255.0
-> policy action my_action 802.1p 5
-> policy rule marking condition my_condition action my_action
In the next example, the policy map group command specifies a group of values that must be mapped; the
policy action map command specifies what must be mapped (802.1p to 802.1p, ToS/DSCP to 802.1p) and
the mapping group that must be used. For more details about creating map groups, see “Creating Map
Groups” on page 36-59.
Here, traffic from two different subnets must be mapped to 802.1p values in a network called Network C.
A map group (tosGroup) is created with mapping values.
-> policy map group tos_group 1-4:4 5-7:7
-> policy condition SubnetA source ip 10.10.5.0 mask 255.255.255.0
-> policy condition SubnetB source ip 12.12.2.0 mask 255.255.255.0
-> policy action map_action map tos to 802.1p using tos_group
The map_action specifies that ToS values is mapped to 802.1p with the values specified in tos_group.
With these conditions and action set up, two policy rules can be configured for mapping Subnet A and
Subnet B to the ToS network:
-> policy rule RuleA condition SubnetA action map_action
-> policy rule RuleB condition SubnetB action map_action
Subnet A
10.10.5.0 OmniSwitch
Network C
Mapping
Subnet B policy
12.12.2.0
Mapping Application
Note. When a PBR QoS rule is applied to the configuration, it is applied to the entire switch, unless you
specify a built-in port group in the policy condition.
Policy Based Routing can be used to redirect traffic to a particular gateway based on source or destination
IP address, source or destination network group, source or destination TCP/UDP port, a service or service
group, IP protocol, or built-in source port group.
page 36-72 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring QoS Policy Applications
Traffic can be redirected to a particular gateway regardless of what routes are listed in the routing table.
Note that the gateway address does not have to be on a directly connected VLAN; the address can be on
any network that is learned by the switch.
Note. If the routing table has a default route of 0.0.0.0, traffic matching a PBR policy is redirected to the
route specified in the policy. For information about viewing the routing table, see Chapter 21, “Configur-
ing IP.”
Policy Based Routing can be used to redirect untrusted traffic to a firewall. In this case, note that reply
packets is not be allowed back through the firewall.
174.26.1.0
173.10.2.0
173.10.3.0.0
Firewall
173.5.1.0
173.5.1.254
OmniSwitch
In this example, all traffic originating in the 10.3 network is routed through the firewall, regardless of
whether or not a route exists.
-> policy condition Traffic3 source ip 10.3.0.0 mask 255.255.0.0
-> policy action Firewall permanent gateway ip 173.5.1.254
-> policy rule Redirect_All condition Traffic3 action Firewall
Note that the functionality of the firewall is important. In the example, the firewall is sending the traffic to
be routed remotely. If you instead set up a firewall to send the traffic back to the switch to be routed, you
must set up the policy condition with a built-in source port group so that traffic coming back from the
firewall does not get looped and sent back out to the firewall.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 36-73
Policy Applications Configuring QoS
For example:
174.26.1.0
173.10.2.0
10.3.0.0
Firewall
173.5.1.0
173.5.1.254
OmniSwitch
In this scenario, traffic from the firewall is sent back to the switch to be re-routed. But because the traffic
re-enters the switch through a port that is not in the Slot01 port group, the traffic does not match the
Redirect_All policy and is routed normally through the switch.
-> policy condition Traffic3 source ip 10.3.0.0 mask 255.255.0.0 source port
group Slot01
-> policy action Firewall permanent gateway ip 173.5.1.254
-> policy rule Redirect_All condition Traffic3 action Firewall
Make sure to enter the qos apply command to activate the policy rule on the switch. Otherwise the rule is
saved as part of the pending configuration, but is not active.
page 36-74 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
37 Configuring ACLs
Access Control Lists (ACLs) are Quality of Service (QoS) policies used to control whether or not packets
are allowed or denied at the switch or router interface. ACLs are sometimes referred to as filtering lists.
ACLs are distinguished by the kind of traffic they filter. In a QoS policy rule, the type of traffic is
specified in the policy condition. The policy action determines whether the traffic is allowed or denied.
For detailed descriptions about configuring policy rules, see Chapter 36, “Configuring QoS.”
In general, the types of ACLs include:
• Layer 2 ACLs—for filtering traffic at the MAC layer. Usually uses MAC addresses or MAC groups for
filtering.
• Layer 3/4 ACLs—for filtering traffic at the network layer. Typically uses IP addresses or IP ports for
filtering; note that IPX filtering is not supported.
• Multicast ACLs—for filtering IGMP traffic.
In This Chapter
This chapter describes ACLs and how to configure them through the Command Line Interface (CLI). CLI
commands are used in the configuration examples; for more details about the syntax of commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Setting the Global Disposition. The disposition specifies the general allow/deny policy on the switch.
See “Setting the Global Disposition” on page 37-7.
• Creating Condition Groups for ACLs. Groups are used for filtering on multiple addresses, ports, or
services. The group is then associated with the policy condition. See “Creating Condition Groups For
ACLs” on page 37-8.
• Creating Policy Rules for ACLs. Policy rules for ACLs are basically QoS policy rules. Specific
parameters for ACLs are described in this chapter. See “Configuring ACLs” on page 37-9.
• Using ACL Security Features. Specific port group, action, service group, and policy rule
combinations are provided to help improve network security. See “Using ACL Security Features” on
page 37-16.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-1
ACL Specifications Configuring ACLs
ACL Specifications
The QoS/ACL functionality described in this chapter is supported on the OmniSwitch 6400, 6850E, 6855,
9000E switches unless otherwise stated in the following Specifications table or specifically noted within
any other section of this chapter. Note that any maximum limits provided in the
Specifications table are subject to available system resources.
Maximum number of policy rules 2048 (ingress and egress rules combined)
Maximum number of egress policy rules 1022 (OmniSwitch 9000E with OS9-GNI-C24E or
OS9-GNI-U24E modules)
510 (OmniSwitch 6400, 6855-U24X, and
OmniSwitch 9000E with OS9-XNI-U12E module)
Maximum number of policy conditions 2048
Maximum number of policy actions 2048
Maximum number of policy services 256
Maximum number of groups (network, MAC, ser- 1024
vice, port, VLAN)
Maximum number of group entries 1011 per group
Maximum number of rules per slot 1664 (OmniSwitch 6400, 6850E, 6855, 9000E)
1280 (OmniSwitch 6400)
Maximum number of bandwidth shaping rules per 832 (OmniSwitch 6400, 6850E, 6855, 9000E
slot CMM)
640 (OmniSwitch 6400)
Maximum number of priority queues per port 8
Maximum number of QoS policy lists per switch 13 (includes the default list)
Maximum number of QoS policy lists per Access 1
Guardian User Network Profile (UNP)
Platforms Supported
QoS policy lists - UNP OmniSwitch 6400, 6850E, 6855
QoS policy lists - egress OmniSwitch 6400, 6855-U24X, 9000E
CLI Command Prefix Recognition Some QoS commands support prefix recognition.
See the “Using the CLI” chapter in the OmniSwitch
AOS Release 6 Switch Management Guide for more
information.
page 37-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs ACL Defaults
ACL Defaults
The following table shows the defaults for ACLs:
Note that in the current software release, the deny and drop options produce the same effect; that is, that
traffic is silently dropped.
For more information about QoS defaults in general, see Chapter 36, “Configuring QoS.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-3
Quick Steps for Creating ACLs Configuring ACLs
2 Create policy condition groups for multiple addresses or services that you want to filter. (If you have a
single address to filter, you can skip this step and simply include the address, service, or port in the policy
condition.) An example:
-> policy network group NetGroup1 192.68.82.0 mask 255.255.255.0 192.60.83.0
mask 255.255.255.0
3 Create a policy condition using the policy condition command. If you created a network group, MAC
group, service group, or port group, specify the group as part of the condition.
-> policy condition Lab3 source network group NetGroup1
Note. (Optional) Test the condition with the show policy classify command using information from the
policy condition. For example:
-> show policy classify l3 source ip 192.68.82.0
This command displays information about whether the indicated parameter can be used to classify traffic
based on policies that are configured on the switch. For more information about testing conditions, see
“Testing Conditions” on page 36-46 in Chapter 36, “Configuring QoS.”
4 Create a policy action with the policy action command. Use the keyword disposition and indicate
whether the flow(s) must be accepted or denied.
-> policy action Yes disposition accept
5 Create a policy rule with the policy rule command and include the relevant condition and action. Use
the keyword precedence to specify the priority of this rule over other rules for traffic matching the speci-
fied condition.
-> policy rule lab_rule1 condition Lab3 action Yes precedence 65535
6 Apply the policy configuration using the qos apply command. For details about using this command,
see “Applying the Configuration” on page 36-61 in Chapter 36, “Configuring QoS.”
page 37-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs ACL Overview
ACL Overview
ACLs provide moderate security between networks. The following illustration shows how ACLs can be
used to filter subnetwork traffic through a private network, functioning like an internal firewall for LANs.
OmniSwitch
Subnetwork
router
Private
Network Public
Network
Filtering Rules
Subnetwork
(ACLs)
Subnetwork
OmniSwitch
When traffic arrives on the switch, the switch checks its policy database to attempt to match Layer 2 or
Layer 3/4 information in the protocol header to a filtering policy rule. If a match is found, it applies the
relevant disposition to the flow. Disposition determines whether a flow is allowed or denied. There is a
global disposition (the default is accept), and individual rules can be set up with their own dispositions.
Note. In some network situations, it is recommended that the global disposition be set to deny, and that
rules be created to allow certain types of traffic through the switch. To set the global disposition to deny,
use the qos default bridged disposition and qos default routed disposition commands. See “Setting the
Global Disposition” on page 37-7 for more information about these commands.
When multiple policy rules exist for a particular flow, each policy is applied to the flow as long as there
are no conflicts between the policies. If there is a conflict, then the policy with the highest precedence is
applied to the flow. See “Rule Precedence” on page 37-6 for more information about precedence.
Note. QoS policy rules can also be used for traffic prioritization and other network scenarios. For a
general discussion of QoS policy rules, see Chapter 36, “Configuring QoS.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-5
ACL Overview Configuring ACLs
Rule Precedence
The switch attempts to classify flows coming into the switch according to policy precedence. Only the rule
with the highest precedence is applied to the flow. This is true even if the flow matches more than one
rule.
Valid Combinations
There are limitations to the types of conditions that can be combined in a single rule. A brief overview of
these limitations is listed here:
• The 802.1p and source VLAN conditions are the only Layer 2 conditions allowed in combination with
Layer 4 conditions.
• Source and destination parameters can be combined in Layer 2, Layer 3, and Layer 4 conditions.
• In a given rule, ToS or DSCP can be specified for a condition with priority specified for the action.
• The Layer 1 destination port condition only applies to bridged traffic, not routed traffic.
• The IP multicast condition works in combination with Layer 1, Layer 2, and Layer 3 destination condi-
tions only if these conditions specify the device that sends the IGMP report packet.
• Individual items and their corresponding groups cannot be combined in the same condition. For exam-
ple, a source IP address cannot be included in a condition with a source IP network group.
• Layer 2 and Layer 3 rules are always effected on bridged and routed traffic. As a result, combining
source or destination TCP/UDP port and IP protocol in a condition is allowed.
• The Quarantine Manager and Remediation (QMR) application and inner VLAN or inner 802.1p condi-
tions are mutually exclusive. If one of these is active, the other one is not available.
For more information about supported combinations, see “Condition Combinations” on page 36-6 and
“Action Combinations” on page 36-9 in Chapter 36, “Configuring QoS.”
page 37-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs ACL Configuration Overview
1 Set the global disposition. This step is described in “Setting the Global Disposition” on page 37-7.
2 Create a condition for the traffic to be filtered. This step is described in “Creating Condition Groups
For ACLs” on page 37-8 and “Creating Policy Conditions For ACLs” on page 37-9.
3 Create an action to accept or deny the traffic. This step is described in “Creating Policy Actions For
ACLs” on page 37-10.
4 Create a policy rule that combines the condition and the action. This step is described in “Creating
Policy Rules for ACLs” on page 37-11.
For a quick tutorial on how to configure ACLs, see “Quick Steps for Creating ACLs” on page 37-4.
Note. Note that the global disposition setting applies to all policy rules on the switch, not just those that
are configured for ACLs.
Policies can then be set up to allow routed traffic through the switch.
Note that in the current release of Alcatel-Lucent’s QoS software, the drop and deny keywords produce
the same result (flows are silently dropped; no ICMP message is sent).
For more information about the global disposition commands, see Chapter 36, “Configuring QoS.” and the
OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-7
Creating Condition Groups For ACLs Configuring ACLs
Important. If you set the global bridged disposition (using the qos default bridged disposition
command) to deny or drop, it results in dropping all Layer 2 traffic from the switch that does not match
any policy to accept traffic. You must create policies (one for source and one for destination) to allow
traffic on the switch.
If you set the bridged disposition to deny or drop, and you configure Layer 2 ACLs, you require two rules
for each type of filter. For more information, see “Layer 2 ACLs” on page 37-11.
This command configures a network group (netgroup2) of three IP addresses. The network group is then
configured as part of a policy condition (cond2). The condition specifies that the addresses in the group
are source addresses. (For all condition groups except service groups, the policy condition specifies
whether the condition group is a source or destination group.)
If a network group was not used, a separate condition would have to be created for each IP address.
Subsequently, a corresponding rule would have to be created for each condition. Using a network group
reduces the number of rules required.
For more details about using groups in policy conditions, see “Using Condition Groups in Policies” on
page 36-48 in Chapter 36, “Configuring QoS.”
page 37-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs Configuring ACLs
Configuring ACLs
This section describes in detail the procedures for configuring ACLs. For more information about how to
configure policies in general, see Chapter 36, “Configuring QoS.” Command syntax is described in detail
in the OmniSwitch AOS Release 6 CLI Reference Guide.
The basic commands for configuring ACL rules are the same as those for configuring policy rules:
policy condition
policy action
policy rule
In this example, a Layer 2 condition (c2) specifies that traffic matches the ports included of the pgroup1
port group. The condition also specifies that the port group is a source group. Any traffic coming in on
ports 1 or 2 on slot 3, port 3 on slot 4, or port 4 on slot 5 matches condition c2.
For more information about condition groups, see “Creating Condition Groups For ACLs” on page 37-8.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-9
Configuring ACLs Configuring ACLs
The following table lists the keywords for the policy condition command that are typically used for the
different types of ACLs:
Layer 2 ACL Condition Layer 3/4 ACL Condition Multicast ACL Condition
Keywords Keywords Keywords
source mac source ip multicast ip
source mac group source ipv6 multicast network group
destination mac source network group destination ip
destination mac group destination ip destination vlan
source vlan destination ipv6 destination port
source vlan group destination network group destination port group
inner source vlan source ip port destination mac
inner source vlan group destination ip port destination mac group
source port service
source port group service group
destination port ip protocol
destination port group ipv6
ethertype nh
802.1p flow-label
destination port
destination port group
icmptype
icmpcode
tos
dscp
source tcp port
destination tcp port
source udp port
destination udp port
established
tcpflags
Note that the individual address, service, or port cannot be used in conjunction with the same type of
condition group. For example, you cannot specify in the same rule both a source MAC address and a
source MAC group.
If you do not specify a disposition for the policy action, the default (accept) is used.
page 37-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs Configuring ACLs
In this example, any traffic matching condition c3 matches rule7; rule7 is configured with the highest
precedence value. If any other rules are configured for traffic with a source address of 10.10.4.8, rule7
takes precedence over the other rules only if one of the following is true:
• A conflict exists with another rule and rule7 has a higher precedence.
• A conflict exists with another rule that has the same precedence value, but rule7 was created first.
The action configured for the rule, a1, allows traffic from 10.10.4.8, so the flow is accepted on the switch.
The rule is not used to classify traffic or enforce the policy until the qos apply command is entered. For
information about applying policy parameters, see “Applying the Configuration” on page 36-61 in
Chapter 36, “Configuring QoS.”
Layer 2 ACLs
Layer 2 filtering filters traffic at the MAC layer. Layer 2 filtering can be done for both bridged and routed
packets. As MAC addresses are learned on the switch, QoS classifies the traffic based on:
• MAC address or MAC group
• Source VLAN
The switch classifies the MAC address as both source and destination.
The following policy condition keywords are used for Layer 2 ACLs:
A group and an individual item cannot be specified in the same condition. For example, a source MAC
address and a source MAC group cannot be specified in the same condition.
Note that combining Layer 2 and Layer 3 conditions in the same policy is supported. Refer to “Condition
Combinations” on page 36-6 and “Action Combinations” on page 36-9 in Chapter 36, “Configuring QoS.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-11
Configuring ACLs Configuring ACLs
In this scenario, traffic with a source MAC address of 08:00:20:11:22:33 coming in on VLAN 5 would
match condition Address1, which is a condition for a policy rule called FilterA. FilterA is then applied to
the flow. Since FilterA has an action (BlockTraffic) that is set to deny traffic, the flow would be denied
on the switch.
Note that although this example contains only Layer 2 conditions, it is possible to combine Layer 2 and
Layer 3 conditions in the same policy.
Layer 3 ACLs
The QoS software in the switch filters routed and bridged traffic at Layer 3.
For Layer 3 filtering, the QoS software in the switch classifies traffic based on:
• Source IP address or source network group
• IP protocol
• ICMP code
• ICMP type
The following policy condition keywords are used for Layer 3 ACLs:
Note that combining Layer 2 and Layer 3 conditions in the same policy is supported. Refer to “Condition
Combinations” on page 36-6 and “Action Combinations” on page 36-9 in Chapter 36, “Configuring QoS.”
page 37-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs Configuring ACLs
Traffic with a source IP address of 192.68.82.0, a source IP port of 23, using protocol 6, matches
condition addr2, which is part of FilterL31. The action for the filter (Block) is set to deny traffic. The
flow is dropped on the switch.
Note that although this example contains only Layer 2 conditions, it is possible to combine Layer 2 and
Layer 3 conditions in the same policy.
In this example, a network group, GroupA, is configured with three IP addresses. Condition cond7
includes GroupA as a destination group. Flows coming into the switch destined for any of the specified IP
addresses in the group matches rule FilterL32. FilterL32 is configured with an action (Ok) to allow the
traffic on the switch.
Note that although this example contains only Layer 2 conditions, it is possible to combine Layer 2 and
Layer 3 conditions in the same policy.
IPv6 ACLs
An ACL is considered an IPv6 ACL if the ipv6 keyword and/or any of the following specific policy
condition keywords are used in the ACL to classify/filter IPv6 traffic:
Note that IPv6 ACLs are effected only on IPv6 traffic. All other ACLs/policies with IP conditions that do
not use the IPv6 keyword are effected only on IPv4 traffic. For example:
-> policy condition c1 tos 7
-> policy condition c2 tos 7 ipv6
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-13
Configuring ACLs Configuring ACLs
In the above example, c1 is an IPv4 condition and c2 is an IPv6 condition. ACLs that use c1 are consid-
ered IPv4 policies; ACLs that use c2 are considered IPv6 policies. In addition, consider the following
examples:
-> policy condition c3 source port 1/10
Condition c3 applies to all traffic ingressing on port 1/10. However, condition c4 applies only to IPv6
traffic ingressing on port 1/10.
Note the following when configuring IPv6 ACLs:
• Trusted/untrusted behavior is the same for IPv6 traffic as it is for IPv4 traffic.
• IPv6 policies do not support the use of network groups, service groups, map groups, or MAC groups.
• The default (built-in) network group, “Switch”, only applies to IPv4 interfaces. There is no such group
for IPv6 interfaces.
For more information regarding IPv6 condition parameters, see the policy condition command in the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 37-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs Configuring ACLs
If a destination group is specified, the corresponding single value keyword cannot be combined in the
same condition. For example, if a destination port is specified, a destination port group cannot be
specified in the same condition.
To filter multicast clients, specify the multicast IP address, which is the address of the multicast group or
stream, and specify the client IP address, VLAN, MAC address, or slot/port. For example:
-> qos default multicast disposition deny
-> policy condition Mclient1 multicast ip 224.0.1.2 destination vlan 5
-> policy action ok disposition accept
-> policy rule Mrule condition Mclient1 action ok
In this example, any traffic coming in on VLAN 5 requesting membership to the 224.0.1.2 multicast group
is allowed.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-15
Using ACL Security Features Configuring ACLs
Note that the UserPorts group applies to both bridged and routed traffic, and it is not necessary to include
the UserPorts group in a condition and/or rule for the group to take effect. Once ports are designated as
members of this group, IP spoofed traffic is blocked while normal traffic is still allowed on the port.
The UserPorts group is also used in conjunction with the DropServices group. If a flow received on a port
that is a member of the UserPorts group is destined for a TCP or UDP port (service) specified in the
DropServices group, the flow is dropped. See “Configuring a DropServices Group” on page 37-17 for
more information.
page 37-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs Using ACL Security Features
To specify multiple types of traffic on the same command line, enter each type separated by a space. For
example:
-> qos user-port filter ospf bgp rip
Note that a slot and port is not required with the qos user-port command. This is because the command
applies to all ports that are members of the UserPorts group.
The following qos user-port command example uses the shutdown option to administratively disable the
user port if the specified type of traffic is received on that port:
-> qos user-port shutdown bpdu
Note that an SNMP trap is sent whenever a user port shutdown occurs. To enable a port disabled by a user
port shutdown operation, use the interfaces admin command to administratively enable the port or
disconnect and reconnect the port cable.
To disable the filter or shutdown function, use the no form of the qos user-port command. For example,
the following command disables the filtering operation for all user ports:
-> qos no user-port filter
Note that any changes to the UserPorts profile (for example, adding or removing a traffic type) are not
made until the qos apply command is performed.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-17
Using ACL Security Features Configuring ACLs
2 Add the services created in Step 1 to a service group called DropServices using the policy service
group command, as shown below:
-> policy service group DropServices tcp135 tcp445 udp137 udp138 udp445
Note that the DropServices group must be specified using the exact capitalization as shown in the
above example.
3 Add ports to the port group called UserPorts using the policy port group command, as shown below:
Note that the UserPorts group must be specified using the exact capitalization as shown in the above
example.
When the above steps are performed, an implicit ACL is created on the switch that applies to all VLANs.
This internal ACL takes precedence over any other policies configured on the switch.
Note that the above policy only blocks ICMP echo traffic, all other ICMP traffic is still allowed.
page 37-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs Using ACL Security Features
This example ACL policy prevents any TCP connection from being initiated to the 192.168.10.0 network
and all other IP traffic to the 192.168.10.0 network. Only TCP connections initiated from the 192.168.10.0
network are allowed.
Note that the above example ACL would prevent FTP sessions. See the policy condition established
command page in the OmniSwitch AOS Release 6 CLI Reference Guide for more information.
An ACL can also be defined using the tcpflags parameter to examine and qualify specific TCP flags indi-
vidually or in combination with other flags. This parameter can be used to prevent specific DOS attacks,
such as the christmas tree.
The following example use the tcpflags condition parameter to determine if the F (fin) and S (syn) TCP
flag bits are set to one and the A (ack) bit is set to zero:
-> policy condition c1 tcpflags all f s mask f s a
In this example, a match must occur on all the flags or the packet is not allowed. If the optional command
keyword any was used, then a match need only occur on any one of the flags. For example, the following
condition specifies that either the A (ack) bit or the R (rst) bit must equal one:
-> policy condition c1 tcpflags any a r mask a r
Note that if a flag is specified on the command line after the any or all keyword, then the match value is
one. If the flag only appears as part of the mask, then the match value is zero. See the policy condition
tcpflags command page in the OmniSwitch AOS Release 6 CLI Reference Guide for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-19
Verifying the ACL Configuration Configuring ACLs
show policy condition Displays information about all pending and applied policy conditions or
a particular policy condition configured on the switch. Use the applied
keyword to display information about applied conditions only.
show policy action Displays information about all pending and applied policy actions or a
particular policy action configured on the switch. Use the applied key-
word to display information about applied actions only.
show policy rule Displays information about all pending and applied policy rules or a par-
ticular policy rule.
show active policy rule Displays the pending and applied policy rules that are active (enabled)
on the switch.
show qos config Displays global QoS configuration parameters.
When a show command is used to display output for all pending and applied policy configuration, the
following characters can appear in the display:
character definition
+ Indicates that the policy rule has been modified or has
been created since the last qos apply.
- Indicates the policy object is pending deletion.
# Indicates that the policy object differs between the pend-
ing/applied objects.
The following example shows all policy rules configured on the switch:
The display indicates that my_rule is active and is used to classify traffic on the switch (the Act field
displays Yes). The rule my_rule5 has been configured since the last qos apply command was entered, as
indicated by the plus (+) sign. The rule is not used to classify traffic until the next qos apply. The rule
mac1 is not active, as indicated by the No in the Act field.
page 37-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring ACLs Verifying the ACL Configuration
To display only policy rules that are active (enabled) on the switch, use the show active policy rule
command. For example:
-> show active policy rule
In this example, the rule my_rule does not display because it is inactive. Rules are inactive if they are
administratively disabled through the policy rule command, or if the rule cannot be enforced by the
current hardware. Both my_rule5 and mac1 are displayed here because they are active; however,
my_rule5 is a pending rule and is not used to classify traffic until the qos apply command is entered.
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about the output of these
commands.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 37-21
ACL Application Example Configuring ACLs
OmniSwitch
Set up a policy rule called outside to deny Telnet traffic to the private network.
1 Create a policy service (traffic_in) for traffic originating from the well-known Telnet port number 23.
4 Then combine the condition and the action in a policy rule (outside).
An example of what these commands look like together on consecutive command lines:
-> policy service traffic_in source ip port 23 protocol 6
-> policy condition outside_cond service traffic_in
-> policy action outside_action disposition drop
-> policy rule outside condition outside_cond action outside_action
page 37-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
38 Using ACL Manager
Access Control List Manager (ACLMAN) is a function of the Quality of Service (QoS) application that
provides an interactive shell for using common industry syntax to create ACLs. Commands entered using
the ACLMAN shell are interpreted and converted to Alcatel-Lucent CLI syntax that is used for creating
QoS filtering policies.
This implementation of ACLMAN also provides the following features:
• Importing of text files that contain common industry ACL syntax.
• The ability to assign a name, instead of a number, to an ACL or a group of ACL entries.
• Modifying specific ACL entries without having to enter the entire ACL each time to make a change.
• ACL logging extensions to display Layer 2 through 4 packet information associated with an ACL.
In This Chapter
This chapter describes how to configure and manage ACLs using the ACLMAN interactive shell.
The following topics are included in this chapter:
• “Quick Steps for Creating ACLs” on page 38-3.
Note. The functionality described in this chapter is supported on the OmniSwitch 9000E, 6850E, 6855,
and 6400 switches unless otherwise noted within any section of this chapter.
For a general discussion of Alcatel-Lucent QoS policy rules and ACLs, see Chapter 36, “Configuring
QoS,” and Chapter 37, “Configuring ACLs.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-1
ACLMAN Defaults Using ACL Manager
ACLMAN Defaults
The following table shows the defaults for ACLs:
page 38-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager Quick Steps for Creating ACLs
-> aclman
Welcome to ACLMAN
Aclman#
When the shell goes operational, the Privileged Exec Mode is automatically activated.
2 Enter the configure terminal command to access the Global Configuration Mode.
Aclman#configure terminal
Aclman(config)#
3 Use the access-list command to create a standard ACL that permits traffic originating from a specific
IP network.
Aclman(config)#access-list 1 permit 10.0.0.0 0.255.255.255
4 Use the interface ethernet command to enter the Interface Configuration Mode for a specific ethernet
switch port. To specify the switch port, enter the slot number followed by a slash and the port number on
that slot (for example, 3/1 specifies port 1 on slot 3).
Aclman(config)#interface ethernet 1/1
Aclman(config-if)#
5 Use the ip access-group command to associate the access list created in Step 3 as a filter for either
incoming (in) or outgoing (out) traffic on port 1/1.
Aclman(config-if)#ip access-group 1 in
6 Enter the exit command to return to the Global Configuration Mode to create additional ACL entries or
enter the end command to return to the Privileged Exec Mode.
Aclman(config-if)#end
7 Optional. In the Privileged Exec Mode, use the show ip access-lists command to verify the ACL
configuration. The display is similar to the following:
Aclman#show ip access-lists
Standard IP access list 1
10 permit 10.0.0.0, wildcard bits 0.255.255.255
8 In the Privileged Exec Mode, use the write memory command to save the running ACL configura-
tion. Note that if this is not done, the ACL configuration is lost on the next reboot of the switch.
Aclman#write memory
9 To close the ACLMAN shell and return to the Alcatel-Lucent CLI, access the Privileged Exec Mode
and use the exit command. Note that when modes other than the Privileged Exec Mode are active, the exit
command returns to the previous mode and does not close the ACLMAN shell. For example:
Aclman(config-if)#exit
Aclman(config)#exit
Aclman#exit
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-3
Quick Steps for Importing ACL Text Files Using ACL Manager
-> aclman
Welcome to ACLMAN
Aclman#
When the shell goes operational, the Privileged Exec Mode is automatically activated.
2 Use the import command to import supported ACLMAN syntax from a specified text file into the
running configuration. For example:
Aclman#import acl_file_1
3 Optional. Use the show running-config command to display the ACL configuration. The display is
similar to the following:
Aclman#show running-config
4 Save the ACLMAN running configuration using the write memory command. Note that if this is not
done, the ACL configuration is lost on the next reboot of the switch.
Aclman#write memory
page 38-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager ACLMAN Overview
ACLMAN Overview
ACLMAN is a function of the Alcatel-Lucent QoS system that allows network administrators to config-
ure and manage ACLs using common industry syntax. ACLs configured using ACLMAN are transpar-
ently converted into Alcatel-Lucent QoS filtering policies and applied to the switch.
An ACLMAN interactive shell provides an ACL command line interface that is similar to command inter-
faces that are available on other industry platforms. This shell serves as a configuration tool for creating
ACLs using common industry syntax commands and/or importing industry syntax from text files. See
“Using the ACLMAN Shell” on page 38-7 for more information.
The following industry ACL types and features are supported with this implementation of ACLMAN:
• Standard ACL. This type of ACL compares the source address of a packet to the source address spec-
ified in the ACL.
• Extended ACL. This type of ACL compares the source and destination address of a packet to the
source and destination address specified in the ACL. Also provides additional criteria for filtering
packets.
• Numbered ACL. This type of ACL refers to standard or extended ACLs that are assigned a number
for identification.
• Named ACL. This type of ACL refers to standard or extended ACLs that are assigned a name for
identification.
The following industry ACL types are currently not supported:
• Reflexive ACLs
• Authentication Proxy
Note. Issuing a write memory command is required to preserve the ACLMAN running configuration
across switch reboots.
Editing the aclman.cfg file is possible using a text editor and also provides an additional method for load-
ing ACL statements into the ACLMAN running configuration. For more information, see “Editing the
ACLMAN Configuration File” on page 38-20.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-5
ACLMAN Overview Using ACL Manager
ACL Precedence
ACLMAN allows a user to apply common industry ACLs to an Alcatel-Lucent switch. When these ACLs
are created using ACLMAN configuration tools, they are automatically assigned an Alcatel-Lucent QoS
internal priority of 101.
Alcatel-Lucent CLI/SNMP policies are assigned a priority of one by default. As a result, ACLMAN
policies take precedence over Alcatel-Lucent CLI/SNMP policies unless the Alcatel-Lucent policies are
configured with a precedence value higher than 101.
QoS policies configured through LDAP are given a value in the range 30000 to 65535. Therefore LDAP
policies take precedence over ACLMAN policies.
page 38-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager Using the ACLMAN Shell
Once the shell is active, then only supported ACLMAN syntax is allowed. There is no predetermined or
configurable timeout value that triggers an exit from the ACLMAN shell. The exit command is used to
return to the Alcatel-Lucent CLI. However, if the configured timeout value for a CLI or telnet session is
reached, the entire session including the ACLMAN shell is dropped. The Alcatel-Lucent CLI command,
kill, is available to terminate a session that is frozen.
The ACLMAN interactive shell supports partial command recognition. To use this optional feature, enter
enough of the command keyword to make it unique and then press the Tab key. ACLMAN fills out the
rest of the keyword. For example:
Aclman#confi
Aclman#configure ter
Aclman#configure terminal
Aclman(config)#
Entering a question mark (?) after a partial command provides a list of potential commands that match the
partial entry. For example:
Aclman#(config)i?
interface ip
Aclman#(config)i
Help is an available menu item in each of the shell command modes. In addition, help is also available by
entering a question mark (?) at the command prompt or after entering a command parameter. For example:
Aclman(config)#?
access-list Add an access list entry
end Return to privileged exec mode
exit Exit from configure mode
help Description of the interactive help system
interface Select an interface to configure
ip Global IP configuration subcommands
no Negate a command or set its defaults
time-range Define time range entries
Aclman(config)#access-list ?
<1-99> IP standard access list
<100-199> IP extended access list
<1300-1999> IP standard access list (expanded range)
<2000-2699> IP extended access list (expanded range)
Aclman(config)#access-list
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-7
ACLMAN Modes and Commands Using ACL Manager
Command Description
clear access-list counters [name | number] Resets the statistics counters to zero for the specified ACL.
If an ACL name or number is not entered, then the counters
for all ACLs are reset.
configure replace Clears the entire running configuration out of memory and
replaces it with the contents of the aclman.cfg file.
configure terminal Accesses the Global Configuration command mode. Com-
mand prompt changes to Aclman (config)#
exit Closes the ACLMAN interactive shell and returns to the
Alcatel-Lucent CLI. The ACLMAN shell is no longer
active.
show access-lists [name | number] Displays the contents of the specified ACLs. If an ACL
name or number is not entered, all ACLs are shown.
show ip interface [type slot/port] Displays ACLs associated with the specified interface. If an
interface is not specified, all configured interfaces are
shown.
show running-config Displays the entire ACLMAN configuration, not just the
ACL configuration.
show time-range [name] Displays the specified time range. If no name is specified,
all time ranges are shown.
The Privileged Exec mode also includes the following commands that are specific to the Alcatel-Lucent
implementation of ACLMAN:
Command Description
import filename Imports ACL syntax from the specified text file.
logging-rate seconds Configures the logging rate time interval. The range is 0
to 3600 seconds. The default value is 30 seconds.
page 38-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager ACLMAN Modes and Commands
Command Description
qos {enable | disable} Enables or disables QoS policies. By default policies are
enabled. This command is the equivalent of the Alcatel-
Lucent CLI qos enable and qos disable command. Note
that this command applies to both ACLMAN and
Alcatel-Lucent CLI configured policies.
show logging Displays QoS logging information. This command is
equivalent to the Alcatel-Lucent CLI show logging
command.
show resources Displays a summary of QoS resources. The information
displayed is a subset of what is provided with the
Alcatel-Lucent CLI show qos statistics command.
write memory Saves the running ACL configuration to the aclman.cfg
file. Note that if this command is not used, any ACL
configuration since the last write memory is lost when
the switch reboots.
Command Description
access-list access-list-number Creates a standard numbered ACL when the ACL num-
{permit | deny} ber specified is between 1 and 99 or 1300 and 1999.
{source source-wildcard | host address | any}
Repeat this command for each additional entry you want
no access-list access-list-number to add to the specified access-list-number.
Examples:
access-list 10 permit 10.0.0.0 0.255.255.255
access-list 10 deny host 198.172.10.2
access-list 30 permit any
no access-list 10
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-9
ACLMAN Modes and Commands Using ACL Manager
Command Description
access-list access-list-number Creates an extended numbered ACL when the ACL
{permit | deny} number specified is between 100 and 199 or 2000 and
protocol 2699.
{source source-wildcard | host address | any}
[operator [port]] Repeat this command for each additional entry you want
{destination destination-wildcard | to add to the specified access-list-number.
host address | any}
[operator [port]] Use the no form of this command to remove the speci-
[established] fied ACL.
[precedence precedence]
[tos tos] Note: The operator [port] and established parameters
[log | log-input] are only used for TCP/UDP ACLs.
[time-range time-range-name]
See “Supported Protocols and Services” on page 38-15
no access-list access-list-number for a list of supported IP protocols and TCP/UDP service
types.
Examples:
access-list 101 permit ip any any
access-list 101 deny tcp ftp any any
access-list access-list-number remark Adds a comment to the specified ACL. Enter up to 256
characters. Note that quotation marks are not required.
Examples:
access-list 10 remark Allows all IP traffic
access-list 102 remark Blocks icmp traffic
exit Exits the Global Configuration Mode and returns to the
Privileged Exec Mode.
interface {ethernet | fastethernet | Invokes the Interface Configuration Mode (see page
gigabitethernet} slot/port 38-11) for the specified interface.
Examples:
interface ethernet 1/24
interface gigabitethernet 1/48
ip access-list {standard | extended} Creates a named ACL and invokes the Access List Con-
access-list-name figuration Mode (see page 38-12).
no ip access-list {standard | extended} Use the no form of this command to remove a named
access-list-name ACL.
Examples:
ip access-list standard TestACL1
ip access-list extended TestACL2
no ip access-list standard TestACL1
page 38-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager ACLMAN Modes and Commands
Command Description
ip access-list resequence access-list-name Renumbers the permit and deny statements in the
starting-sequence-number increment named ACL using the specified starting sequence num-
ber and increment value.
Examples:
ip access-list resequence TestACL1 10 10
ip access-list resequence TestACL2 1 4
ip access-list resequence 102 20 10
time-range time-range-name Creates a time range with the specified name and
invokes the Time Range Configuration Mode.
no time-range time-range-name
Examples:
time-range range1
no time-range range1
Command Description
ip access-group {number | name} {in | out} Associates the specified ACL number or name as an
incoming or outgoing filter. The ACL is applied to the
no ip access-group {number | name} {in | out} slot/port that was specified with the interface command.
Examples:
ip access-group 10 in
ip access-group acl_out_1 out
no ip access-group 10 in
end Exits the Interface Configuration Mode and returns to
the Privileged Exec Mode.
exit Exits the Interface Configuration Mode and returns to
the Global Configuration Mode.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-11
ACLMAN Modes and Commands Using ACL Manager
Command Description
[sequence number] {permit | deny} Creates an ACL entry for the active named standard
{source source-wildcard | host address | ACL. The optional sequence number parameter specifies
any} the number assigned to the entry. If a number is not spec-
ified with this command, the next available number is
no [sequence number] used.
no {permit | deny} source [source-wildcard] Repeat this command for each additional entry that you
want to add to the active named ACL.
Examples:
permit any
permit 10.0.0.0 0.255.255.255
deny host 198.172.10.2
no permit any
page 38-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager ACLMAN Modes and Commands
Command Description
[sequence number] {permit | deny} Creates an ACL entry for the active named extended
protocol ACL. The optional sequence number parameter specifies
{source source-wildcard | host address | any} the number assigned to the entry. If a number is not spec-
[operator [port]] ified with this command, the next available number is
{destination destination-wildcard | used.
host address | any}
[operator [port]] Repeat this command for each additional entry that you
[established] want to add to the active named ACL.
[precedence precedence]
[tos tos] Use the no forms of this command to remove the speci-
[log | log-input] fied ACL entries.
[time-range time-range-name]
Note: The operator and established parameters are only
no [sequence number] used for TCP/UDP ACLs.
no deny protocol source source-wildcard See “Supported Protocols and Services” on page 38-15
destination destination-wildcard for a list of supported IP protocols and TCP/UDP service
types.
no permit
protocol Examples:
{source source-wildcard | host address | any} permit ip any any
[operator [port]] deny tcp ftp any any
{destination destination-wildcard | no ip any any
host address | any}
[operator [port]]
[established]
[precedence precedence]
[tos tos]
[log | log-input]
[time-range time-range-name]
remark remark Adds a comment to the active ACL. Enter up to 256
characters.
Examples:
remark ACL filters icmp traffic on any host.
end Exits the Access List Configuration Mode and returns to
the Privileged Exec Mode.
exit Exits the Access List Configuration Mode and returns to
the Global Configuration Mode.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-13
ACLMAN Modes and Commands Using ACL Manager
Command Description
absolute [start time date] [end time date] Defines an absolute range of time for an ACL. Note that
only one period (absolute or periodic) for each time
no absolute range is supported.
Examples:
absolute start 12:30 1 january 2006 end 16:00 31
december 2006
periodic days-of-the-week hh:mm to [days-of- Defines a recurring range of time for an ACL. Note that
the-week] hh:mm only one period (absolute or periodic) for each time
range is supported.
no periodic days-of-the-week hh:mm to [days-
of-the-week] hh:mm Use the no form of this command to remove the range.
Examples:
periodic monday wednesday friday 10:00 to 16:00
end Exits the Time Range Configuration Mode and returns to
the Privileged Exec Mode.
exit Exits the Time Range Configuration Mode and returns to
the Global Configuration Mode.
Configuring a read-only access to the policy domain or QoS command set only allows the user access to
the following ACLMAN shell commands:
clear
exit
show access-lists
show ip interface
show logging
show resources
show running-config
show time-range
page 38-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager Supported Protocols and Services
When creating extended TCP ACLs, enter one of the following supported TCP service types for the
required port parameter value. Note that using the port number to specify the service instead of the service
name is also allowed.
When creating extended UDP ACLs, enter one of the following supported UDP service types for the
required port parameter value. Note that using the port number to specify the service instead of the service
name is also allowed.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-15
Configuring ACLs Using ACL Manager
Configuring ACLs
This section describes using ACLMAN functionality to configure and apply common industry ACLs on an
Alcatel-Lucent switch. For more information about using the Alcatel-Lucent CLI to configure and manage
ACLs, see Chapter 24, “Configuring QoS,”.
To configure a common industry ACL, the following general steps are required:
1 Create an ACL. Use Global Configuration Mode commands to create numbered or named standard
and extended ACLs. In addition, importing of ACL text files is also supported. See “ACL Configuration
Methods and Guidelines” on page 38-16 for more information.
2 Apply the ACL to a switch interface. Use the interface command in the Global Configuration Mode
to associate an ACL as an incoming or outgoing filter for a specific switch interface.
3 Save the ACL configuration. Use the write memory command in the Privileged Exec Mode to save
the ACL configuration to the aclman.cfg file. See “Saving the ACL Configuration” on page 38-19 for
more information.
For a quick tutorial on how to configure ACLs, see “Quick Steps for Creating ACLs” on page 38-3. For a
description of ACLMAN command modes and syntax, see “ACLMAN Modes and Commands” on
page 38-8.
• If a wildcard mask is not specified for an IP address used in an ACL, the mask value defaults to 0.0.0.0.
page 38-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager Configuring ACLs
• The order of permit and deny statements within an ACL is very important because statements are
processed in order.
• A named standard ACL cannot have the same name as that of an existing extended ACL. The reverse
is also true; named extended ACLs cannot use a name already assigned to a standard ACL.
• ACL names are truncated to 64 characters.
• When a number is specified for an ACL remark entry, ACL entries are renumbered after a switch
reboot. For example:
Goodbye
-> aclman
Aclman#show ip access-lists Test10
Extended IP access list Test10
10 remark This ACL permits any 10.0.0.0 traffic
20 remark This ACL denys all 20.0.0.0 traffic
30 permit ip host 10.0.0.0 any
40 deny ip host 20.0.0.0 any
Aclman#
The range of 100–199 and 2000–2699 is reserved for extended ACLs. For example, the following
command creates an extended ACL:
Aclman#(config)access-list 102 permit ip any any
To add additional entries to the same ACL, specify the assigned number of the ACL that you want to
modify. For example, the following commands add entries to standard ACL 102:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-17
Configuring ACLs Using ACL Manager
To remove a numbered ACL, use the no form of the access-list command. Note that removing a single
entry from a standard ACL is not allowed without deleting the entire ACL. To avoid having to re-enter an
entire ACL each time a change is required, use one of the following configuration methods:
• Create a named ACL instead of a numbered ACL. Removing individual ACL entries is allowed with-
out having to remove and re-enter the entire ACL. See “Configuring Named Standard and Extended
ACLs” on page 38-18 for more information.
• Create the numbered ACL configuration in a text file and use the Privileged Exec Mode import
command to load the text file syntax into the ACLMAN running configuration. Then each time a
change is required for this ACL, simply edit the text file and import the file contents into the
ACLMAN configuration. For more information about importing ACL text files, see “Importing ACL
Text Files” on page 38-20.
The ip access-list command also invokes the Access List Configuration Mode, which is used to create
ACL entries for the named ACL. For example:
Aclman(config)#ip access-list standard Test1
Aclman(config-std-nacl#permit any
Aclman(config-std-nacl)#deny host 12.255.10.58
Aclman(config-std-nacl)#exit
Aclman(config)#
Note that it is possible to add and remove named ACL entries without having to delete and re-enter the
entire ACL configuration. For example:
Aclman(config)#ip access-list extended Test2
Aclman(config-ext-nacl)#permit ip any any
Aclman(config-ext-nacl)#permit udp host 198.172.10.4 any
Aclman(config-ext-nacl)#permit tcp host 11.22.3.1 any
Aclman(config-ext-nacl)#end
Aclman#configure terminal
Aclman(config)#ip access-list extended Test2
Aclman(config-ext-nacl)#no permit ip any any
Aclman(config-ext-nacl)#permit ip any 172.10.5.0 0.0.255.255
Aclman(config-ext-nacl)#end
page 38-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager Configuring ACLs
In the above example, the permit ip any any entry is removed from the Test2 extended ACL. A new
entry, permit ip any 172.10.5.0 0.0.255.255, is then added to the same ACL. Note that new entries are
added to the end of the access list by default. However, it is possible to specify a sequence number with
the new ACL statement to position the statement at a desired location within the ACL. For example,
Aclman(config)#ip access-list extended Test 2
Aclman(config-ext-nacl)#15 deny tcp any any
Aclman(config-ext-nacl)#end
In the above example, the deny tcp any any entry was assigned sequence number 15, which positioned
the entry between statements 10 and 20.
Note. Note that ACLs are not applied to the switch until they are associated with a switch interface.
Note. Issuing a write memory command is required to preserve the ACLMAN running configuration
across switch reboots.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-19
Configuring ACLs Using ACL Manager
By default ACLMAN looks in the /flash directory on the switch for the filename specified with the
import command. If the file is in any other directory, specify the path where the text file is located along
with the filename. For example, the following command imports the ext_acl102 file located in the work-
ing directory on the switch:
Aclman#import working/std_acl102
Note that any errors encountered when importing the contents of a text file into the ACLMAN configura-
tion are logged to an aclman.cfg.1.err file on the switch. If this file already exists, then the error filename
number is incremented by a value of one (for example, aclman.cfg.2.err, aclman.cfg.3.err) for each new
error log file that is created.
Importing ACL statements from a text file updates the ACLMAN running configuration. Use the write
memory command in the Privileged Exec Mode to save the updated running configuration to the
aclman.cfg file. This adds the imported statements to the ACLMAN startup configuration.
Note. Issuing a write memory command is required to preserve the ACLMAN running configuration
across switch reboots.
page 38-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using ACL Manager Verifying the ACLMAN Configuration
show policy condition Displays information about all pending and applied policy conditions or
a particular policy condition configured on the switch. Use the applied
keyword to display information about applied conditions only.
show policy action Displays information about all pending and applied policy actions or a
particular policy action configured on the switch. Use the applied
keyword to display information about applied actions only.
show policy rule Displays information about all pending and applied policy rules or a
particular policy rule.
show active policy rule Displays the pending and applied policy rules that are active (enabled)
on the switch.
show qos config Displays global QoS configuration parameters.
When a show command is used to display output for all pending and applied policy configuration, the
following characters can appear in the display:
character definition
+ Indicates that the policy rule has been modified or has
been created since the last qos apply.
- Indicates the policy object is pending deletion.
# Indicates that the policy object differs between the
pending/applied objects.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 38-21
Verifying the ACLMAN Configuration Using ACL Manager
page 38-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
39 Managing Policy
Servers
Quality of Service (QoS) policies that are configured through Alcatel-Lucent’s PolicyView network
management application are stored on a Lightweight Directory Access Protocol (LDAP) server.
PolicyView is an OmniVista application that runs on an attached workstation.
In This Chapter
This chapter describes how LDAP directory servers are used with the switch for policy management.
There is no required configuration on the switch. When policies are created on the directory server through
PolicyView, the PolicyView application automatically configures the switch to communicate with the
server. This chapter includes information about modifying configuration parameters through the
Command Line Interface (CLI) if manual reconfiguration is necessary. For more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Throughout this chapter the term policy server is used to refer to LDAP directory servers used to store
policies. Procedures described in this chapter include:
• “Installing the LDAP Policy Server” on page 39-3
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 39-1
Policy Server Specifications Managing Policy Servers
page 39-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Policy Servers Policy Server Overview
Note. The switch has separate mechanisms for managing QoS policies stored on an LDAP server and QoS
policies configured directly on the switch. For more information about creating policies directly on the
switch, see Chapter 36, “Configuring QoS.”
Information about installing the LDAP policy server is included in this chapter. Consult the server
manufacturer’s documentation for detailed information about configuring the server.
OmniSwitch
PolicyView workstation
IP traffic;
voice and video
traffic
LDAP server
See your server documentation for additional details on setting up the server.
See the next sections of this chapter for information about modifying policy server parameters or viewing
information about policy servers.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 39-3
Modifying Policy Servers Managing Policy Servers
Note. SSL configuration must be done manually through the policy server command.
For information about policy server parameter defaults, see “Policy Server Defaults” on page 39-2.
In this example, an LDAP server with an IP address of 10.10.2.3 will not be used to download policies.
Any policies already downloaded to the switch are not affected by disabling the server.
To re-enable the server, specify up.
-> policy server 10.10.2.3 admin up
If the policy server is not created on the default port, the no form of the command must include the port
number. For example:
-> no policy server 10.10.2.4 5000
page 39-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Policy Servers Modifying Policy Servers
Note that the port number must match the port number configured on the policy server.
If the port number is modified, any existing entry for that policy server is not removed. Another entry is
simply added to the policy server table.
Note. If you enable SSL, the port number is automatically set to 636. (This does not create another entry
in the port table.)
For example, if you configure a policy server with port 389 (the default), and then configure another
policy server with the same IP address but port number 5000, two entries display on the show policy
server screen.
-> policy server 10.10.2.3
-> policy server 10.10.2.3 port number 5000
-> show policy server
To remove an entry, use the no form of the policy server command. For example:
-> no policy server 10.10.2.3 port number 389
If this command is entered, a user with a username of kandinsky and a password of blue will be able to
access the LDAP server to modify parameters on the server itself.
Note that the searchbase path must be a valid path in the server directory structure.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 39-5
Modifying Policy Servers Managing Policy Servers
SSL is now enabled between the specified server and the switch. The port number in the switch
configuration is automatically set to 636, which is the port number typically used for SSL; however, the
port number must be configured with whatever port number is set on the server. For information about
configuring the port number, see “Modifying the Port Number” on page 39-5.
To disable SSL, use no ssl with the command:
-> policy server 10.10.2.3 no ssl
SSL is disabled for the 10.10.2.3 policy server. Additional policies cannot be saved to the directory server
from the PolicyView application.
Use the show policy server long command to display the last load time. For example:
-> show policy server long
LDAP server 0
IP address : 10.10.2.3,
TCP port : 16652,
Enabled : Yes,
Operational Status : Down,
Preference : 99,
Authentication : password,
SSL : Disabled,
login DN : cn=DirMgr
searchbase : o=company
Last load time : 02/14/02 16:38:18
page 39-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Policy Servers Verifying the Policy Server Configuration
Note. If policies are applied from PolicyView or through CLI, it activates the current configuration.
For more information about configuring policies through the CLI, see Chapter 36, “Configuring QoS.”
show policy server Displays information about servers from which policies may be
downloaded to the switch.
show policy server long Displays detailed information about an LDAP policy server.
show policy server statistics Displays statistics about policy directory servers.
show policy server rules Displays the names of policies originating on a directory server that
have been downloaded to the switch.
show policy server events Displays any events related to a directory server.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 39-7
Verifying the Policy Server Configuration Managing Policy Servers
page 39-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
40 Configuring Universal
Network Profiles
The Universal Network Profile (UNP) feature provides network administrators with the ability to define
and apply network access control to specific types of devices by grouping such devices according to
specific matching profile criteria. This allows network administrators to create virtual machine network
profiles (VNPs) and user network profiles from a unified framework of operation and administration.
UNP is not limited to creating profiles for only certain types of devices. However, the following
classification methods implemented through UNP functionality and profile criteria provide the ability to
tailor profiles for specific devices (physical or virtual):
• MAC-based authentication using a RADIUS-capable server. A profile name is returned upon
successful authentication.
• Switch-wide classification rules to classify on source MAC or IP address (no authentication required).
• VLAN tag classification to create VLAN port associations based on the VLAN ID contained in device
packets.
• Default profile classification for untagged traffic or traffic not classified through other methods.
Basically, UNP functionality is used to define profile-based VLANs to which network devices are
assigned. The profile can allow, deny, or require actions by users or machines on the network. Because
membership to a VLAN is based on UNP profile criteria, devices assigned to the VLAN are not tied to a
specific port or switch. This flexibility allows device mobility within the network while maintaining
network security.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-1
In This Chapter Configuring Universal Network Profiles
In This Chapter
This chapter provides an overview of the UNP feature and describes how to configure the port-based func-
tionality and profile attributes through the Command Line Interface (CLI). CLI commands are used in the
configuration examples; for more details about the syntax of commands, see the OmniSwitch AOS Release
6 CLI Reference Guide.
The following information and procedures are included in this chapter:
• “Quick Steps for Configuring UNP” on page 40-4
page 40-2 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Specifications
UNP Specifications
Platforms Supported OmniSwitch 6400, 6850E, 6855
Number of UNPs per switch 4k (includes static and dynamic profiles).
Authentication Type MAC-based authentication
UNP classification rules MAC address, MAC-range, IP address, and VLAN tag
Number of QoS policy lists per switch 32 (includes the default list)
Number of QoS policy lists per UNP 1
UNP Defaults
The following default settings are applied when the Universal Network Profile (UNP) feature is enabled
on a switch port:
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-3
Quick Steps for Configuring UNP Configuring Universal Network Profiles
2 Use the unp name command with the qos-policy-list parameter to optionally assign a list of QoS
policy rules to a UNP (see “Quick Steps for Configuring QoS Policy Lists” on page 40-7).
-> unp name serverA qos-policy-list name serverA_rules
Note. Verify the UNP profile configuration using the show unp command. For example:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
Note. Dynamic UNP VLANs are not saved in the switch configuration file (boot.cfg). When the next
switch reboot occurs, the device ages out, or the UNP is deleted, the dynamic VLAN configuration is
removed.
2 Use the unp auth-server-down-unp command to specify the name of a temporary UNP to which a
device is assigned if the RADIUS server is unreachable.
-> unp auth-server-down-unp temp_UNP
page 40-4 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Quick Steps for Configuring UNP
3 Use the unp auth-server-down-timeout command to configure how long a device remains in the
authentication server down UNP. The timer is set to 60 seconds by default and is triggered when a device
is learned in the authentication server down UNP.
-> unp auth-server-down-timeout 120
Note. Verify the UNP global parameter configuration using the show unp global configuration
command. For example:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
1 Use the unp port command to enable UNP functionality on one or more switch ports. Once enabled,
the port becomes eligible for dynamic assignment based on UNP authentication and classification.
-> unp port 1/10-25 enable
2 Use the unp port default-unp command to designate an existing profile as the default UNP for the
port. Devices are assigned to the default profile when UNP authentication and classification is not
available or is unsuccessful.
-> unp port 1/10 default-unp def_unp1
3 Use the unp port mac-authentication command to enable MAC authentication on the port.
4 Use the unp port mac-authentication pass-alternate command to designate and existing profile to
which a device is assigned if successful MAC authentication does not return a UNP name.
-> unp port 1/10 pass-alternate-unp alt_unp1
5 Use the unp port classification command to enable classification on the port. When enabled, UNP
classification rules are applied to device traffic received on the port when MAC authentication is not
available or unsuccessful. See “Quick Steps for Configuring UNP Classification Rules” on page 40-6.
-> unp port 1/10 classification enable
6 Use the unp port trust-tag command to specify that UNP should assign the device to an existing
VLAN that matches the VLAN ID tag of the device packets. When enabled, this type of dynamic port
assignment is done when the device is not classified by other UNP classification methods.
-> unp port 1/10 trust-tag enable
Note. Verify the UNP port configuration using the show unp port command. For example:
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-5
Quick Steps for Configuring UNP Configuring Universal Network Profiles
To display information about device MAC addresses learned on a UNP port, use the show unp user
command:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
2 To configure a rule for a range of MAC addresses, use the unp classification mac-range command.
4 To configure a VLAN tag rule, use the unp classification vlan-tag command. This rule can also be
combined with any of the other rules (MAC address, MAC range, or IP address) to make the rule more
specific to a VLAN.
-> unp classification vlan-tag 400 unp-name admin
-> unp classification mac-address 00:0f:b5:46:d7:56 vlan-tag 100 unp-name
customerB
Note. Verify the UNP classification rule configuration using the show unp classification command:
page 40-6 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Quick Steps for Configuring UNP
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
3 Assign one or more QoS policy rules to the policy list using the policy list rules command.
4 Assign the QoS policy list to a UNP using the unp name command.
Note. Verify the QoS policy list configuration using the show policy list command:
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-7
Quick Steps for Configuring UNP Configuring Universal Network Profiles
Verify the UNP association for the policy list using the show unp command:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
page 40-8 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Overview
UNP Overview
A Universal Network Profile (UNP) provides a method for dynamically assigning network devices to
VLAN domains. A profile consists of configurable attributes that help to define a group of users or
devices that have similar requirements for access to network resources. A device sending traffic that
matches such attributes is then assigned to a VLAN associated with the UNP. The UNP may also specify a
QoS policy list that is subsequently applied to device traffic associated with the UNP VLAN.
Dynamic assignment of devices using UNPs is achieved through port-based functionality that provides the
ability to authenticate and classify device traffic. Authentication verifies the device identity and provides a
UNP name. In the event authentication is not available or is unsuccessful, classification rules associated
with the UNPs, as well as the UNP port configuration attributes are applied to the traffic to determine the
UNP VLAN assignment.
Profile Attributes
In most cases, profiles are manually created by the administrator. However, UNP does support dynamic
profile configuration that is based on certain traffic conditions and the UNP port configuration. Whether or
not a profile is manually or dynamically created, the profile consists of the following attributes:
• UNP name. The UNP name is obtained from the RADIUS server and mapped to the same profile
name configured on the switch. If authentication is not used or fails, other classification methods can
provide the UNP name. The switch profile identifies three attribute values: VLAN ID, classification
rules, and a QoS policy list name.
• VLAN ID. All members of the profile group are assigned to the VLAN ID specified by the profile
(also referred to as the UNP VLAN).
• Classification Rules. A UNP can specify classification rules that are used to assign devices to a profile
based on the source MAC address, source IP address, or VLAN tag of device packets. UNP rules are
applied based on the outcome of authentication. See “Device Authentication and Classification” on
page 40-10 for more information.
• QoS policy list name. Specifies the name of an existing list of QoS policy rules. The rules within the
list are applied to all members of the profile group to enforce access to network resources. Only one
policy list is allowed per profile, but multiple profiles may use the same policy list. See “Configuring
QoS Policy Lists” on page 40-28 for more information.
An administrator can implement the same UNP name across the entire network infrastructure, as the
VLAN association is kept locally on each switch. For example, the administrator can deploy the UNP
named “Engineering” in one building using VLAN 10, while the same UNP deployed in another building
can use VLAN 20. The same UNP access controls are applied to all profile devices in each building, even
though they belong to different VLANs.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-9
UNP Overview Configuring Universal Network Profiles
Dynamic Profiles
UNP functionality provides the ability to dynamically create profiles based on very specific traffic
conditions. A UNP profile is dynamically created when the trust VLAN tag option is enabled on the UNP
port or link aggregate and one of the following conditions occurs:
• A tagged packet received on the UNP port contains a VLAN tag that matches an existing MVRP
VLAN in the switch configuration that is not assigned to a profile.
• There is no matching VLAN in the switch configuration.
Dynamic profiles are saved in the switch configuration, and profile attributes are configurable in the same
manner as manually created profiles.
page 40-10 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Overview
If classification is disabled on a UNP port, classification rules are not applied to traffic received on that
port. If both authentication and classification are disabled on a UNP port, traffic received on that port is
blocked, unless a default UNP or trust VLAN tag is configured for that port.
For more information, see “Enabling Dynamic Profile Configuration” on page 40-26.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-11
UNP Overview Configuring Universal Network Profiles
UNP VLANs
When a UNP is created, specifying a VLAN ID is required. Traffic that is classified with the UNP is
assigned to the associated VLAN. There are two methods for creating this type of VLAN:
• Using standard VLAN management commands, create the VLAN then assign the VLAN to the UNP at
the time the profile is created.
• Enabling the UNP dynamic VLAN configuration option to automatically create the VLAN, if it does
not exist, at the time the UNP is created.
VLANs that are automatically created at the time the profile is created are referred to as UNP dynamic
VLANs. These VLANs carry many of the same attributes as standard VLANs, such as:
• The VLAN status (enabled or disabled) is configurable.
• The STP status is configurable and is enabled by default for dynamic VLANs. This STP instance is
included in the maximum number of 1x1 STP instances allowed when the switch is running in the 1x1
STP mode.
However, UNP dynamic VLANs differ from standard VLANs as follows:
• A dynamic VLAN cannot be deleted using standard VLAN commands. The VLAN is only removed
when the UNP to which the VLAN is assigned is deleted.
• UNP dynamic VLANs are identified as a separate type of VLAN. The vlan show commands will
display this type with the default name of “UNP-DYN-VLAN” and the designated type as “UNP
Dynamic Vlan”.
• Dynamic VLANs are not saved in the “! VLAN:” section of the switch configuration file (boot.cfg).
However, the unp commands to enable dynamic VLAN configuration and create the UNP are saved in
the “! DA-UNP:” section of boot.cfg. As a result, the VLAN is created again on the next switch
bootup.
For more information, see “Enabling Dynamic VLAN Configuration” on page 40-29.
page 40-12 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Overview
How it Works
There is no global switch setting to invoke the UNP functionality. Instead, UNP is enabled on individual
switch ports and profiles are defined to determine the dynamic VLAN assignment for devices connected
through the UNP ports.
When UNP is enabled on a switch port, a device classification process is triggered when the port receives
traffic. Based on both the UNP port and profile configuration, traffic is processed as follows to determine
the profile association and subsequent VLAN assignment for the device traffic:
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-13
UNP Overview Configuring Universal Network Profiles
A
YES
authentication
MAC
enabled?
RADIUS server NO NO
configured?
YES
YES
Authentication
Classification
enabled?
Fail
Send MAC to RADIUS fail reasons
Check NO
server for authentication
Server
NO
Unreachable
Classification rule
matches?
Authentication
down UNP YES
server
authentication
MAC exists?
NO
passed? NO
YES NO
exists?
UNP
YES
UNP VLAN exists? YES
YES Server returned a NO
UNP that exists?
YES NO YES
UNP VLAN exists?
NO
NO YES Trust VLAN
Pass
Alternate and packet
enabled
UNP exists? is tagged?
YES NO
D
NO YES YES
UNP VLAN exists? exists?
UNP UNP VLAN exists?
YES NO NO
The following diagrams show how the device MAC address and UNP port assignment is handled based on
which of the UNP classification paths (B, C, or D) the packet follows. The path is determined by the initial
authentication and classification process originating with path A.
page 40-14 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Overview
NO
YES
tag matches
VLAN is tagged?
Packet
UNP VLAN?
YES NO
NO Dynamic
configuration
VLAN
enabled?
Both tagged and untagged
YES
packets are learned as
forwarding on the UNP VLAN
(for tagged packets, the tag
VLAN and UNP VLAN are
the same at this point). NO
MVRP VLAN?
The UNP port is a tagged
member of the UNP VLAN YES
for tagged packets and is an
untagged member of the UNP
VLAN for untagged packets.
Convert MVRP VLAN
[End of Processing] to a UNP dynamic VLAN1
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-15
UNP Overview Configuring Universal Network Profiles
NO
YES
tag matches
VLAN is tagged?
Packet
UNP VLAN?
YES NO
Dynamic NO
configuration
VLAN
enabled?
YES
Both tagged and untagged Tagged packets are filtered
packets are learned as on the tag VLAN and untagged
forwarding on the UNP VLAN packets are filtered on the
(for tagged packets, the tag Create a UNP default VLAN for the port.
VLAN and UNP VLAN are dynamic VLAN2
[End of Processing]
the same at this point).
[End of Processing]
page 40-16 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Overview
NO YES NO YES Dynamic NO
MVRP VLAN? in tag exists?
VLAN exists?
UNP configuration
VLAN
enabled?
YES NO YES
Create a UNP
NO Dynamic YES dynamic VLAN2
configuration
VLAN exists?
UNP
enabled?
YES NO
Convert MVRP VLAN NO Dynamic Dynamic NO
to a UNP dynamic configuration
VLAN configuration
VLAN
VLAN1 enabled? enabled?
YES YES
NO Dynamic Dynamic NO
configuration
profile configuration
profile
enabled? enabled?
[End of Processing]
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-17
Interaction With Other Features Configuring Universal Network Profiles
page 40-18 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Interaction With Other Features
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-19
Interaction With Other Features Configuring Universal Network Profiles
• If a policy rule is enabled, it is active for all policy lists to which it belongs. If one of the policy lists is
disabled, the rule is still active for all the other lists.
• If a policy rule is disabled, it is no longer active in any policy list to which it belongs, even if the list is
still enabled.
Source Learning
Do not disable source learning on a port or VLAN when using UNP to classify devices ingressing on
UNP-enabled ports.
page 40-20 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Configuration Overview
• Optionally configure classification rules for the profile. When classification is enabled on a UNP port,
these rules are applied to traffic received on the port to determine which UNP is applied to the traffic.
See“Enabling Dynamic Profile Configuration” on page 40-26.
• Enable or disable dynamic VLAN configuration of the VLANs associated with the UNP. The status of
dynamic VLAN configuration is applied to all profiles. See “Enabling Dynamic VLAN Configura-
tion” on page 40-29.
• Enable or disable dynamic profile configuration. A dynamic profile is created only when specific traf-
fic conditions occur on UNP ports. See “Enabling Dynamic Profile Configuration” on page 40-26.
• Define a temporary UNP to which devices are assigned in the event the authentication server is down
or unreachable. A configurable timer is also available to specify how long a device remains in this
temporary UNP. See“Configuring an Authentication Server Down UNP” on page 40-31.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-21
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
switch are dynamically assigned to that VLAN. See “Configuring the Trust VLAN Tag Status” on
page 40-24.
For more information about using MAC authentication and classifying non-supplicant devices, see
“Device Authentication and Classification” on page 40-10 and “UNP Configuration Overview” on
page 40-21.
The unp port commands enables UNP on port 1 of slot 3 and on ports 1-10 on slot 4.
To disable UNP on a port, use the disable option with unp port command.
Note. Disabling UNP on a port clears the UNP configuration for that port.
page 40-22 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
Note. Any configuration change to a UNP-enabled port will flush all MAC addresses learned on that port.
This applies only to CLI commands used to configure UNP port parameters.
To disable MAC authentication, use the unp port mac-authentication command with the disable option.
The UNP name specified with this command must already exist in the switch configuration. If an alter-
nate pass UNP is not configured for the port, then other classification methods configured for the port are
applied.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-23
Configuring UNP Port-Based Access Control Configuring Universal Network Profiles
Enabling Classification
By default, when UNP is enabled on the port, classification is disabled. This means that no UNP
classification rules are applied to device traffic received on that port. Instead, other classification
parameters configured for the port are applied.
If classification is enabled on the UNP port, all classification rules configured for any UNP in the switch
configuration are applied to traffic received on the port when one of the following occurs:
• MAC authentication is not enabled on the port.
• MAC authentication is enabled but the RADIUS server information is not configured for the switch.
To enable classification for the UNP port, use the unp port classification command with the enable
option.
-> unp port 1/10 classification enable
To disable classification, use the unp port classification command with the disable option.
-> unp port 1/15-20 classification disable
If a device does not match any UNP classification rules, then the switch checks to see if one of the
following classification methods are available to apply to the device:
• A default UNP is configured for the port. See “Configuring a Default UNP” on page 40-25.
• The trust VLAN tag function is enabled for the port. See “Configuring the Trust VLAN Tag Status” on
page 40-24.
• The UNP VLAN obtained from the matching classification rule does not exist in the switch
configuration.
• An authentication server down UNP is configured, but the VLAN associated with that UNP does not
exist in the switch configuration.
When the trust tag option is triggered by one of the above conditions, a VLAN-port-association (VPA) is
created between the UNP port and the matching VLAN, even if the matching VLAN is not associated with
a UNP.
page 40-24 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Configuring UNP Port-Based Access Control
To enable the trust VLAN tag status, use the unp port trust-tag command with the enable option. For
example:
-> unp port 1/10-15 trust-tag enable
To disable the trust VLAN tag status for the UNP port, use the unp port trust-tag command with the
disable option. For example:
-> unp port 1/10-15 trust-tag disable
If the trust VLAN tag status is disabled, the switch checks to see if a default UNP is configured for the
port. If a default UNP does not exist for the port, device traffic is blocked.
• MAC authentication fails and device traffic doesn’t match any UNP classification rules.
• The trust VLAN tag option is enabled but device packets do not contain a VLAN tag that matches an
existing VLAN ID on the switch.
To configure a default UNP for the port, use the unp port default-unp command and specify the name of
an existing profile. For example:
-> unp port 1/10 default-unp port10_unp
The default UNP for a port is basically a “last resort” UNP for traffic that was not successfully classified
through other methods. If all other methods fail and a default UNP is not configured for the port, device
traffic is blocked on that port.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-25
Configuring Profiles Configuring Universal Network Profiles
Configuring Profiles
Universal Network Profiles (UNP) are applied to device traffic that is received on UNP-enabled ports. A
profile name and VLAN ID are required profile attributes. Optional profile attributes include
classification rules and a QoS policy list name.
Consider the following when configuring a UNP:
• The VLAN associated with a profile must already exist in the switch configuration, unless the
dynamic VLAN configuration functionality is enabled (see “Enabling Dynamic VLAN Configuration”
on page 40-29.
• Profile attributes are only applied to device traffic that is received on UNP-enabled ports (see
“Enabling UNP on Ports” on page 40-22).
• If a profile is associated with a standard VLAN and that VLAN is deleted, the profile is still associated
with that VLAN. Any traffic subsequently classified with this profile is filtered unless the UNP port on
which the traffic is received is configured with alternate classification methods (see “Configuring UNP
Port Parameters” on page 40-23).
• Specifying a QoS policy list name that is inactive or does not already exist in the switch configuration
is allowed. However, the list will remain inactive for the UNP until the list is enabled or configured
using the QoS policy list commands (see “Configuring QoS Policy Lists” on page 40-28).
To configure a UNP, use the unp name command. For example, the following command creates the
“guest_user” profile to assign devices to VLAN 500 and apply the rules from the “temp_rules” policy list:
-> unp name guest_user vlan 500 qos-policy-list temp_rules
To verify the UNP configuration for the switch, use the show unp command. For more information about
user profiles, see “UNP Overview” on page 40-9.
Use the disable option with the dynamic-profile-configuration command to disable this functionality.
For example:
-> unp dynamic-profile-configuration disable
Dynamic profile configuration is a global UNP setting that is applied to traffic on any UNP port that is
configured to trust the VLAN tag of the incoming packets. To verify if this setting is enabled or disabled,
use the show unp global configuration command.
Consider the following when enabling dynamic profile configuration:
• A profile is only dynamically created if the trust VLAN tag is enabled for the UNP port and the packet
VLAN tag matches an MVRP VLAN ID that is not assigned to a UNP or there is no matching VLAN
ID in the switch configuration.
• Dynamically created profiles are saved in the boot.cfg file for the switch.
page 40-26 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Configuring Profiles
• By default, dynamically created profiles are automatically named dynamic_profile_vlan_id, where the
VLAN ID is the ID of the VLAN contained in the packet tag.
• After the dynamic profile is created, changing the profile name, associated VLAN ID, or the QoS
policy list is allowed. To avoid any confusion, change the profile name if the VLAN ID associated
with the profile has changed.
• If the dynamic profile configuration option is enabled along with the dynamic VLAN configuration
option, if the dynamic creation of a profile refers to a VLAN that is a MVRP VLAN, then the MVRP
VLAN is automatically converted to a dynamic UNP VLAN (UNP-DYN-VLAN).
• Classification rules are only applied to traffic received on UNP ports on which classification is
enabled.
• The following order of precedence is used to determine which UNP is applied to a device when the
device matches more than one rule:
> MAC address + VLAN tag
> MAC address
> MAC address range + VLAN tag
> MAC address range
> IP address + VLAN tag
> IP address
> VLAN tag
• When a classification rule is removed or modified, all MAC addresses classified with that rule are
flushed. Adding a rule does not cause a MAC address flush. If necessary, use the no mac-learning
command to clear and re-learn any addresses after the rule is added.
To configure a UNP MAC address rule, use the unp classification mac-address command. For example,
the following command applies the “serverA” profile to a device with the specified source MAC address:
-> unp classification mac-address 00:00:2a:33:44:01 unp-name serverA_unp
To configure a UNP MAC address range rule, use the unp classification mac-range command. For
example, the following command applies the “clusterA” profile to a device with a source MAC address
that falls within the specified range of MAC addresses:
-> unp classification mac-range 00:00:2a:33:44:01 00:00:2a:33:44:10 unp-name
clusterA
To configure a UNP IP address rule, use the unp classification ip-address command. For example, the
following command applies the “vm-1” profile to a device with the specified source IP address:
-> unp classification ip-address 10.1.1.1 mask 255.0.0.0 unp-name vm-1
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-27
Configuring Profiles Configuring Universal Network Profiles
To configure a VLAN tag rule, use the unp classification vlan-tag command. For example, the following
command applies the “vm-2” profile to device packets that contain the specified VLAN ID:
-> unp classification vlan-tag 100
The VLAN tag rule can be combined with the any of the other rules to include the tag as a required
parameter to match for the rule. For example, to include the VLAN tag with a MAC address rule, use the
unp classification mac-address rule command with the vlan-tag option:
-> unp classification mac-address 00:00:2a:33:44:01 vlan-tag 10 unp-name serverA
In this example, a device is classified with UNP “serverA” if the source MAC address of the device is
“00:00:2a:33:44:01” and device packets are tagged with VLAN 10.
Use the show unp classification command to verify the UNP rule configuration for the switch. For more
information about UNP rules, see “What are UNP Classification Rules?” on page 40-11.
Note that the no default-list option was used to create the rules in this example. Using this option is
recommended when creating a policy list for a UNP.
Note the following guidelines when configuring QoS/ACL policy rules and lists:
• A default policy list exists in the switch configuration. Rules are added to this list when the rule is
created. A rule can belong to multiple policy lists. As a result, the rule remains a member a of the
default list even when it is subsequently assigned to additional lists.
• Each time a rule is assigned to a policy list, an instance of that rule is created. Each instance is
allocated system resources. To exclude a rule from the default policy list, use the no default-list option
of the policy rule command when the rule is created. For example:
-> policy rule r1 condition c1 action a1 no default-list
• Up to 32 policy lists (including the default list) are supported per switch. Only one policy list per UNP
is allowed, but a policy list can be associated with multiple profiles.
• If a rule is a member of multiple policy lists but one or more of these lists are disabled, the rule is still
active for those lists that are enabled.
page 40-28 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Configuring Profiles
• If the QoS status of an individual rule is disabled, then the rule is disabled for all policy lists, even if a
list to which the policy belongs is enabled.
• Policy lists are not active on the switch until the qos apply command is issued.
Use the show policy list command to display the QoS policy rule configuration for the switch.
For more information about configuring QoS/ACL policy lists, see “Creating Policy Lists” on page 36-40
in Chapter 36, “Configuring QoS.”
Use the disable option with the dynamic-vlan-configuration command to disable dynamic configuration.
-> unp dynamic-vlan-configuration disable
Dynamic VLAN configuration is a global UNP setting that applies to all profiles. To verify if this setting
is enabled or disabled, use the show unp global configuration command.
Consider the following when enabling dynamic VLAN configuration:
• The VLAN status and other port (non-UNP port) assignments are configurable using standard VLAN
commands. In addition, the STP status of the VLAN is configurable and enabled by default when the
dynamic VLAN is created.
• A dynamic VLAN cannot be deleted using standard VLAN commands (no vlan vlan_id).
• UNP dynamic VLANs are identified as a separate type of VLAN. The vlan show commands will
display this type with the default name of “UNP-DYN-VLAN” and the designated type as “UNP
Dynamic Vlan”. For example:
-> show vlan 450
Name : UNP-DYN-VLAN,
Type : UNP Dynamic Vlan,
Administrative State : enabled,
Operational State : disabled,
IP Router Port : disabled,
IP MTU : 1500
• Dynamic VLANs are not saved in the “! VLAN:” section of the switch configuration file (boot.cfg).
However, the unp commands to enable dynamic VLAN configuration and create the UNP are saved in
the “! DA-UNP:” section of boot.cfg (see the following sample boot.cfg file). As a result, the VLAN is
created again on the next switch bootup.
!========================================!
! File: /flash/working/boot.cfg !
!========================================!
! Chassis:
system name (none)
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-29
Configuring Profiles Configuring Universal Network Profiles
! Configuration:
! Capability Manager:
hash-control brief
! Multi-Chassis:
! Virtual Flow Control:
! Interface:
! Link Aggregate:
linkagg static agg 10 size 2 admin-state enable
! VLAN:
vlan 1 admin-state enable
vlan 451 admin-state enable
vlan 777 admin-state enable
vlan 887-888 admin-state enable
.
.
.
! DA-UNP:
unp dynamic-vlan-configuration enable
unp name temp1 vlan 450
unp name unpTemp vlan 10
unp name unpTemp2 vlan 10
unp classification mac-address 00:00:00:00:00:01 unp-name unpTemp2
unp classification mac-address 10:22:33:44:55:66 unp-name unpTemp2
unp classification ip-address 1.1.1.2 mask 255.0.0.0 unp-name unpTemp2
unp port 1/10 enable
unp port 1/10 classification enable
unp port 1/10 trust-tag enable
unp port 1/11 enable
unp port 1/11 mac-authentication enable
page 40-30 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles Configuring Profiles
After a device is classified into the VLAN for this UNP, an attempt to re-authenticate the device is made
after a specific period of time (60 seconds by default). To change this time value, use the unp auth-
server-down-timeout command.
-> unp auth-server-down-timeout 120
The authentication down UNP and related timer value are applied to all traffic received on all UNP ports
in the event the RADIUS server becomes unreachable. To verify if this setting is enabled or disabled, use
the show unp global configuration command
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-31
UNP Application Example Configuring Universal Network Profiles
• UNP functionality is enabled on the OmniSwitch 6900 ports that are connected to network devices that
will generate traffic to which UNP profiles are applied.
ACLs, ACLs
QoS, QoS,
VLAN VLAN VM Server
11:11:11:11:11:11
Employee
44:44:44:44:44:44 55:55:55:55:55:55 66:66:66:66:66:66
As soon as the network devices connected to the UNP ports start sending traffic, the switch applies the
UNP port and profile configuration to determine which UNP to apply to the traffic. Once the appropriate
UNP is identified, the device and the port to which the device is connected are dynamically assigned to the
VLAN associated with the UNP.
Because the UNP port and profile configuration is applied to each device connected to or through a UNP
port, it is possible for that port to belong to more than one UNP VLAN. For example, if on the server the
virtual machine “VM-1” is associated with UNP1, and “VM-2” with “UNP2” and “VM-3” with “UNP3”,
then the port to which the server is connected is dynamically assigned to VLANs 10, 20, and 30.
page 40-32 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Application Example
2 Enable MAC authentication for the switch and specify the RADIUS server to use for authenticating
non-supplicants using the aaa device-classification mac command.
-> aaa device-classification mac rad1
-> vlan 10
-> vlan 20
-> vlan 30
2 Configure UNP1 with VLAN 10 and a MAC classification rule using the unp name and unp classifi-
cation mac-address commands.
3 Configure UNP2 with VLAN 20 and a MAC classification rules using the unp name and unp classifi-
cation mac-address commands.
4 Create a QoS policy list for UNP2 and then associate the list to UNP2 using the unp name command
with the qos-policy-list parameter.
5 Configure UNP3 with VLAN 30 and a MAC classification rule using the unp name and unp classifi-
cation mac-address commands.
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-33
UNP Application Example Configuring Universal Network Profiles
2 Enable MAC authentication on the UNP ports using the unp port mac-authentication command. If
authentication is not enabled, the MAC of the device connected to the port is not sent to the RADIUS
server for authentication.
-> unp port 1/1-10 mac-authentication enable
3 Configure an alternate UNP, if necessary, using the unp port mac-authentication pass-alternate
command. This UNP is applied to device traffic when authentication is successful but the RADIUS server
did not return a UNP name.
-> unp port 1/1-10
4 Enable classification on the UNP ports using the unp port classification command. If classification is
not enabled, UNP will not apply profile rules to classify traffic.
-> unp port 1/1-10 classification enable
5 Configure a default UNP, if necessary, using the unp port default-unp command. This UNP is applied
when all other options fail to classify the device.
-> unp port 1/1-10 default-unp def_unp
6 Configure the UNP port to trust the VLAN tag of a device packet, if necessary, using the unp port
trust-tag command. This allows UNP to assign a device to a switch VLAN that matches the VLAN tag
contained in packets received from the device. This type of assignment is done when all other options fail
to classify the device.
-> unp port 1/1 trust-tag enable
Untagged packets are assigned to the default UNP for the port, if a default UNP
is configured.
page 40-34 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
Configuring Universal Network Profiles UNP Application Example
2 Specify a UNP to apply to device traffic when the authentication server is down using the unp auth-
server-down-unp command. An authentication server down timer is initiated for the device when the
device is assigned to the VLAN associated with this UNP.
-> unp auth-server-down-unp temp_unp
3 Change the authentication server down timer value, if necessary, using the unp auth-server-down-
timeout command. When the timer value expires for a device, re-authentication and/or classification is
attempted for that device.
-> unp auth-server-down-timeout 120
OmniSwitch AOS Release 7 Network Configuration Guide January 2013 page 40-35
Verifying the UNP Configuration Configuring Universal Network Profiles
show unp Displays the profile configuration for the switch. This includes the UNP
name, VLAN ID, and QoS policy list, if any, associated with the profile.
show unp classification Displays the classification rules configured for each profile.
show unp global configuration Displays the status of dynamic VLAN configuration and whether or not
an authentication server down UNP is configured.
show unp port Displays the UNP port configuration for the switch. Lists ports that are
UNP-enabled and the status of parameters for that port.
show unp user Displays the MAC addresses learned on the UNP ports. This includes
the UNP name, VLAN ID, and the status of the MAC on the port.
page 40-36 OmniSwitch AOS Release 7 Network Configuration Guide January 2013
41 Configuring 802.1X
Physical devices attached to a LAN port on the switch through a point-to-point LAN connection can be
authenticated through the switch through port-based network access control. This control is available
through the IEEE 802.1X standard implemented on the switch.
The Access Guardian functionality uses this implementation of 802.1X to provide configurable device
classification policies for authenticating both 802.1x clients (supplicants) and non-802.1x clients
(non-supplicants). Such policies include the option of using Captive Portal Web-based authentication. In
addition, device classification policies determine the VLAN assignment of a device and are particularly
useful for providing secure network access to guest clients.
For information about how to configure and use device classification policies, see Chapter 43, “Configur-
ing Access Guardian.”
In This Chapter
This chapter describes 802.1X ports used for port-based access control and how to configure them through
the Command Line Interface (CLI). CLI commands are used in the configuration examples; for more
details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
This chapter provides an overview of 802.1X and includes the following information:
• “Setting Up Port-Based Network Access Control” on page 41-8
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 41-1
802.1X Specifications Configuring 802.1X
802.1X Specifications
RFCs Supported RFC 2284–PPP Extensible Authentication Protocol (EAP)
RFC 2865–Remote Authentication Dial In User Service
(RADIUS)
RFC 2866–RADIUS Accounting
RFC 2867–RADIUS Accounting Modifications for Tun-
nel Protocol Support
RFC 2868–RADIUS Attributes for Tunnel Protocol Sup-
port
RFC 2869–RADIUS Extensions
IEEE Standards Supported IEEE 802.1X-2001–Standard for Port-based Network
Access Control
802.1X RADIUS Usage Guidelines
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
802.1X Defaults
The following table lists the defaults for 802.1X port configuration through the 802.1x command and the
relevant command keywords:
page 41-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1X Quick Steps for Configuring 802.1X
The port is set up automatically with 802.1X defaults. See “802.1X Defaults” on page 41-2 for informa-
tion about the defaults. For more information about vlan port commands, see Chapter 5, “Assigning Ports
to VLANs.”
See Chapter 42, “Managing Authentication Servers,” for more information about configuring RADIUS
authentication servers for 802.1X authentication.
Note. If 802.1X users authenticate into an authenticated VLAN, the VLAN must be configured with the
vlan authentication command. For information about configuring VLANs with authentication, see
Chapter 4, “Configuring VLANs.”
3 Associate the RADIUS server (or servers) with authentication for 802.1X ports:
4 (Optional) Associate the server (or servers) to be used for accounting (logging) 802.1X sessions. For
example:
-> aaa accounting 802.1x rad2 ldap3 local
5 (Optional) Configure port-access control parameters for the 802.1X port using the 802.1x command:
6 (Optional) Configure the number of times supplicant devices are polled for identification using the
802.1x supp-polling retry command:
-> 802.1x 3/1 supp-polling retry 10
Note. Verify the 802.1X port configuration using the 802.1x command:
->show 802.1x users 4/5
Optional. To display the number of 802.1x users on the switch, use the show 802.1x users command:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 41-3
Quick Steps for Configuring 802.1X Configuring 802.1X
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
page 41-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1X 802.1X Overview
802.1X Overview
The 802.1X standard defines port-based network access controls, and provides the structure for authenti-
cating physical devices attached to a LAN. It uses the Extensible Authentication Protocol (EAP).
There are three components for 802.1X:
• The Supplicant—This is the device connected to the switch that supports the 802.1x protocol. The
device can be connected directly to the switch or via a point-to-point LAN segment. Typically the
supplicant is a PC or laptop.
• The Authenticator Port Access Entity (PAE)—This entity requires authentication from the suppli-
cant. The authenticator is connected to the supplicant directly or via a point-to-point LAN segment.
The OmniSwitch acts as the authenticator.
• The Authentication Server—This component provides the authentication service and verifies the
credentials (username, password, challenge, etc.) of the supplicant. On the OmniSwitch, only RADIUS
servers are currently supported for 802.1X authentication.
Authentication
Authenticator PAE
Server
Supplicant
authentication
login request request
authorization
PC OmniSwitch granted
RADIUS server
802.1X Components
A device that does not use the 802.1x protocol for authentication is referred to as a non-supplicant. The
Access Guardian feature provides configurable device classification policies to authenticate access of both
supplicant and non-supplicant devices on 802.1x ports. See Chapter 43, “Configuring Access Guardian,”
for more information.
Supplicant Classification
When an EAP frame or an unknown source data frame is received from a supplicant, the switch sends an
EAP packet to request the supplicant’s identity. The supplicant then sends the information (an EAP
response), which is validated on an authentication server set up for authenticating 802.1X ports. The
server determines whether additional information (a challenge, or secret) is required from the supplicant.
After the supplicant is successfully authenticated, the MAC address of the supplicant is learned in the
appropriate VLAN depending on the following conditions:
• If the authentication server returned a VLAN ID, then the supplicant is assigned to that VLAN. All
subsequent traffic from the supplicant is then forwarded on that VLAN.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 41-5
802.1X Overview Configuring 802.1X
• If the authentication server does not return a VLAN ID or authentication fails, then the supplicant is
classified according to any device classification policies that are configured for the port. See
Chapter 43, “Configuring Access Guardian,” for more information.
• If the authentication server does not return a VLAN ID and there are no user-configured device classi-
fication policies for the port, Group Mobility is used to classify the supplicant. If Group Mobility is
unable to classify the supplicant, the supplicant is assigned to the default VLAN for the 802.1X port.
• If the authentication fails and there are no user-configured devicee classification policies for the port,
the supplicant is blocked.
Note that multiple supplicants can be authenticated on a given 802.1X port. Each supplicant MAC address
received on the port is authenticated, learned, and classified separately, as described above.
The global configuration of this feature is controlled by the aaa authentication 802.1x command. This
command enables 802.1X for the switch and identifies the primary and backup authentication servers. See
“Setting 802.1X Switch Parameters” on page 41-8 for more information about configuring this command.
Using the 802.1x command, an administrator can force an 802.1X port to always accept any frames on the
port (therefore not requiring a device to first authenticate on the port); or an administrator can force the
port to never accept any frames on the port. See “Configuring the Port Authorization” on page 41-9.
Re-authentication
After a supplicant has successfully authenticated through an 802.1X port, the switch can be configured to
periodically re-authenticate the supplicant (re-authentication is disabled by default). In addition, the
supplicant can be manually re-authenticated (see “Re-authenticating an 802.1X Port” on page 41-10).
The re-authentication process is transparent to a user connected to the authorized port. The process is used
for security and allows the authenticator (the OmniSwitch) to maintain the 802.1X connection.
Note. If the MAC address of the supplicant has aged out during the authentication session, the 802.1X
software in the switch will alert the source learning software in the switch to re-learn the address.
802.1X ports can also be initialized if there a problem on the port. Initializing a port drops connectivity to
the port and requires the port to be re-authenticated. See “Initializing an 802.1X Port” on page 41-11.
page 41-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1X 802.1X Overview
802.1X Accounting
802.1X authentication sessions can be logged if servers are set up for 802.1X accounting. Accounting can
also be done through the local Switch Logging feature.
The 802.1x accounting process also sends an Interim-Update accounting record to a RADIUS accounting
server whenever an authenticated 802.1x client receives an IP address. This record includes the “Frame-
IPAddress” attribute, which contains the IP address of the 802.1x client for the server to log.
The Interim-Update record also includes the following attributes, which are the same as those found in the
Start accounting record:
• User Name
• NAS-IP-Address
• NAS-Port
• Acct-Session
• Alcatel-Lucent-Auth-Group (VlanId)
• Alcatel-Lucent-Slot-Port
• Alcatel-Lucent-Client-IP-Addr
No configuration is required to enable the sending of the Interim-Update record. This record is automati-
cally generated whenever an 802.1x client receives a new IP address. For example, when an 802.1x client
first authenticates and requests an IP address or if an existing 802.1x client performs a release and renew
operation to obtain a new IP address.
Note that this feature is only operational when the following configuration requirements are met:
• The 802.1x client must use DHCP to obtain an IP address. Whenever the client automatically or manu-
ally requests and receives an IP address, the Interim-Update accounting record is generated.
• The switch must have DHCP Snooping globally enabled, or the VLAN to which the 802.1x client is
classified must have DHCP Snooping enabled.
• The accounting server configured is a RADIUS server. This feature is not supported with any other
type of authentication server at this time.
In addition to the Interim-Update record, the Stop record also contains the new “Frame-IP-Address”
attribute. The Stop record is sent when an 802.1x client logs off.
For information about setting up accounting for 802.1X, see “Configuring Accounting for 802.1X” on
page 41-11.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 41-7
Setting Up Port-Based Network Access Control Configuring 802.1X
In this example, the rad1 server will be used for authenticating 802.1X ports. If rad1 becomes unavail-
able, the switch will use rad2 for 802.1X authentication. When this command is used, 802.1X is automati-
cally enabled for the switch.
Note that the same RADIUS servers can be used for 802.1x (supplicant) and MAC (non-supplicant)
authentication. Using different servers for each type of authentication is allowed but not required.
For more information about using MAC authentication and classifying non-supplicant devices, see
Chapter 43, “Configuring Access Guardian.”
The vlan port 802.1x command enables 802.1X on port 1 of slot 3. The port will be set up with defaults
listed in “802.1X Defaults” on page 41-2.
To disable 802.1X on a port, use the disable option with vlan port 802.1x command. For more informa-
tion about vlan port commands, See Chapter 5, “Assigning Ports to VLANs.”
page 41-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1X Setting Up Port-Based Network Access Control
In this example, the port control direction is set to incoming traffic only on port 1 of slot 3.
The type of port control (or authorization) is configured with the port-control parameter described in the
next section.
In this example, the port control on port 1 of slot 3 is always authorized for any traffic.
The auto option configures the port to be open for traffic when a device successfully completes an 802.1X
authentication exchange with the switch.
• Supplicant (or user) timeout—The time before the switch will timeout an 802.1X user who is attempt-
ing to authenticate. During the authentication attempt, the switch sends requests for authentication
information (identity requests, challenge response, etc.) to the supplicant (see “Configuring the Maxi-
mum Number of Requests” on page 41-10). If the supplicant does not reply to these requests, the
supplicant is timed out when the timeout expires.
To modify the quiet timeout, use the 802.1x command with the quiet-period keyword. To modify the
transmit timeout, use the 802.1x command with the tx-period keyword. To modify the supplicant or user
timeout, use the 802.1x command with the supp-timeout keyword. For example:
-> 802.1x 3/1 quiet-period 50 tx-period 25 supp-timeout 25
This command changes the quiet timeout to 50 seconds; the transmit timeout to 25 seconds; and the user
timeout to 25 seconds.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 41-9
Setting Up Port-Based Network Access Control Configuring 802.1X
Note. The authentication server timeout can also be configured (with the server-timeout keyword) but the
value is always superseded by the value set for the RADIUS server through the aaa radius-server
command.
In this example, the maximum number of requests that will be sent is three.
In this example, the maximum number of times a device is polled is set to 10. If no EAP frames are
received, the device is considered a non-supplicant, and any non-supplicant classification policies config-
ured for the port are applied to the device.
To bypass 802.1x authentication and classify supplicants connected to the port as non-supplicants, set the
number of polling retries to zero:
-> 802.1x 3/1 supp-polling retry 0
Note. Setting the number of polling retries to zero turns off 802.1x authentication for the port; all devices
(including supplicants) are then classified as non-supplicants. As a result, non-supplicant policies that use
MAC-based authentication are now applicable to supplicant devices, not just non-supplicant devices.
page 41-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring 802.1X Setting Up Port-Based Network Access Control
In this example, automatic re-authentication is enabled, and re-authentication will take place on the port
every 25 seconds.
To manually re-authenticate a port, use the 802.1x re-authenticate command. For example:
-> 802.1x re-authentication 3/1
This command drops connectivity on port 1 of slot 3. The switch sends out a Request Identity message
and restores connectivity when the port is successfully re-authenticated.
In this example, the RADIUS server rad1 will be used for accounting. If rad1 becomes unavailable, the
local Switch Logging function in the switch will log 802.1X sessions. For more information about Switch
Logging, see Chapter 55, “Using Switch Logging.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 41-11
Verifying the 802.1X Port Configuration Configuring 802.1X
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 41-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
42 Managing Authentication
Servers
This chapter describes authentication servers and how they are used with the switch. The types of servers
described include Remote Authentication Dial-In User Service (RADIUS), Lightweight Directory Access
Protocol (LDAP), Terminal Access Controller Access Control System (TACACS+), and ACE/Server from
SecurID.
In This Chapter
This chapter includes some information about attributes that must be configured on the servers.
The following sections contain details on how to configure the switch through the Command Line
Interface (CLI) to communicate with the servers to retrieve authentication information about users.
The configuration procedures described include:
• Configuring an ACE/Server. This procedure is described in “ACE/Server” on page 42-8.
• Configuring a RADIUS Server. This procedure is described in “RADIUS Servers” on page 42-9.
• Configuring a TACACS+ Server. This procedure is described in “TACACS+ Server” on page 42-18.
• Configuring an LDAP Server. This procedure is described in “LDAP Servers” on page 42-21.
• Configuring Kerberos Snooping. This procedure is described in “Kerberos Snooping” on page 42-35.
For information about using servers for authenticating users to manage the switch, see the “Switch
Security” chapter in the OmniSwitch AOS Release 6 Switch Management Guide.
For information about using servers to retrieve authentication information for Layer 2 Authentication users
(authenticated VLANs), see Chapter 44, “Configuring Authenticated VLANs.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-1
Authentication Server Specifications Managing Authentication Servers
RADIUS RFCs Supported RFC 2865–Remote Authentication Dial In User Service (RADIUS)
RFC 2866–RADIUS Accounting
RFC 2867–RADIUS Accounting Modifications for Tunnel Proto-
col Support
RFC 2868–RADIUS Attributes for Tunnel Protocol Support
RFC 2809–Implementation of L2TP Compulsory Tunneling
through RADIUS
RFC 2869–RADIUS Extensions
RFC 2548–Microsoft Vendor-specific RADIUS Attributes
RFC 2882–Network Access Servers Requirements: Extended
RADIUS Practices
TACACS+ RFCs Supported RFC 1321--(TACACS+) standard authentication, authorization,
and accounting protocol
RFC 1492–An Access Control Protocol
LDAP RFCs Supported RFC 1789–Connectionless Lightweight X.5000 Directory Access
Protocol
RFC 2247–Using Domains in LDAP/X.500 Distinguished Names
RFC 2251–Lightweight Directory Access Protocol (v3)
RFC 2252–Lightweight Directory Access Protocol (v3): Attribute
Syntax Definitions
RFC 2253–Lightweight Directory Access Protocol (v3): UTF-8
String Representation of Distinguished Names
RFC 2254–The String Representation of LDAP Search Filters
RFC 2256–A Summary of the X.500(96) User Schema for Use
with LDAPv3
Other RFCs RFC 2574–User-based Security Model (USM) for version 3 of the
Simple Network Management Protocol (SNMPv3)
RFC 2924–Accounting Attributes and Record Formats
RFC 2975–Introduction to Accounting Management
RFC 2989–Criteria for Evaluating AAA Protocols for Network
Access
Platforms Supported OmniSwitch 9000E, 6850E, 6855, 6400
Maximum number of authentication 4 (not including any backup servers)
servers in single authority mode
Maximum number of authentication 4 per VLAN (not including any backup servers)
servers in multiple authority mode
Maximum number of servers per 4 (not including any backup servers)
Authenticated Switch Access type
CLI Command Prefix Recognition The aaa radius-server, aaa tacacs+-server, and aaa ldap-server
commands support prefix recognition. See the “Using the CLI”
chapter in the OmniSwitch AOS Release 6 Switch Management
Guide for more information.
page 42-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers Server Defaults
Server Defaults
The defaults for authentication server configuration on the switch are listed in the tables in the next
sections.
* The port defaults are based on the older RADIUS standards; some servers are set up with port numbers
based on the newer standards (ports 1812 and 1813, respectively).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-3
Quick Steps For Configuring Authentication Servers Managing Authentication Servers
2 Use the aaa radius-server, aaa tacacs+-server, and/or the aaa ldap-server command to configure the
authentication server(s). For example:
-> aaa radius-server rad1 host 10.10.2.1 10.10.3.5 key amadeus
-> aaa tacacs+-server tac3 host 10.10.4.2 key otna timeout 10
-> aaa ldap-server ldap2 host 10.10.3.4 dn cn=manager password tpub base c=us
Note. (Optional) Verify the server configuration by entering the show aaa server command. For example:
-> show aaa server
Server name = rad1
Server type = RADIUS,
IP Address 1 = 10.10.2.1,
IP Address 2 = 10.10.3.5
Retry number = 3,
Timeout (in sec) = 2,
Authentication port = 1645,
Accounting port = 1646
Server name = ldap2
Server type = LDAP,
IP Address 1 = 10.10.3.4,
Port = 389,
Domain name = cn=manager,
Search base = c=us,
Retry number = 3,
Timeout (in sec) = 2,
Server name = Tacacs1
ServerIp = 1.1.1.1
ServerPort = 49
Encryption = MD5
Timeout = 5 seconds
Status = UP
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
3 If you are using ACE/Server, there is no required switch configuration; however, you must FTP the
sdconf.rec file from the server to the /network directory of the switch.
4 Configure authentication on the switch. This step is described in other chapters. For a quick overview
of using the configured authentication servers with Authenticated VLANs, see “AVLAN Configuration
Overview” on page 44-4. For a quick overview of using the configured authentication servers with
Authenticated Switch Access, see the OmniSwitch AOS Release 6 Switch Management Guide.
page 42-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers Server Overview
Server Overview
Authentication servers are sometimes referred to as AAA servers (authentication, authorization, and
accounting). These servers are used for storing information about users who want to manage the switch
(Authenticated Switch Access) and users who need access to a particular VLAN or VLANs
(Authenticated VLANs).
RADIUS, TACACS +, or LDAP servers can be used for Authenticated Switch Access and/or
Authenticated VLANs. Another type of server, ACE/Server from SecurID, can be used for authenticated
switch access only; the ACE/Server is an authentication-only server (no authorization or accounting).
Only RADIUS servers are supported for 802.1X Port-based Network Access Control.
The following table describes how each type of server can be used with the switch:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-5
Server Overview Managing Authentication Servers
A RADIUS server supporting the challenge and response mechanism as defined in RADIUS RFC 2865
can access an ACE/Server for authentication purposes. The ACE/Server is then used for user authentica-
tion, and the RADIUS server is used for user authorization.
privileges
and receives login and privi- for login information, and
lege information about the OmniSwitch checks the switch for privi- OmniSwitch
user. lege information.
Authenticated VLANs
For authenticated VLANs, authentication servers contain a database of user names and passwords, chal-
lenges/responses, and other authentication criteria such as time-of-day access. The Authenticated VLAN
attribute is required on servers set up in multiple authority mode.
Servers can be configured using one of two different modes, single authority mode or multiple authority
mode. The mode specifies how the servers are set up for authentication: single authority mode uses a
single list (an authentication server and any backups) to poll with authentication requests. Multiple author-
ity mode uses multiple lists, one list for each authenticated VLAN. For more information about authority
modes and Authenticated VLANs, see Chapter 44, “Configuring Authenticated VLANs.”
OmniSwitch
page 42-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers Server Overview
Authentication
Authenticator PAE
Server
Supplicant
authentication
login request request
authorization
PC OmniSwitch granted
RADIUS server
For more information about configuring 802.1X ports on the switch, see Chapter 41, “Configuring
802.1X.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-7
ACE/Server Managing Authentication Servers
ACE/Server
An external ACE/Server can be used for authenticated switch access. It cannot be used for Layer 2 authen-
tication or for policy management. Attributes are not supported on ACE/Servers. These values must be
configured on the switch through the user commands. See the “Switch Security” chapter of the
OmniSwitch AOS Release 6 Switch Management Guide for more information about setting up the local
user database.
Since an ACE/Server does not store or send user privilege information to the switch, user privileges for
Secur/ID logins are determined by the switch. When a user attempts to log into the switch, the user ID and
password are sent to the ACE/Server. The server determines whether the login is valid. If the login is
valid, the user privileges must be determined. The switch checks its user database for the user privileges. If
the user is not in the database, the switch uses the default privilege, which is determined by the default
user account. For information about the default user account, see the “Switch Security” chapter of the
OmniSwitch AOS Release 6 Switch Management Guide.
There are no server-specific parameters that must be configured for the switch to communicate with an
attached ACE/Server; however, you must FTP the sdconf.rec file from the server to the /network
directory of the switch. This file is required so that the switch knows the IP address of the ACE/Server.
For information about loading files onto the switch, see the OmniSwitch AOS Release 6 Switch Manage-
ment Guide.
The ACE client in the switch is version 4.1; it does not support the replicating and locking feature of ACE
5.0, but it can be used with an ACE 5.0 server if a legacy configuration file is loaded on the server. The
legacy configuration must specify authentication to two specific servers (master and slave). See the RSA
Security ACE/Server documentation for more information.
To display information about any servers configured for authentication, use the show aaa server
command. For more information about the output for this command, see the OmniSwitch AOS Release 6
CLI Reference Guide.
Also, you can need to clear the ACE/Server secret occasionally because of misconfiguration or required
changes in configuration. Clearing the secret is described in the next section.
When you clear the secret on the switch, the secret must also be cleared on the ACE/Server as described
by the RSA Security ACE/Server documentation.
page 42-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers RADIUS Servers
RADIUS Servers
RADIUS is a standard authentication and accounting protocol defined in RFC 2865 and RFC 2866. A
built-in RADIUS client is available in the switch. A RADIUS server that supports Vendor Specific
Attributes (VSAs) is required. The Alcatel-Lucent attributes can include VLAN information, time-of-day,
or slot/port restrictions.
Standard Attributes
The following tables list RADIUS server attributes 1–39 and 60–63, their descriptions, and whether the
Alcatel-Lucent RADIUS client in the switch supports them. Attribute 26 is for vendor-specific informa-
tion and is discussed in “Vendor-Specific Attributes for RADIUS” on page 42-11. Attributes 40–59 are
used for RADIUS accounting servers and are listed in “RADIUS Accounting Server Attributes” on
page 42-13.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-9
RADIUS Servers Managing Authentication Servers
page 42-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers RADIUS Servers
The Alcatel-Lucent-Auth-Group attribute is used for Ethernet II only. If a different protocol, or more than
one protocol is required, use the Alcatel-Lucent-Auth-Group-Protocol attribute instead. For example:
Alcatel-Lucent-Auth-Group-Protocol 23: IP_E2 IP_SNAP
Alcatel-Lucent-Auth-Group-Protocol 24: IPX_E2
In this example, authenticated users on VLAN 23 can use Ethernet II or SNAP encapsulation. Authenti-
cated users on VLAN 24 can use IPX with Ethernet II.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-11
RADIUS Servers Managing Authentication Servers
2 On the RADIUS server, configure the functional privilege attributes with the bitmask values.
Note. For more information about configuring users on the switch, see the “Switch Security” chapter in
the OmniSwitch AOS Release 6 Switch Management Guide.
page 42-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers RADIUS Servers
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-13
RADIUS Servers Managing Authentication Servers
The following table lists the VSAs supported for RADIUS accounting servers. The attributes in the
radius.ini file can be modified if necessary.
page 42-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers RADIUS Servers
For management sessions (FTP, telnet, HTTP, console, HTTPS, SSH, SNMP):
• When accounting is enabled, accounting session ID is generated with the combination of virtual MAC
address and time stamp (time stamp is based on the user name and the session number) and passed to
the RADIUS server.
• When accounting is disabled, virtual MAC address is generated as the accounting session ID.
Note.
- Unique Radius Accounting Session ID is not supported for local accounting.
- Accounting server must be configured as RADIUS server. This feature is not supported when the
accounting server is configured as LDAP server, TACACS+ server, ACE server.
To enable RADIUS accounting session ID, enter the aaa accounting session-id command at the CLI
prompt as shown:
-> aaa accounting session-id enable
For example, If MAC address is 00:00:00:00:00:01, then session ID will be 000000000001-132434 where
132434 is time stamp for supplicant or non-supplicant user. For management sessions (FTP, telnet, HTTP,
console, HTTPS, SSH), the session ID will be Virtual_mac_address-TimeStamp.
To disable RADIUS accounting session ID, use the disable option as shown:
-> aaa accounting session-id disable
For example, If MAC address is 00:00:00:00:00:01, then session ID will be 000000000001. For manage-
ment sessions (FTP, telnet, HTTP, console, HTTPS, SSH), the session ID will be Virtual_mac_address.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-15
RADIUS Servers Managing Authentication Servers
When creating a new server, at least one host name or IP address (specified by the host keyword) is
required as well as the shared secret (specified by the key keyword).
In this example, the server name is rad1, the host address is 10.10.2.1, the backup address is 10.10.3.5,
and the shared secret is amadeus. Note that the shared secret must be configured exactly the same as on
the server.
-> aaa radius-server rad1 host 10.10.2.1 10.10.3.5 key amadeus
To modify a RADIUS server, enter the server name and the desired parameter to be modified.
-> aaa radius-server rad1 key mozart
If you are modifying the server and have just entered the aaa radius-server command to create or modify
the server, you can use command prefix recognition. For example:
-> aaa radius-server rad1 retransmit 5
-> timeout 5
For information about server defaults, see “Server Defaults” on page 42-3.
To remove a RADIUS server, use the no form of the command:
-> no aaa radius-server rad1
page 42-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers RADIUS Servers
• RADIUS test tool verifies the authentication or accounting process connectivity with the RADIUS
server.
• The authentication-request or accounting-request is sent multiple times. The test stops when a response
is received from the server or when all requests are timed out. OmniSwitch allows two IP addresses to
be configured for one RADIUS server name. Since the server can be configured with two host
addresses, the requests are sent first to the first address. When all requests to the first address time out,
the requests are sent to the second address.
Note. The switch must have the following RADIUS server configuration before starting the test tool:
RADIUS server name, acct-port, auth-port, secret key, retransmit count, and timeout.
Supports multiple sessions (console, telnet, SSH) to test multiple RADIUS servers.
The CLI of the user session (console, telnet, SSH) goes in the blocking state when the test is started. In the
blocking state, no other command (CLI) is accepted. The blocking state of the CLI prompt of the switch
can be terminated by pressing any key.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-17
TACACS+ Server Managing Authentication Servers
TACACS+ Server
Terminal Access Controller Access Control System (TACACS+) is a standard authentication,
authorization, and accounting protocol defined in RFC 1321 that employs TCP for reliable transport. A
built-in TACACS+ client is available in the switch. A TACACS+ server allows access control for routers,
network access servers, and other networked devices through one or more centralized servers. The
protocol also allows separate authentication, authorization, and accounting services. The TACACS+
protocol allows clients to use any authentication mechanism by allowing arbitrary length and content
authentication exchanges.
The user can configure multiple TACACS+ servers through TACACS+ client. When the primary server
fails, the client tries the subsequent servers. Multiple server configurations are applicable only for backup
and not for server chaining.
In the TACACS+ protocol, the client queries the TACACS+ server by sending TACACS+ requests. The
server responds with reply packets indicating the status of the request.
• Authentication. TACACS+ protocol provides authentication between the client and the server. It also
ensures confidentiality because all the exchanges are encrypted. The protocol supports fixed
passwords, one-time passwords, and challenge-response queries. Authentication is not a mandatory
feature, and it can be enabled without authorization and accounting. During authentication if a user is
not found on the primary TACACS+ server, the authentication fails. The client does not try to
authenticate with the other servers in a multiple server configuration. The authorization is performed if
the authentication succeeds.
• Authorization. Enabling authorization determines if the user has the authority to execute a specified
command. TACACS+ authorization cannot be enabled independently. The TACACS+ authorization is
enabled automatically when the TACACS+ authentication is enabled.
• Accounting. The process of recording what the user is attempting to do or what the user has done is
Accounting. The TACACS+ accounting must be enabled on the switches for accounting to succeed.
Accounting can be enabled irrespective of authentication and authorization. TACACS+ supports three
types of accounting:
Start Records—Indicate the service is about to begin.
Stop Records—Indicates the services has just terminated.
Update Records—Indicates the services are still being performed.
page 42-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers TACACS+ Server
• Authentication and Authorization are combined together and cannot be performed independently.
• Per command authorization for TACACS is supported. TACACs command authorization can be
enabled or disabled.
• Only inbound ASCII logins are supported.
When creating a new server, at least one host name or IP address (specified by the host keyword) is
required as well as the shared secret (specified by the key keyword).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-19
TACACS+ Server Managing Authentication Servers
Usage Example
In the following example, the server name is tac1, the host address is 10.10.5.2, the backup address is
10.10.5.5, and the shared secret is otna.
Note that the shared secret must be configured exactly the same as on the server.
-> aaa tacacs+-server tac1 host 10.10.5.2 10.10.5.5 key otna
Use the aaa tacacs command authorization to enable TACACs command authorization by changing the
text sent back to the TACACS+ server.
-> aaa tacacs command authorization enable
In this example, the server name is tac1, the host address is 10.10.5.2, the backup address is 10.10.5.5, and
the shared secret is otna. Note that the shared secret must be configured exactly the same as on the server.
-> aaa tacacs+-server tac1 host 10.10.5.2 10.10.5.5 key otna
To modify a TACACS+ server, enter the server name and the desired parameter to be modified.
-> aaa tacacs+-server tac1 key tnemelc
If you are modifying the server and have just entered the aaa tacacs+-server command to create or
modify the server, you can use command prefix recognition. For example:
-> aaa tacacs+-server tac1 timeout 5
For information about server defaults, see “Server Defaults” on page 42-3.
To remove a TACACS+ server, use the no form of the command:
-> no aaa tacacs+-server tac1
page 42-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers LDAP Servers
LDAP Servers
Lightweight Directory Access Protocol (LDAP) is a standard directory server protocol. The LDAP client
in the switch is based on several RFCs: 1798, 2247, 2251, 2252, 2253, 2254, 2255, and 2256. The proto-
col was developed as a way to use directory services over TCP/IP and to simplify the directory access
protocol (DAP) defined as part of the Open Systems Interconnection (OSI) effort. Originally it was a
front-end for X.500 DAP.
The protocol synchronizes and governs the communications between the LDAP client and the LDAP
server. The protocol also dictates how its databases of information, which are normally stored in hierarchi-
cal form, are searched, from the root directory down to distinct entries.
In addition, LDAP has its own format that permits LDAP-enabled Web browsers to perform directory
searches over TCP/IP.
2 Copy the relevant schema LDIF files from the Alcatel-Lucent software CD to the configuration direc-
tory on the server. (Each server type has a command line tool or a GUI tool for importing LDIF files.)
Database LDIF files can also be copied and used as templates. The schema files and the database files are
specific to the server type. The files available on the Alcatel-Lucent software CD include the following:
aaa_schema.microsoft.ldif
aaa_schema.netscape.ldif
aaa_schema.novell.ldif
aaa_schema.openldap.schema
aaa_schema.sun.ldif
aaa_database.microsoft.ldif
aaa_database.netscape.ldif
aaa_database.novell.ldif
aaa_database.openldap.ldif
aaa_database.sun.ldif
3 After the server files have been imported, restart the server.
Information in the server files must match information configured on the switch through the
aaa ldap-server command. For example, the port number configured on the server must be the same as
the port number configured on the switch. See “Configuring the LDAP Authentication Client” on
page 42-32 for information about using this command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-21
LDAP Servers Managing Authentication Servers
entries definition
dn: <distinguished name> Defines the DN (required).
objectClass: top Defines top object class (at least one is required). Object
class defines the list of attributes required and allowed in
directory server entries.
objectClass: organizationalUnit Specifies that organizational unit must be part of the object
class.
ou: <organizationalUnit name> Defines the organizational unit name.
<list of attritbutes> Defines the list of optional entry attributes.
Common Entries
The most common LDIF entries describe people in companies and organizations. The structure for such an
entry might look like the following:
dn: <distinguished name>
objectClass: top
objectClass: person
objectClass: organizational Person
cn: <common name>
sn: <surname>
<list of optional attributes>
page 42-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers LDAP Servers
This is how the entry would appear with actual data in it.
dn: uid=yname, ou=people, o=yourcompany
objectClass: top
objectClass: person
objectClass: organizational Person
cn: your name
sn: last name
givenname: first name
uid: yname
ou: people
description:
<list of optional attributes>
...
Directory Entries
Directory entries are used to store data in directory servers. LDAP–enabled directory entries contain infor-
mation about an object (person, place, or thing) in the form of a Distinguished Name (DN) that must be
created in compliance with the LDAP protocol naming conventions.
Distinguished names are constructed from Relative Distinguished Names (RDNs), related entries that
share no more than one attribute value with a DN. RDNs are the components of DNs, and DNs are string
representations of entry names in directory servers.
Distinguished names typically consist of descriptive information about the entries they name, and
frequently include the full names of individuals in a network, their email addresses, TCP/IP addresses,
with related attributes such as a department name, used to further distinguish the DN. Entries include one
or more object classes, and often a number of attributes that are defined by values.
Object classes define all required and optional attributes (a set of object classes is referred to as a
“schema”). As a minimum, every entry must include the DN and one defined object class, like the name of
an organization. Attributes required by a particular object class must also be defined. Some commonly
used attributes that comprise a DN include the following:
Country (c), State or Province (st), Locality (l),
Organization (o), Organization Unit (ou),
and Common Name (cn)
Although each attribute would necessarily have its own values, the attribute syntax determines what kind
of values are allowed for a particular attribute, e.g., (c=US), where country is the attribute and US is the
value. Extra consideration for attribute language codes is necessary if entries are made in more than one
language.
Entries are usually based on physical locations and established policies in a Directory Information Tree
(DIT); the DN locates an entry in the hierarchy of the tree. Alias entries pointing to other entries can also
be used to circumvent the hierarchy during searches for entries.
Once a directory is set up, DN attributes must thereafter be specified in the same order to keep the
directory paths consistent. DN attributes are separated by commas as shown in this example:
cn=your name, ou=your function, o= your company, c=US
As there are other conventions used, please refer to the appropriate RFC specification for further details.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-23
LDAP Servers Managing Authentication Servers
In addition to managing attributes in directory entries, LDAP makes the descriptive information stored in
the entries accessible to other applications. The general structure of entries in a directory tree is shown in
the following illustration. It also includes example entries at various branches in the tree.
ROOT
dn=c=US
c=Canada c=US
dn=o=your company,c=US
Directory Searches
DNs are always the starting point for searches unless indicated otherwise in the directory schema.
Searches involve the use of various criteria including scopes and filters which must be predefined, and
utility routines, such as Sort. Searches must be limited in scope to specific durations and areas of the direc-
tory. Some other parameters used to control LDAP searches include the size of the search and whether to
include attributes associated with name searches.
Base objects and scopes are specified in the searches, and indicate where to search in the directory. Filters
are used to specify entries to select in a given scope. The filters are used to test the existence of object
class attributes, and enable LDAP to emulate a “read” of entry listings during the searches. All search pref-
erences are implemented by means of a filter in the search. Filtered searches are based on some compo-
nent of the DN.
Directory Modifications
Modifications to directory entries contain changes to DN entry attribute values, and are submitted to the
server by an LDAP client application. The LDAP-enabled directory server uses the DNs to find the entries
to either add or modify their attribute values.
Attributes are automatically created for requests to add values if the attributes are not already contained in
the entries.
page 42-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers LDAP Servers
All attributes are automatically deleted when requests to delete the last value of an attribute are submitted.
Attributes can also be deleted by specifying delete value operations without attaching any values.
Modified attribute values are replaced with other given values by submitting replace requests to the server,
which then translates and performs the requests.
components description
<ldap> Specifies TCP/IP connection for LDAP protocol. (The <ldaps>
prefix specifies SSL connection for LDAP protocol.)
<hostname> Host name of directory server or computer, or its IP address (in dot-
ted decimal format).
<port> TCP/IP port number for directory server. If using TCP/IP and
default port number (389), port need not be specified in the URL.
SSL port number for directory server (default is 636).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-25
LDAP Servers Managing Authentication Servers
components description
<base_dn> DN of directory entry where search is initiated.
<attributes> Attributes to be returned for entry search results. All attributes are
returned if search attributes are not specified.
<scope> Different results are retrieved depending on the scopes associated
with entry searches.
• Change Password
• Password History
• Account Lockout
• LDAP Error Messages (e.g., Invalid Username/Password, Server Data Error, etc.)
For instructions on installing LDAP-enabled directory servers, refer to the vendor-specific instructions.
page 42-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers LDAP Servers
Note. Server schema extensions must be configured before the aaa ldap-server command is configured.
attribute description
bop-asa-func-priv-read-1 Read privileges for the user.
bop-asa-func-priv-read-2 Read privileges for the user.
bop-asa-func-priv-write-1 Write privileges for the user.
bop-asa-func-priv-write-2 Write privileges for the user.
bop-asa-allowed-access Whether the user has access to configure the switch.
bop-asa-snmp-level-security Whether the user can have SNMP access, and the
type of SNMP protocol used.
bop-shakey A key computed from the user password with the
alp2key tool.
bop-md5key A key computed from the user password with the
alp2key tool.
allowedtime The periods of time the user is allowed to log into the
switch.
switchgroups The VLAN ID and protocol (IP_E2, IP_SNAP,
IPX_E2, IPX_NOV, IPX_LLC, IPX_SNAP).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-27
LDAP Servers Managing Authentication Servers
LDAP snmp-
Level Definition
level-security
no 1 No SNMP access allowed
no auth 2 SNMP access allowed without any SNMP authentication and
encryption
sha 3 SHA authentication algorithm needed for authenticating SNMP
md5 4 MD5 authentication algorithm needed for authenticating SNMP
sha+des 5 SHA authentication algorithm and DES encryption needed for
authentication SNMP
md5+des 6 MD5 authentication algorithm and DES encryption needed for
authentication SNMP
2 On the LDAP server, configure the functional privilege attributes with the bitmask values.
For more information about configuring users on the switch, see the Switch Security chapter of the
OmniSwitch AOS Release 6 Switch Management Guide.
1 Use the alp2key application to calculate the authentication key from the password of the user. The
switch automatically computes the authentication key, but for security reasons the key is never displayed
in the CLI.
2 Cut and paste the key to the relevant attribute on the server.
An example using the alp2key tool to compute the SHA and MD5 keys for mypassword:
ors40595{}128: alp2key mypassword
bop-shakey: 0xb1112e3472ae836ec2b4d3f453023b9853d9d07c
bop-md5key: 0xeb3ad6ba929441a0ff64083d021c07f1
ors40595{}129:
page 42-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers LDAP Servers
Note. The bop-shakey and bop-md5key values must be recomputed and copied to the server any time a
user password is changed.
AccountStartTime
User account start times are tracked in the AccountStartTime attribute of the user directory entry that
keeps the time stamp and accounting information of user log-ins. The following fields (separated by
carriage returns “|”) are contained in the Login log. Some fields are only used for Layer 2 Authentication.
Fields Included For Any Type of Authentication
• User account ID or username client entered to log-in: variable length digits.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-29
LDAP Servers Managing Authentication Servers
• Switch VLAN number client joins in multiple authority mode (0=single authority; 2=multiple author-
ity); variable-length digits.
• Switch slot number to which client connects: nn
AccountStopTime
User account stop times are tracked in the AccountStopTime attribute that keeps the time stamp and
accounting information of successful user log-outs. The same fields as above (separated by carriage
returns “|”) are contained in the Logout log. A different carriage return such as the # sign can be used in
some situations. Additionally, these fields are included but apply only to the Logout log:
Fields For Any Type of Authentication
• Log-out reason code, for example LOGOFF(18) or DISCONNECTED BY ADMIN(19)
• Number of frames received on the port during the client session from log-in to log-out: variable length
digits.
• Number of frames sent on the port during the client session from log-in to log-out: variable length
digits.
AccountFailTime
The AccountFailTime attribute log records the time stamp and accounting information of unsuccessful
user log-ins. The same fields in the Login Log—which are also part of the Logout log (separated by
carriage returns “|”)—are contained in the Login Fail log. A different carriage return such as the # sign can
be used in some situations. Additionally, these fields are included but apply only to the Login Fail log.
• User account ID or username client entered to log-in: variable length digits.
• Log-in fail error code: nn. For error code descriptions refer to the vendor-specific listing for the
specific directory server in use.
• Log-out reason code, for example PASSWORD EXPIRED(7) or AUTHENTICATION FAILURE(21).
page 42-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers LDAP Servers
Dynamic Logging
Dynamic logging can be performed by an LDAP-enabled directory server if an LDAP server is
configured first in the list of authentication servers configured through the aaa accounting mac or aaa
accounting session command. Any other servers configured are used for accounting (storing history
records) only. For example:
-> aaa accounting session ldap2 rad1 rad2
In this example, server ldap2 will be used for dynamic logging, and servers rad1 and rad2 will be used
for accounting.
If you specify a RADIUS server first, all of the servers specified are used for recording history records
(not logging). For example:
-> aaa accounting session rad1 ldap2
In this example, both the rad1 and ldap2 servers will be used for history only. Dynamic logging does not
take place on the LDAP server.
Dynamic entries are stored in the LDAP-enabled directory server database from the time the user
successfully logs in until the user logs out. The entries are removed when the user logs out.
• Entries are associated with the switch the user is logged into.
• Each dynamic entry contains information about the user connection. The related attribute in the server
is bop-loggedusers.
A specific object class called alcatelBopSwitchLogging contains three attributes as follows:
Attribute Description
bop-basemac MAC range, which uniquely identifies the switch.
bop-switchname Host name of the switch.
bop-loggedusers Current activity records for every user logged
onto the switch identified by bop-basemac.
Each switch that is connected to the LDAP-enabled directory server has a DN starting with
bop-basemac-xxxxx, ou=bop-logging. If the organizational unit ou=bop.logging exists somewhere in the
tree under searchbase, logging records are written on the server. See the server manufacturer
documentation for more information about setting up the server.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-31
LDAP Servers Managing Authentication Servers
For example:
“ASA 0 : CONSOLE IP 65.97.233.108 Jones”
Note. The server must be configured with the appropriate schema before the aaa ldap-server command is
configured.
The keywords for the aaa ldap-server command are listed here:
page 42-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers LDAP Servers
In this example, the switch will be able to communicate with an LDAP server (called ldap2) that has an IP
address of 10.10.3.4, a domain name of cn=manager, a password of tpub, and a searchbase of c=us.
These parameters must match the same parameters configured on the server itself.
Note. The distinguished name must be different from the searchbase name.
In this example, an existing LDAP server is modified with a different password, and then the timeout is
modified on a separate line. These two command lines are equivalent to:
-> aaa ldap-server ldap2 password my_pass timeout 4
The switch automatically sets the port number to 636 when SSL is enabled. The 636 port number is typi-
cally used on LDAP servers for SSL. The port number on the switch must match the port number config-
ured on the server. If the port number on the server is different from the default, use the aaa ldap-server
command with the port keyword to configure the port number. For example, if the server port number is
635, enter the following:
-> aaa ldap-server ldap2 port 635
The switch can now communicate with the server on port 635.
To remove SSL from the server, use no with the ssl keyword. For example:
-> aaa ldap-server ldap2 no ssl
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-33
Verifying the Authentication Server Configuration Managing Authentication Servers
aaa hic redundancy Displays information about a particular AAA server or AAA servers.
background-poll-interval
An example of the output for this command is given in “Quick Steps For Configuring Authentication
Servers” on page 42-4. For more information about the output of this command, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 42-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers Kerberos Snooping
Kerberos Snooping
Kerberos is a secure method for authenticating a request for a service in a computer network. The purpose
of Kerberos is to perform authentication between a client and a server.
Authentication is a mechanism whereby systems securely identify their users. Authentication provides a
network security mechanism that is designed to check the identity of the client. Kerberos uses shared key
cryptography in which both the user and the server have access to the same key, or password, used to posi-
tively identify the user.
The Kerberos protocol is designed to provide reliable authentication over open and insecure networks
where communication between the hosts belonging to it may be intercepted. It is a robust security proto-
col used to establish the identity of users and systems accessing services across the network, to protect
network protocols from tampering (integrity protection), and often to encrypt the data sent across the
protocol (privacy protection).
It is based on the concept of symmetric encryption keys, which means that the same key is used to encrypt
and decrypt a message. This is also referred to as a shared private key. It is a client-server based secret-key
network authentication method that uses a trusted Kerberos server to verify secure access to both services
and users. In Kerberos, this trusted server is called the key distribution center (KDC). The KDC issues
tickets to validate users and services. The password of the user is never stored in any form on the client
machine. The password is immediately discarded after being used.
Kerberos provides authentication only. It does not support user authorization.
Why Kerberos?
In the password based authentication, passwords sent across the network can be intercepted and subse-
quently used by eavesdroppers to impersonate the user. In addition to the security concern, password
based authentication is inconvenient as users do not want to enter a password each time they access a
network service.
With Kerberos authentication, user password is never sent across the network, encrypted or in plain text.
Secret keys are only passed across the network in encrypted form. A user has to only authenticate to the
Kerberos system once (using the principal and password). It provides single-sign-on, which lets a user log
in to a system and access multiple systems or applications for a longer period without the need to enter the
user name and password multiple times.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-35
Kerberos Snooping Managing Authentication Servers
Kerberos Snooping
Upon receiving the Kerberos Request Protocol Data Unit (PDU), Kerberos agent relays and snoops the
authentication frames coming from the client and creates or updates the user entry. On reception of the
request packet, KDC replies to the client by sending a response packet. Kerberos agent relays and snoops
the reply packet coming from KDC and updates the authentication state of the client (authentication pass
or fail). Once the client is authenticated successfully, and the user domain is classified under some QoS
policy, then that QoS policy is applied.
page 42-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers Kerberos Snooping
Note. Kerberos snooping is supported only on 802.1x ports with non-supplicant users. Before enabling
Kerberos snooping on the port, configure 8021.x port and a non-supplicant authentication configuration
using the following commands:
1. To configure the port as a mobile port and an 802.1X port, use the vlan port commands:
-> vlan port mobile 3/1
-> vlan port 3/1 802.1x enable
2. Configure a non-supplicant device classification policy for an 802.1x port. Ensure that non-supplicant
gets authenticated through RADIUS server.
-> 802.1x slot/port non-supplicant policy authentication [[pass] {group-mobility | user-network-
profile profile_name | vlan vid | default-vlan| block | captive-portal}] [[fail]
{group-mobility | user-network-profile profile_name | vlan vid | default-vlan | block |
captive-portal}]
For detailed information on the above command, see chapter, “Configuring 802.1X.”
To enable Kerberos snooping on an 802.1x port, use the 802.1x slot/port kerberos command at the CLI
prompt as shown:
-> 802.1x 3/1 kerberos enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-37
Kerberos Snooping Managing Authentication Servers
To disable MAC move globally on the switch, use disable option as shown:
-> aaa kerberos mac-move disable
page 42-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers Kerberos Snooping
Note. Server IP address cannot be configured as 0.0.0.0, and the octet value in the IP address cannot be
greater than 255 (for example, 1.256.2.3).
Use ‘udp-port’ keyword to configure both UDP and TCP protocol port number.
Use the no form of this command to delete the Kerberos server IP address. Only one server can be deleted
at a time.
-> no aaa kerberos ip-address 172.21.160.102
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-39
Kerberos Snooping Managing Authentication Servers
Use the no form of this command to the remove global classification QoS policy list from the switch.
-> no aaa kerberos authentication-pass policy-list-name
The following information provides more information on the policy list association with the Kerberos
users:
• If a domain level policy list is configured in switch and any user belongs to that domain gets authenti-
cated from the Kerberos server, then the domain level policy list is applied to the users over the global
policy list.
• If a user gets authenticated from the Kerberos server and the domain policy list is not configured on the
switch for the authenticated user domain, then the global policy list is applied to the users if the
globally policy list is configured on the switch.
• If a user gets authenticated from the Kerberos server and neither the domain policy list (for that user
domain) nor the global policy list is configured, then the user traffic is classified on the basis of already
applied non-supplicant authentication classification.
Use the no form of this command to remove the "per domain" classification policy for Kerberos users.
-> no aaa kerberos authentication-pass domain EXAMPLE.COM
page 42-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Managing Authentication Servers Kerberos Snooping
show aaa kerberos users Displays the learnt Kerberos users information.
To clear global and port level Kerberos statistics, use the clear aaa kerberos statistics and clear aaa
kerberos port statistics commands.
Note. “show configuration snapshot aaa” and “show 802.1x 1/13” displays the Kerberos configuration as
shown below.
-> show configuration snapshot aaa
! AAA :
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 42-41
Kerberos Snooping Managing Authentication Servers
direction = both,
operational directions = both,
port-control = auto,
quiet-period (seconds) = 60,
tx-period (seconds) = 30,
supp-timeout (seconds) = 30,
server-timeout (seconds) = 30,
max-req = 2,
re-authperiod (seconds) = 3600,
reauthentication = no
Supplicant polling retry count = 2
Captive Portal Session Limit (hrs) = 12
Captive Portal Login Retry Count = 3
Supplicant Bypass = enable
Supplicant Bypass allow-eap Branch = pass,
Captive Portal Inactivity Logout = disable
Kerberos Snooping = enabled
For more information about the output details that result from these commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 42-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
43 Configuring Access
Guardian
Access Guardian refers to the following Alcatel-Lucent security functions that work together to provide a
dynamic, proactive network security solution:
• Authentication and Classification—Access control is configured on 802.1X-enabled ports using
device classification policies. A policy can specify the use of one or more types of authentication
methods (802.1X, MAC-based, or Web-based Captive Portal) for the same port. For each type of
authentication, the policy also specifies the classification method (RADIUS, Group Mobility, default
VLAN, or block device access).
• Host Integrity Check (HIC)—An integrated solution for device integrity verification. This solution
consists of the InfoExpress CyberGatekeeper server, a permanent or web-based downloadable agent to
verify host compliance, and User Network Profiles (UNP). HIC is triggered when a UNP is applied to a
device and HIC is enabled for the UNP.
• User Network Profiles (UNP)—One of the configurable options of a device classification policy is to
classify a device with a UNP. When the policy applies the UNP to one or more devices, the UNP
determines the VLAN assignment for the device, whether or not HIC is required for the device, and if
any QoS access control list (ACL) policies are applied to the device.
• Virtual Network Profile (VNP) - Also referred to as the Universal Network Profile (UNP), it
provides a method for dynamically assigning network devices to VLAN domains. A profile consists of
configurable attributes that help to define a group of users or devices that have similar requirements for
access to network resources. A device sending traffic that matches such attributes is then assigned to a
VLAN associated with the UNP. The UNP may also specify a QoS policy list that is subsequently
applied to device traffic associated with the UNP VLAN. For more information on UNP commands,
see OmniSwitch AOS Release 6 CLI Reference Guide and for UNP configuration, see Chapter 40,
“Configuring Universal Network Profiles”.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-1
In This Chapter Configuring Access Guardian
In This Chapter
This chapter provides an overview of Access Guardian security features and describes how to configure
these features through the Command Line Interface (CLI). CLI commands are used in the configuration
examples; for more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Refer-
ence Guide.
The following information and procedures are included in this chapter:
• “Quick Steps for Configuring Access Guardian” on page 43-5
• “Access Guardian Overview” on page 43-12.
• “Interaction With Other Features” on page 43-22
• “Setting Up Port-Based Network Access Control” on page 43-23
• “Configuring Access Guardian Policies” on page 43-26
• “Configuring 802.1x Authentication Bypass” on page 43-34
• “Configuring Captive Portal Authentication” on page 43-36
• “Configuring Host Integrity Check” on page 43-47
• “Configuring User Network Profiles” on page 43-49
• “Verifying Access Guardian Users” on page 43-53
• “Verifying the Access Guardian Configuration” on page 43-56
For more information about configuring 802.1X on switch ports, see Chapter 37, “Configuring 802.1X.”.
page 43-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Access Guardian Specifications
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-3
Access Guardian Defaults Configuring Access Guardian
page 43-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Quick Steps for Configuring Access Guardian
1 To configure an Access Guardian policy that authenticates and classifies 802.1x users (supplicants),
use the 802.1x supplicant policy authentication command.
-> 802.1x 2/12 supplicant policy authentication pass group-mobility default-vlan
fail vlan 10 captive-portal
2 To configure an Access Guardian policy that authenticates and classifies non-802.1x users
(non-supplicants), use the 802.1x non-supplicant policy authentication command.
-> 802.1x 2/12 non-supplicant policy authentication pass group-mobility
default-vlan fail vlan 10 captive-portal
3 To configure an Access Guardian Captive Portal policy that classifies web-based clients, use the
802.1x captive-portal policy authentication command.
Note. This policy is triggered only when the Captive Portal option of a supplicant or non-supplicant policy
is applied.
-> 802.1x 2/12 captive-portal policy authentication pass vlan 100 block fail
vlan 10
4 To configure the length of a Captive Portal session, use the 802.1x captive-portal session-limit
command.
-> 802.1x 3/1 captive-portal session-limit 8
5 To configure the number of Captive Portal login attempts allowed before a device is classified as a
failed login, use the 802.1x captive-portal retry-count command.
-> 802.1x 3/1 captive-portal retry-count 5
6 To bypass authentication and restrict device classification of non-802.1x users to VLANs that are not
authenticated VLANs, use the 802.1x non-supplicant policy command.
-> 802.1x 3/10 non-supplicant policy vlan 43 block
7 To set the Access Guardian policy back to the default classification policy for an 802.1x port, use the
802.1x policy default command.
-> 802.1x 3/10 policy default
Note. Verify the Access Guardian configuration using the show 802.1x device classification policies
command:
-> show 802.1x device classification policies
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-5
Quick Steps for Configuring Access Guardian Configuring Access Guardian
To verify the Captive Portal configuration for an 802.1X-enabled port, use the 802.1x auth-server-down
command:
-> show 802.1x 1/13
direction = both,
operational directions = both,
port-control = auto,
quiet-period (seconds) = 60,
tx-period (seconds) = 30,
supp-timeout (seconds) = 30,
server-timeout (seconds) = 30,
max-req = 2,
re-authperiod (seconds) = 3600,
reauthentication = no
Supplicant polling retry count = 2
Captive Portal Session Limit (hrs) = 12
Captive Portal Login Retry Count = 3
To verify the global Captive Portal configuration for the switch, use the show 802.1x auth-server-down
command:
-> show 802.1x captive-portal configuration
page 43-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Quick Steps for Configuring Access Guardian
To display the number of non-802.1x users learned on the switch, use the show 802.1x non-supplicant
command:
-> show 802.1x non-supplicant
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-7
Quick Steps for Configuring Access Guardian Configuring Access Guardian
2 To enable the Host Integrity Check option for a UNP, use the aaa user-network-profile command
with the hic enable parameter.
-> aaa user-network-profile name guest_user vlan 500 hic enable
3 To associate a UNP with maximum ingress and egress bandwidth along with maximum default depth,
ues the aaa user-network-profile command with maximum-ingress-bandwidth and maximum-egress-
bandwidth, and maximum-default-depth parameters.
-> aaa user-network-profile name "profile1" vlan 50 maximum-ingress-bandwidth
1024 maximum-egress-bandwidth 256 maximum-default-depth 128
4 To assign a list of QoS policies to a UNP, use the aaa user-network-profile command with the
policy-list-name parameter. Note that the policy list specified must already exist in the switch
configuration.
-> aaa user-network-profile name guest_user vlan 500 policy-list name temp_rules
5 To configure an Access Guardian device classification policy to apply a user profile, use the 802.1x
supplicant policy authentication, 802.1x non-supplicant policy authentication, 802.1x captive-portal
policy authentication, or 802.1x non-supplicant policy command with the user-network-profile
parameter. For example:
-> 802.1x 1/10 supplicant policy authentication user-network-profile guest_user
Note. Verify the UNP configuration using the show aaa user-network-profile command:
-> show aaa user-network-profile
To verify the UNP configuration for a device classification policy, use the show 802.1x device classifica-
tion policies command:
page 43-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Quick Steps for Configuring Access Guardian
authentication:
pass: default-vlan (default)
fail: block (default)
Device classification policies on 802.1x port 2/48
Supplicant:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
See “Configuring User Network Profiles” on page 43-49 for more information about configuring profiles.
2 To configure a UNP mobile rule for a range of MAC addresses, use the aaa classification-rule mac-
address-range command.
-> aaa classification-rule mac-address-range 00:00:2a:33:44:01 00:00:2a:33:44:10
user-network-profile name accounting
3 To configure an IP address UNP mobile rule, use the aaa classification-rule ip-address command.
4 To configure an Access Guardian Group Mobility device classification policy to authenticate and clas-
sify devices using UNP mobile rules, use the 802.1x supplicant policy authentication, 802.1x non-
supplicant policy authentication, 802.1x captive-portal policy authentication, or 802.1x non-suppli-
cant policy command with the group-mobility parameter. For example:
-> 802.1x 6/1 supplicant policy authentication pass group-mobility default-vlan
fail captive-portal
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-9
Quick Steps for Configuring Access Guardian Configuring Access Guardian
Note. Verify the UNP mobile rule configuration using the show aaa classification-rule command:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
See “Configuring User Network Profile Mobile Rules” on page 43-52 for more information.
2 Enable the HIC feature for the switch using the aaa hic command.
3 Enable the HIC option for the UNP using the aaa user-network-profile command.
4 Optional. Configure a server name and IP address entry for the HIC exception list using the aaa hic
redundancy background-poll-interval command.
-> aaa hic allowed-name rem_srv1 ip-address 10.1.1.1
5 Optional. Configure the URL for the web-agent download server using the aaa hic web-agent-url
command.
-> aaa hic web-agent-url http://10.10.10.10:2146
page 43-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Quick Steps for Configuring Access Guardian
6 Optional. Configure the proxy port number for the host device using the aaa hic custom-proxy-port
command.
-> aaa hic custom-proxy-port 8878
Note. Verify the HIC configuration for the switch using the show aaa hic command:
-> show aaa hic
HIC Global Status: Enabled
HIC Allowed 1: rem-serv1
HIC Web Agent URL: http://100.100.100.100:8080/CGAgentLauncher.htm
HIC Proxy Port: 8383
HIC Reconnect-timer: 16
HIC Server-fail-mode: Passthrough
To verify the HIC InfoSys CyberGatekeeper server information configured for the switch, use the show
aaa hic server command:
-> show aaa hic server
Server Server Server Server
Name IP Address UDP Port Role Connection Status
----------------+-----------------+---------+---------+------------+---------
hic-srv1 10.2.2.2 11707 Primary Active Down
hic 2.2.2.1 11707 Backup Inactive Down
To display the HIC status for host devices, use the show aaa hic host command:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
See “Configuring Host Integrity Check” on page 43-47 for more detailed configuration information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-11
Access Guardian Overview Configuring Access Guardian
Quarantine Manager
Traffic Anomaly Detection
Qua
(Reactive) ran tine
Intr
usio
n De
tecti
on
Role
Access Guardian -Bas
(Proactive)
ed A
cces
s
Host
Inte User Network Profiles (UNP)
grity
QoS ACL Lists
Auth
entic
ation
Host Integrity Check (HIC) using
InfoExpress CyberGatekeeper
page 43-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Access Guardian Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-13
Access Guardian Overview Configuring Access Guardian
Captive portal pass-through is performed globally on a bridge OmniSwitch that does not have an IP
address to reach the AAA server during RADIUS Server configuration. No 802.1x configurations must be
present on the bridge ports when captive-portal pass-through is configured. For enabling or disabling
captive portal passthrough globally on a switch, use the captive-portal pass-through command with
enable or disable options. When enable option is configured, the packets with Captive Portal IP address as
destination are forwarded to the Layer 3 switch.
page 43-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Access Guardian Overview
1 Captive Portal—redirects the user device to a Web-based login screen and requires the user to enter
credentials to gain network access. This option is used only with the 802.1X, MAC, or Non-supplicant
policies. The Captive Portal policy is applied after Web-based authentication is attempted, so this option is
not valid for Captive Portal policies. See “Configuring the Captive Portal Policy” on page 43-32.
2 Group Mobility—uses Group Mobility VLAN rules and User Network Profile (UNP) mobile rules to
determine the VLAN assignment for a device. UNP rules apply a profile to any device that matches the
UNP rule criteria. Note that UNP mobile rules take precedence over VLAN rules. See “What are UNP
Mobile Rules?” on page 43-20.
4 Default VLAN—assigns a device to the default VLAN for the 802.1x port.
6 User Network Profile (UNP)—applies a pre-configured profile to a user device. The profile specifies
a required VLAN ID, the optional Host Integrity Check (HIC) status, and an optional QoS policy list
name. See “User Network Profiles (Role-Based Access)” on page 43-19.
It is possible to configure one or more of the classification options for a single policy. The order in which
the policy options are applied to a device is determined by the order in which the option was configured.
For example, if a MAC-based authentication policy is configured to use the Group Mobility and default
VLAN options, then the policy actions are applied in the following sequence:
1 MAC-based authentication is performed.
2 If authentication was successful and provided a VLAN ID, the client is assigned to that VLAN and no
further policy options are applied.
3 If a VLAN ID was not provided or authentication failed, then Group Mobility applies VLAN rules.
4 If there are no Group Mobility VLAN rules that match the client traffic, then the device is learned in
the default VLAN for the 802.1X port.
See “Configuring Access Guardian Policies” on page 43-26 for more information about how to use and
configure policies.
Note. It is possible to bypass 802.1x authentication and classify supplicants connected to an 802.1x port as
non-supplicants (see the “Configuring the Number of Polling Retries” section in
Chapter 37, “Configuring 802.1X,” for more information). When bypassing, all devices (including
supplicants) are then classified as non-supplicants. As a result, non-supplicant policies that use
MAC-based authentication are now applicable to supplicant devices, but not on non-supplicant devices.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-15
Access Guardian Overview Configuring Access Guardian
The following diagram illustrates the conceptual flow of Access Guardian policies, including the separate
Web-based authentication branch provided by Captive Portal:
As shown in the Access Guardian Policy Flow diagram, Captive Portal is an optional policy that is
available for both supplicant and non-supplicant policies. When successful RADIUS authentication does
not return a VLAN ID or a device fails authentication, policies configured for the port are examined. If the
Captive Portal policy is configured for the port and invoked by device traffic, then the user must
authenticate through the switch through standard web browser software.
For more information, see “Configuring Access Guardian Policies” on page 43-26 and “Configuring
Captive Portal Authentication” on page 43-36.
page 43-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Access Guardian Overview
In addition to configuring the UNP, the HIC feature requires the configuration of global HIC parameters
to enable the feature for the switch, identify the HIC server, and specify a server exception list. The HIC
exception list identifies servers, such as the Web-based agent download server or a remediation server,
that the host device is allowed access to during the verification process.
The InfoExpress compliance agents are used by the host device to interact with the CyberGatekeeper
server. The desktop agent is installed on the device. If the desktop agent is not installed, then the switch
redirects the user Web browser to a download server to obtain the Web-based agent.
The CyberGatekeeper server is configured with information that defines the criteria a host device must
have installed to achieve compliance with network access requirements. The InfoExpress Policy Manager
is used to define such criteria. Additional servers are configured to provide the Web-based agent and any
remediation functions required to update the end user device.
Note. The HIC feature is not available unless the feature is enabled for the switch. This is true even if HIC
servers are configured for the switch or the HIC attribute is enabled for a profile. See “Configuring Host
Integrity Check” on page 43-47 for more information.
How it Works
The Access Guardian HIC process is triggered when a device initially connects to an 802.1X port and a
device classification policy for that port applies a HIC-enabled UNP to the device. The host device is then
granted limited access to the network; only DHCP, DNS, ARP, and any IP traffic between the host and
any HIC-related servers is allowed. During this time, the host invokes the HIC compliance agent (desktop
or Web-based) to complete the verification process.
If the HIC server determines the host is compliant, the host is then granted the appropriate access to the
network. If the HIC server determines the host is not compliant, the host network access remains restricted
to the HIC-related servers and any other remediation servers that can provide the host with the necessary
updates to achieve compliance.
This integrated solution to provide device integrity verification is also "always-on". The HIC agent
continues to check the integrity of the host device as long as the device remains connected to the switch. If
the compliance agent detects a violation of the security policies or the agent itself is disabled or
terminated, the HIC server notifies the switch to limit the network access for that device.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-17
Access Guardian Overview Configuring Access Guardian
Note: The keepalive steps above are the same for the backup server if it becomes the ACTIVE server.
Note: The random reconnect value prevents a HIC server from being overwhelmed by HIC requests from
multiple switches simultaneously once the server becomes ACTIVE again.
• Once primary server is ACTIVE again, the backup server becomes inactive.
page 43-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Access Guardian Overview
When the user profile save global profile command is applied, the current settings like prompts and
aliases for the session are saved as the global profile. The global profile is activated when any user logs in
to the VLAN again.
A UNP is a configurable option of Access Guardian device classification policies. A policy can also
include 802.1X, MAC, or Captive Portal (Web-based) authentication to provide more granular control of
the profile.
A device classification policy offers the following two methods for deploying a UNP:
• The UNP option is configured to specify the name of a profile. When the device classification policy is
applied to an end user device, the profile attributes are applied to that device.
The Group Mobility option is configured for the policy. When this option is triggered, Group Mobility
examines any VLAN rules or UNP mobile rules to determine if the device traffic matches any such rules.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-19
Access Guardian Overview Configuring Access Guardian
If there is a match with a UNP rule, the profile specified in that rule is applied to the device. Note that
UNP rules take precedence over VLAN rules.
User profiles and UNP mobile rules must already exist in the switch configuration before they are
deployed through Access Guardian device classification policies. See “Configuring User Network
Profiles” on page 43-49 and “What are UNP Mobile Rules?” on page 43-20 for more information.
page 43-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Access Guardian Overview
Dynamic UNP
The OmniSwitch can associate a client MAC address with a UNP based on an authentication result, such
as 802.1X or MAC authentication, or based on classification rules, such as IP or MAC ranges.
Dynamic UNP extends this capability by enhancing the protocol between the HIC server and the
OmniSwitch allowing the HIC server to return the UNP that a user must be associated with. This allows
users to be classified into UNPs based on Active Directory group memberships, machine specific parame-
ters or any other parameters the HIC agent supports. Once classified into a UNP, specific access rights can
be enforced by applying the policy list associated with the UNP to the user.
CMD-RESET Keyword
In the case of HIC failure if a UNP is returned with a special keyword of CMD-RESET, the associated
MAC address is flushed from the switch and forced to re-initiate the 802.1x classification.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-21
Interaction With Other Features Configuring Access Guardian
page 43-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Setting Up Port-Based Network Access Control
In this example, the rad1 server is used for authenticating 802.1X ports. If rad1 becomes
unavailable, the switch uses rad2 for 802.1X authentication. When this command is used, 802.1X is
automatically enabled on the switch.
Note. The same RADIUS servers can be used for 802.1x (supplicant) and MAC (non-supplicant)
authentication. Using different servers for each type of authentication is allowed but not required.
For more information about using MAC authentication and classifying non-supplicant devices, see
“Authentication and Classification” on page 43-13, “Configuring Access Guardian Policies” on
page 43-26, and “Configuring User Network Profiles” on page 43-49.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-23
Setting Up Port-Based Network Access Control Configuring Access Guardian
MAC accounting
Use the aaa accounting mac command to create an accounting server entry for the non-supplicant mac-
based authentication. This verifies if the radius server is configured as the authentication server for MAC.
The following example specifies the accounting server rad1 for the non-supplicant mac-based
authentication:
-> aaa accounting mac rad1 local
The 802.1x auth-server-down command is also used to enable or disable a policy. For example:
The authentication server down policy and re-authentication time period configuration applies to all
802.1x ports on the switch. To verify the authentication server down policy configuration, use the show
802.1x auth-server-down command.
Note. When device authentication fails due to an unreachable RADIUS server, an event message is sent to
the switch logging utility (swlog). See Chapter 51, “Using Switch Logging,” for more information.
The vlan port 802.1x command enables 802.1X on port 1 of slot 3. The port is set up with defaults listed
in “802.1X Defaults” of the Chapter 37, “Configuring 802.1X.”
To disable 802.1X on a port, use the disable option with vlan port 802.1x command. For more
information about vlan port commands, See Chapter 5, “Assigning Ports to VLANs.”.”
page 43-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Setting Up Port-Based Network Access Control
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-25
Configuring Access Guardian Policies Configuring Access Guardian
Note. If no policies are configured on an 802.1x port, access from non-supplicant devices is blocked and
the following default classification policy is applied to supplicant devices:
2 If authentication fails or successful authentication returns a VLAN ID that does not exist, the device is
blocked.
3 If authentication is successful and returns a VLAN ID that exists in the switch configuration, the
supplicant is assigned to that VLAN.
page 43-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring Access Guardian Policies
4 If authentication is successful but does not return a VLAN ID, Group Mobility checks if there are any
VLAN rules or User Network Profile mobile rules that classify the supplicant.
5 If Group Mobility classification fails, the supplicant is assigned to the default VLAN ID for the 802.1x
port.
If no policy keywords are specified with this command (for example, 802.1x 1/10 supplicant policy
authentication), then supplicants are blocked if 802.1x authentication fails or does not return a VLAN ID.
Note that the order in which parameters are configured determines the order in which they are applied. For
example, the following commands apply Group Mobility rules at different times during the classification
process:
-> 802.1x 2/12 supplicant policy authentication pass group-mobility vlan 10
block fail vlan 10 default-vlan
The first command in the supplicant policy example checks Group Mobility rules first then checks for
VLAN 10 next. The second command checks for VLAN 10 first then checks for Group Mobility rules.
Use the pass keyword to specify which options to apply when 802.1x authentication is successful but does
not return a VLAN ID. Use the fail keyword to specify which options to apply when 802.1x
authentication fails or returns a VLAN ID that does not exist. The pass keyword is implied and therefore
an optional keyword. If the fail keyword is not used, the default action is to block the device.
Note. When a policy option is configured as a fail condition, device classification is restricted to
assigning supplicant devices to VLANs that are not authenticated VLANs.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-27
Configuring Access Guardian Policies Configuring Access Guardian
page 43-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring Access Guardian Policies
The order in which parameters are configured determines the order in which they are applied. For
example, the following commands apply Group Mobility rules at different times during the classification
process:
-> 802.1x 2/12 non-supplicant policy authentication pass group-mobility vlan 10
block fail vlan 10 default-vlan
The first command in the non-supplicant policy example checks Group Mobility rules first then checks for
VLAN 10 next. The second command checks for VLAN 10 first then checks for Group Mobility rules.
Use the pass keyword to specify which options to apply when 802.1x authentication is successful but does
not return a VLAN ID. Use the fail keyword to specify which options to apply when 802.1x
authentication fails or returns a VLAN ID that does not exist. The pass keyword is implied and therefore
an optional keyword. If the fail keyword is not used, the default action is to block the device.
Use the pass keyword to specify which options to apply when MAC authentication is successful but does
not return a VLAN ID. Use the fail keyword to specify which options to apply when MAC authentication
fails. The pass keyword is implied and therefore an optional keyword. If the fail keyword is not used, the
default action is to block the device when authentication fails.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-29
Configuring Access Guardian Policies Configuring Access Guardian
Note. When a policy option is configured as a fail condition, device classification is restricted to assigning
supplicant devices to VLANs that are not authenticated VLANs.
To configure a non-supplicant policy that does not perform MAC authentication, use the
802.1x non-supplicant policy command. The following parameter keywords are available with this
command to specify one or more policies for classifying devices:
Note that this type of policy does not use 802.1x or MAC authentication. As a result, all of the available
policy keywords restrict the assignment of the non-supplicant device to only those VLANs that are not
authenticated VLANs. The pass and fail keywords are not used when configuring this type of policy.
page 43-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring Access Guardian Policies
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-31
Configuring Access Guardian Policies Configuring Access Guardian
page 43-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring Access Guardian Policies
the port if the device failed authentication. As a result, it is only necessary to change the policy if the
default pass and fail cases are not sufficient.
To change the Captive Portal policy configuration, use the 802.1x captive-portal policy authentication
command. The following keywords are available with this command to specify one or more policies for
classifying devices.
The first command in the captive-portal policy example checks Group Mobility rules first then checks
for VLAN 10 next. The second command checks for VLAN 10 first then checks for Group Mobility
rules.
• When a policy is specified as a policy to apply when authentication fails, device classification is
restricted to assigning non-supplicant devices to VLANs that are not authenticated VLANs.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-33
Configuring 802.1x Authentication Bypass Configuring Access Guardian
Configuration Guidelines
Consider the following guidelines before configuring 802.1x authentication bypass:
• The 802.1x bypass operation is only supported on 802.1x ports configured for auto access control
mode. See “Enabling 802.1X on Ports” on page 43-24 for more information about configuring the
access control mode.
• If a port has supplicants connected, and 802.1x bypass is enabled for that port, the supplicants are
automatically logged off to undergo authentication according to the enabled bypass configuration.
• When the 802.1x bypass configuration is modified or disabled, any non-supplicant devices are auto-
matically logged off the port. This will free up those devices to undergo the authentication specified by
the new bypass configuration.
• If re-authentication is configured for the 802.1x port and supplicant bypass is enabled, the MAC
authentication followed by 802.1x authentication is initially performed as configured. However, only
802.1x authentication is performed during the reauthentication process, so there is no recheck to see if
the MAC address of the user device is restricted.
page 43-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring 802.1x Authentication Bypass
• When successful MAC authentication returns a VLAN ID or User Network Profile (UNP) and the
802.1x bypass operation is configured to initiate 802.1x authentication when a device passes MAC
authentication, the device is not moved into that VLAN or UNP. Instead, the device is moved into the
VLAN or UNP returned by 802.1x authentication. If 802.1x authentication does not provide such
information, the device is moved based on the supplicant device classification policies for the port.
• When supplicant bypass is enabled after MAC authentication, till it completes the supplicant
authentication, the port will be in mac_authenticated_await8021x state.
• Configuring 802.1x supplicant bypass is not allowed on ports where the 802.1x supplicant polling retry
count is set to zero. Both operations are mutually exclusive on the same port.
• Using the 802.1x non-supplicant allow-eap command with the none parameter is similar to setting
the supplicant polling retry counter to zero (see “Configuring the Number of Polling Retries” section in
Chapter 34, “Configuring 802.1X,”). However, the functionality configured with each command
differs as follows:
> When the supplicant polling retry is set to zero, EAP frames are ignored. MAC authentication is
only triggered when a non-EAP frame is received, which is when the supplicant times out and is in
an open state.
> When the allow EAP is set to none, EAP frames are ignored but MAC authentication is triggered
when the first EAP frame is received and the supplicant is not in an open state.
The resulting Access Guardian authentication process for a device connected to 802.1x port 2/1 is as
follows for this example:
• MAC authentication is triggered when the first frame from the new user is received, whether it is an
EAP frame or not.
• EAP frames for this user are ignored until MAC authentication completes (RADIUS returns an
Access-Accept or a Access-Reject response).
• Once the initial MAC authentication passes (that is, Access-Accept), 802.1x authentication is bypassed
for this user and all EAP frames are ignored. The user is permanently authenticated through MAC
authentication and 802.1x is permanently bypassed.
• Once the initial MAC authentication fails (that is, Access-Reject), 802.1x authentication is allowed for
this user. The user is authenticated through 802.1x authentication. During this transition, the EAP
frames are allowed and the switch must force the supplicant to restart a fresh EAP session by sending a
multicast Request Identity EAPOL on the port. This is because the supplicant may have already sent an
EAPOL Start.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-35
Configuring Captive Portal Authentication Configuring Access Guardian
• Configure the homepage URL for the client browser. The Captive Portal authentication process
responds only to browser queries that contain the “www”, “http”, or “https” prefix in the URL. As a
result, it is necessary to configure the homepage URL for the browser with at least one of these three
prefixes.
• Configure a specific proxy server URL. Captive Portal looks for the word “proxy” to identify the
proxy server URL used by the client. If this URL does not contain the word “proxy”, use the 802.1x
captive-portal proxy-server-url command to specify the URL address to use.
• Configure an 802.1x device classification policy for Captive Portal authentication. A supplicant or
non-supplicant policy configured with Captive Portal as a pass or fail condition is required to invoke
Captive Portal authentication. For more information, see “Configuring Supplicant Policies” on
page 43-27 and “Configuring Non-supplicant Policies” on page 43-29.
• Configure a Captive Portal device classification policy. A separate Captive Portal policy is required
to classify devices when successful web-based authentication does not return a VLAN ID or
authentication fails. For more information, see “Configuring the Captive Portal Policy” on page 43-32.
• Configure the Captive Portal session time limit. This time limit determines the length of the Captive
Portal login session. When this time limit expires, the user is automatically logged out and network
access is blocked. For more information, see “Configuring Captive Portal Session Parameters” on
page 43-37.
• Configure the number of Captive Portal login attempts allowed. This number determines the
number of failed login attempts a user is allowed when initiating a Captive Portal session. For more
information, see “Configuring Captive Portal Session Parameters” on page 43-37.
page 43-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring Captive Portal Authentication
The 802.1x captive-portal retry-count command is used to configure the maximum number of times a
user can try to log in through the Captive Portal login web page. When this limit is reached without
achieving a successful login, the fail case of the Captive Portal device classification policy configured for
the 802.1x port is applied to the user device. The default login retry count is set to 3. To specify an
unlimited amount of login retries, specify 0 for this parameter value.
-> 802.1x 1/10 captive-portal retry-count 0
Use the 802.1x auth-server-down command to display the current values for the Captive Portal session
parameters. An example of this command is available in the “Quick Steps for Configuring Access Guard-
ian” on page 43-5.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-37
Configuring Captive Portal Authentication Configuring Access Guardian
Once the custom files are created with the images and information the file type requires, download the
files to the /flash/switch directory on the switch. When a Captive Portal session is initiated, the switch
checks to see if there are any files in this directory; if so, then the custom files are incorporated and
displayed by Captive Portal. If no files are found, the default Captive Portal Web page components are
used.
Consider the following guidelines when customizing Captive Portal Web page components:
• Filenames are case sensitive. When creating a custom file, ensure that the filename matches the
filename exactly as shown in the list of file types described.
• Create custom logo and background pages using the .gif, .jpg, or .png formats. Captive Portal checks
the flash/switch directory on the switch.for a .gif file, then a .jpg file, and finally a .png file.
Whichever file type Captive Portal encounters first is the file used to display the custom logo or
background.
• The .inc files, which are used to present customized welcome messages, are partial HTML files that
can include only text or text and other HTML tags, such as links. Note that .inc files are wrapped in a
paragraph HTML tag within the body of a Captive Portal default page.
The following is an example of a customized Captive Portal login page:
page 43-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Authenticating with Captive Portal
Note. Captive Portal does not require the configuration of IP interfaces, a UDP Relay agent, or an
external DHCP server to provide an IP address for the client device. A temporary IP address derived from
the Captive Portal subnet is assigned to the client for use during the authentication process. For more
information, see “Configuring Captive Portal Authentication” on page 43-36.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-39
Authenticating with Captive Portal Configuring Access Guardian
DHCP method
• When the browser is opened for the first time, it sends a DHCP INFORM to request option 252.
• Option 252 information is sent from the DHCP server specifying the URL of the proxy file. The proxy
file is returned. For example, the returned URL is "proxy-server.inc.alcatel.com/proxy_files/
your_proxy.pac". Only Windows supports this mode.
• When the Operating System fails to get the DHCP option 252, usually after 5-10seconds, the DNS
method is used.
For captive portal, OmniSwitch acts as the DHCP Server for the pre-authenticated users.The DHCP server
always returns option 252 in the DHCP ACK message. The URL specified in the option 252 is
"10.123.0.1/wpad.dat".
Note. The captive portal address can be changed from configuration. The URL always uses the current
captive portal address.
DNS method
• DNS queries are sent to find the proxy file, wpad.dat.
• The browser downloads the proxy file wpad.dat. All Operating Systems support this mode.
• The web browser can also be set with "automatic configuration script" with the proxy file URL
configured on the browser. This mode is similar to the DHCP mode, but DHCP inform is not required
since the URL is known by the browser.
page 43-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Authenticating with Captive Portal
Static configuration
In static configuration, the switch locates the web proxy and gets the actual proxy file. The file is
modified to always return the captive portal web addresses or URLs.
1 Open a Web browser window on the client device. If there is a default home page, the browser
attempts to connect to that URL. If a default home page is not available, enter a URL for any website and
attempt to connect to that site. Note that the specified URL must contain the “http”, “https”, or “www”
prefix (see “Configuring Captive Portal Authentication” on page 43-36 for more information).
A certificate warning message can appear when the Web browser window opens. If so, select the option to
continue on to the website. For example, Windows IE7 browser displays the following message:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-41
Authenticating with Captive Portal Configuring Access Guardian
When the browser window opens and after the certificate warning message, if any, is cleared, Captive
Portal displays a login screen similar to the one shown in the following example:
Note. If Bypass option is disabled in the switch configuration, the “Bypass” button is not shown in the
login page.
page 43-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Authenticating with Captive Portal
4 Click on the “Acceptable Use Policy” box to activate the “Submit” and “Bypass” buttons, as follows:
Note. If Bypass option is disabled in the switch configuration, the “Bypass” button is not shown in the
login page.
5 Click the “Submit” button to login to the network or click the “Bypass” button to bypass Captive Portal
authentication (see “Bypassing Captive Portal Login” on page 43-44). If the “Submit” button is clicked,
Captive Portal sends the user information provided in the login window to the RADIUS server for
authentication. The following status message appears during the authentication process:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-43
Authenticating with Captive Portal Configuring Access Guardian
6 If user authentication is successful, the following status and logout messages are displayed:
The user is now logged in to the network and has access to all network resources in the VLAN to
which this user was assigned. The VLAN membership for the user was either returned through
RADIUS authentication or determined through Captive Portal device classification (invoked when
RADIUS does not return a VLAN ID or authentication fails).
7 Click on “Bookmark the CP-Logout link” and note the http://captive-portal/logout URL before leaving
the Captive Portal status page or closing the browser window. See “Logging Off the Network with Captive
Portal” on page 43-46 for more information.
Note. The https://10.123.0.1/logout URL is used to display a Captive Portal logout page. If a user does not
log out of a Captive Portal session using this URL, the session remains active until the Captive Portal
session limit is reached (default is 12 hours). Adding a bookmark for this URL is highly
recommended.
page 43-44 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Authenticating with Captive Portal
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-45
Authenticating with Captive Portal Configuring Access Guardian
If the “Cancel” Button is clicked, the captive portal logout page is closed. However, the client is not
logged off.
To log off from a Captive Portal session, the user clicks the “Submit” button. The user is then logged off
the network and the user device returns to the Captive Portal state (device MAC address is unknown to the
switch).
The following logout confirmation page appears when the logout process is done.
page 43-46 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring Host Integrity Check
Note. A user is automatically logged out of the network if the Captive Portal session time limit is reached.
For more information, see “Configuring Captive Portal Session Parameters” on page 43-37.
In addition to enabling HIC for a UNP, the following configuration tasks are involved in setting up the
HIC feature to run on the switch:
1 Configure the identity of the HIC server. Use the aaa hic server-name command to configure the
name and IP address of the InfoExpress CyberGatekeeper server, a shared secret, and the UDP port
number used for HIC requests.
-> aaa hic server-name hic-srv1 ip-address 2.2.2.2 key wwwtoe
Note that configuring the server is required before HIC can be enabled for the switch.
2 Configure the Web agent download server URL. A host can use the InfoExpress desktop compli-
ance agent or a Web-based agent. If the desktop agent is not installed on the host, the switch redirects the
host to a Web agent download server. The URL of the download server is configured for the switch using
the aaa hic web-agent-url command.
-> aaa hic web-agent-url http://10.10.10.10:2146
When the HIC process is initiated for a host device, the host has limited access to the network for commu-
nicating with the HIC server and any servers included in the exception list. Make sure the Web agent
download server is added to the server exception list, as described below.
3 Configure a server exception list.There are specific servers that a host device may need access to
during the HIC process. For example, if the host is going to use the Web-based compliance agent, access
to the Web agent download server is required. Use the aaa hic allowed-name command to add the name
and IP address of up to four servers to the HIC server exception list. Up to 16 server exception entries are
allowed.
-> aaa hic allowed-name websrv1 ip-address 123.10.5.1 ip-mask 255.255.255.0
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-47
Configuring Host Integrity Check Configuring Access Guardian
4 Configure a custom proxy port number. By default, the switch uses 8080 for the host proxy port
number. If a different number is used by the host device, use the aaa hic custom-proxy-port command to
configure the switch to use the host value.
-> aaa hic custom-proxy-port 8878
5 Enable the HIC feature for the switch. By default, the HIC feature is disabled for the switch. This
means that all HIC functionality is disabled. For example, if the HIC attribute of a UNP is enabled, the
HIC process is not invoked when the profile is applied if the HIC feature is not enabled for the switch. Use
the aaa hic command to enable or disable the HIC feature for the switch.
-> aaa hic enable
Enabling the HIC feature for the switch is not allowed if the HIC server information is not configured.
Check to see if the server configuration exists before attempting to enable this feature.
Use the show aaa hic host command to see a list of host MAC addresses the switch has learned and the
HIC status for each host. The show aaa hic, show aaa hic server, and show aaa hic server-failure policy
commands provide information about the HIC status and configuration for the switch.
For more information about HIC, see “Host Integrity Check (End-User Compliance)” on page 43-16.
• Pass-Through Mode (Fail Open): In Pass-through mode HIC users are moved to the HIC
PASSTHROUGH state. Users in this state are treated the same as a HIC SUCCESS and have network
access according to the policy list for their UNP, for example:
-> aaa hic server-failure mode passthrough
• Mapping Users to Temporary UNP: Mapping can be used to move all users in the HIC IN
PROGRESS state from their current UNP to a temporary UNP while the servers are down, for exam-
ple:
-> aaa hic server-failure policy user-network-profile change unp_x to unp_y
While the servers are down, all HIC new and existing HIC users in the HIC IN PROGRESS state are
temporarily moved to the unp_y. When any one of the HIC servers comes back up the HIC hosts in unp_y
is moved back to unp_x and restart the HIC validation.
page 43-48 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring User Network Profiles
• Maximum ingress and egress bandwidth, and maximum default depth: Specifies maximum
ingress and egress bandwidth limiting on a port on basis of UNP classification locally or remotely
through radius server returned UNP attribute. See “Port Bandwidth Through RADIUS” on page 43-50
for more information
To verify the UNP configuration for the switch, use the show aaa user-network-profile command. For
more information about user profiles, see “User Network Profiles (Role-Based Access)” on page 43-19.
Note the following guidelines when configuring QoS policy rules and lists:
• A default policy list exists in the switch configuration. Rules are added to this list when the rule is
created. A rule can belong to multiple policy lists. As a result, the rule remains a member a of the
default list even when it is subsequently assigned to additional lists.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-49
Configuring User Network Profiles Configuring Access Guardian
• Each time a rule is assigned to a policy list, an instance of that rule is created. Each instance is allo-
cated system resources. To exclude a rule from the default policy list, use the no default-list option of
the policy rule command when the rule is created. For example:
-> policy rule r1 condition c1 action a1 no default-list
• Up to 13 policy lists (including the default list) are supported per switch. Only one policy list per UNP
is allowed, but a policy list can be associated with multiple profiles.
• If a rule is a member of multiple policy lists but one or more of these lists are disabled, the rule is still
active for those lists that are enabled.
• If the QoS status of an individual rule is disabled, then the rule is disabled for all policy lists, even if a
list to which the policy belongs is enabled.
• Policy lists are not active on the switch until the qos apply command is issued.
Use the show policy list command to display the QoS policy rule configuration for the switch.
Note.
• Bandwidth limitation applied on a port by UNP classification is not be removed on user log out or
aging. User can either over ride the bandwidth through “QoS port” command or disabling 8021x on
port to remove the UNP applied bandwidth active on the port. Administratively bringing down the port
also removes the applied UNP configurations on the port.
• Run time modification of ingress and egress bandwidth is allowed but it does not affect the user already
authenticated, instead, it is applied on the new user authenticating under UNP. That is, if a user modi-
fies the UNP profile during the run time, the modified profile is not applied to those users already
authenticated with the same AAA UNP. If any user disconnects and then authenticates again, then the
modified profile is applied to the user.
page 43-50 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Configuring User Network Profiles
• If any parameter (egress, ingress bandwidth, default depth) associated with a UNP profile is modified,
then the other parameters need to be configured again, else, they will be set to their default values.
For example, consider a UNP profile with egress and ingress bandwidth as 100M, and default depth as
10M. Modify only the egress bandwidth as 200M. In this scenario, only the modified egress band-
width is considered, but the ingress and the default depth is set to their default values unless specifi-
cally configured to the required values.
Note: The same bandwidth behavior applies when the user is authenticated with QoS port bandwidth, QoS
port configuration being the latest configuration.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-51
Configuring User Network Profiles Configuring Access Guardian
To configure a UNP MAC address range rule, use the aaa classification-rule mac-address-range
command. For example, the following command applies the “accounting” profile to a device with a source
MAC address that falls within the specified range of MAC addresses:
-> aaa classification-rule mac-address-range 00:00:2a:33:44:01 00:00:2a:33:44:10
user-network-profile name accounting
To configure a UNP IP address rule, use the aaa classification-rule ip-address command. For example,
the following command applies the “accounting” profile to a device with the specified source IP address:
-> aaa classification-rule ip-address 10.1.1.1 user-network-profile name
accounting
Use the show aaa classification-rule command to verify the UNP mobile rule configuration for the
switch. For more information about UNP rules, see “What are UNP Mobile Rules?” on page 43-20.
page 43-52 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Verifying Access Guardian Users
2 The show aaa-device supplicant-users command displays the Access Guardian status of all suppli-
cant (802.1x) users learned on the switch:
-> show aaa-device supplicant-users
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-53
Verifying Access Guardian Users Configuring Access Guardian
3 The show aaa-device non-supplicant-users command displays the Access Guardian status of all non-
supplicant (non-802.1x) users learned on the switch:
-> show aaa-device non-supplicant-users
4 The show aaa-device captive-portal-users command displays the Access Guardian status of all users
that attempted network access through the switch using Captive Portal web-based authentication:
-> show aaa-device captive-portal-users
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 43-54 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Access Guardian Verifying Access Guardian Users
• port slot/port—Logs out all users connected to the specified slot and port number. For example:
-> aaa admin-logout port 1/9
• user user_name—Logs out the user device accessing the network with the specified user name
account. For example:
-> aaa admin-logout user j_smith
• user-network-profile name profile_name—Logs out all users classified with the specified profile
name. For example:
-> aaa admin-logout user-network-profile name marketing
Logging a group of users out of the network is particularly useful if configuration changes are required to
any Access Guardian features. For example, if the Host Integrity Check (HIC) feature is globally disabled
for the switch, all User Network Profiles (UNP) with the HIC attribute enabled no longer check devices
for compliance. This could allow users that don’t comply with security requirements to access the
network. The solution:
1 Log out all users associated with the profile using the aaa admin-logout command.
2 Disable the HIC feature for the switch using the aaa hic disable command.
3 Make any necessary configuration changes to the HIC feature (for example, add a remediation server
to the HIC exception list).
4 Enable the HIC feature for the switch using the aaa hic enable command. When HIC is enabled, all
users associated with the HIC-enabled UNP are checked for compliance.
Note. The aaa admin-logout command is only available to the switch admin user. The admin account,
however, is protected from any attempts to log out the admin user.
For more information about HIC and user profiles, see “Host Integrity Check (End-User Compliance)” on
page 43-16 and “User Network Profiles (Role-Based Access)” on page 43-19.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 43-55
Verifying the Access Guardian Configuration Configuring Access Guardian
802.1x auth-server-down Displays information about ports configured for 802.1X. Includes
Captive Portal session timeout and login retry parameter values.
show 802.1x auth-server-down Displays global information about the Access Guardian Captive Portal
configuration.
show 802.1x device Displays Access Guardian device classification policies configured for
classification policies 802.1x-enabled ports.
show aaa user-network-profile Displays the User Network Profile (UNP) configuration for the switch.
show aaa classification-rule Displays the UNP mobile classification rule configuration for the
switch.
show aaa hic Displays the global Host Integrity Check (HIC) configuration for the
switch.
show aaa hic host Displays a list of the learned host MAC addresses and the HIC status for
each host.
show aaa hic server Displays the HIC server configuration for the switch.
show aaa hic server-failure Displays the Host Integrity Check (HIC) server exception list.
policy
show aaa hic Displays the global Host Integrity Check (HIC) configuration for the
switch.
show aaa authentication 802.1x Displays information about the global 802.1X configuration on the
switch.
show aaa authentication mac Displays a list of RADIUS servers configured for MAC-based
authentication.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 43-56 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
44 Configuring
Authenticated VLANs
Authenticated VLANs control user access to network resources based on VLAN assignment and a user
log-in process; the process is sometimes called user authentication or Layer 2 Authentication. (Another
type of security is device authentication, which is set up through the use of port-binding VLAN policies or
static port assignment. See Chapter 45, “Defining VLAN Rules.”) In this chapter, the terms authenticated
VLANs (AVLANs) and Layer 2 Authentication are synonymous.
Layer 2 Authentication is different from another feature in the switch called Authenticated Switch Access,
which is used to grant individual users access to manage the switch. For more information about
Authenticated Switch Access, see the “Switch Security” chapter in the OmniSwitch AOS Release 6 Switch
Management Guide.
In This Chapter
This chapter describes authenticated VLANs and how to configure them through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
The authentication components described in this chapter include:
• Authentication clients—see “Setting Up Authentication Clients” on page 44-7.
Note. The functionality described in this chapter is supported on the OmniSwitch 6400, 6850E, 6855,
9000E switches unless otherwise noted within any section of this chapter.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-1
Authenticated Network Overview Configuring Authenticated VLANs
Authentication agent
RADIUS or LDAP servers in the switch
Authentication port
DHCP server
This chapter describes all of these components in detail, except the external authentication servers, which
are described in Chapter 42, “Managing Authentication Servers.” A brief overview of the components is
given here:
Authentication servers—A RADIUS or LDAP server must be configured in the network. The server
contains a database of user information that the switch checks whenever a user tries to authenticate
through the switch. (Note that the local user database on the switch can not be used for Layer 2
authentication.) Backup servers can be configured for the authentication server.
• RADIUS or LDAP server. Follow the manufacturer documentation instructions for your particular
server. The external server can also be used for Authenticated Switch Access. Server details, such as
RADIUS attributes and LDAP schema information, are given in Chapter 42, “Managing Authentica-
tion Servers.”
• RADIUS or LDAP client in the switch. The switch must be set up to communicate with the RADIUS
or LDAP server. This chapter briefly describes the switch configuration. See Chapter 42, “Managing
Authentication Servers,” for detailed information about setting up switch parameters for authentication
servers.
Authentication clients—Authentication clients login through the switch to get access to authenticated
VLANs. There are three types of clients:
• AV-Client. This is an Alcatel-Lucent-proprietary authentication client. The AV-Client does not require
an IP address prior to authentication. The client software must be installed on the user end station. This
chapter describes how to install and configure the client. See “Installing the AV-Client” on page 44-13.
• Telnet client. Any standard Telnet client can be used. A IP address is required prior to authentication.
An overview of the Telnet client is provided in “Setting Up Authentication Clients” on page 44-7.
page 44-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Authenticated Network Overview
• Web browser client. Any standard Web browser can be used (Netscape or Internet Explorer). An IP
address is required prior to authentication. See “Web Browser Authentication Client” on page 44-8 for
more information about Web browser clients.
Authenticated VLANs—At least one authenticated VLAN must be configured. See “Configuring
Authenticated VLANs” on page 44-26.
Authentication port—At least one mobile port must be configured on the switch as an authentication
port. This is the physical port through which authentication clients are attached to the switch. See “Config-
uring Authenticated Ports” on page 44-28.
DHCP Server—A DHCP server can provide IP addresses to clients prior to authentication. After
authentication, any client can obtain an IP address in an authenticated VLAN to which the client is
allowed access. A relay to the server must be set up on the switch. See “Setting Up the DHCP Server” on
page 44-29.
Authentication agent in the switch—Authentication is enabled when the server(s) and the server
authority mode is specified on the switch. See “Configuring the Server Authority Mode” on page 44-32.
These components are described in more detail in the next sections.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-3
AVLAN Configuration Overview Configuring Authenticated VLANs
2 Configure at least one authenticated VLAN. A router port must be set up in at least one authenti-
cated VLAN for the DHCP relay. See “Configuring Authenticated VLANs” on page 44-26.
3 Configure at least one authenticated mobile port. Required for connecting the clients to the switch.
See “Configuring Authenticated Ports” on page 44-28.
4 Set up the DHCP server. Required if you are using Telnet or Web browser clients. Required for any
clients that need to get IP addresses after authentication. See “Setting Up the DHCP Server” on
page 44-29.
5 Configure the authentication server authority mode. See “Configuring the Server Authority Mode”
on page 44-32.
6 Specify accounting servers for authentication sessions. Optional; accounting can also be done
through the switch logging feature in the switch. See “Specifying Accounting Servers” on page 44-35.
The following is a summary of commands used in these procedures.
page 44-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs AVLAN Configuration Overview
Note that this command does not create a VLAN; the VLAN must already be created. For information
about creating VLANs, see Chapter 4, “Configuring VLANs.”
The VLAN must also have an IP router interface if Telnet or Web browser clients authenticate into this
VLAN. The following command configures an IP router interface on VLAN 2:
-> ip interface vlan-2 address 10.10.2.20 vlan 2
2 Create and enable at least one mobile authenticated port. The port must be in VLAN 1, the default
VLAN on the switch.
-> vlan port mobile 3/1
-> vlan port 3/1 authenticate enable
4 Set up a path to a DHCP server if users get IP addresses from DHCP. The IP helper address is the IP
address of the DHCP server; the AVLAN default DHCP address is the address of any router port
configured on the VLAN.
-> ip helper address 10.10.2.5
-> aaa avlan default dhcp 10.10.2.20
If the relay is used for authentication only, enter the ip helper avlan only command:
-> ip helper avlan only
Note. To check the DNS and DHCP authentication configuration, enter the show aaa avlan config
command. For example:
-> show aaa avlan config
default DHCP relay address = 192.9.33.222
authentication DNS name = authent.company.com
For more information about this command, see the OmniSwitch AOS Release 6 CLI Reference Guide.
5 Configure the switch to communicate with the authentication servers. Use the aaa radius-server or
aaa tacacs+-server command. For example:
-> aaa radius-server rad1 host 10.10.1.2 key wwwtoe timeout 3
-> aaa ldap server ldap2 host 199.1.1.1 dn manager password foo base c=us
See Chapter 42, “Managing Authentication Servers,” for more information about setting up external serv-
ers for authentication.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-5
AVLAN Configuration Overview Configuring Authenticated VLANs
6 Enable authentication by specifying the authentication mode (single mode or multiple mode) and the
server. Use the RADIUS or LDAP server name(s) configured in step 5. For example:
-> aaa authentication vlan single-mode rad1 rad2
Note. Verify the authentication server configuration by entering the show aaa authentication vlan
command or verify the accounting server configuration by entering the show aaa accounting vlan
command. For example:
-> show aaa authentication vlan
All authenticated vlans
1rst authentication server = rad1,
2nd authentication server = ldap2
For more information about these commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 44-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-7
Setting Up Authentication Clients Configuring Authenticated VLANs
Note. If you want to return to the default language (English) for the Web browser prompts, delete the
contents of the file.
page 44-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
Important. When you install the Ksecu.img file after initial installation, any files in the /flash/switch/
avlan directory is overwritten.
The /flash/switch/avlan directory contains authentication HTML pages for the client that can be modified
(to include a company logo, for example). The names of these files are: topA.html, topB.html,
bottomA.html, bottomB.html, and myLogo.gif.
The directory also contains files that must be installed on Mac OS Web browser clients as described in the
next sections.
4 Double-click on the application javlanInstall AppleScript inside the newly created directory. The
workstation is now setup for authentication.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-9
Setting Up Authentication Clients Configuring Authenticated VLANs
2 Select Domain > Security > Authenticate. Enter the administrator password if required.
3 Select Domain > Security > Enable Root. Enter the password.
4 Select System Preferences/Login and select the login prompt to display when opening a new session.
8 If you are using a self-signed SSL certificate, or the certificate provided by Alcatel-Lucent (wv-
cert.pem), see “DNS Name and Web Browser Clients” on page 44-12.
To set up the Mac OSX.1 for authentication:
1 In the browser URL command line, enter the DNS name configured on the switch (see the next section
for setting up the DNS name for Mac OSX clients). The authentication page displays.
2 Click on the link to download the installation software. The avlanInstall.tar file is copied to the Mac
desktop.
5 Make sure the SSL certificate is installed correctly (see “SSL for Web Browser Clients” on
page 44-11) and that the DNS name configured on the switch matches the DNS name in the certificate (see
“DNS Name and Web Browser Clients” on page 44-12).
page 44-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
Click on “Continue to this website (not recommended)” to continue the browser session. A certificate
error message, similar to the one shown below, appears at the top of the browser window.
1 Click on the certificate error message. A “Certificate Invalid” popup window displays.
2 Click on “View Certificates” at the bottom of the “Certificate Invalid” popup window.
A “Certificate Information” popup window displays.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-11
Setting Up Authentication Clients Configuring Authenticated VLANs
3 Click on the “Install Certificate” button at the bottom of the “Certificate Information” window. This
step launches the Certificate Import Wizard.
4 Click the “Next” button to continue with the Certificate Import Wizard process. The “Certificate
Store” window displays.
5 Select “Place all certificates in the following store” and click on the “Browse” button. This displays
a list of certificate stores.
6 Select “Trusted Root Certification Authorities” from the list of stores and continue with the wizard
installation process. A “Security Warning” window displays containing a warning about installing the
certificate.
Click the “Yes” button in the “Security Warning” window to finish installing the certificate. After the
certificate is installed, the browser no longer displays the certificate error message.
Note. The keytool command requires a password. By default, the password is changeit.
On the browser workstation, the authentication user must enter the DNS name in the browser command
line to display the authentication page.
For more information about configuring a DNS name, see “Setting Up a DNS Path” on page 44-29.
page 44-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
• Set the AV-Client as primary network login (Windows 95 and 98). See “Setting the AV-Client as
Primary Network Login” on page 44-19.
• Configure the AV-Client for DHCP (optional). See “Configuring the AV-Client Utility” on
page 44-19.
2 Double-click the Network icon. When the Network window opens, select the Protocols tab.
3 Click the Add button and the Select Network Protocol window appears.
4 Select the DLC protocol from the list of Network Protocols. Click OK.
Windows 98
1 From your Windows desktop, select Start > Settings > Control Panel.
2 Double-click the Network icon. When the Network window opens, select the Configuration tab.
3 Click the Add button and the Select Network Component Type window appears.
5 When the Select Network Protocol window appears, select Microsoft from the list of manufacturers
and Microsoft 32-bit DLC from the list of Network Protocols. Click OK.
6 Follow the prompts requesting Windows files.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-13
Setting Up Authentication Clients Configuring Authenticated VLANs
Windows 95
Install the 32-bit DLC protocol program and the update patch from the Microsoft FTP site
(ftp.microsoft.com). From the FTP site, download the MSDLC32.EXE and DLC32UPD.EXE files (or the
latest DLC protocol update). These files are self-extracting zip files. Follow these steps:
1 Double-click the MSDLC32.EXE file in the folder to which you want to download the file.
Note. Do not run MSDLC32.EXE file in the Windows or Windows/System folders. If you downloaded
the file to either of these locations, copy it to a temporary folder on your hard disk or copy it to an installa-
tion diskette before double-clicking on it.
2 From your Windows desktop, select Start > Settings > Control Panel.
5 In the Select Network Component Type dialog box, double-click on the Protocol network component.
6 In the Select Network Protocol dialog box, click on the Have Disk button.
7 Specify the drive and path where the MSDLC32.EXE files (you must have already extracted them) are
located. For example, if you created an installation diskette, you would enter:
<drive letter>:\
If you created a temporary folder on your hard disk, then you would enter:
C:\<folder name>
where folder name is the directory or path into which you copied the MSDLC32.EXE files. Click OK.
9 When prompted, insert the Windows 95 disks so that other network components can be reinstalled.
10 When prompted, shut down your computer and restart Windows 95. This restart is required for the
DLC protocol stack to load on the system.
11 Next, the DLC protocol stack update must be loaded. Double click the DLC32UPD.EXE file. The
program installs itself. After installing the update, it is recommended that the system be rebooted.
2 Double-click the AV-Client icon. The installation routine begins and the following window displays:
page 44-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
3 We recommend that you follow the instructions on the screen regarding closing all Windows programs
before proceeding with the installation. Click on the Next button. The following window displays.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-15
Setting Up Authentication Clients Configuring Authenticated VLANs
4 From this window you can install the client at the default destination folder shown on the screen or you
can click the Browse button to select a different directory. Click on the Next button. The software loads,
and the following window displays.
5 This window gives you the option of restarting your PC workstation now, or later. You cannot use the
AV-Client until you restart your computer. If you decide to restart now, be sure to remove any disks from
their drives. Click the Finish button to end the installation procedure.
page 44-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
2 Double-click the AV-Client icon. The installation routine begins and the following window displays:
3 We recommend that you follow the instructions on the screen regarding closing all Windows programs
before proceeding with the installation. Click on the Next button. The following window displays:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-17
Setting Up Authentication Clients Configuring Authenticated VLANs
4 From this window you can install the client at the default destination folder shown on the screen or you
can click the Browse button to select a different directory. Click on the Next button. The software loads,
and the following window displays.
5 This window recommends that you read a text file included with the client before you exit the install
shield. Click on the box next to “View the single sign-on Notes” to select this option. Click on the Finish
button to end the installation process. Remember that you must restart your computer before you can run
the AV-Client.
page 44-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
2 Select the “Client” from the list and click the Add button. The “Select Network Client Window”
displays.
3 You can click the Have Disk button, enter the correct path for your disk drive in the space provided
and click OK. You can also browse to the directory where the AV-Client is installed and click OK. Select
“Alcatel AVLAN Login Provider”.
4 Select Alcatel AVLAN Login Provider as the Primary Network Login on the Configuration tab.
Note. Make sure to have your Windows 95 or 98 media available during this procedure.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-19
Setting Up Authentication Clients Configuring Authenticated VLANs
Note. If you disable the AV-Client at startup, you can activate VLAN authentication by pointing your
mouse to the AV-Client icon on the Windows stem tray and right-clicking to select Logon.
Note. If the user reboots the PC workstation, the client session with the network server is automatically
terminated.
page 44-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-21
Setting Up Authentication Clients Configuring Authenticated VLANs
2 Enter the user name for this device in the “Login Name?” field. This user name is configured on the
authentication server.
3 Enter the password for this user in the “Password?” field. If the client is set up for basic dialog mode
and the user enters the correct password, the user is authenticated. If the client is set up for extended mode,
the user is prompted to enter the VLAN ID and challenge. After all required user information is entered,
the following message displays:
User xxxx authenticated by <Authentication Type> authentication
The user is now logged into the network and has access to all network resources in the VLAN with which
this user shares membership.
Note. If authentication is successful but an error occurs while configuring VLANs, the user station does
not move into the user-defined VLAN.
page 44-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
2 To continue the procedure, click the Logoff button. The following screen indicates that the AV-Client
is sending a logoff request to the authentication server.
The next message on the screen indicates that the AV-Client is requesting an IP address in the default
VLAN. The client is removed from the authenticated VLAN and placed in the default VLAN.
When the AV-Client is logged into the network, the AV-Client icon on the Windows desktop has a
blue background. When the logoff procedure is completed, the screen disappears and the background
is gone from the AV-Client icon.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-23
Setting Up Authentication Clients Configuring Authenticated VLANs
Note. If the AV-Client is used with DHCP, the DHCP server must be configured as described in “Setting
Up the DHCP Server” on page 44-29.
At startup, an AV-Client user PC workstation issues a Windows DHCP request if the AV-Client DHCP
release/renew feature is enabled. This feature is disabled by default. The AV-Client is capable of
obtaining an address from the default client VLAN or whatever VLAN it authenticates into if a DHCP
server is located in the VLAN.
The DHCP tab of the configuration utility gives you several options for managing DHCP when it is
enabled. You also have the option of disabling DHCP operations.
Note. A delay between DHCP release and client logoff is recommended because the DHCP server MAC
address can be timed out in the AV-Client ARP table. If that is the case, the client must send an ARP
packet to discover the DHCP server MAC address before it can send the release packet. If the logoff
packet is sent to the switch before the release packet gets sent, then the IP address is never released.
Increasing the value of the delay parameter can prevent this from happening.
page 44-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up Authentication Clients
1 To configure the DHCP parameters, access the AV-Client configuration utility and select the DHCP
tab. The following screen displays:
2 Click the box next to “Enable DHCP Operations”. Several options activate in the utility window as
shown in the following screen. When you click on a box next to an option, the option is activated in the
configuration window.
3 When you click one of the features, an indicator is activated directly below the feature. Specify the
number of seconds for the delay for the selected feature.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-25
Configuring Authenticated VLANs Configuring Authenticated VLANs
4 To apply the change, click the Apply button. When you click the OK button, the screen closes and the
change is effected. If you decide not to implement the change, click the Cancel button and the screen
closes without implementing a change.
Note that the specified VLAN (in this case, VLAN 2) must already exist on the switch. A router port must
also be configured for the VLAN (with the ip interfacecommand) so that a DHCP relay can be set up. For
example:
-> vlan 2 router ip 10.10.2.20
See “Setting Up the DHCP Server” on page 44-29 for more information about setting up a DHCP server.
----------------------------------------------------------------
user1 00:20:da:05:f6:23 02 02 23
In this example, user1 is authenticated into VLAN 23 and is using MAC address 00:20:da:05:f6:23. To
remove user1 from authenticated VLAN 23, enter the aaa vlan no command with the MAC address. For
example:
-> aaa avlan no 00:20:da:05:f6:23
When this command is entered, user1 is removed from VLAN 23. If the switch is set up so that authenti-
cated users can send traffic through the default VLAN, the user is placed into the default VLAN of the
authentication port. (See “Setting Up the Default VLAN for Authentication Clients” on page 44-27 for
information about setting up the switch so that authentication clients can send traffic through the default
VLAN prior to authentication.)
For more information about the output display for the aaa avlan no and show avlan user commands, see
the OmniSwitch AOS Release 6 CLI Reference Guide.
Note. The MAC addresses of users can also be found in the log files generated by accounting servers.
page 44-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Configuring Authenticated VLANs
This changes the authentication address for VLAN 3 to 10.10.2.80. The authentication IP address is also
used for the DNS address (see “Setting Up a DNS Path” on page 44-29).
When modifying the authentication address for a specific VLAN, make sure the following is true:
• The new IP address does not match an IP router interface address for the same VLAN. IP address reso-
lution problems can occur if these two addresses are not unique.
• The new IP address is an address that is local to the network segment on which the client is connected
The binding of the VLAN to the authentication IP address is to provide flexibility for the network
administrator to assign a designated IP address for respective user network segments.
To display authentication addresses, use the show aaa avlan auth-ip command.
When this command is enabled, any authentication client initially belongs to the default VLAN of the
authentication port through which the client is connected. After authentication, if a client is removed from
an authenticated VLAN through the aaa avlan no command, the client is moved to the default VLAN.
To disable any default VLAN for authentication traffic, use the disable keyword with the command:
-> avlan default-traffic disable
WARNING: Traffic on default vlan is DISABLED.
Existing users on default vlan are not flushed.
Users now do not belong to and cannot traffic in the default VLAN prior to authentication. Note that any
existing users in the default VLAN are not flushed.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-27
Configuring Authenticated Ports Configuring Authenticated VLANs
• MAC-Port
The MAC-port-protocol, MAC-IP address, port-IP address, and Port-Protocol binding rules are not
supported on authenticated VLANs. In addition to the above binding rule types, however, a MAC range
rule can also be applied to authenticated ports. For more information about port binding and MAC range
rules and how to configure them, see Chapter 45, “Defining VLAN Rules.”
To enable port binding and MAC range rules on authenticated VLANs, use the avlan port-bound
command with the enable keyword.
-> avlan port-bound enable
This command allows some port binding rules (MAC-Port-IP address, MAC-Port, Port-IP address, and
MAC-Port-Protocol) and MAC range rules to be used on any authenticated VLAN.
To disable port binding rules on authenticated VLANs, use the disable keyword with the command:
-> avlan port-bound disable
To enable authentication on the mobile port, use the vlan port authenticate command.
-> vlan port 3/1 authenticate enable
For more information about the configuring VLAN ports, see Chapter 5, “Assigning Ports to VLANs.”
By default, authentication clients cannot traffic in the default VLAN for the authentication port unless the
aaa accounting command command is enabled. See “Setting Up the Default VLAN for Authentication
Clients” on page 44-27.
page 44-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up a DNS Path
When this command is configured, a Web browser client can enter auth.company in the browser
command line to initiate the authentication process.
To remove a DNS path from the configuration, use the no form of the command. For example:
-> no aaa avlan dns
The DNS path is removed from the configuration, and Web browser clients must enter the authentication
IP address to initiate the authentication process.
Note. For more information about configuring DHCP relay in general, see Chapter 28, “Configuring
DHCP and DHCPv6.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-29
Setting Up the DHCP Server Configuring Authenticated VLANs
Before Authentication
Normally, authentication clients cannot traffic in the default VLAN, so authentication clients do not
belong to any VLAN when they connect to the switch. Even if DHCP relay is enabled, the DHCP discov-
ery process cannot take place. To address this issue, a DHCP gateway address must be configured so that
the DHCP relay “knows” which router port address to use for serving initial IP addresses. (See “Configur-
ing a DHCP Gateway for the Relay” on page 44-31 for information about configuring the gateway
address.)
Note. The switch can be set up so that authentication clients belong to the default VLAN prior to authenti-
cation (see “Setting Up the Default VLAN for Authentication Clients” on page 44-27). If a DHCP server
is located in the default VLAN, clients can obtain initial IP addresses from this server without using a
relay. However, the DHCP server is typically not located in a default VLAN because it is more difficult to
manage from an authenticated part of the network.
After Authentication
When the client authenticates, the client is moved into the allowed VLAN based on VLAN information
sent from an authentication server (single mode authority) or based on VLAN information configured
directly on the switch (multiple mode authority).
For information about authentication server authority modes, see “Configuring the Server Authority
Mode” on page 44-32.
After authentication a client can be moved into a VLAN in which the client current IP address does not
correspond. This happens if the DHCP gateway address for assigning initial IP addresses is the router port
of an authenticated VLAN to which the client does not belong. (See “Configuring a DHCP Gateway for
the Relay” on page 44-31.)
In this case, clients send DHCP release/renew requests to get an address in the authenticated VLAN to
which they have access; DHCP relay must be enabled so that the request can be forwarded to the appropri-
ate VLAN.
Note. Telnet clients typically require manual configuration for IP address release/renew. Web browser
clients initiate their release/renew process automatically.
DHCP is automatically enabled on the switch whenever a DHCP server address is defined. For more infor-
mation about using the ip helper address command, see Chapter 28, “Configuring DHCP and DHCPv6.”
If multiple DHCP servers are used, one IP address must be configured for each server. The default VLAN
DHCP gateway must also be specified so that Telnet and Web browser clients can obtain IP addresses
prior to authentication. See the next section for more information.
If you want to specify that the relay only be used for packets coming in on an authenticated port, enter the
ip helper avlan only command.
-> ip helper avlan only
page 44-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Setting Up the DHCP Server
When this command is specified, the switch acts as a relay for authentication DHCP packets only;
non-authentication DHCP packets are not relayed. For more information about using the ip helper avlan
only command, see Chapter 28, “Configuring DHCP and DHCPv6.”
Telnet and Web browser clients initially receive an IP address in this scope. (After authentication, these
clients can require a new IP address if they do not belong to the VLAN associated with this gateway
address.)
To remove a gateway address from the configuration, use the no form of the aaa avlan default dhcp
command. For example:
-> no aaa avlan default dhcp
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-31
Configuring the Server Authority Mode Configuring Authenticated VLANs
At least one server must be configured in either mode. Up to three backup servers total can be specified.
The CLI commands required for specifying the servers are as follows:
aaa authentication vlan single-mode
aaa authentication vlan multiple-mode
Note. Each RADIUS and LDAP server can each have an additional backup host of the same type
configured through the aaa radius-server and aaa tacacs+-server commands.
In addition, the aaa accounting mac command can be used to set up an accounting server or servers to
keep track of user session statistics. Setting up servers for accounting is described in “Specifying Account-
ing Servers” on page 44-35.
page 44-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Configuring the Server Authority Mode
Authenticated
VLAN 2
VLAN 1
Authenticated
VLAN 3
LDAP or RADIUS
servers
To configure authentication in single mode, use the aaa authentication vlan command with the
single-mode keyword and name(s) of the relevant server and any backups. At least one server must be
specified; the maximum is four servers. For example:
-> aaa authentication vlan single-mode ldap1 ldap2
In this example, authenticated VLANs are enabled on the switch in single mode. All authenticated VLANs
on the switch use ldap1 to attempt to authenticate users. If ldap1 becomes unavailable, the switch uses
backup server ldap2. Both servers contain user information, including which VLANs users can be
authenticated through. (The servers must have been previously set up with the aaa ldap-server command.
For more information about setting up authentication servers, see Chapter 42, “Managing Authentication
Servers.”)
To disable authenticated VLANs, use the no form of the command. Note that the mode does not have to
specified. For example:
-> no aaa authentication vlan
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-33
Configuring the Server Authority Mode Configuring Authenticated VLANs
Authenticated
VLAN 2
RADIUS server
VLAN 1 for VLAN 2
Authenticated
VLAN 3
Authenticated
VLAN 5
RADIUS servers
for VLAN 5
page 44-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Authenticated VLANs Specifying Accounting Servers
To configure authentication in multiple mode, use the aaa authentication vlan command with the
multiple-mode keyword, the relevant VLAN ID, and the names of the servers. The VLAN ID is required,
and at least one server must be specified (a maximum of four servers is allowed per VLAN). For example:
-> aaa authentication vlan multiple-mode 2 rad1
-> aaa authentication vlan multiple-mode 3 ldap1
-> aaa authentication vlan multiple-mode 4 ldap1
-> aaa authentication vlan multiple-mode 5 ldap2 ldap3
To disable authenticated VLANs in multiple mode, use the no form of the command and specify the
relevant VLAN. Note that the mode does not have to be specified. For example:
-> no aaa authentication vlan 2
This command disables authentication on VLAN 2. VLANs 3, 4, and 5 are still enabled for authentication.
In this example, a RADIUS server (rad1) is used for all accounting of authenticated VLANs; an LDAP
server (ldap2) is specified as a backup accounting server.
If the switch is configured for multiple authority mode, the VLAN ID must be specified. In multiple mode,
a different accounting server (with backups) can be specified for each VLAN. For example:
-> aaa accounting vlan 3 rad1 rad2 ldap1
-> aaa accounting vlan 4 ldap2 ldap3
In this example, rad1 is configured as an accounting server for VLAN 3; rad2 and ldap1 are backups that
are only used if the previous server in the list goes down. An LDAP server (ldap2) is configured for
accounting in VLAN 4; the backup server for VLAN 4 is ldap3.
If an external server is not specified with the command, AVLAN user session information is logged in the
local switch log. For information about switch logging, see Chapter 55, “Using Switch Logging.” In
addition, the keyword local can be used so that logging is done on the switch if the external server or
servers become unavailable. If local is specified, it must be specified last in the list of servers.
In the following example, single-mode authentication is already set up on the switch, the aaa accounting
vlan command configures a RADIUS server (rad1) for accounting. The local logging feature in the switch
(local) is the backup accounting mechanism.
-> aaa accounting vlan rad1 local
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 44-35
Verifying the AVLAN Configuration Configuring Authenticated VLANs
show aaa authentication vlan Displays information about authenticated VLANs and the server
configuration.
show aaa accounting vlan Displays information about accounting servers configured for
Authenticated VLANs.
show avlan user Displays MAC addresses for authenticated VLAN users on the switch.
show aaa avlan config Displays the current global configuration for authenticated VLANs.
show aaa avlan auth-ip Displays the IP addresses for authenticated VLANs.
For more information about these commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
page 44-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
45 Defining VLAN Rules
VLAN rules are used to classify mobile port traffic for dynamic VLAN port assignment. Rules are defined
by specifying a port, MAC address, protocol, network address, binding, or DHCP criteria to capture
certain types of network device traffic. It is also possible to define multiple rules for the same VLAN. A
mobile port is assigned to a VLAN if its traffic matches any one VLAN rule.
There is an additional method for dynamically assigning mobile ports to VLANs that involves enabling
VLAN mobile tagging. This method is similar to defining rules in that the feature is enabled on the VLAN
that is going to receive the mobile port tagged traffic. The difference, however, is that tagged packets
received on mobile ports are classified by their 802.1Q VLAN ID tag and not by whether or not their
source MAC, network address, or protocol type matches VLAN rule criteria.
In This Chapter
This chapter contains information and procedures for defining VLAN rules through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide. Refer to Chapter 4, “Configuring
VLANs,” and Chapter 5, “Assigning Ports to VLANs,” for information about the VLAN mobile tagging
feature.
Configuration procedures described in this chapter include:
• Defining DHCP rules on page 45-11.
• Defining binding rules to restrict access to specific network devices on page 45-13.
For information about creating and managing VLANs, see Chapter 4, “Configuring VLANs.”
For information about enabling port mobility and defining mobile port properties, see Chapter 5, “Assign-
ing Ports to VLANs.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-1
VLAN Rules Specifications Defining VLAN Rules
page 45-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Sample VLAN Rule Configuration
1 Create VLAN 255 with a description (for example, Finance IP Network) using the following
command:
-> vlan 255 name "Finance IP Network"
2 Define an IP network address rule for VLAN 255 that captures mobile port traffic containing a network
21.0.0.0 IP source address. For example:
-> vlan 255 ip 21.0.0.0
3 Define a DHCP MAC range rule for VLAN 255 that captures mobile port DHCP traffic that contains a
source MAC address that falls within the range specified by the rule. For example:
-> vlan 255 dhcp mac 00:DA:95:00:59:10 00:DA:95:00:59:9F
4 Define an IPX protocol rule for VLAN 355 that captures mobile port traffic containing an IPX
protocol type value. For example:
-> vlan 355 protocol ipx-e2
5 Define a MAC-IP-port binding rule that restricts assignment to VLAN 1500 to traffic received on
mobile port 3/10 containing a MAC address of 00:DA:95:00:CE:3F and an IP address of 21.0.0.43. For
example:
-> vlan 1500 binding mac-ip-port 00:da:95:00:ce:3f 21.0.0.43 3/10
Note. Optional. To verify that the rules in this tutorial were defined for VLANs 255, 355, and 1500, enter
show vlan rules. For example:
-> show vlan rules
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-3
VLAN Rules Overview Defining VLAN Rules
Rule See
DHCP MAC Address “DHCP Rules” on page 45-5
DHCP MAC Range
DHCP Port
DHCP Generic
MAC-Port-IP Address Binding “Binding Rules” on page 45-6
MAC-Port Binding
Port-Protocol Binding
MAC Address “MAC Address Rules” on page 45-6
MAC Address Range
Network Address “Network Address Rules” on page 45-6
Protocol “Protocol Rules” on page 45-6
Port “Port Rules” on page 45-7
Use the show vlan rules command to display a list of rules already configured on the switch. For more
information about this command, refer to the OmniSwitch AOS Release 6 CLI Reference Guide.
page 45-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules VLAN Rules Overview
DHCP Rules
Dynamic Host Configuration Protocol (DHCP) frames are sent from client workstations to request an IP
address from a DHCP server. The server responds with the same type of frames, which contain an IP
address for the client. If clients are connected to mobile ports, DHCP rules are used to classify this type of
traffic for the purposes of transmitting and receiving DHCP frames to and from the server.
When a mobile port receives a DHCP frame that matches a DHCP rule, the port is temporarily assigned to
the VLAN long enough to forward the DHCP requests within the VLAN broadcast domain. The source
MAC address of the DHCP frame, however, is not learned for that VLAN port association. As a result, the
show mac-address-table command output will not contain an entry for the DHCP source MAC address.
The show vlan port command output, however, will contain an entry for the temporary VLAN port
association that occurs during this process.
Once a device connected to a mobile port receives an IP address from the DHCP server, the VLAN port
assignment triggered by the device DHCP frames matching a VLAN DHCP rule is dropped unless regular
port traffic matches another rule on that same VLAN. If this match occurs, or the traffic matches a rule on
another VLAN, then the source MAC address of the mobile port frames is learned for that VLAN port
association.
DHCP rules are most often used in combination with IP network address rules. A DHCP client has an IP
address of all zeros (0.0.0.0) until it receives an IP address from a DHCP server, so initially it would not
match any IP network address rules.
Binding rules, MAC address rules, and protocol rules also capture DHCP client traffic. The exception to
this is binding rules that specify an IP address as part of the rule, similar to IP network address rule
definitions.
The following DHCP rule types are available:
• DHCP MAC Address
• DHCP Port
• DHCP Generic
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-5
VLAN Rules Overview Defining VLAN Rules
Binding Rules
Binding rules restrict VLAN assignment to specific devices by requiring that device traffic match all crite-
ria specified in the rule. As a result, a separate binding rule is required for each device. An unlimited
number of such rules, however, is allowed per VLAN and up to 8129 of each rule type is allowed per
switch. Although DHCP traffic is examined and processed first by switch software, binding rules take
precedence over all other rules.
The following binding rule types are available. The rule type name indicates the criteria the rule uses to
determine if device traffic qualifies for VLAN assignment. For example, the MAC-Port-IP address bind-
ing rule requires a matching source MAC and IP address in frames received from a device connected to
the port specified in the rule.
• MAC-port-IP Address
• MAC-port
• port-protocol
Note that MAC-port-IP and MAC-port binding rules are also supported on Authenticated VLANs
(AVLANs). See “Configuring VLAN Rule Definitions” on page 45-10 and Chapter 44, “Configuring
Authenticated VLANs,” for more information.
Protocol Rules
Protocol rules determine VLAN assignment based on the protocol a device uses to communicate. When
defining this type of rule, there are several generic protocol values to select from: IP, IPX, AppleTalk, or
DECNet. If none of these are sufficient, it is possible to specify an Ethernet type, Destination and Source
Service Access Protocol (DSAP/SSAP) header values, or a Sub-network Access Protocol (SNAP) type.
Note that specifying a SNAP protocol type restricts classification of mobile port traffic to the ethertype
value found in the IEEE 802.2 SNAP LLC frame header.
IP protocol rules also capture DHCP traffic, if no other DHCP rule exists that would classify the DHCP
traffic into another VLAN. Therefore, it is not necessary to combine DHCP rules with IP protocol rules for
the same VLAN.
page 45-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules VLAN Rules Overview
Port Rules
Port rules are fundamentally different from all other supported rule types, in that traffic is not required to
trigger dynamic assignment of the mobile port to a VLAN. As soon as this type of rule is created, the
specified port is assigned to the VLAN only for the purpose of forwarding broadcast types of VLAN traf-
fic to a device connected to that same port.
Port rules are mostly used for silent devices, such as printers, that require VLAN membership to receive
traffic forwarded from the VLAN. These devices usually don’t send traffic, so they do not trigger dynamic
assignment of their mobile ports to a VLAN.
It is also possible to specify the same port in more than one port rule defined for different VLANs. The
advantage to this is that traffic from multiple VLANs is forwarded out the one mobile port to the silent
device. For example, if port 3 on slot 2 is specified in a port rule defined for VLANs 255, 355, and 755,
then outgoing traffic from all three of these VLANs is forwarded on port 2/3.
Port rules only apply to outgoing mobile port traffic and do not classify incoming traffic. If a mobile port
is specified in a port rule, its incoming traffic is still classified for VLAN assignment in the same manner
as all other mobile port traffic.
VLAN assignments that are defined using port rules are exempt from the port default VLAN restore
status. See Chapter 5, “Assigning Ports to VLANs,” for more information regarding a port default VLAN
restore status and other mobile port properties.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-7
VLAN Rules Overview Defining VLAN Rules
Note. Another type of mobile traffic classification, referred to as VLAN mobile tagging, takes precedence
over all VLAN rules. If a mobile port receives an 802.1Q packet that contains a VLAN ID tag that
matches a VLAN that has mobile tagging enabled, the port and its traffic are assigned to this VLAN, even
if the traffic matches a rule defined on any other VLAN. See Chapter 5, “Assigning Ports to VLANs,” for
more information about VLAN mobile tag classification.
The VLAN rule precedence table on page 45-9 provides a list of all VLAN rules, including the two inter-
nal rules mentioned above, in the order of precedence that switch software applies to classify mobile port
frames. The first column lists the rule type names, the second and third columns describe how the switch
handles frames that match or don’t match rule criteria. The higher the rule is in the list, the higher its level
of precedence.
When a frame is received on a mobile port, switch software starts with rule one in the rule precedence
table and progresses down the list until there is a successful match between rule criteria and frame
contents. The exception to this is if there is a binding rule violation. In this case, the frame is blocked and
its source port is not assigned to the rule VLAN.
Each binding rule type contains multiple parameters that are used to determine if a mobile port frame qual-
ifies for assignment to the binding rule VLAN, violates one of the binding rule parameter values, or is
simply allowed on the port but not assigned to the binding rule VLAN. For example, as indicated in the
rule precedence table, a mobile port frame is compared to binding MAC-port rule criteria and processed as
follows:
• If the frame source MAC address matches the rule MAC address, then the frame port must also match
the rule port to qualify for assignment to the rule VLAN.
• If the frame source MAC matches but the frame port does not match, then a violation occurs and the
frame is blocked and the port is not assigned to the rule VLAN. There is no further attempt to match
this frame to rules of lower precedence.
• If the frame source MAC does not match but the frame port does match, the frame is allowed but the
port is not assigned to the rule VLAN. The frame is then compared to other rules of lower precedence
in the table or carried on the mobile port default VLAN if the frame does not match any other VLAN
rules and the mobile port default VLAN is enabled.
In the above example, the MAC address parameter defines a critical match value for the binding rule. The
port parameter defines a non-critical match value for the binding rule. When a critical match occurs, the
contents of a frame must also match all other parameter values or the frame is dropped. If a non-critical
match occurs, the frame is still processed even if it does not match all other parameters.
page 45-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules VLAN Rules Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-9
Configuring VLAN Rule Definitions Defining VLAN Rules
Note. If the contents of a mobile port frame matches the values specified in both an IP network address
rule and a port-protocol binding rule, the IP network address rule takes precedence. However, if the
contents of such frame violates the port-protocol binding rule, the frame is dropped.
page 45-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Configuring VLAN Rule Definitions
• When an active device is disconnected from a mobile port and connected to a fixed port, the source
MAC address of that device is not learned on the fixed port until the MAC address has aged out and no
longer appears on the mobile port.
• When a VLAN is administratively disabled, static port and dynamic mobile port assignments are
retained but traffic on these ports is not forwarded. However, VLAN rules remain active and continue
to classify mobile port traffic for VLAN membership.
• When a VLAN is deleted from the switch configuration, all rules defined for that VLAN are automati-
cally removed and any static or dynamic port assignments are dropped.
• It is possible to define MAC-port-IP and MAC-port binding rules for Authenticated VLANs
(AVLANs). However, these rules are not active until the avlan port-bound command is issued for the
AVLAN. Note that these rules only apply to traffic received on authenticated ports. See Chapter 44,
“Configuring Authenticated VLANs,” for more information.
Refer to the following sections (listed in the order of rule precedence) for instructions on how to define
each type of VLAN rule:
Rule See
DHCP MAC Address “Defining DHCP MAC Address Rules” on page 45-11
DHCP MAC Range “Defining DHCP MAC Range Rules” on page 45-12
DHCP Port “Defining DHCP Port Rules” on page 45-12
DHCP Generic “Defining DHCP Generic Rules” on page 45-13
MAC-Port-IP Address Binding “Defining Binding Rules” on page 45-13
MAC-Port Binding
Port-Protocol Binding
MAC Address “Defining MAC Address Rules” on page 45-15
MAC Address Range “Defining MAC Range Rules” on page 45-15
Network Address “Defining IP Network Address Rules” on page 45-16 and
“Defining IPX Network Address Rules” on page 45-17
Protocol “Defining Protocol Rules” on page 45-18
Port “Defining Port Rules” on page 45-19
To display a list of VLAN rules already configured on the switch, use the show vlan rules command. For
more information about this command, refer to the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-11
Configuring VLAN Rule Definitions Defining VLAN Rules
Only one MAC address is specified when using the vlan dhcp mac command to create a DHCP MAC
rule. Therefore, to specify multiple MAC addresses for the same VLAN, create a DHCP MAC rule for
each address. If dealing with a large number of MAC addresses in sequential order, consider using a
DHCP MAC range rule described in the next section.
Use the no form of the vlan dhcp mac command to remove a DHCP MAC address rule.
-> vlan 255 no dhcp mac 00:00:da:59:0c:11
Only valid source MAC addresses are allowed for the low and high end boundary MACs. For example,
multicast addresses (for example, 01:00:00:c5:09:1a) are ignored even if they fall within a specified MAC
range and are not allowed as the low or high end boundary MAC. If an attempt is made to use a multicast
address for one of the boundary MACs, an error message is displayed and the rule is not created.
Use the no form of the vlan dhcp mac range command to remove a DHCP MAC range rule. Note that it
is only necessary to enter the low end MAC address to identify which rule to remove.
-> vlan 1000 no dhcp mac range 00:00:da:00:00:01
To specify multiple ports and/or slots, use a hyphen to specify a range of ports and a space to specify
multiple slots. For example,
-> vlan 255 dhcp port 4/1-5 5/12-20 6/10-15
Use the no form of the vlan dhcp port command to remove a DHCP port rule.
-> vlan 255 no dhcp port 2/10-12 3/1-5 6/1-9
page 45-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Configuring VLAN Rule Definitions
Use the no form of the vlan dhcp generic command to remove a DHCP generic rule.
-> vlan 255 no dhcp generic
3 The device must attach to a specific switch port and use a specific protocol (port-protocol binding
rule).
If frames do not contain matching criteria, they are compared against other existing VLAN rules of lower
precedence. However, if a frame violates criteria of any one binding rule, it is discarded. Refer to “Under-
standing VLAN Rule Precedence” on page 45-8 for more information.
Note that MAC-port-IP and MAC-port binding rules are also supported on Authenticated VLANs
(AVLANs). See Chapter 44, “Configuring Authenticated VLANs,” for more information.
The following subsections provide information about how to define each of the binding rule types.
In this example, frames received on mobile port 2/3 must contain a source MAC address of
00:00:da:59:0c:12 and a source IP address of 21.0.0.10 to qualify for dynamic assignment to VLAN 255.
Use the no form of the vlan binding mac-ip-port command to remove a MAC-port-IP binding rule. Note
that it is only necessary to enter the rule MAC address parameter value to identify which rule to remove.
-> vlan 255 no binding mac-ip-port 00:00:da:59:0c:12
Note that this binding rule type is also supported on AVLANs. See Chapter 44, “Configuring Authenti-
cated VLANs,” for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-13
Configuring VLAN Rule Definitions Defining VLAN Rules
In this example, frames received on mobile port 6/10 must contain a source MAC address of
00:02:9a:3e:f1:06 to qualify for dynamic assignment to VLAN 1500.
Use the no form of the vlan binding mac-port command to remove a MAC-port binding rule. Note that it
is only necessary to enter the rule MAC address parameter value to identify which rule to remove.
-> vlan 1500 no binding mac-port 00:02:9a:3e:f1:06
Note that this binding rule type is also supported on AVLANs. See Chapter 44, “Configuring Authenti-
cated VLANs,” for more information.
The first example command specifies that frames received on mobile port 3/1 must contain an IP SNAP
protocol type to qualify for dynamic assignment to VLAN 1503. The second command specifies that
frames received on mobile port 4/1 must contain a DSAP/SSAP protocol value of F0/F0 to qualify for
dynamic assignment to VLAN 1504.
The following table lists command keywords for specifying a protocol type:
Note that specifying a SNAP protocol type restricts classification of mobile port traffic to the ethertype
value found in the IEEE 802.2 SNAP LLC frame header.
Use the no form of the vlan binding port-protocol command to remove a port-protocol binding rule.
-> vlan 255 no binding port-protocol 8/12 ethertype 0600
page 45-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Configuring VLAN Rule Definitions
Only one MAC address is specified when using the vlan mac command to create a MAC address rule.
Therefore, to specify multiple MAC addresses for the same VLAN, create a separate rule for each address.
If dealing with a large number of MAC addresses, consider using MAC address range rules described in
the next section.
Use the no form of the vlan mac command to remove a MAC address rule.
-> vlan 255 no mac 00:00:da:59:0c:11
Only valid source MAC addresses are allowed for the low and high end boundary MACs. For example,
multicast addresses (for example, 01:00:00:c5:09:1a) are ignored even if they fall within a specified MAC
range and are not allowed as the low or high end boundary MAC. If an attempt is made to use a multicast
address for one of the boundary MACs, an error message is displayed and the rule is not created.
Use the no form of the vlan mac range command to remove a MAC range rule. Note that it is only neces-
sary to enter the low end MAC address to identify which rule to remove.
-> vlan 1000 no mac range 00:00:da:00:00:01
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-15
Configuring VLAN Rule Definitions Defining VLAN Rules
Note. IP network address rules are applied to traffic received on both mobile and fixed (non-mobile) ports.
As a result, fixed port traffic that contains an IP address that is included in the IP subnet specified by the
rule is dropped. However, if the IP network address rule VLAN is also the default VLAN for the fixed
port, then the fixed port traffic is forwarded and not dropped.
To define an IP network address rule, enter vlan followed by an existing VLAN ID then ip followed by a
valid IP network address and an optional subnet mask. For example, the following command creates an IP
network address rule for VLAN 1200:
-> vlan 1200 ip 31.0.0.0 255.0.0.0
In this example, frames received on any mobile port must contain a network 31.0.0.0 source IP address
(for example, 31.0.0.10, 31.0.0.4) to qualify for dynamic assignment to VLAN 1200.
If a subnet mask is not specified, the default class for the IP address is used (Class A, B, or C). For exam-
ple, either one of the following commands create an IP network address rule for network 134.10.0.0:
-> vlan 1200 ip 134.10.0.0 255.255.0.0
-> vlan 1200 ip 134.10.0.0
The pool of available internet IP addresses is divided up into three classes, as shown in the following table.
Each class includes a range of IP addresses. The range an IP network address belongs to determines the
default class for the IP network when a subnet mask is not specified.
Use the no form of the vlan ip command to remove an IP network address rule.
-> vlan 1200 no ip 134.10.0.0
page 45-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Configuring VLAN Rule Definitions
In this example, frames received on any mobile port must contain an IPX network a010590c address with
a Novell Raw (802.3) encapsulation to qualify for dynamic assignment to VLAN 1200.
IPX network addresses consist of eight hex digits. If an address less than eight digits is entered, the entry
is prefixed with zeros to equal eight characters. For example, the following command results in an IPX
network address rule for network 0000250b:
-> vlan 1210 ipx 250b snap
If an encapsulation parameter value is not specified, this value defaults to Ethernet-II encapsulation. For
example, either one of the following commands creates the same IPX network address rule:
-> vlan 1220 ipx 250c e2
-> vlan 1220 ipx 250c
If the IPX network address rule VLAN is going to route IPX traffic, it is important to specify a rule encap-
sulation that matches the IPX router port encapsulation. If there is a mismatch, connectivity with other
IPX devices can not occur. See Chapter 4, “Configuring VLANs,” for information about defining VLAN
IPX router ports.
The following table lists keywords for specifying an encapsulation value:
Use the no form of the vlan ipx command to remove an IPX network address rule. Note that it is only
necessary to specify the IPX network address to identify which rule to remove.
-> vlan 1220 no ipx 250c
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-17
Configuring VLAN Rule Definitions Defining VLAN Rules
The first example command specifies that frames received on any mobile port must contain an IP SNAP
protocol type to qualify for dynamic assignment to VLAN 1503. The second command specifies that
frames received on any mobile port must contain a DSAP/SSAP protocol value of f0/f0 to qualify for
dynamic assignment to VLAN 1504.
If an attempt is made to define an ethertype rule with a protocol type value that is equal to the value
already captured by one of the generic IP or IPX protocol rules, a message displays recommending the use
of the IP or IPX generic rule. The following example shows what happens when an attempt is made to
create a protocol rule with an ethertype value of 0800 (IP Ethertype):
-> vlan 200 protocol ethertype 0800
ERROR: Part of ip ethernet protocol class - use <vlan # protocol ip-e2> instead
Note that specifying a SNAP protocol type restricts classification of mobile port traffic to the ethertype
value found in the IEEE 802.2 SNAP LLC frame header.
Use the no form of the vlan protocol command to remove a protocol rule.
-> vlan 1504 no protocol dsapssap f0/f0
page 45-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Configuring VLAN Rule Definitions
In this example, all traffic on VLAN 755 is flooded out mobile port 2 on slot 3.
Note that it is possible to define a port rule for a non-mobile (fixed, untagged) port, however, the rule is
not active until mobility is enabled on the port.
Use the no form of the vlan port command to remove a port rule.
-> vlan 755 no port 2/3
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-19
Application Example: DHCP Rules Defining VLAN Rules
The VLANs
This application example contains three (3) VLANs. These VLANs are called Test, Production, and
Branch. The Test VLAN connects to the main network, the Production VLAN, through an external router.
The configuration of this VLAN is self-contained, making it easy to duplicate for testing purposes. The
Test VLAN contains its own DHCP server and DHCP clients. The clients gain membership to the VLAN
through DHCP port rules.
The Production VLAN carries most of the traffic in this network. It does not contain a DHCP server, but
does contain DHCP clients that gain membership through DHCP port rules. Two external routers connect
this VLAN to the Test VLAN and a Branch VLAN. One of the external routers—the one connected to the
Branch VLAN—has DHCP Relay functionality enabled. It is through this router that the DHCP clients in
the Production VLAN access the DHCP server in the Branch VLAN.
The Branch VLAN contains a number of DHCP client stations and its own DHCP server. The DHCP
clients gain membership to the VLAN through both DHCP port and MAC address rules. The DHCP server
allocates IP addresses to all Branch and Production VLAN clients.
page 45-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Application Example: DHCP Rules
The following table summarizes the VLAN architecture and rules for all devices in this network configu-
ration. The diagram on the following page illustrates this network configuration.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-21
Application Example: DHCP Rules Defining VLAN Rules
OmniSwitch
Client 1
DHCP Port
Rule
Server 1 Test VLAN
10.15.14.16 IP Subnet 10.15.X.X Client 2
DHCP Port Rules DHCP Port
Rule
Client 3
Router 1 DHCP
No DHCP Port Rule
Relay
Production VLAN Client 4
IP Subnet 10.15.128.X DHCP
DHCP Port Rules Port Rule
Router 2
DHCP
Relay On Client 5
DHCP
Port Rule
Client 7
DHCP
MAC
Client 8
DHCP Servers DHCP
Both DHCP servers become members in their MAC
respective VLANs via IP subnet rules.
DHCP Clients
Routers
Clients 1 to 6 are assigned to their respective
Router 1 provides connectivity between the Test VLANs through DHCP port rules. Clients 3 and
VLAN and the Production VLAN. It does not 4 are not in a VLAN with a DHCP server so they
have Bootup functionality enabled so it cannot must rely on the server in the Branch VLAN for
connect DHCP servers and clients from different initial addressing information. Clients 7 and 8
VLANs. share a port with other devices, so they are
assigned to the Branch VLAN via DHCP MAC
Router 2 connects the Production VLAN and the address rules.
Branch VLAN. With DHCP Relay enabled, this
router can provide connectivity between the
DHCP server in the Branch VLAN and the DHCP
clients in the Production VLAN.
page 45-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Defining VLAN Rules Verifying VLAN Rule Configuration
show vlan rules Displays a list of rules for one or all VLANs configured on the switch.
For more information about the resulting display from this command, see the OmniSwitch AOS Release 6
CLI Reference Guide. An example of the output for the show vlan rules command is also given in
“Sample VLAN Rule Configuration” on page 45-3.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 45-23
Verifying VLAN Rule Configuration Defining VLAN Rules
page 45-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
46 Configuring Network
Security
Network Security (also known as Alcatel-Lucent Traffic Anomaly Detection feature) is a network
monitoring feature that aims to detect the anomalies in the network by analyzing the patterns of ingress
and egress packets on a port. These anomalies occur when the traffic patterns of a port do not meet the
expectations. The detection of anomalies results in logging, SNMP trap generation, and shutting down of
the anomalous port. This feature is mainly used in the Layer2 domain.
In This Chapter
This chapter describes Network Security features and how to configure them through the Command Line
Interface (CLI). CLI commands are used in the configuration examples. For more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include the following:
• “Creating Monitoring-Group and Associating Port Range” on page 46-6.
For information about CLI commands that can be used to view Network Security, see the OmniSwitch
AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 46-1
Network Security Specifications Configuring Network Security
page 46-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Network Security Quick Steps for Configuring Network Security
2 To configure the different anomaly parameters of a monitoring-group, use the netsec group anomaly
command. For example:
-> netsec group group1 anomaly arp-flood state enable period 60
4 Check the summary of a particular anomaly or all the anomalies in a group. For example, to view the
summary of arp-flood anomaly that belong to “group1”, enter:
-> show netsec group group1 anomaly arp-flood summary
Note. Optional. To verify the Network Security summary of a specific anomaly on port 1 of slot 2, enter
show netsec summary command. For example:
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 46-3
Network Security Overview Configuring Network Security
Anomalies
A network traffic anomaly refers to deviations in the rates of a user-port ingress and egress packets from
expectations. The anomalies are monitored in the network by observing the network traffic for a
configurable time period. During this period, the Network Security counts relevant packets on a port.
Anomalies may occur in scenarios, such as the following:
• When a high number of TCP SYN packets are not expected from a user-port in a short period.
• When more than one ARP response is received for every ARP request.
• When a high number of TCP RST packets are not expected in a network in a short period.
The above listed scenarios occur in a network due to malicious systems in the network, or when a network
is attacked or misconfigured.
Network Security detects the following anomalies:
Anomaly Description
ARP Address Scan Occurs when a host sends a burst of ARP requests for multiple IP
addresses.
ARP Flood Occurs when a host receives a burst of ARP request packets.
ARP Failure Occurs when ARP queries do not elicit ARP responses.
ICMP Address Scan Occurs when multiple hosts receive ICMP echo request packets at the
same time.
ICMP Flood Occurs when a host receives a burst of ICMP echo request packets.
ICMP Unreachable Occurs when a host receives a flood of ICMP Unreachable packets.
TCP Port Scan Occurs when a host receives a burst of TCP SYN packets for multiple
TCP ports.
TCP Address Scan Occurs when multiple hosts receive TCP SYN packets at the same
time.
SYN Flood Occurs when a host receives a burst of TCP SYN packets on the same
TCP port.
SYN Failure Occurs when a host receives fewer SYNACKs than SYNs it sent out.
SYN-ACK Scan Occurs when a host receives more SYNACKs than SYNs it sent out.
page 46-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Network Security Network Security Overview
Monitoring Group
A monitoring-group is used by Network Security to configure the anomaly detection on sets of ports. A
monitoring-group is identified by a name and has a set of ports as its members. A monitoring-group is
created by adding a set of ports to the group or by configuring an anomaly parameter for the group. A
monitoring-group exists as long as it has a member port or has at least one of its anomaly parameters
configured.
The network security configurations are applied according to the monitoring-groups. The anomaly
detection parameters of monitoring-groups can be configured by the user. Also, the user can add or
remove a port in the monitoring-group. A port can be moved from one monitoring-group to another, but it
cannot exist in more than one monitoring-group at a time. Network security is disabled on a port that is not
a member of a monitoring-group.
Network Security changes an anomaly parameter configuration across all monitoring-groups in the
following ways:
• Group-name “all”, overwrites the configuration for all the monitoring-groups.
• Anomaly “all”, overwrites the configuration for all the anomalies.
Network Security has a predefined monitoring-group “default”, and allows a maximum of 32
monitoring-groups including "default" at a time. Network Security applies the rules to match the specific
packets when a port is in a monitoring-group. These rules exist as long as the port is a member of any
monitoring-group.
The statistics for the packets are maintained on a per-port basis and are available when a port is a member
of the monitoring-group. When a port is removed from the monitoring-group, the statistics for the packets
are cleared. If a monitoring port is moved from one monitoring-group to another, the statistics of the port
do not get cleared. A port's anomaly statistics are tracked when that anomaly is configured to be moni-
tored on that port, and are cleared when monitoring is stopped for that anomaly.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 46-5
Configuring Network Security Configuring Network Security
To associate a range of ports with a monitoring-group, enter netsec group followed by the group name
and port followed by the slot number, a slash(/), the first port number, a hyphen(-), and the last port
number. For example, to associate ports 3 through 5 on slot 2 with monitoring-group “group1”, enter:
-> netsec group group1 port 2/3-5
To disassociate a range of ports from the monitoring-group, enter no netsec group followed by the group
name and port followed by the slot number, a slash(/), the first port number, a hyphen(-), and the last port
number. For example, to disassociate ports 3 through 5 on slot 2 from the monitoring-group “group1”,
enter:
-> no netsec group group1 port 2/3-5
anomaly name
arp-addr-scan
arp-flood
arp-failure
icmp-addr-scan
icmp-flood
icmp-unreachable
page 46-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Network Security Configuring Network Security
anomaly name
tcp-port-scan
tcp-addr-scan
syn-flood
syn-failure
syn-ack-scan
fin-scan
fin-ack-diff
rst-count
To configure the anomaly to be monitored, enter netsec group, the group name, anomaly, the anomaly
name, and the optional keywords shown in the table below:
For example, to enable or disable the anomaly parameter log of the monitoring-group “group1”, enter:
-> netsec group group1 anomaly arp-flood log enable
For example, to configure the anomaly parameter period of the monitoring-group “ad”, enter:
-> netsec group ad anomaly tcp-port-scan period 30
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 46-7
Configuring Network Security Configuring Network Security
For more information about the resulting display from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide.
page 46-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
47 Configuring Port
Mapping
Port Mapping is a security feature, which controls communication between peer users. Each session
comprises a session ID, a set of user ports, and/or a set of network ports. The user ports within a session
cannot communicate with each other and can only communicate through network ports. In a port mapping
session with user port set A and network port set B, the ports in set A can only communicate with the ports
in set B. If set B is empty, the ports in set A can communicate with rest of the ports in the system.
A port mapping session can be configured in the unidirectional or bidirectional mode. In the
unidirectional mode, the network ports can communicate with each other within the session. In the
bidirectional mode, the network ports cannot communicate with each other. Network ports of a
unidirectional port mapping session can be shared with other unidirectional sessions, but cannot be shared
with any sessions configured in the bidirectional mode. Network ports of different sessions can
communicate with each other.
In This Chapter
This chapter describes the port mapping security feature and explains how to configure the same through
the Command Line Interface (CLI).
Configuration procedures described in this chapter include:
• Creating/Deleting a Port Mapping Session—see “Creating a Port Mapping Session” on page 47-3 or
“Deleting a Port Mapping Session” on page 47-4.
• Enabling/Disabling a Port Mapping Session—see “Enabling a Port Mapping Session” on page 47-4 or
“Disabling a Port Mapping Session” on page 47-4.
• Configuring a Port Mapping Direction—see “Configuring Unidirectional Port Mapping” on page 47-5
and “Restoring Bidirectional Port Mapping” on page 47-5.
• Configuring an example Port Mapping Session—see “Sample Port Mapping Configuration” on
page 47-6.
• Verifying a Port Mapping Session—see “Verifying the Port Mapping Configuration” on page 47-7.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 47-1
Port Mapping Specifications Configuring Port Mapping
page 47-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Port Mapping Quick Steps for Configuring Port Mapping
2 Enable the port mapping session with the port mapping command. For example:
Note. You can verify the configuration of the port mapping session by entering show port mapping
followed by the session ID.
-> show port mapping 3
You can also verify the status of a port mapping session by using the port mapping dynamic-proxy-arp
command.
You can create a port mapping session with link aggregate network ports. For example, to create a port
mapping session 3 with network ports of link aggregation group 7, you would enter:
-> port mapping 3 network-port linkagg 7
You can specify all the ports of a slot to be assigned to a mapping session. For example, to create a port
mapping session 3 with all the ports of slot 1 as network ports, you would enter:
-> port mapping 3 network-port slot 1
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 47-3
Enabling/Disabling a Port Mapping Session Configuring Port Mapping
You can specify a range of ports to be assigned to a mapping session. For example, to create a port
mapping session 4 with ports 5 through 8 on slot 2 as user ports, you would enter:
-> port mapping 4 user-port 2/5-8
Similarly, to delete the network ports of link aggregation group 7 of a mapping session 4, you would enter:
-> port mapping 4 no network-port linkagg 7
Note. You must delete any attached ports with the port mapping user-port network-port command
before you can delete a port mapping session.
page 47-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Port Mapping Configuring a Port Mapping Direction
Note. To change the direction of an active session with network ports, delete the network ports of the
session, change the direction, and recreate the network ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 47-5
Sample Port Mapping Configuration Configuring Port Mapping
The Switch D is configured by creating a port mapping session 1 with user ports 2/1, 2/2 and network
ports 1/1.
3/1 3/2 3/3 2/1
Switch A Switch C
1/1 1/1 3/1
2/1
1/2 3/2
2/2
1/3 Switch B Switch D
1/1 2/1
2/1
2/2
2/2
3/1 3/1
page 47-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Port Mapping Verifying the Port Mapping Configuration
2 Create two port mapping sessions on Switch A using the following commands:
Similarly, create and enable a port mapping session 1 on Switch D by entering the following commands:
-> port mapping 1 user-port 2/1-2 network-port 1/1
port mapping dynamic-proxy- Displays the status of one or more port mapping sessions.
arp
show port mapping Displays the configuration of one or more port mapping sessions.
For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 47-7
Verifying the Port Mapping Configuration Configuring Port Mapping
page 47-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
48 Configuring Learned
Port Security
Learned Port Security (LPS) provides a mechanism for authorizing source learning of MAC addresses on
Ethernet and Gigabit Ethernet ports. The only types of Ethernet ports that LPS does not support are link
aggregate and tagged (trunked) link aggregate ports. Using LPS to control source MAC address learning
provides the following benefits:
• A configurable source learning time limit that applies to all LPS ports.
• Two methods for handling unauthorized traffic: stopping all traffic on the port or only blocking traffic
that violates LPS criteria.
In This Chapter
This chapter describes how to configure LPS parameters through the Command Line Interface (CLI). CLI
commands are used in the configuration examples; for more details about the syntax of commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
Configuration procedures described in this chapter include:
• Enabling LPS for a port on page 48-9.
• Specifying a source learning time limit for all LPS ports on page 48-10.
• Configuring the maximum number of MAC addresses learned per port on page 48-14.
• Configuring the maximum number of filtered MAC addresses learned per port on page 48-15.
• Configuring a list of authorized MAC addresses for an LPS port on page 48-15.
• Configuring a range of authorized MAC addresses for an LPS port on page 48-16.
• Selecting the security violation mode for an LPS port on page 48-17.
For more information about source MAC address learning, see Chapter 3, “Managing Source Learning.”
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-1
Learned Port Security Specifications Configuring Learned Port Security
page 48-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Sample Learned Port Security Configuration
• Defining the maximum number of learned MAC addresses allowed on an LPS port.
• Defining the time limit to allow source learning on all LPS ports.
LPS is supported on Ethernet and gigabit Ethernet fixed, mobile, tagged and authenticated ports. LPS is
not supported on link aggregate and tagged (trunked) link aggregate ports.
1 Enable LPS on ports 6 through 12 on slot 3, 4, and 5 using the following command:
2 Set the total number of learned MAC addresses allowed on the same ports to 25 using the following
command:
-> port-security 3/6-12 4/6-12 5/6-12 maximum 25
3 Configure the amount of time in which source learning is allowed on all LPS ports to 30 minutes using
the following command:
-> port-security shutdown 30
4 Select shutdown for the LPS violation mode using the following command:
Note. Optional. To verify LPS port configurations, use the show port-security command. For example:
Port: 7/10
Operation Mode : ENABLED,
Max MAC bridged : 1,
Trap Threshold : DISABLED,
Max MAC filtered : 5,
Low MAC Range : 00:00:00:00:00:00,
High MAC Range : ff:ff:ff:ff:ff:ff,
Violation : RESTRICT,
Violating MAC : NULL
To verify the new source learning time limit value, use the show port-security shutdown command. For
example:
-> show port-security shutdown
LPS Shutdown Config = 25 min,
Convert-to-static = DISABLE,
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-3
Sample Learned Port Security Configuration Configuring Learned Port Security
No Aging = ENABLE,
Boot Up = ENABLE,
Learn As Static = DISABLE,
Mac Move = DISABLE,
Remaining Learning Window = 882 sec,
page 48-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Learned Port Security Overview
Additional LPS functionality allows the user to specify how the LPS port handles unauthorized traffic.
The following two options are available for this purpose:
• Block only traffic that violates LPS port restrictions; authorized traffic is forwarded on the port.
• Disable the LPS port when unauthorized traffic is received; all traffic is stopped and a port reset is
required to return the port to normal operation.
LPS functionality is supported on the following Ethernet and Gigabit Ethernet port types:
• Fixed (non-mobile)
• Mobile
• 802.1Q tagged
• Authenticated
• 802.1x
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-5
Learned Port Security Overview Configuring Learned Port Security
• Is the number of MAC addresses learned on the port below the maximum number allowed?
• Is the number of MAC addresses learned on the port below the maximum Filtered MAC allowed?
• Is there a configured authorized MAC address entry for the LPS port that matches the packet’s source
MAC address?
Using the above criteria, the following table shows the conditions under which a MAC address is learned
or blocked on an LPS port:
When the learning window expires the system will learn the filtering MACs up to the maximum limit and
the LPS port will go on violation.
When a source MAC address violates any of the LPS conditions, the address is considered unauthorized.
The LPS violation mode determines if the unauthorized MAC address is simply blocked (filtered) on the
port or if the entire port is disabled (see “Selecting the Security Violation Mode” on page 48-17). Regard-
less of which mode is selected, notice is sent to the Switch Logging task to indicate that a violation has
occurred.
page 48-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Learned Port Security Overview
Note. A dynamic MAC address learned on an LPS port is flushed when a port goes down, or MAC ages
out, or the MAC address entry in the LPS table is not saved.
On enabling "no-aging" on an LPS port, the MAC addresses are automatically learned as pseudo static
MAC addresses during the LPS learning window time period. These learned MAC addresses are not
affected by aging and flushing operations that occur during the learning window.
Once the learning window expires, if the ‘convert-to-static’ option is disabled, these MAC addresses
remain as pseudo static. Else if the ‘convert-to-static’ is enabled, the pseudo static MAC addresses are
converted to static address.
Note. Statically configured authorized MAC addresses are displayed permanently in the MAC address
table for the specified LPS port; they will not be learned on any other port in the same VLAN.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-7
Learned Port Security Overview Configuring Learned Port Security
Example:
-> vlan 2
-> vlan 2 port default 1/3
-> vlan 2 port default 1/4
-> port-security 1/3 mac 00:00:00:00:00:01
-> port-security 1/4 mac 00:00:00:00:00:01
Note.
• Static MAC Address movement is not allowed on LPS ports configured as UNI ports.
• System supports static MAC moves only on the LPS ports where static MAC is configured on
different ports in a given VLAN.
• When static MAC is configured on different LPS ports in a VLAN, the static MAC is valid only on one
port. This port is either an ingress port or the first port on which LPS static MAC is configured.
• The maximum number of MAC addresses that can be filtered on the port.
• The violation mode selected for the port; restrict, shutdown or discard.
• The management status for the MAC address entry; configured or dynamic.
If the LPS port is shut down or the network device is disconnected from the port, the LPS table entries and
the source learning MAC address table entries for the port are automatically cleared. In addition, if an LPS
table entry is intentionally cleared from the table, the MAC address for this entry is automatically cleared
from the source learning table at the same time. To override this behavior, a dynamic MAC address can be
converted to a static MAC address using the port-security convert-to-static command.
To view the contents of the LPS table, use the show port-security command. Refer to the OmniSwitch
AOS Release 6 CLI Reference Guide for more information about this command.
page 48-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Configuring Learned Port Security
To enable LPS on multiple ports, specify a range of ports or multiple slots. For example:
-> port-security 4/1-5 admin-status enable
-> port-security 5/12-20 6/10-15 admin-status enable
When LPS is enabled on an active port, all MAC addresses learned on that port prior to the time LPS was
enabled are cleared from the source learning MAC address table.
To disable LPS on a port, use the port-security command with the disable parameter. For example, the
following command disables LPS on a range of ports:
-> port-security 5/21-24 6/1-4 admin-status disable
To convert all learned bridge MAC address on LPS port into static MAC address, use the port-security
chassis command with the convert-to-static parameter. For example:
-> port-security chassis convert-to-static
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-9
Configuring Learned Port Security Configuring Learned Port Security
To disable all the LPS ports on a chassis, use the port-security chassis disable command, as shown:
-> port-security chassis disable
When LPS is disabled on a port, MAC address entries for that port are retained in the LPS table. The next
time LPS is enabled on the port, the same LPS table entries are again active. If there is a switch reboot
before the switch configuration is saved, however, dynamic MAC address entries are discarded from the
table.
To disable source learning on the specified LPS port(s), use the port-security command with the locked
parameter. For example, the following command disables source learning on port 3 of slot 4:
-> port-security 4/3 admin-status locked
Use the no form of this command to remove LPS and clear all entries (configured and dynamic) in the
LPS table for the specified port. For example:
-> no port-security 5/10
After LPS is removed, all the dynamic and static MAC addresses will be flushed and the learning of new
MAC addresses will be enabled.
The LPS source learning time limit is a switch-wide parameter that applies to all LPS enabled ports, not
just one or a group of LPS ports. The following command example sets the time limit value to 30 minutes:
-> port-security shutdown time 30
Once the time limit value expires, source learning of any new dynamic MAC addresses is stopped on all
LPS ports even if the number of addresses learned does not exceed the maximum allowed.
Note. The LPS source learning time window has a higher priority over the maximum number of MAC
addresses allowed. Therefore, if the learning interval expires before the port has learned the maximum
MAC addresses allowed, the port will not learn anymore MAC addresses.
When the source learning time window expires, all the dynamic MAC addresses learned on the LPS ports
start to age out. To prevent aging out, all dynamic MAC addresses must be converted to static MAC
addresses. The convert-to-static parameter used with the port-security shutdown command enables or
disables the conversion of dynamic MAC addresses to static MAC addresses on LPS ports when the
source learning time window expires.
page 48-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Configuring Learned Port Security
To enable the conversion of dynamic MAC addresses to static MAC addresses on LPS ports when the
source learning time window expires, use the port-security shutdown command with the
convert-to-static parameter, as shown:
-> port-security shutdown 30 convert-to-static enable
To disable the conversion of dynamic MAC addresses to static MAC addresses when the source learning
time window expires, use the port-security shutdown command with the convert-to-static parameter, as
shown:
-> port-security shutdown 30 convert-to-static disable
To convert the dynamically learned MAC addresses to static addresses on a specific LPS port at any time
irrespective of the source learning time window, use the port-security convert-to-static command. For
example, to convert the dynamic MAC addresses on port 8 of slot 4 to static ones, enter:
-> port-security 4/8 convert-to-static
When the no-aging parameter is enabled with the port-security shutdown command, all the bridged LPS
MAC addresses learned during the learning window are not aged-out from the system. These MAC
addresses are learned as pseudo static MAC addresses. For example:
-> port-security shutdown 60 no-aging enable
The bridged LPS MACs will be removed from the system when the no port-security command or no
mac-address-table command is issued.
To start the learning window automatically at boot-up time or on switch restart, use the port-security
shutdown command with the boot-up parameter enabled. For example:
-> port-security shutdown 60 boot-up enable
Note.
• The number of converted static MAC addresses cannot exceed the maximum number of MAC
addresses allowed on the LPS ports.
• The conversion of dynamic MAC addresses to static ones does not apply to LPS mobile and
authenticated ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-11
Configuring Learned Port Security Configuring Learned Port Security
page 48-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Configuring Learned Port Security
Note. The port-security shutdown 0 default option can be used to set all the options for learning window
to their default values. For example:
-> port-security shutdown 0 default
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-13
Configuring Learned Port Security Configuring Learned Port Security
To specify a maximum number of MAC addresses allowed for multiple ports, specify a range of ports or
multiple slots. For example:
-> port-security 1/10-15 maximum 10
-> port-security 2/1-5 4/2-8 5/10-14 maximum 25
Configured MAC addresses count towards the maximum number allowed. For example, if there are 10
configured authorized MAC addresses for an LPS port and the maximum number of addresses allowed is
set to 15, then only five dynamically learned MAC address are allowed on this port.
If the maximum number of MAC addresses allowed is reached before the switch LPS time limit expires,
then all source learning of dynamic and configured MAC addresses is stopped on the LPS port.
Sending a trap when this threshold is reached provides notification of newly learned bridged MAC
addresses. Trap contents includes identifying information about the MAC, such as the address itself, the
corresponding IP address, switch identification, and the slot and port number on which the MAC was
learned.
page 48-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Configuring Learned Port Security
To specify a maximum number of filtered MAC addresses learned on multiple ports, specify a range of
ports or multiple slots. For example:
-> port-security 5/9-15 max-filtering 10
-> port-security 1/1-5 7/2-8 2/10-14 max-filtering 25
If the maximum number of filtered MAC addresses allowed is reached, either the LPS port is disabled
(Shutdown Violation mode) or MAC address learning is disabled (Restrict Violation mode). Under both
these modes, SNMP traps are generated and the events are logged in the switch log. For information on
configuring the security violation modes, see “Selecting the Security Violation Mode” on page 48-17.
Note. If a VLAN is not specified, the default VLAN for the port is used.
Use the no form of this command to clear configured and/or dynamic MAC address entries from the LPS
table. For example, the following command removes a MAC address entry for port 4 of slot 6 that belongs
to VLAN 10 from the LPS table:
-> port-security 6/4 no mac 00:20:da:9f:58:0c vlan 10
Note that when a MAC address is cleared from the LPS table, it is automatically cleared from the source
learning MAC address table at the same time.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-15
Configuring Learned Port Security Configuring Learned Port Security
To configure a source MAC address range for multiple ports, specify a range of ports or multiple slots. For
example:
-> port-security 4/1-5 mac-range low 00:20:da:00:00:10 high 00:20:da:00:00:50
-> port-security 2/1-4 4/5-8 mac-range low 00:20:d0:59:0c:9a high
00:20:d0:59:0c:9f
To set the range back to the default values, enter port-security followed by the port’s slot/port designa-
tion, then mac-range. Leaving off the low and high MAC addresses will reset the range back to
00:00:00:00:00:00 and ff:ff:ff:ff:ff:ff. For example, the following command sets the authorized MAC
address range to the default values for port 12 of slot 4:
-> port-security 4/12 mac-range
In addition, specifying a low end MAC and a high end MAC is optional. If either one is not specified, the
default value is used. For example, the following commands set the authorized MAC address range on the
specified ports to 00:da:25:59:0c:10–ff:ff:ff:ff:ff:ff and 00:00:00:00:00:00–00:da:25:00:00:9a:
-> port-security 2/8 mac-range low pp:da:25:59:0c
-> port-security 2/10 mac-range high 00:da:25:00:00:9a
Refer to the OmniSwitch AOS Release 6 CLI Reference Guide for more information about this command.
page 48-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Learned Port Security Configuring Learned Port Security
To configure the security violation mode for multiple LPS ports, specify a range of ports or multiple slots.
For example:
-> port-security 4/1-10 violation shutdown
-> port-security 1/10-15 2/1-10 violation restrict
-> port-security 3/4 violation discard
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 48-17
Displaying Learned Port Security Information Configuring Learned Port Security
show port-security Displays Learned Port Security (LPS) configuration and table
entries.
show port-security shutdown Displays the amount of time during which source learning can
occur on all LPS ports.
show port-security brief Displays the per port LPS parameters configured for all the ports.
For more information about the resulting display from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide. An example of the output for the show port-security and show port-security
shutdown commands is also given in “Sample Learned Port Security Configuration” on page 48-3.
page 48-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
49 Diagnosing Switch
Problems
Several tools are available for diagnosing problems that may occur with the switch. These tools include:
• Port Mirroring
• Port Monitoring
• sFlow
Port mirroring copies all incoming and outgoing traffic from a single mirrored Ethernet port to a second
mirroring Ethernet port, where it can be monitored with a Remote Network Monitoring (RMON) probe or
network analysis device without disrupting traffic flow on the mirrored port. The port monitoring feature
allows you to examine packets to and from a specific Ethernet port. sFlow is used for measuring high
speed switched network traffic. It is also used for collecting, storing, and analyzing the traffic data. Switch
Health monitoring software checks previously configured threshold levels for the switch’s consumable
resources, and notifies the Network Monitoring Station (NMS) if those limits are violated.
In This Chapter
This chapter describes port mirroring, port monitoring, remote monitoring (RMON) probes, sFlow, and
switch health features and explains how to configure the same through the Command Line Interface (CLI).
Configuration procedures described in this chapter include:
• Creating or Deleting a Port Mirroring Session—see “Creating a Mirroring Session” on page 49-18 or
“Deleting A Mirroring Session” on page 49-21.
• Protection from Spanning Tree changes (Port Mirroring)—see “Unblocking Ports (Protection from
Spanning Tree)” on page 49-19.
• Enabling or Disabling Port Mirroring Status—see “Enabling or Disabling Mirroring Status” on
page 49-19 or “Disabling a Mirroring Session (Disabling Mirroring Status)” on page 49-19.
• Configuring Port Mirroring Direction—see “Configuring Port Mirroring Direction” on page 49-20.
• Enabling or Disabling a Port Mirroring Session—see “Enabling or Disabling a Port Mirroring Session
(Shorthand)” on page 49-20.
• Configuring a Port Monitoring Session—see “Configuring a Port Monitoring Session” on page 49-25.
• Enabling a Port Monitoring Session—see “Enabling a Port Monitoring Session” on page 49-25.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-1
In This Chapter Diagnosing Switch Problems
• Disabling a Port Monitoring Session—see “Disabling a Port Monitoring Session” on page 49-25.
• Deleting a Port Monitoring Session—see “Deleting a Port Monitoring Session” on page 49-25.
• Pausing a Port Monitoring Session—see “Pausing a Port Monitoring Session” on page 49-26.
• Configuring the persistence of a Port Monitoring Session—see “Configuring Port Monitoring Session
Persistence” on page 49-26.
• Configuring a Port Monitoring data file—see “Configuring a Port Monitoring Data File” on
page 49-26.
• Suppressing creation of a Port Monitoring data file—see “Suppressing Port Monitoring File Creation”
on page 49-27.
• Configuring a Port Monitoring direction—see “Configuring Port Monitoring Direction” on page 49-27.
• Displaying Port Monitoring Status and Data—see “Displaying Port Monitoring Status and Data” on
page 49-28.
• Configuring a sFlow Session—see “Configuring a sFlow Session” on page 49-30.
• Configuring a Fixed Primary Address—see “Configuring a Fixed Primary Address” on page 49-31.
• Enabling or Disabling RMON Probes—see “Enabling or Disabling RMON Probes” on page 49-36.
• Configuring Resource Threshold Limits (Switch Health)—see “Configuring Resource and Tempera-
ture Thresholds” on page 49-43.
• Configuring Sampling Intervals—see “Configuring Sampling Intervals” on page 49-45.
• Resetting Health Statistics—see “Resetting Health Statistics for the Switch” on page 49-47.
For information about additional Diagnostics features such as Switch Logging and System Debugging/
Memory Management commands, see Chapter 55, “Using Switch Logging.”
page 49-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Mirroring Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-3
Port Mirroring Overview Diagnosing Switch Problems
Note. Optional. To verify the port mirroring configuration, enter show port mirroring status followed by
the port mirroring session ID number. The display is similar to the one shown below:
-> show port mirroring status 6
For more information about this command, see “Displaying Port Mirroring Status” on page 49-21 or the
“Port Mirroring and Monitoring Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference
Guide.
page 49-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Monitoring Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-5
Port Monitoring Overview Diagnosing Switch Problems
2 Enable the port monitoring session by entering port monitoring, followed by the port monitoring
session ID, source, the slot and port number of the port to be monitored, and enable. For example:
-> port monitoring 6 source 2/3 enable
3 Optional. Configure optional parameters. For example, to create a file called “monitor1” for port moni-
toring session 6 on port 2/3, enter:
-> port monitoring 6 source 2/3 file monitor1
Note. Optional. To verify the port monitoring configuration, enter show port mirroring status, followed
by the port monitoring session ID number. The display is similar to the one shown below:
-> show port monitoring status
For more information about this command, see “Port Monitoring” on page 49-24 or the “Port Mirroring
and Monitoring Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide.
page 49-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems sFlow Overview
sFlow Overview
The following sections detail the specifications, defaults, and quick set up steps for the sFlow feature.
Detailed procedures are found in “sFlow” on page 49-29.
sFlow Specifications
RFCs Supported 3176 - sFlow
Management Information Base
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
Sampling Sampling rate of one (1) counts all packets and 0
(zero) disables sampling.
Agent IP Address Configurable using ip managed-interface com-
mand.
sFlow Defaults
The following table shows sFlow default values:
sFlow Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-7
sFlow Overview Diagnosing Switch Problems
1 To create a sFlow receiver session, use the sflow agent command by entering sflow
receiver, followed by the receiver index, name, and the address to be monitored. For example:
-> sflow receiver 1 name Golden address 198.206.181.3
2 Optional. Configure optional parameters. For example, to specify the timeout value “65535” for sFlow
receiver session on address 198.206.181.3, enter:
-> sflow receiver 1 name Golden address 198.206.181.3 timeout 65535
Note. Optional. To verify the sFlow receiver configuration, enter show sflow receiver, followed by the
sFlow receiver index. The display is similar to the one shown below:
-> show sflow receiver
Receiver 1
Name = Golden
Address = IP_V4 198.206.181.3
UDP Port = 6343
Timeout = 65535
Packet Size= 1400
DatagramVer= 5
For more information about this command, see “sFlow” on page 49-29 or the “sFlow Commands” chapter
in the OmniSwitch AOS Release 6 CLI Reference Guide.
1 To create a sFlow sampler session, use the sflow sampler command by entering sflow
sampler, followed by the instance ID, port list, receiver, and the rate. For example:
-> sflow sampler 1 2/1-5 receiver 1 rate 2048
2 Optional. Configure optional parameters. For example, to specify the sample-hdr-size value “128” for
sFlow sampler instance 1 on ports 2/1-5, enter:
-> sflow sampler 1 2/1-5 receiver 1 rate 2048 sample-hdr-size 128
Note. Optional. To verify the sFlow sampler configuration, enter show sflow sampler, followed by the
sFlow sampler instance ID. The display is similar to the one shown below:
-> show sflow sampler 1
page 49-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems sFlow Overview
For more information about this command, see “sFlow” on page 49-29 or the “sFlow Commands” chapter
in the OmniSwitch AOS Release 6 CLI Reference Guide.
1 To create a sFlow poller session, use the sflow poller command by entering sflow
poller, followed by the instance ID, port list, receiver, and the interval. For example:
-> sflow poller 1 2/6-10 receiver 1 interval 30
Note. Optional. To verify the sFlow poller configuration, enter show sflow poller, followed by the sFlow
poller instance ID. The display is similar to the one shown below:
-> show sflow poller
For more information about this command, see “sFlow” on page 49-29 or the “sFlow Commands” chapter
in the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-9
Remote Monitoring (RMON) Overview Diagnosing Switch Problems
RMON Specifications
RFCs Supported 2819 - Remote Network Monitoring
Management Information Base
Platforms Supported OmniSwitch 6400, 6850E, 6855, 9000E
RMON Functionality Supported Basic RMON 4 group implementation
–Ethernet Statistics group
–History (Control and Statistics) group
–Alarms group
–Events group
RMON Functionality Not Supported RMON 10 group*
RMON2*
–Host group
–HostTopN group
–Matrix group
–Filter group
–Packet Capture group
(*An external RMON probe that includes
RMON 10 group and RMON2 may be used
where full RMON probe functionality is
required.)
Flavor (Probe Type) Ethernet/History/Alarm
Status Active/Creating/Inactive
History Control Interval (seconds) 1 to 3600
History Sample Index Range 1 to 65535
Alarm Interval (seconds) 1 to 2147483647
Alarm Startup Alarm Rising Alarm/Falling Alarm/
RisingOrFalling Alarm
Alarm Sample Type Delta Value/Absolute
RMON Traps Supported RisingAlarm/FallingAlarm
These traps are generated whenever an Alarm
entry crosses either its Rising Threshold or its
Falling Threshold and generates an event con-
figured for sending SNMP traps.
page 49-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Remote Monitoring (RMON) Overview
2 To verify the RMON probe configuration, enter the show rmon probes command, with the keyword
for the type of probe. For example, to display the statistics probes, enter the following:
-> show rmon probes stats
3 To view statistics for a particular RMON probe, enter the show rmon probes command, with the
keyword for the type of probe, followed by the entry number for the desired RMON probe. For example:
-> show rmon probes 1011
For more information about these commands, see “Displaying a List of RMON Probes” on page 49-37,
“Displaying Statistics for a Particular RMON Probe” on page 49-38, or the “RMON Commands” chapter
in the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-11
Switch Health Overview Diagnosing Switch Problems
page 49-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Switch Health Overview
The default settings for the command you entered will be displayed. For example:
Rx Threshold = 80
TxRx Threshold = 80
Memory Threshold = 80
CPU Threshold = 80
Temperature Threshold = 60
2 Enter the appropriate command to change the required health threshold or health sampling interval
parameter settings or reset all health statistics for the switch. For example:
-> health threshold memory 85
Note. Optional. To verify the Switch Health configuration, enter show health threshold, followed by the
parameter you modified (e.g., memory). The display is similar to the one shown below:
Memory Threshold = 85
For more information about this command, see “Displaying Health Threshold Limits” on page 49-44 or
the “Health Monitoring Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-13
Port Mirroring Diagnosing Switch Problems
Port Mirroring
On chassis-based or standalone switches, you can set up port mirroring sessions between Ethernet ports
within the same switch, while on stackable switches, you can set up port mirroring sessions across
switches within the same stack.
Ethernet ports supporting port mirroring include 10BaseT/100BaseTX/1000BaseT (RJ-45), 1000BaseSX/
LX/LH, and 10GBaseS/L (LC) connectors. When port mirroring is enabled, the active “mirrored” port
transmits and receives network traffic normally, and the “mirroring” port receives a copy of all transmit
and receive traffic to the active port. You can connect an RMON probe or network analysis device to the
mirroring port to see an exact duplication of traffic on the mirrored port without disrupting network traffic
to and from the mirrored port.
Port mirroring runs in the Chassis Management software and is supported for Ethernet (10 Mbps), Fast
Ethernet (100 Mbps), Gigabit Ethernet (1000 Mpbs), and 10 Gigabit Ethernet (10000 Mbps) ports. In addi-
tion, the switch supports “N-to-1” port mirroring, where up to 128 source ports can be mirrored to a single
destination port.
Note the following restriction when configuring a port mirroring session:
• Two (2) port mirroring sessions are supported per standalone chassis-based switch or in a stack consist-
ing of two or more switches.
• You cannot configure a port mirroring and a port monitoring session on the same NI module in an
OmniSwitch chassis-based switch.
• You cannot configure port mirroring and monitoring on the same switching ASIC on OmniSwitch
6400, 6850E, and 6855 switches. Each switching ASIC controls 24 ports (e.g., ports 1–24, 25–48, etc.).
For example, if a port mirroring session is configured for ports 1/12 and 1/22, then configuring a port
monitoring session for any of the ports between 1 and 24 is not allowed.
• If a port mirroring session is configured across two switching ASICs, then configuring a monitoring
session is not allowed on any of the ports controlled by each of the ASICs involved. For example, if a
port mirroring session is configured for ports 1/8 and 1/30 on a 48-port switch, then configuring a port
monitoring session involving any of the ports between 1 and 48 is not allowed.
page 49-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Mirroring
NMS
Workstation
Mirrored
(Active) Port
(w/ Incoming &
Outgoing Frames)
Mirroring
(Monitoring) Port
(w/ Copied Incoming
& Outgoing Frames)
Relationship Between Mirrored and Mirroring Ports
Note. If the mirroring port monitors mirrored traffic on an RMON probe belonging to a different VLAN
than the mirrored port, it should be protected from blocking due to Spanning Tree updates. See “Unblock-
ing Ports (Protection from Spanning Tree)” on page 49-19 for details.
The diagram on the following page illustrates how port mirroring can be used with an external RMON
probe to copy RMON probe frames and Management frames to and from the mirroring and mirrored
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-15
Port Mirroring Diagnosing Switch Problems
ports. Frames received from an RMON probe attached to the mirroring port can be seen as being received
by the mirrored port. These frames from the mirroring port are marked as if they are received on the
mirrored port before being sent over the switch backplane to an NMS station. Therefore, management
frames destined for the RMON probe are first forwarded out of the mirrored port. After being received on
the mirrored port, copies of the frames are mirrored out of the mirroring port—the probe attached to the
mirroring port receives the management frames.
NMS Workstation
A. RMON probe frames sent from the mirroring port
Mirroring Port
Mirrored Port
C. Management frames from the NMS Workstation are sent to the mirrored port....
D. ...and port mirroring sends copies of the
Management frames to the mirroring port.
NMS Workstation
Mirroring Port
Mirrored Port
RMON Probe
OmniSwitch
page 49-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Mirroring
• There must not be any physical loop present in the Remote Port Mirroring VLAN.
• On the intermediate and destination switches, source learning must be disabled or overridden on the
ports belonging to the Remote Port Mirroring VLAN.
• The QoS redirect feature can be used to override source learning on an OmniSwitch.
• 802.1AB (LLDP)
• 802.3ag (OAM)
• BPDUs will not be mirrored on OmniSwitch 6400, 6850E, and 6855 switches but will be mirrored on
OmniSwitch 9000E switches.
For more information and an example of a Remote Port Mirroring configuration, see “Remote Port
Mirroring” on page 49-17.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-17
Port Mirroring Diagnosing Switch Problems
Note. To prevent the mirroring (destination) port from being blocked due to Spanning Tree changes, be
sure to specify the VLAN ID number (from 1 to 4094) for the port that will remain unblocked (protected
from these changes while port mirroring is active). This parameter is optional; if it is not specified,
changes resulting from Spanning Tree could cause the port to become blocked (default). See Unblocking
Ports (Protection from Spanning Tree) below for details.
To create a mirroring session, enter the port mirroring source destination command and include the port
mirroring session ID number and the source and destination slot/ports, as shown in the following example:
-> port mirroring 6 source 2/3 destination 2/4
This command line specifies mirroring session 6, with the source (mirrored) port located in slot 2/port 3,
and the destination (mirroring) port located in slot 3/port 4.
To create a remote port mirroring session, enter the port mirroring source destination command and
include the port mirroring session ID number, the source and destination slot/ports, and the remote port
mirroring VLAN ID as shown in the following example:
-> port mirroring 8 source 1/1 destination 1/2 rpmir-vlan 1000
This command line specifies remote port mirroring session 8, with the source (mirrored) port located on
slot 1/port 1, the destination (mirroring) port on slot 1/port 2, and the remote port mirroring VLAN 1000.
Note. Neither the mirrored nor the mirroring ports can be a mobile port. See Chapter 5, “Assigning Ports
to VLANs,” for information on mobile ports.
Creating an “N-to-1” port mirroring session is supported, where up to 128 source ports can be mirrored to
a single destination port. In the following example, port 1/2, 2/1, and 2/3 are mirrored on destination port
2/4 in session 1:
-> port mirroring 1 source 1/2 destination 2/4
-> port mirroring 1 source 2/1 destination 2/4
-> port mirroring 1 source 2/3 destination 2/4
As an option, you can specify a range of source ports and/or multiple source ports. In the following exam-
ple, ports 1/2 through 1/6 are mirrored on destination port 2/4 in session 1:
-> port mirroring 1 source 1/2-6 destination 2/4
In the following example, ports 1/9, 2/7, and 3/5 are mirrored on destination port 2/4 in session 1:
-> port mirroring 1 source 1/9 2/7 3/5 destination 2/4
page 49-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Mirroring
In the following example, 1/2 through 1/6 and 1/9, 2/7, and 3/5 are mirrored on destination port 2/4 in
session 1:
-> port mirroring 1 source 1/2-6 1/9 2/7 3/5 destination 2/4
Note. Ports can be added after a port mirroring session has been configured.
This command line specifies mirroring session 6, with the source (mirrored) port located in slot 2/port 3,
and the destination (mirroring) port located in slot 2/port 4. The mirroring port on VLAN 750 is protected
from Spanning Tree updates.
Note. If the unblocked VLAN identifier is not specified, the mirroring port could be blocked due to
changes in Spanning Tree.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-19
Port Mirroring Diagnosing Switch Problems
Note. You can modify the parameters of a port mirroring session that has been disabled.
Keep in mind that the port mirroring session configuration remains valid, even though port mirroring has
been turned off. Note that the port mirroring session identifier and slot/port locations of the designated
interfaces must always be specified.
Note. Note that the port mirroring session identifier and slot/port locations of the designated interfaces
must always be specified.
Note. Optionally, you can also specify the optional unblocked VLAN ID number and either enable or
disable on the same command line.
In this example, the command specifies port mirroring session 6, with the mirrored (active) port located in
slot 2/port 3 and the mirroring port located in slot 6/port 4. The mirroring direction is unidirectional and
inward bound:
-> port mirroring 6 source 2/3 destination 6/4 inport
In this example, the command specifies port mirroring session 6, with the mirrored (active) port located in
slot 2/port 3, and the mirroring port located in slot 6/port 4. The mirroring direction is unidirectional and
outward bound:
-> port mirroring 6 source 2/3 destination 6/4 outport
You can use the bidirectional keyword to restore a mirroring session to its default bidirectional configura-
tion. For example:
-> port mirroring 6 source 2/3 destination 6/4 bidirectional
Note. Note that the port mirroring session identifier and slot/port locations of the designated interfaces
must always be specified.
page 49-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Mirroring
To enable a port mirroring session, enter the port mirroring command, followed by the port mirroring
session ID number and the keyword enable. The following command enables port mirroring session 6
(turning port mirroring on):
-> port mirroring 6 enable
Note. Port mirroring session parameters cannot be modified when a mirroring session is enabled. Before
you can modify parameters, the mirroring session must be disabled.
To disable a port mirroring session, enter the port mirroring command, followed by the port mirroring
session ID number and the keyword disable. The following command disables port mirroring session 6
(turning port mirroring off):
-> port mirroring 6 disable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-21
Port Mirroring Diagnosing Switch Problems
Destination switch
Intermediate
switch
3/1
Local MTP
Source switch 2/2 3/2
1/2
2/1
Destination Port
RPMir
Source VLAN - 1000
Port
1/1
page 49-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Mirroring
Note. If the intermediate switches are not OmniSwitches, refer to the vendor's documentation for instruc-
tions on disabling or overriding source learning.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-23
Port Monitoring Diagnosing Switch Problems
Port Monitoring
An essential tool of the network engineer is a network packet capture device. A packet capture device is
usually a PC-based computer, such as the Sniffer®, that provides a means for understanding and measur-
ing data traffic of a network. Understanding data flow in a VLAN-based switch presents unique chal-
lenges, primarily because traffic moves inside the switch, especially on dedicated devices.
The port monitoring feature allows you to examine packets to and from a specific Ethernet port. Port
monitoring has the following features:
• Software commands to enable and display captured port data.
• A file called pmonitor.enc is created in the /flash memory when you configure and enable a port
monitoring session.
• Data packets time stamped.
• The maximum number of monitoring sessions is limited to one per chassis and/or stack.
• You cannot configure a port mirroring and a port monitoring session on the same NI module in an
OmniSwitch chassis-based switch.
• You cannot configure port mirroring and monitoring on the same switching ASIC on OmniSwitch
6400, 6850E, and 6855 switches. Each switching ASIC controls 24 ports (e.g., ports 1–24, 25–48, etc.).
For example, if a port mirroring session is configured for ports 1/12 and 1/22, then configuring a port
monitoring session for any of the ports between 1 and 24 is not allowed.
• If a port mirroring session is configured across two switching ASICs, then configuring a monitoring
session is not allowed on any of the ports controlled by each of the ASICs involved. For example, if a
port mirroring session is configured for ports 1/8 and 1/30 on a 48-port switch, then configuring a port
monitoring session involving any of the ports between 1 and 48 is not allowed.
• Only the first 64 bytes of the traffic will be captured.
• If both mirroring and monitoring are enabled, then packets will either be mirrored or monitored (i.e.,
sent to CPU), whichever comes first. See “Mirroring on Multiple Ports” on page 49-15 for more infor-
mation.
You can select to dump real-time packets to a file. Once a file is captured, you can FTP it to a Sniffer or
PC for viewing.
page 49-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Monitoring
Note. One port monitoring session can be configured per chassis or stack.
In addition, you can also specify optional parameters shown in the table below. These parameters must be
entered after the slot and port number.
keywords
file no file size
no overwrite inport outport
bidirectional timeout enable
disable
For example, to configure port monitoring session 6 on port 2/3 and administratively enable it, enter:
-> port monitoring 6 source 2/3 enable
These keywords can be used when creating the port monitoring session or afterwards. See the sections
below for more information on using these keywords.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-25
Port Monitoring Diagnosing Switch Problems
To resume a paused port monitoring session, use the port monitoring command by entering port
monitoring, followed by the port monitoring session ID and resume. For example, to resume port moni-
toring session 6, enter:
-> port monitoring 6 resume
Optionally, you can also configure the size of the file and/or you can configure the data file so that more-
recent packets will not overwrite older packets in the data file if the file size is exceeded.
To create a file and configure its size, use the port monitoring source CLI command by entering port
monitoring, followed by the user-specified session ID number, source, the slot number of the port to be
monitored, a slash (/), the port number of the port, file, the name of the file, size, and the size of the file in
16K byte increments. (The maximum size is 140K bytes.)
For example, to configure port monitoring session 6 on port 2/3 with a data file called “user_port” in the
/flash directory with a size of 49152 (3 * 16K), enter:
-> port monitoring 6 source 2/3 file /flash/user_port size 3
page 49-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Port Monitoring
To prevent more recent packets from overwriting older packets in the data file, if the file size is exceeded,
use the port monitoring source CLI command by entering port monitoring, followed by the user-speci-
fied session ID number, source, the slot number of the port to be monitored, a slash (/), the port number of
the port, file, the name of the file, and overwrite off.
For example, to configure port monitoring session 6 on port 2/3 with a data file called “user_port” in the
/flash directory that will not overwrite older packets if the file size is exceeded, enter:
-> port monitoring 6 source 2/3 file user_port overwrite off
To allow more recent packets from overwriting older packets in the data file if the file size is exceeded
(the default), use the port monitoring source CLI command by entering port monitoring, followed by
the user-specified session ID number, source, the slot number of the port to be monitored, a slash (/), the
port number of the port, file, the name of the file, and overwrite on.
For example, to configure port monitoring session 6 on port 2/3 with a data file called “user_port” in the
/flash directory that will not overwrite older packets if the file size is exceeded, enter:
-> port monitoring 6 source 2/3 file /flash/user_port overwrite on
Note. The size and no overwrite options can be entered on the same command line.
To configure port monitoring session 6 on port 2/3 as unidirectional and outward bound, for example,
enter:
-> port monitoring 6 source 2/3 outport
For example, to restore port monitoring session 6 on port 2/3 to its bidirectional direction, enter:
-> port monitoring 6 source 2/3 bidirectional
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-27
Port Monitoring Diagnosing Switch Problems
For example, to display port monitoring data, use the show port monitoring file command as shown
below:
-> show port monitoring file
Note. For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 49-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems sFlow
sFlow
sFlow is a network monitoring technology that gives visibility in to the activity of the network, by provid-
ing network usage information. It provides the data required to effectively control and manage the network
usage. sFlow is a sampling technology that meets the requirements for a network traffic monitoring solu-
tion.
sFlow is an industry standard with many vendors delivering products with this support. Some of the appli-
cations of the sFlow data include:
• Detecting, diagnosing, and fixing network problems
• Capacity planning
sFlow is a sampling technology embedded within switches/routers. It provides the ability to monitor the
traffic flows. It requires a sFlow agent software process running as part of the switch software and a sFlow
collector which receives and analyses the monitored data. The sFlow collector makes use of SNMP to
communicate with a sFlow agent in order to configure sFlow monitoring on the device (switch).
sFlow agent running on the switch/router, combines interface counters and traffic flow (packet) samples
preferably on all the interfaces into sFlow datagrams that are sent across the network to a sFlow collector.
Packet sampling on the switch/router is typically performed by the switching/routing ASICs, providing
wire-speed performance. In this case, sFlow agent does very little processing, by packaging data into
sFlow datagrams that are immediately sent on network. This minimizes the memory and CPU utilization
by sFlow agent.
sFlow Manager
The sFlow manager is the controller for all the modules. It initializes all other modules. It interfaces with
the Ethernet driver to get the counter samples periodically and reads sampled packets from the Q-
Dispatcher module. The counter samples are given to the poller module and sampled packets are given to
the sampler to format a UDP. The sFlow manager also has a timer which periodically sends timer ticks to
other sections.
Each sFlow manager instance has multiples of receiver, sampler, and poller instances. Each user
programmed port will have an individual sampler and poller. The sampler and poller could be potentially
pointing to multiple receivers if the user has configured multiple destination hosts.
Receiver
The receiver module has the details about the destination hosts where the sFlow datagrams are sent out. If
there are multiple destination then each destination has an instance of the receiver. All these receivers are
attached to the sFlow manager instance and to an associated sample/poller.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-29
sFlow Diagnosing Switch Problems
Sampler
The sampler is the module which gets hardware sampled from Q-Dispatcher and fills up the sampler part
of the UDP datagram.
Poller
The poller is the module which gets counter samples from Ethernet driver and fills up the counter part of
the UDP datagram.
In addition, you can also specify optional parameters shown in the table below. These parameters can be
entered after the IP address.
keywords
timeout packet-size
forever version
udp-port
For example, to configure sFlow receiver session 6 on switch 10.255.11.28 and to specify the packet-size
and timeout value, enter:
-> sflow receiver 6 name sflowtrend address 10.255.11.28 packet-size 1400 time-
out 600
To configure a sFlow sampler session, use the sflow sampler command by entering sflow sampler,
followed by the instance ID number, the slot number of the port to be monitored, a slash (/), and the port
number and receiver, the receiver_index.
For example, to configure sampler session 1 on port 2/3, enter:
-> sflow sampler 1 2/3 receiver 6
In addition, you can also specify optional parameters shown in the table below. These parameters can be
entered after the receiver index.
keywords
rate
sample-hdr-size
For example, to configure sFlow sampler session 1 on port 2/3 and to specify the rate and sample-hdr-size,
enter:
-> sflow sampler 1 2/3 receiver 6 rate 512 sample-hdr-size 128
page 49-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems sFlow
To configure a sFlow poller session, use the sflow poller command by entering sflow poller, followed by
the instance ID number, the slot number of the port to be monitored, a slash (/), and the port number of the
port and receiver, then receiver_index.
For example, to configure poller session 3 on port 1/1, enter:
-> sflow poller 3 1/1 receiver 6
In addition, you can also specify the optional interval parameter after the receiver index value. For exam-
ple, to configure sFlow poller session 3 on port 1/1 with an interval of 5, enter:
-> sflow poller 3 1/1 receiver 6 interval 5
Receiver 1
Name = Golden
Address = IP_V4 198.206.181.3
UDP Port = 6343
Timeout = 65535
Packet Size= 1400
DatagramVer= 5
Note. For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-31
sFlow Diagnosing Switch Problems
Note. For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
Note. For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
page 49-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems sFlow
Note. For more information about the displays that result from these commands, see the OmniSwitch AOS
Release 6 CLI Reference Guide.
To delete a sFlow sampler session, use the no form of the sflow sampler command by entering no sflow
sampler, followed by the instance ID number, the slot number of the port to delete, a slash (/), and the
port number of the port, enter:
-> no sflow sampler 1 2/3
To delete a sFlow poller session, use the no form of the sflow poller command by entering no sflow
poller, followed by the instance ID number, the slot number of the port to delete, a slash (/), and the port
number of the port, enter:
-> no sflow poller 3 1/1
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-33
Remote Monitoring (RMON) Diagnosing Switch Problems
C. Management frames from the NMS Workstation are sent to the mirrored port....
NMS Workstation
RMON Probe
OmniSwitch
page 49-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Remote Monitoring (RMON)
RMON probes can be enabled or disabled via CLI commands. Configuration of Alarm threshold values
for RMON traps is a function reserved for RMON-monitoring NMS stations.
This feature supports basic RMON 4 group implementation in compliance with RFC 2819, including the
Ethernet Statistics, History (Control & Statistics), Alarms and Events groups (described below).
Note. RMON 10 group and RMON2 are not implemented in the current release. An external RMON
probe that includes RMON 10 group and RMON2 may be used where full RMON probe functionality is
required.
Ethernet Statistics
Ethernet statistics probes are created whenever new ports are inserted and activated in the chassis. When a
port is removed from the chassis or deactivated, the Ethernet statistics group entry associated with the
physical port is invalidated and the probe is deleted.
The Ethernet statistics group includes port utilization and error statistics measured by the RMON probe
for each monitored Ethernet interface on the switch. Examples of these statistics include CRC (Cyclic
Redundancy Check)/alignment, undersized/oversized packets, fragments, broadcast/multicast/unicast, and
bandwidth utilization statistics.
Alarm
The Alarm group collects periodic statistical samples from variables in the probe and compares them to
previously configured thresholds. If a sample crosses a previously configured threshold value, an Event is
generated. Examples include Absolute or Relative Values, Rising or Falling Thresholds on the Utilization
Frame Count and CRC Errors.
Event
The Event group controls generation and notification of events from the switch to NMS stations. For
example, customized reports based on the type of Alarm can be generated, printed and/or logged.
Note. The following RMON groups are not implemented: Host, HostTopN, Matrix, Filter, and Packet
Capture.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-35
Remote Monitoring (RMON) Diagnosing Switch Problems
To enable or disable an entire group of RMON probes of a particular flavor type (such as Ethernet
Statistics, History, or Alarm), enter the command without specifying an entry-number, as shown in the
following examples.
The following command disables all currently defined (disabled) RMON Ethernet Statistics probes:
-> rmon probes stats disable
The following command enables all currently defined (disabled) RMON History probes:
-> rmon probes history enable
The following command enables all currently defined (disabled) RMON Alarm probes:
-> rmon probes alarm enable
Note. Network activity on subnetworks attached to an RMON probe can be monitored by Network
Management Software (NMS) applications.
page 49-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Remote Monitoring (RMON)
A display showing all current statistics RMON probes should appear, as shown in the following example:
Entry Slot/Port Flavor Status Duration System Resources
-------+-----------+-----------+----------+---------------+---------------------
4001 4/1 Ethernet Active 00:25:00 275 bytes
4008 4/8 Ethernet Active 00:25:00 275 bytes
4005 4/5 Ethernet Active 00:25:00 275 bytes
This table entry displays probe statistics for all probes on the switch. The probes are active, utilize 275
bytes of memory, and 25 minutes have elapsed since the last change in status occurred.
To show a list of the history probes, enter:
-> show rmon probes history
A display showing all current history RMON probes should appear, as shown in the following example:
Entry Slot/Port Flavor Status Duration System Resources
-------+----------+---------+-----------+------------+----------------
1 1/1 History Active 92:52:20 5464 bytes
30562 1/35 History Active 00:31:22 312236 bytes
30817 1/47 History Active 00:07:31 5200236 bytes
The table entry displays statistics for RMON History probes on the switch.
To show a list of the alarm probes, enter:
-> show rmon probes alarm
A display showing all current alarm RMON probes should appear, as shown in the following example:
Entry Slot/Port Flavor Status Duration System Resources
-------+-----------+-----------+----------+---------------+--------------------
31927 1/35 Alarm Active 00:25:51 608 bytes
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-37
Remote Monitoring (RMON) Diagnosing Switch Problems
A display showing statistics for the specified RMON probe will appear, as shown in the following
sections.
page 49-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Remote Monitoring (RMON)
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-39
Remote Monitoring (RMON) Diagnosing Switch Problems
A display showing all logged RMON Events should appear, as shown in the following example:
Entry Time Description
---------+----------------+-----------------------------------------------------
1 00:08:00 etherStatsPkts.4008: [Falling trap] “Falling Event”
2 00:26:00 etherStatsCollisions.2008: “Rising Event”
3 00:39:00 etherStatsCollisions.2008: “Rising Event”
The display shown above identifies the Entry number of the specified Event, along with the elapsed time
since the last change in status (measured in hours/minutes/seconds) and a description of the Alarm condi-
tion detected by the probe for all RMON Logged Events. For example, Entry number 3 is linked to ether-
StatsCollisions.2008: [Rising trap] “Rising Event,” an Alarm condition detected by the RMON probe in
which a trap was generated based on a Rising Threshold Alarm, with an elapsed time of 39 minutes since
the last change in status.
A display showing the specific logged RMON Event should appear, as shown in the following example:
Entry Time Description
---------+----------------+-----------------------------------------------------
3 00:39:00 etherStatsCollisions.2008: “Rising Event”
The display shown above identifies the Entry number of the specified Event, along with the elapsed time
since the last change in status (measured in hours/minutes/seconds) and a description of the Alarm condi-
tion detected by the probe for the specific RMON Logged Event. For example, Entry number 3 is linked to
etherStatsCollisions.2008: [Rising trap] “Rising Event,” an Alarm condition detected by the RMON probe
in which a trap was generated based on a Rising Threshold Alarm, with an elapsed time of 39 minutes
since the last change in status.
page 49-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Monitoring Switch Health
NMS Workstation
OmniSwitch
• Threshold level
Additionally, Health Monitoring provides the capacity to specify thresholds for the resource utilization
levels it monitors and generates traps based on the specified threshold criteria.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-41
Monitoring Switch Health Diagnosing Switch Problems
The following sections include a discussion of CLI commands that can be used to configure resource
parameters and monitor or reset statistics for switch resources. These commands include:
• health threshold—Configures threshold limits for input traffic (RX), output/input traffic (TX/RX),
memory usage, CPU usage, and chassis temperature. See page 49-43 for more information.
• show health threshold—Displays current health threshold settings. See page 49-44 for details.
• health interval—Configures sampling interval between health statistics checks. See page 49-45 for
more information.
• show health interval—Displays current health sampling interval, measured in seconds. See page
49-45 for details.
• show health —Displays health statistics for the switch, as percentages of total resource capacity. See
page 49-46 for more information.
• health statistics reset—Resets health statistics for the switch. See page 49-47 for details.
page 49-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Monitoring Switch Health
Note. When a resource falls back below the configured threshold, an addition trap is sent to the user. This
indicates that the resource is no longer operating beyond its configured threshold limit.
The health threshold command is used to configure threshold limits for input traffic (RX), output/input
traffic (TX/RX), memory usage, CPU usage and chassis temperature.
To configure thresholds for these resources, enter the health threshold command, followed by the input
traffic, output/input traffic, memory usage, CPU usage, or chassis temperature value, where:
For example, to specify a CPU usage threshold of 85 percent, enter the following command:
-> health threshold cpu 85
For more information on the health threshold command, refer to Chapter 52, “Health Monitoring
Commands,” in the OmniSwitch AOS Release 6 CLI Reference Guide.
Note. When you specify a new value for a threshold limit, the value is automatically applied across all
levels of the switch (switch, module, and port). You cannot select differing values for each level.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-43
Monitoring Switch Health Diagnosing Switch Problems
To display a specific health threshold, enter the show health threshold command, followed by the appro-
priate suffix syntax:
• rx
• txrx
• memory
• cpu
• temperature
For example, if you want to view only the health threshold for memory usage, enter the following
command:
-> show health threshold memory
Memory Threshold = 80
Note. For detailed definitions of each of the threshold types, refer to “Configuring Resource and Tempera-
ture Thresholds” on page 49-43, as well as Chapter 52, “Health Monitoring Commands,” in the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 49-44 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Monitoring Switch Health
Valid values for the seconds parameter include 1, 2, 3, 4, 5, 6, 10, 12, 15, 20, or 30.
Sampling Interval = 5
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-45
Monitoring Switch Health Diagnosing Switch Problems
Device 1 Min 1 Hr 1 Hr
Resources Limit Curr Avg Avg Max
-----------------+-------+------+------+-----+----
Receive 80 00 00 00 00
Transmit/Receive 80 00 00 00 00
Memory 80 87* 87 86 87
Cpu 80 08 05 04 08
Temperature Cmm 60 34 34 33 34
Temperature Cmm Cpu 60 28 28 27 28
In the screen sample shown above, the Device Resources field displays the device resources that are being
measured (for example, Receive displays statistics for traffic received by the switch; Transmit/Receive
displays statistics for traffic transmitted and received by the switch; Memory displays statistics for switch
memory; and CPU displays statistics for the switch CPU). The Limit field displays currently configured
device threshold levels as percentages of available bandwidth. The Curr field displays current bandwidth
usage for the specified device resource. 1 Min. Avg. refers to the average device bandwidth used over a 1
minute period. 1 Hr. Avg. refers to the average device bandwidth used over a 1 hour period, and 1 Hr.
Max. refers to the maximum device bandwidth used over a 1 hour period.
Note. If the Current value appears with an asterisk displayed next to it, the Current value exceeds the
Threshold limit. For example, if the Current value for Memory is displayed as 85* and the Threshold
Limit is displayed as 80, the asterisk indicates that the Current value has exceeded the Threshold Limit
value.
page 49-46 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Diagnosing Switch Problems Monitoring Switch Health
In the screen sample shown above, the port 04/03 Resources field displays the port resources that are
being measured (for example, Receive displays statistics for traffic received by the switch, while Trans-
mit/Receive displays statistics for traffic transmitted and received by the switch). The Limit field displays
currently configured resource threshold levels as percentages of available bandwidth. The Curr field
displays current bandwidth usage for the specified resource. 1 Min. Avg. refers to the average resource
bandwidth used over a 1 minute period. 1 Hr. Avg. refers to the average resource bandwidth used over a 1
hour period, and 1 Hr. Max. refers to the maximum resource bandwidth used over a 1 hour period.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 49-47
Monitoring Switch Health Diagnosing Switch Problems
page 49-48 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
50 Configuring VLAN
Stacking
VLAN Stacking provides a mechanism to tunnel multiple customer VLANs (CVLAN) through a service
provider network using one or more service provider VLANs (SVLAN) by way of 802.1Q double-tagging
or VLAN Translation. This feature enables service providers to offer their customers Transparent LAN
Services (TLS). This service is multipoint in nature so as to support multiple customer sites or networks
distributed over the edges of a service provider network.
This implementation of VLAN Stacking offers the following functionality:
• An Ethernet service-based approach that is similar to configuring a virtual private LAN service
(VPLS).
• Ingress bandwidth sharing across User Network Interface (UNI) ports.
• Ingress bandwidth rate limiting on a per UNI port, per CVLAN, or CVLAN per UNI port basis.
• Built in UNI profiles IEEE-FWD-ALL and IEEE-DROP-ALL to tunnel or discard all IEEE multicast
MAC addresses traffic associated to UNI port.
• Multiple TPIDs (0x8100, 0x88a8 & 0x9100) supported and interpreted on UNI ports.
• L2 control frames with only double tag packets are accepted on UNI ports.
• Custom L2 protocol entry for proprietary protocol with multicast MAC addresses for specific packet
control.
• CVLAN (inner) tag 802.1p-bit mapping to SVLAN (outer) tag 802.1p bit.
• CVLAN (inner) tag DSCP mapping to SVLAN (outer) tag 802.1p bit.
In This Chapter
This chapter describes the basic components of VLAN Stacking and how to define a service-based or port-
based configuration through the Command Line Interface (CLI). CLI commands are used in the configura-
tion examples; for more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI
Reference Guide.
This chapter provides an overview of VLAN Stacking and includes the following topics:
• “VLAN Stacking Specifications” on page 50-2.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-1
VLAN Stacking Specifications Configuring VLAN Stacking
page 50-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking VLAN Stacking Defaults
Tunneled Frames:
STP, GVRP, MVRP,
Discarded Frames:
802.1x, 802.1ab, AMAP, VTP
VLAN, Uplink Fast, PVST,
PAGP, DTP, CDP
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-3
VLAN Stacking Overview Configuring VLAN Stacking
• Network Network Interface (NNI)—An NNI is a port that resides on either a PE Bridge or a Transit
Bridge and connects to a service provider network. Traffic ingressing on a network port is considered
SVLAN traffic and is switched to a customer-facing port or to another network port.
• User Network Interface (UNI)—A UNI is a port that resides on a PE bridge that connects to a
customer network and carries customer traffic. The UNI may consist of a single port or an aggregate of
ports and can accept tagged or untagged traffic.
The following illustration shows how VLAN Stacking uses the above components to tunnel customer traf-
fic through a service provider network:
page 50-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking VLAN Stacking Overview
Provider
Customer A
LAN
Site 2
Provider Edge 2
Customer A
Site 1
Transit Bridge
Customer B
EMAN Site 2
Provider Edge 1
Provider Edge 3
Customer B
Site 1
NNI Port
UNI Port
NNI Port
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-5
VLAN Stacking Overview Configuring VLAN Stacking
Note. MAC processing and tunneling is supported for up to 8 VLAN tag headers at a UNI port.
Similarly, MAC processing and tunneling is supported for up to 8 VLAN tag headers at an NNI port.
2 Double Tagging inserts the SVLAN tag in the packet. The packet is sent out the network port with
double tags (SVLAN+Additional tag for SVLAN).
Addi- Inner
MAC DA MAC SA SVLAN Tag Inner ETYPE Payload
tional VLAN ..... VLAN
(6) (6) (4) Tag 0x0800
Note. Double tagging is applied when preserve mode is configured using the ethernet-service sap profile
command.
3 VLAN Translation replaces the CVLAN Tag with SVLAN Tag. The packet is sent out the network
port with a single tag (SVLAN).
page 50-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking VLAN Stacking Overview
Note. VLAN Translation is applied when translate mode is configured using the ethernet-service sap
profile command
• Ethernet frames received on NNI port are always forwarded to any UNI port with translated CVLAN
and ethertype 0x8100, in translate mode.
The information on traffic engineering applied, maximum VLAN tags processed for Layer 2 control
frames according to preserve or translate mode configuration for UNI and NNI ports are mentioned in the
following table:
L2 Control Maximum
Frames UNI Port VLAN tag
Mode Action at Egress NNI
Treatment headers
processed
STP BPDU Preserve Tunnel >8 Tunnel
STP BPDU Preserve Mac Tunnel 7 Tunnel
STP BPDU Preserve Peer 7 -
STP BPDU Preserve Discard/Drop - -
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-7
VLAN Stacking Overview Configuring VLAN Stacking
L2 Control Maximum
Frames UNI Port VLAN tag
Mode Action at Egress NNI
Treatment headers
processed
STP BPDU Translate Tunnel >8 Tunnel
STP BPDU Translate Mac Tunnel 8 Tunnel
STP BPDU Translate Peer 8 -
STP BPDU Translate Discard/Drop - -
LACP PDU Preserve Tunnel 7 Tunnel
LACP PDU Preserve Mac Tunnel 7 Tunnel
LACP PDU Preserve Peer 7 -
LACP PDU Preserve Discard/Drop - -
LACP PDU Translate Tunnel 8 Tunnel
LACP PDU Translate Mac Tunnel 8 Tunnel
LACP PDU Translate Peer 8 -
LACP PDU Translate Discard/Drop - -
page 50-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking VLAN Stacking Overview
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-9
Interaction With Other Features Configuring VLAN Stacking
IP Multicast VLANs
The IP Multicast VLANs (IPMV) application has the following interactions with VLAN Stacking func-
tionality and commands:
• IPMV operates in one of two modes: enterprise or VLAN Stacking. When the enterprise mode is
active, IPMV uses sender and receiver ports for IP multicast traffic. When the IPMV VLAN Stacking
mode is active, IPMV maps sender and receiver ports to VLAN Stacking NNI and UNI ports.
• If IPMV is operating in the enterprise mode, there are no CLI usage changes.
• If IPMV is operating in the VLAN Stacking mode, the following VLAN Stacking CLI commands are
used to configure interoperability with IPMV:
See the OmniSwitch AOS Release 6 CLI Reference Guide for more information about these commands.
page 50-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Interaction With Other Features
Link Aggregation
• Both static and dynamic link aggregation are supported with VLAN Stacking.
• Note that a link aggregate must consist of all UNI or all NNI ports. VLAN Stacking functionality is not
supported on link aggregates that consist of a mixture of VLAN Stacking ports and conventional
switch ports.
• QoS applies the inner source vlan and inner 802.1p policy conditions to the CVLAN (inner) tag of
VLAN Stacking packets.
• QoS applies the source vlan and 802.1p policy conditions to the SVLAN (outer) tag of VLAN Stack-
ing packets.
• Quarantine Manager and Remediation (QMR) is not available if VLAN Stacking services or QoS
inner source vlan and inner 802.1p policies are configured on the switch.
• An RRSTP ring must consist of either all VLAN Stacking NNI ports or all standard switch ports; a
mixture of the two port types in the same ring is not supported.
• If an RRSTP ring contains NNI ports, the VLAN tag configured for the ring must match the SVLAN
tag that VLAN Stacking appends to packets before they are received or forwarded on NNI ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-11
Interaction With Other Features Configuring VLAN Stacking
Spanning Tree
• Spanning Tree is enabled by default for VLAN Stacking SVLANs. The Spanning Tree status for an
SVLAN is configurable through VLAN Stacking commands. Note that the SVLAN Spanning Tree
status applies only to the service provider network topology.
• BPDU frames are tunneled by default. See “Configuring a UNI Profile” on page 50-25 for information
about configuring VLAN Stacking to tunnel or discard Spanning Tree BPDU.
• See “Configuring VLAN Stacking Network Ports” on page 50-18 for information about configuring
VLAN Stacking interoperability with legacy Spanning Tree BPDU systems.
• A back door link configuration is not supported. This occurs when there is a link between two customer
sites that are both connected to a VLAN Stacking provider edge switch.
• A dual home configuration is not supported. This type of configuration consists of a single customer
site connected to two different VLAN Stacking switches or two switches at a customer site connect to
two different VLAN Stacking switches.
page 50-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Quick Steps for Configuring VLAN Stacking
1 Create a VLAN Stacking VLAN (SVLAN) 1001 using the ethernet-service command.
2 Create a VLAN Stacking service and associate the service with SVLAN 1001 using the ethernet-
service service-name command.
-> ethernet-service service-name CustomerA svlan 1001
3 Configure port 3/1 as a VLAN Stacking Network Network Interface (NNI) port and associate the port
with SVLAN 1001 using the ethernet-service svlan nni command.
-> ethernet-service svlan 1001 nni 3/1
4 Create a VLAN Stacking Service Access Point (SAP) and associate it to the “CustomerA” service
using the ethernet-service sap command.
-> ethernet-service sap 10 service-name CustomerA
5 Configure port 1/49 as a VLAN Stacking User Network Interface (UNI) port and associate the port
with SAP ID 10 using the ethernet-service sap uni command.
-> ethernet-service sap 10 uni 1/49
6 Associate traffic from customer VLANs (CVLAN) 10 and 20 with SAP 10 using the ethernet-service
sap cvlan command.
-> ethernet-service sap 10 cvlan 10
-> ethernet-service sap 10 cvlan 20
7 (Optional) Create a SAP profile that applies an ingress bandwidth of 10, translates the CVLAN tag,
and maps the CVLAN priority to the SVLAN priority using the ethernet-service sap-profile command.
-> ethernet-service sap-profile sap-video1 ingress-bandwidth 10 cvlan translate
priority map-inner-to-outer-p
8 (Optional) Associate the “sap-video1” profile with SAP 10 using the ethernet-service sap sap-profile
command.
-> ethernet-service sap 10 sap-profile sap-video1
9 (Optional) Create a UNI port profile to block GVRP and STP control frames received on UNI ports
using the ethernet-service uni-profile command.
-> ethernet-service uni-profile uni_1 l2-protocol stp gvrp discard
10 (Optional) Associate the “uni_1” profile with port 1/49 using the ethernet-service uni uni-profile
command.
-> ethernet-service uni 1/49 uni-profile uni_1
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-13
Quick Steps for Configuring VLAN Stacking Configuring VLAN Stacking
Note. Verify the VLAN Stacking Ethernet service configuration using the show ethernet-service
command:
-> show ethernet-service
See the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in this display.
page 50-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Configuring VLAN Stacking Services
3 Configure Network Network Interface (NNI) ports. An NNI port is associated with an SVLAN and
carries the encapsulated SVLAN traffic through the provider network. See “Configuring VLAN Stacking
Network Ports” on page 50-18.
4 Configure a VLAN Stacking service access point (SAP). A SAP binds UNI ports, the type of
customer traffic, and traffic engineering parameter attributes to the VLAN Stacking service. Each SAP is
associated to one service name, but a single service can have multiple SAPs to which it is associated. See
“Configuring a VLAN Stacking Service Access Point” on page 50-20.
5 Configure User Network Interface (UNI) ports. One or more UNI ports are associated with a SAP to
identify to the service which ports will receive customer traffic that the service will process for tunneling
through the provider network. When a UNI port is associated with a SAP, the SAP parameter attributes
are applied to traffic received on the UNI port. See “Configuring VLAN Stacking User Ports” on
page 50-21.
6 Associate CVLAN traffic with an SAP. This step specifies the type of traffic customer traffic that is
allowed on UNI ports and then tunneled through the SVLAN. The type of customer traffic is associated
with a SAP and applies to all UNI ports associated with the same SAP. See “Configuring the Type of
Customer Traffic to Tunnel” on page 50-22.
7 Define SAP profile attributes. A SAP profile contains traffic engineering attributes for specifying
bandwidth sharing, rate limiting, CVLAN translation or double-tagging, and priority bit mapping. A
default profile is automatically associated with a SAP at the time the SAP is created. As a result, it is only
necessary to configure a SAP profile if the default attribute values are not sufficient. See “Configuring a
Service Access Point Profile” on page 50-23.
8 Define UNI profile attributes. A default UNI profile is automatically assigned to a UNI port at the
time a port is configured as a VLAN Stacking UNI. This profile determines how control frames received
on the port are processed. It is only necessary to configure a UNI profile if the default attribute values are
not sufficient. See “Configuring a UNI Profile” on page 50-25.
The following table provides a summary of commands used in these procedures:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-15
Configuring VLAN Stacking Services Configuring VLAN Stacking
Configuring SVLANs
There are three kinds of SVLANs:
• Customer SVLAN: An SVLAN that carries customer traffic
page 50-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Configuring VLAN Stacking Services
Similar to standard VLANs, the administrative and Spanning Tree status for the SVLAN is enabled by
default and the SVLAN ID is used as the default name. The ethernet-service svlan command also
provides parameters for changing any of these status values and the name. These are the same parameters
that are used to change these values for standard VLANs. For example, the following commands change
the administrative and Spanning Tree status and name for SVLAN 300:
-> ethernet-service svlan 300 disable
-> ethernet-service svlan 300 stp disable
-> ethernet-service svlan 300 name “Customer A”
To delete an SVLAN from the switch configuration, use the no form of the ethernet-service svlan
command. For example, to delete SVLAN 300 enter:
-> no ethernet-service svlan 300
Note that when an SVLAN is deleted, all port associations with the SVLAN are also removed.
Use the show ethernet-service vlan command to display a list of VLAN Stacking VLANs configured for
the switch.
The SVLAN or IPMPVLAN ID specified with this command must already exist in the switch configura-
tion; entering a standard VLAN ID is not allowed. See “Configuring SVLANs” on page 50-16 for more
information.
Once the VLAN Stacking service is created, the name is used to configure and display all components
associated with that service. The service name provides a single point of reference for a specific VLAN
Stacking configuration. For example, the following show ethernet-service command display shows how
the service name identifies a VLAN Stacking service and components related to that service:
-> show ethernet-service
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-17
Configuring VLAN Stacking Services Configuring VLAN Stacking
IPMVLAN : 40
NNI(s) : No NNIs configured
SAP Id : 2
UNIs : 1/22
CVLAN(s) : 100
sap-profile : translate_profile
To delete a service from the switch configuration, use the no form of the ethernet-service service-name
command. For example, the following command deletes the “Video-Service” service:
-> no ethernet-service servic-name Video-Service
Note that when a VLAN Stacking service is deleted, the SVLAN or IMPVLAN ID association with the
service is automatically deleted. However, if one or more VLAN Stacking service access point (SAP) are
associated with the service, remove the SAPs first before attempting to delete the service.
When a port is associated with an SVLAN using this command, the port is automatically defined as an
NNI to carry traffic for the specified SVLAN. In addition, the default VLAN for the port is changed to a
VLAN that is reserved for the VLAN Stacking application. At this point, the port is no longer config-
urable using standard VLAN port commands.
To delete an NNI port association with an SVLAN, use the no form of the ethernet-service svlan nni
command. For example, the following command deletes the NNI 2/1 and SVLAN 300 association:
-> no ethernet-service svlan 300 nni 2/1
Note that when the last SVLAN association for the port is deleted, the port automatically reverts back to a
conventional switch port and is no longer VLAN Stacking capable.
Use the show ethernet-service port command to verify the NNI port configuration for the switch.
page 50-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Configuring VLAN Stacking Services
• transparent-bridging—Configures the transparent bridging status for the NNI port. When transparent
bridging is enabled, the NNI forwards SVLAN traffic without processing packet contents. As a result,
the NNI port can also forward traffic for SVLANs that are not configured on the local switch, thus
allowing for a greater number of NNI port associations with SVLANs. Enabling transparent bridging is
recommended only on NNI ports that are known to and controlled by the network administrator.
The following command example configures the vendor TPID for NNI port 2/1 to 0x88a8 and enables
support for Spanning Tree legacy BPDU:
-> ethernet-service nni 2/1 tpid 88a8 stp legacy-bpdu enable
STP
Customer MAC {0x01, 0x80, 0xc2, 0x00, 0x00, 0x00}
Provider MAC address (802.1ad/D6.0) {0x01, 0x80, 0xc2, 0x00, 0x00, 0x08}
Provider MAC address (Legacy MAC) {0x01, 0x80, 0xc2, 0x00, 0x00, 0x00}
GVRP
Customer MAC address {0x01, 0x80, 0xc2, 0x00, 0x00, 0x21}
Provider MAC address {0x01, 0x80, 0xc2, 0x00, 0x00, 0x0D}
• GVRP legacy BPDU are supported only on network ports that already have GVRP enabled for the
port.
• STP legacy BPDU are supported only when the flat Spanning Tree mode is active on the switch.
Use the show ethernet-service nni command to display the NNI port configuration for the switch.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-19
Configuring VLAN Stacking Services Configuring VLAN Stacking
• Customer VLANs (CVLANs). See “Configuring the Type of Customer Traffic to Tunnel” on
page 50-22.
• SAP profile. Each SAP is associated with a single profile. This profile contains attributes that are used
to define traffic engineering parameters applied to traffic ingressing on UNI ports that are associated
with the SAP. See “Configuring a Service Access Point Profile” on page 50-23.
The above components are all configured separately using different VLAN Stacking commands. The
ethernet-service sap command is for creating a SAP ID and associating the ID with a VLAN Stacking
service. For example, the following command creates SAP 20 and associates it with Video-Service:
-> ethernet-service sap 20 service-name Video-Service
To delete a VLAN Stacking SAP from the switch configuration, use the no form of the ethernet-service
sap command. For example, the following command deletes SAP 20:
-> no ethernet-service sap 20
Note that when the SAP is deleted, all UNI port, CVLAN, and profile associations are automatically
dropped. It is not necessary to remove these items before deleting the SAP.
A VLAN Stacking SAP basically identifies the location where customer traffic enters the provider
network edge, the type of customer traffic to service, parameters to apply to the traffic, and the service that
will process the traffic for tunneling through the provider network.
Consider the following when configuring a VLAN Stacking SAP:
• A SAP is assigned to only one service, but a service can have multiple SAPs. So, a single service can
process and tunnel traffic for multiple UNI ports and customers.
• Associating multiple UNI ports to one SAP is allowed.
• A default SAP profile is associated with the SAP at the time the SAP is created. This profile contains
the following default attribute values:
The above default attribute values are applied to customer traffic associated with the SAP. Only one
profile is assigned to each SAP; however, it is possible to use the same profile for multiple SAPs.
• To use different profile attribute values, create a new profile and associate it with the SAP. See
“Configuring a Service Access Point Profile” on page 50-23. Each time a profile is assigned to a SAP,
the existing profile is overwritten with the new one.
page 50-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Configuring VLAN Stacking Services
Use the show ethernet-service sap command to display the SAPs configured for the switch. Use the
show ethernet-service command to display a list of VLAN Stacking services and the SAPs associated
with each service.
A UNI port is a customer-facing port on which traffic enters the VLAN Stacking service. When the port is
associated with a service access point, the port is automatically defined as a UNI port and the default
VLAN for the port is changed to a VLAN that is reserved for the VLAN Stacking application.
To delete a UNI port association with a VLAN Stacking SAP, use the no form of the ethernet-service sap
uni command. For example, the following command deletes the association between UNI 1/1 and SAP
20:
-> ethernet-service sap 20 no uni 1/1
Note that when the last SAP association for the port is deleted, the port automatically reverts back to a
conventional switch port and is no longer VLAN Stacking capable.
Consider the following when configuring VLAN Stacking UNI ports:
• All customer traffic received on the UNI port is dropped until customer VLANs (CVLAN) are associ-
ated with the port. See “Configuring the Type of Customer Traffic to Tunnel” on page 50-22.
• If the SAP ID specified with this command is associated with an IPMVLAN, the SAP profile must
specify CVLAN translation. In addition, multicast traffic is not associated with the IPMVLAN until the
UNI port is associated with the IPMVLAN as a receiver port. For more information, see the “Configur-
ing IP Multicast VLANs” chapter in this guide.
• A default UNI profile is assigned to the port at the time the port is configured. This profile defines how
control frames received on the UNI ports are processed. By default, GVRP and Spanning Tree frames
are tunneled. All other protocol control frames are dropped.
• To use different profile attribute values, create a new profile and associate it with the UNI port. See
“Configuring a UNI Profile” on page 50-25. Each time a profile is assigned to a UNI, the existing
profile is overwritten with the new one.
Use the show ethernet-service uni command to display a list of UNI ports and the profile association for
each port.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-21
Configuring VLAN Stacking Services Configuring VLAN Stacking
In this example, customer frames tagged with VLAN ID 500 that are received on SAP 20 UNI ports are
processed by the service to which SAP 20 is associated. This includes applying profile attributes associ-
ated with SAP 20 to the qualifying customer frames. If no other customer traffic is specified for SAP 20,
all other frames received on SAP 20 UNI ports are dropped.
In addition to specifying one or more CVLANs, it is also possible to specify the following parameters
when using the ethernet-service sap cvlan command:
• all—Specifies that all untagged and tagged frames are accepted on the UNI ports. If this parameter is
combined with a CVLAN ID and bandwidth sharing and rate limiting are enabled for the SAP profile,
then frames tagged with the CVLAN ID are given a higher bandwidth priority than all other frames
received on the port.
• untagged—Specifies that only untagged frames are accepted on the UNI ports. If this parameter is
combined with a CVLAN ID, then all untagged frames plus frames tagged with the CVLAN ID are
accepted on the UNI ports.
For example, the following command specifies that all untagged frames and frames tagged with CVLAN
ID 500 is accepted on UNI ports associated with SAP 20:
-> ethernet-service sap 20 cvlan 500 untagged
Use the no form of the ethernet-service sap cvlan command to delete an association between customer
traffic and a VLAN Stacking SAP. For example, the following command deletes the association between
CVLAN 500 and SAP 20:
-> ethernet-service sap 20 no cvlan 500
Note that when the last customer traffic association is deleted from a SAP, the SAP itself is not automati-
cally deleted. No traffic is accepted or processed by a SAP in this state, but the SAP ID is still known to
the switch.
Consider the following when configuring the type of customer traffic to tunnel:
• If no customer traffic is associated with a VLAN Stacking SAP, then the SAP does not process any
traffic for the service.
• Only one all or untagged designation is allowed for any given SAP; specifying both for the same SAP
is not allowed.
• Only one untagged designation is allowed per UNI port, even if the UNI port is associated with multi-
ple SAPs.
• Only one all designation is allowed per UNI port, even if the UNI port is associated with multiple
SAPs.
• Associating customer traffic with a service using an IP Multicast VLAN (IPMVLAN) is not allowed.
page 50-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Configuring VLAN Stacking Services
Use the show ethernet-service command to display the type of customer traffic associated with each SAP
configured for the switch
A default profile, named “default-sap-profile”, is automatically assigned to the SAP at the time the SAP is
created (see “Configuring a VLAN Stacking Service Access Point” on page 50-20). It is only necessary to
create a new profile to specify different attribute values if the default profile values (see above) are not
sufficient.
The following command provides an example of creating a new SAP profile to specify a different method
for mapping the SVLAN priority value:
-> ethernet-service sap-profile map_pbit priority map-inner-to-outer-p
In this example the map_pbit profile specifies priority mapping of the CVLAN inner tag 802.1p value to
the SVLAN outer tag value. The other attributes in this profile are set to their default values.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-23
Configuring VLAN Stacking Services Configuring VLAN Stacking
To delete a SAP profile, use the no form of the ethernet-service sap-profile command. For example, the
following command deletes the map_pbit profile:
-> no ethernet-service sap-profile map_pbit
• A CVLAN-UNI combination associated with a SAP having egress bandwidth configuration is unique
and it cannot be configured on any other SAP with egress bandwidth configuration.
Use the show ethernet-service sap-profile command to view a list of profiles that are already configured
for the switch. This command also displays the attribute values for each profile.
Note the following when associating a profile with a VLAN Stacking SAP:
• To change the profile associated with the SAP back to the default profile, specify “default-sap-profile”
for the profile name. For example:
-> ethernet-service sap 20 sap-profile default-sap-profile
• If the SAP ID specified with this command is associated with an IPMVLAN, the profile associated
with the SAP ID must specify CVLAN tag translation. Double tagging is not supported with IPMV-
LAN SAPs that are also associated with a UNI port.
Use the show ethernet-service sap command to display the SAP configuration, which includes the profile
association for each SAP.
page 50-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Configuring VLAN Stacking Services
A default UNI profile, named “default-uni-profile”, is automatically associated with a UNI port. The
default UNI profile specifies how control frames ingressing on the UNI port.
To delete a UNI profile, use the no form of the ethernet-service uni-profile command. For example, the
following command deletes the discard-gvrp profile:
-> no ethernet-service uni-profile discard-gvrp
Use the show ethernet-service uni-profile command to view a list of profiles that are already configured
for the switch. This command also displays the attribute values for each profile.
Note. The VLAN Stacking provider edge (PE) switch will not tunnel GVRP frames unless the GVRP
feature and/or GVRP transparent switching functionality is enabled on the PE switch. This is true even if
GVRP processing is enabled for the VLAN Stacking port.
To change the profile associated with the UNI port back to the default profile, specify “default-uni-
profile” for the profile name. For example:
-> ethernet-service uni 1/1 uni-profile default-uni-profile
Use the show ethernet-service uni command to display the profile associations for each UNI port.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-25
Configuring VLAN Stacking Services Configuring VLAN Stacking
The custom L2 protocol can be applied to specific actions (tunnel, MAC-tunnel and discard). The
following table describes the actions that can be associated:
Action Description
Tunnel Tunnels the specified PDU across the provider network without
modifying the MAC address.
MAC-tunnel Changes the destination MAC address to the configured tunnel
MAC address of the UNI profile before forwarding.
Discard Discards the specified PDU.
Based on the configuration the custom L2 protocols are classified as qualified L2 protocols and
unqualified L2 protocols.
The qualified L2 protocols are the custom L2 protocols that are fully defined with an Ether-Type and
optionally a Sub-Type or ssap/dsap. The action can be set to "Tunnel", "Discard” or "Mac-Tunnel".
The unqualified L2 protocols are the custom L2 protocols that are only defined with a Mac-address or
Mac-address with mask. The action can be set to "Tunnel" or "Discard".
The custom L2 protocol is associated to a UNI profile for specific packet control (Tunnel, MAC-tunnel
and Discard) for proprietary protocol with multicast MAC addresses. To associate a UNI profile to a
specific action use the ethernet-service uni-profile custom-L2-protocol command. For example, the
following command specifies the action “mac-tunnel” to the custom L2 protocol “tunnel-mac-ethertype”
associated to the UNI profile “profile1”:
-> ethernet-service uni-profile profile1 custom-L2-protocol
tunnel-mac-ethertype mac-tunnel
Use the show ethernet-service sap command to view the configuration information of the custom-L2-
protocol entry.
page 50-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking VLAN Stacking Application Example
Customer A Customer A
Site 1 Site 2
MAN CLOUD
PE1 PE2
NNI 3/1 NNI 3/1
SVLAN 200
UNI 2/1 UNI 2/1
CVLAN 10 CVLAN 10
Customer B Customer B
Site 1 Site 2
VLAN Stacking Application
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-27
VLAN Stacking Application Example Configuring VLAN Stacking
2 Configure two VLAN Stacking services on PE1 and PE2 using the ethernet-service service-name
command. Configure one service with the name “CustomerA” and the other service with the name
“Customer B”. Assign “CustomerA” service to SVLAN 100 and “CustomerB” service to SVLAN 200.
-> ethernet-service service-name CustomerA svlan 100
3 Configure port 3/1 on PE1 and PE2 as VLAN Stacking NNI ports using the ethernet-service svlan nni
command. Associate each port with both SVLAN 100 and SVLAN 200.
-> ethernet-service svlan 100 nni 3/1
4 Configure a VLAN Stacking SAP with ID 20 on PE1 and PE2 using the ethernet-service sap. Associ-
ate the SAP with the “CustomerA” service.
-> ethernet-service sap 20 service-name CustomerA
5 Configure a VLAN Stacking SAP with ID 30 on PE1 and PE2 using the ethernet-service sap
command. Associate the SAP with the “CustomerB” service.
-> ethernet-service sap 30 service-name CustomerB
6 Configure port 1/1 on PE1 and PE2 as a VLAN Stacking UNI port and associate 1/1 with SAP 20
using the ethernet-service sap uni command.
-> ethernet-service sap 20 uni 1/1
7 Configure port 2/1 on PE1 and PE2 as a VLAN Stacking UNI port and associate 2/1 with SAP 30
using the ethernet-service sap uni command.
-> ethernet-service sap 30 uni 2/1
8 Configure SAP 20 on PE1 and PE2 to accept all customer traffic on UNI port 1/1 using the ethernet-
service sap cvlan command.
-> ethernet-service sap 20 cvlan all
9 Configure SAP 30 on PE1 and PE2 to accept only customer traffic that is tagged with CVLAN 10
using the ethernet-service sap cvlan command.
-> ethernet-service sap 30 cvlan 10
page 50-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking VLAN Stacking Application Example
10 Create a SAP profile on PE1 and PE2 that will map the inner CVLAN tag 802.1p value to the outer
SVLAN tag using the ethernet-service sap-profile command.
-> ethernet-service sap-profile map_pbit priority map-inner-to-outer-p
11 Associate the “map_pbit” profile to SAP 30 using the ethernet-service sap sap-profile command.
This profile will only apply to Customer B traffic, so it is not necessary to associate the profile with SAP
20.
-> ethernet-service sap 30 sap-profile map_pbit
12 Verify the VLAN Stacking service configuration using the show ethernet-service command.
The following is an example of what the sample configuration commands look like entered sequentially
on the command line of the provider edge switches:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-29
Wire-Speed Ethernet Loopback Test Configuring VLAN Stacking
• A unique source MAC address for the test frames. In this case, the MAC address of the device that will
generate the test frames is used.
• A unique destination MAC address for the test frames. For an inward test, using the base MAC address
of the destination switch is recommended. For an outward test, use the base MAC address of customer
premises equipment (CPE) or the MAC address of the egress port on the provider edge (PE) switch.
• The VLAN ID on which the test frames are forwarded (if the frame is double-tagged, this is the VLAN
ID of the outer tag).
• The switch port (for example, the UNI or NNI port) that will perform the egress or ingress loopback
operation for the test.
• The type of test to run (outward or inward loopback).
The loopback-test command is used to define the test profile and is also the same command that is used to
enable or disable the actual loopback operation. For example, the following command creates an inward
loopback test profile:
-> loopback-test PE1-inward-UNI source-mac 00:00:00:dd:aa:01 destination-mac
00:00:00:cc:aa:bb vlan 1001 loopback-port 1/1 type inward
The following commands enable and disable the PE1-inward-UNI profile attributes for the switch:
-> loopback-test PE1-inward-UNI enable
Use the show loopback-test to display the loopback test profile configuration.
page 50-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking Wire-Speed Ethernet Loopback Test
• Only Layer 2 loopback tests are supported: test frames are not routed. The loopback operation will
only swap the source and destination MAC address of bridged test frames.
• The switch creates a static MAC address entry for the egress port when the outward loopback profile is
applied on that port. The static address created is the destination MAC address specified in the profile.
If the switch receives a non-test frame that contains the same MAC address, both the test and non-test
frames are filtered even if they were received on different ports.
• Each loopback test is associated with one VLAN; using multiple VLANs is not supported.
• Once a port is designated as the loopback port for a test, that port is no longer available for use by other
switch applications.
• Ports used for an outward loopback operation go “out-of-service” and will no longer carry customer
traffic. The port does remain active, however, for test frame traffic.
• Ports used for an inward loopback operation remain “in-service”. Test frame traffic is mixed in with
customer frame traffic.
• If the MAC addresses specified in the loopback test profile is an actual network address (for example,
02:da:95:e1:22:10, not aa:aa:aa:aa:aa:aa), flush the MAC address table for the switch when loopback
testing is finished.
The following sections provide more information about using and configuring both types of Ethernet loop-
back tests.
Note. Conducting an outward loopback test disrupts the flow of customer traffic on the loopback port and
may cause network reachability problems.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-31
Wire-Speed Ethernet Loopback Test Configuring VLAN Stacking
Test Head
MAC A
MAC A MAC B
MAC A MAC B
• The test head transmits frames with source MAC A and destination MAC B.
• When the test frames reach UNI port 1/1 on PE3, the egress loopback operation is triggered on that
port. MAC A and B are swapped in each test frame as the frames are looped back on to the egress port.
• Once the egress loopback operation is complete, the frames are then sent to the redirect port and
forwarded back to the test head.
page 50-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VLAN Stacking View Statistics for tunneling protocols
Test Head
MAC A
MAC A MAC N
MAC A MAC N
• The test head transmits frames with source MAC A and destination MAC N.
• When the test frames reach NNI port 2/1 on PE3, the ingress loopback operation is triggered on that
port. MAC A and N are swapped in each test frame as the frames are looped back onto the ingress port.
• Once the ingress loopback operation is complete and because the NNI port is also the redirect port in
this case, the frames are forwarded back to the test head.
show ethernet-service nni l2pt- Displays the statistics information of Network Network Interface
statistics (NNI) ports.
show ethernet-service uni l2pt- Displays the statistics of all protocols configured per UNI port.
statistics
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 50-33
Verifying the VLAN Stacking Configuration Configuring VLAN Stacking
show ethernet-service mode Displays the active VLAN Stacking mode for the switch.
show ethernet-service vlan Displays the SVLAN configuration for the switch.
show ethernet-service Displays the VLAN Stacking service configuration for the switch.
show ethernet-service sap Displays the VLAN Stacking service access point (SAP) configura-
tion for the switch.
show ethernet-service custom-L2- Displays the VLAN Stacking service access point (SAP)
protocol configuration for the switch.
show ethernet-service port Displays configuration information for VLAN Stacking ports.
show ethernet-service nni Displays configuration information for NNI port parameters.
show ethernet-service uni Displays profile associations for UNI ports.
show ethernet-service uni-profile Displays UNI profile attribute values.
show ethernet-service sap-profile Displays SAP profile attribute values.
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide. An example of the output for the show ethernet-service command is also given in
“Quick Steps for Configuring VLAN Stacking” on page 50-13.
page 50-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
51 Configuring Ethernet
OAM
The rise in the number of Ethernet service instances has resulted in service providers requiring a powerful
and robust set of management tools to maintain Ethernet service networks. Service provider networks are
large and intricate, often consisting of different operators that work together to provide the customers with
end-to-end services. The challenge for the service providers is to provide a highly available, convergent
network to the customer base. Ethernet OAM (Operations, Administration, and Maintenance) provides the
detection, resiliency, and monitoring capability for end-to-end service guarantee in an Ethernet network.
In This Chapter
This chapter describes the Ethernet OAM feature, how to configure it and display Ethernet OAM
information through the Command Line Interface (CLI). For more details about the syntax of commands,
see the OmniSwitch AOS Release 6 CLI Reference Guide.
The following information and procedures are included in this chapter:
• “Ethernet OAM Overview” on page 51-3.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-1
Ethernet OAM Specifications Configuring Ethernet OAM
page 51-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Ethernet OAM Overview
• Point-to-point MA: logical sub-MA component only between two MEPs MA.
• Maintenance Domain: One or more MAs under the same administrative control.
• Remote Fault Propagation (RFP): Propagates connectivity fault events into the interface attached to a
MEP.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-3
Ethernet OAM Overview Configuring Ethernet OAM
Customer
Domain
Provider
Domain
Customer Customer
Network Network
page 51-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Ethernet OAM Overview
Fault Management
Service OAM Connectivity Fault Management consists of three types of messages that are used to help
network administrators detect, verify, and isolate when a problem occurs in the network:
• Continuity Check Messages (CCM)—These are multicast messages exchanged periodically by MEPs
to detect loss of service connectivity between MEPs. These messages are also used by MEPs and MIPs
to discover other MEPs within a domain.
• Linktrace Messages (LTM)—These messages are transmitted by a MEP to trace the path to a destina-
tion maintenance point. The receiving maintenance point responds to LTMs with a linktrace reply
(LTR). This mechanism is similar to the UDP Trace Route function. The transmission of linktrace
messages is requested by an administrator.
• Loopback Messages (LBM)—These messages are transmitted by a MEP to a specified MIP or MEP
to determine whether or not the maintenance point is reachable. The receiving maintenance point
responds to LBMs with a loopback reply (LBR). This mechanism is not used to discover a path to the
destination; it is similar to the Ping function. The transmission of loopback messages is requested by an
administrator.
Performance Monitoring
The ITU-T Y.1731 Recommendation addresses the need to monitor performance to help enforce customer
service level agreements (SLAs). Frame delay (latency) and frame delay variation (jitter) are important
performance objectives, especially for those applications (such as voice) that cannot function with a high
level of latency or jitter.
This implementation of Service OAM supports Ethernet frame delay measurement (ETH-DM) and is
compliant with Y.1731. The ETH-DM feature allows for the configuration of on-demand OAM to
measure frame delay and frame delay variation between endpoints.
Frame delay measurement is performed between peer MEPs (measurements to MIPs are not done) within
the same MA. Although the OmniSwitch implementation of ETH-DM is compliant with ITU-T Y.1731,
delay measurement can be performed for both ITU-T Y.1731 and IEEE 802.1ag MEPs.
Any MEP can initiate or reply to an ETH-DM request, depending on the type of delay measurement
requested. There are two types of delay measurements supported: one-way and two-way.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-5
Ethernet OAM Overview Configuring Ethernet OAM
One-way ETH-DM
• A MEP sends one-way delay measurement (1DM)) frames to a peer MEP. The sending MEP inserts
the transmission time into the 1DM frame at the time the frame is sent.
• When a MEP receives a 1DM frame, the MEP calculates the one-way delay as the difference between
the time at which the frame was received and the transmission time indicated by the frame timestamp
(receive time minus transmission time).
• One-way delay measurement statistics are gathered and stored on the receiving MEP (the MEP that
receives a 1DM request).
• One-way ETH-DM requires clock synchronization between the sending and receiving MEPs. Using
NTP for clock synchronization is recommended.
Two-way ETH-DM
• A MEP sends delay measurement message (DMM) frames to a peer MEP to request a two-way ETH-
DM. The sending MEP inserts the transmission time into the DMM frame at the time the frame is sent.
• When a MEP receives a DMM frame, the MEP responds to the DMM with a delay message reply
(DMR) frame that contains the following timestamps:
– Timestamp copied from the DMM frame.
– Timestamp indicating when the DMM frame was received.
– Timestamp indicating the time at which the receiving MEP transmitted the DMR frame back to the
sending MEP.
• When a MEP receives a DMR frame, the MEP compares all the DMR timestamps with the time at
which the MEP received the DMR frame to calculate the two-way delay.
• The two-way delay is the difference between the time the originating MEP sent a DMM request and the
time at which the originating MEP received a DMR frame minus the time taken by the responding
MEP to process the DMM request.
• Two-way delay measurement statistics are gathered and stored on the originating MEP (the MEP that
initiates a DMM request).
• This method does not require clock synchronization between the transmitting and receiving MEPs.
page 51-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Ethernet OAM Overview
Support for both the IEEE and ITU-T Ethernet CFM standards allows interoperability between
OmniSwitch 802.1ag and Y.1731 CFM with the following minor configuration requirements:
• The OmniSwitch MD format must be configured as “none”.
• ITU-T Y.1731 uses the “icc-based” format for a MEG, so the OmniSwitch MA format must also be
configured to use the “icc-based” format.
• When the OmniSwitch MA is configured with the “icc-based” format, the MA name is automatically
padded with zeros if the name specified is less than 13 characters.
The OmniSwitch CLI commands to configure an MD and MA include the “none” and “icc-based” format
options. See “Configuring Ethernet OAM” on page 51-9 for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-7
Quick Steps for Configuring Ethernet OAM Configuring Ethernet OAM
2 Create an Ethernet OAM Maintenance Association using the ethoam association command.
For example:
-> ethoam association alcatel-sales format string domain esd.alcatel-lucent.com
vlan 10
3 Create an Ethernet OAM Maintenance End Point using the ethoam endpoint admin-state command.
For example:
-> ethoam endpoint 100 domain esd.alcatel-lucent.com association alcatel-sales
direction up port 1/10
4 Administratively enable the Ethernet OAM Maintenance End Point using the ethoam endpoint
admin-state command. For example:
-> ethoam endpoint 100 domain esd.alcatel-lucent.com association alcatel-sales
admin-state enable
5 Enable Continuity Check Messages for the Ethernet OAM Maintenance End Point using the ethoam
endpoint rfp command. For example:
-> ethoam endpoint 100 domain esd.alcatel-lucent.com association alcatel-sales
ccm enable
6 Configure the Message Handling Function (MHF) value of an Ethernet OAM Maintenance Domain
using the ethoam domain mhf command. For example:
-> ethoam domain esd.alcatel-lucent.com mhf explicit
7 Configure the endpoint list for the Ethernet OAM Maintenance Association using the ethoam associa-
tion endpoint-list command. For example:
-> ethoam association alcatel-sales domain esd.alcatel-lucent.com endpoint-list
100
8 Enable the maintenance entity to initiate transmitting loopback messages to obtain loopback replies
using the ethoam loopback command. For example:
-> ethoam loopback target-endpoint 15 source-endpoint 100 domain esd.alcatel-
lucent.com association alcatel-sales
page 51-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Configuring Ethernet OAM
Note that with this implementation of Ethernet OAM, it is only possible to delete an MD when there is no
Maintenance Association, End Point, or Intermediate Point associated with the MD.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-9
Configuring Ethernet OAM Configuring Ethernet OAM
To modify the default Ethernet OAM Maintenance Domain, use the ethoam default-domain level
command, as shown:
-> ethoam default-domain vlan 100 level 4 mhf none
Note. The no form of this command restores the default Ethernet OAM Maintenance Domain value.
Note that with this implementation of Ethernet OAM, it is only possible to delete an MA when there is no
Maintenance End Point (MEP) or Maintenance Intermediate Point (MIP) associated with the MA.
By default, the CCM interval is set to 10 seconds. To modify this value for an MA, use the ethoam associ-
ation ccm-interval command:
-> ethoam association alcatel-sales domain esd.alcatel-lucent.com ccm-interval
interval1m
To modify the MEP list of an MA, use the ethoam association endpoint-list command, as shown:
-> ethoam association alcatel-sales domain esd.alcatel-lucent.com endpoint-list
100-200
To remove the MEP list from an Ethernet OAM Maintenance Association, enter:
-> no ethoam association alcatel-sales domain esd.alcatel-lucent.com endpoint-
list 100-200
page 51-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Configuring Ethernet OAM
To configure the administrative state of a MEP, use the ethoam endpoint admin-state command. For
example:
-> ethoam end-point 100 domain esd.alcatel-lucent.com association alcatel-sales
admin-state enable
• The virtual MEP is configured on a virtual port and not attached to any switch interface.
• The behavior of virtual MEP will be the same as that of the MEPs created on physical ports.
• The Remote Fault Propagation feature is not supported for virtual UP MEP.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-11
Configuring Ethernet OAM Configuring Ethernet OAM
To configure the priority values for Continuity Check Messages and Linktrace Messages transmitted by a
MEP, use the ethoam endpoint priority command. For example:
-> ethoam end-point 100 domain esd.alcatel-lucent.com association alcatel-sales
priority 6
To configure the lowest priority fault alarm for the lowest priority defect for a MEP, use the ethoam
endpoint lowest-priority-defect command. For example:
-> ethoam end-point 100 domain esd.alcatel-lucent.com association alcatel-sales
lowest-priority-defect all-defect
Configuring Loopback
To initiate transmitting Loopback messages (LBMs) and obtaining Loopback replies (LBRs), use the
ethoam loopback command. For example:
Configuring Linktrace
To initiate transmitting Linktrace messages (LTMs) and detecting Linktrace replies (LTR), use the
ethoam linktrace command. For example:
-> ethoam linktrace 10:aa:ac:12:12:ad end-point 4 domain esd.alcatel-lucent.com
association alcatel_sales flag fdbonly hop-count 32
page 51-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Configuring Ethernet OAM
One-Way ETH-DM
The ethoam one-way-delay command is used to configure a one-way ETH-DM (1DM) to monitor perfor-
mance between two MEPs. For example, the following command is used to initiate the transmission of
1DM frames to a target MEP:
-> ethoam one-way-delay target-endpoint 10 source-endpoint 12 domain MD1 associ-
ation MA1 vlan-priority 4
This command initiates the sending of 1DM frames from MEP 12 to MEP 10, which does not reply to
frames received from MEP 12. The latency and jitter statistics are gathered and stored on the receiving
MEP, which is MEP 10 in this example.
An option to specify a target MAC address, instead of a MEP ID, is also supported. For example:
-> ethoam one-way-delay target-macaddress 00:e0:b1:6a:52:4c source-endpoint 12
domain MD association MA vlan-priority 4
One-way delay measurement statistics are gathered and stored on the receiving MEP (the MEP that
receives a 1DM request).
Note. One-way ETH-DM requires clock synchronization between the sending and receiving MEPs. Using
NTP for clock synchronization is recommended.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-13
Configuring Ethernet OAM Configuring Ethernet OAM
Two-Way ETH-DM
The ethoam two-way-delay command is used to configure a two-way ETH-DM to monitor roundtrip
performance between two MEPs. For example, the following command is used to initiate the transmission
of delay measurement message (DMM) frames to a target MEP:
This command initiates the sending of DMM frames from MEP 12 to MEP 10. However, with two-way
delay measurement, the receiving MEP replies with delay message response (DMR) frames to the sending
MEP. In this example, MEP 10 sends DMR frames back to MEP 12.
An option to specify a target MAC address, instead of a MEP ID, is also supported. For example:
page 51-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Ethernet OAM Service Assurance Agents
Configuring an SAA
The first step in configuring an SAA for either ETH-LB or two-way ETH-DM is to create an SAA ID. The
saa command is used to create the SAA ID string (up to 32 characters), along with an SAA description
and time interval. For example:
-> saa saa2 descr “two-way eth-dm” interval 160
The SAA time interval specifies the amount of time, in minutes, to wait between each iteration of the SAA
test. By default, the SAA time interval is set to 150 minutes and the description is set to “DEFAULT”.
Once the SAA ID is created, then the type of SAA is configured (for example, ETH-LB or ETH-DM).
In this example, “saa1” is an existing SAA ID that is configured to run ETH-LB assurance iterations. The
additional command parameters apply to the specific loopback operation. Note that these parameters are
similar to those specified with the ethoam loopback command.
In this example, “saa2” is an existing SAA ID that is configured to run two-way ETH-DM assurance test
iterations. The additional command parameters apply to the specific delay measurement operation. Note
that these parameters are similar to those specified with the ethoam two-way-delay command.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-15
Ethernet OAM Service Assurance Agents Configuring Ethernet OAM
Both commands provide the ability to define a specific start and stop time for the SAA. For example:
-> saa saa2 start at 2010-09-12,09:00:00
In addition, the saa stop command provides a never parameter to specify that the SAA will not stop unless
a specific date and time is specified with the saa stop command. For example:
1 -> saa saa2 start
In this example, the first command starts “saa2”. Note that because a date and time was not specified, the
SAA starts immediately. The second command specifies that “saa2” will never stop unless a date and time
is specified. As a result, the third command will fail because it does not specify a date and time. The fourth
command, however, will successfully stop the SAA at the specified date and time.
page 51-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring Ethernet OAM Verifying the Ethernet OAM Configuration
show ethoam Displays the information of all the Management Domains configured on
the switch.
show ethoam domain Displays the information of a specific Management Domain configured
on the switch.
show ethoam domain Displays the information of a specific MA in a Management Domain
association configured on the switch.
show ethoam domain Displays the information of a specific MEP in a Management Domain
association end-point configured on the switch.
show ethoam remote-endpoint Displays the information of all remote MEPs learned as a part of the
domain CCM message exchange.
show ethoam default-domain Displays all the default MD information for all the VLANs or a specific
configuration VLAN.
show ethoam default-domain Displays the values of scalar Default-MD objects
configuration
show ethoam vlan Displays the vlan association for a specified VLAN-ID
show ethoam cfmstack Displays the contents of CFM Stack Managed Object, which determines
the relationships among MEPs and MIPs on a specific switch port.
show ethoam linktrace-reply Displays the content of the Linktrace reply (LTR) returned by a previ-
ously transmitted LTM. This command displays the LTR based on the
transaction identifier or sequence number of the LTM for which the
LTR is to be displayed
show ethoam linktrace-tran-id Displays the transaction identifiers returned by previously generated
LTMs from a specified MEP.
show ethoam statistics Displays the Ethernet OAM statistics of all the Management Domains
configured on the switch. Also, displays the statistics of all the MAs and
matching MEPs for all the MDs.
show ethoam config-error Displays the configuration error for a specified VLAN, port or linkagg.
show saa Displays generic configuration parameters for all the configured SAAs.
show saa type config Displays configured SAAs of the given type.
show saa statistics Displays latest record, aggregated record or history.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 51-17
Verifying the Ethernet OAM Configuration Configuring Ethernet OAM
page 51-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
52 Configuring EFM
(LINK OAM)
Ethernet in the First Mile (EFM), also known as LINK OAM, is a collection of protocols specified in
IEEE 802.3ah, defining Ethernet in the access networks that connects subscribers to their immediate
service provider. EFM, EFM-OAM and LINK OAM refers to IEEE 802.3ah standard.
LINK OAM (Operation, Administration, and Maintenance) is a tool monitoring Layer-2 link status by
sending OAM protocol data units (OAMPDUs) between networked devices on the first mile. The first
mile network refers to the connection between the subscriber and the public carrier network. LINK OAM
is mainly used to address common link-related issues on the first mile. It helps network administrators
manage their networks effectively.
By enabling LINK OAM on two devices connected by a point-to-point connection, network
administrators can monitor the status of the link, detect faults in network segments, and probe link errors
by using loopback testing.
In This Chapter
This chapter describes the LINK OAM feature and how to configure it through the Command Line
Interface (CLI). CLI commands are used in the configuration examples; for more details about the syntax
of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide. This chapter provides an
overview of LINK OAM and includes the following information:
• “LINK OAM Specifications” on page 52-2
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 52-1
LINK OAM Specifications Configuring EFM (LINK OAM)
page 52-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring EFM (LINK OAM) LINK OAM Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 52-3
Quick Steps for Configuring LINK OAM Configuring EFM (LINK OAM)
2 Enable LINK OAM protocol for a specific port using the efm-oam port status command. For example
3 Configure the LINK AOM port to active mode by using the efm-oam port mode command.
For example:
-> efm-oam port 1/1 mode active
Note. The above step is optional. By default, LINK OAM mode is active on all ports.
4 Configure the timeout interval (keep-alive) for the dynamically learned neighboring devices on the port
by using the efm-oam port keepalive-interval command. For example:
-> efm-oam port 1/1 keepalive-interval 10
5 Configure the time interval by which the information OAMPDUs should be transmitted out of an LINK
OAM enabled port by using the efm-oam port hello-interval command. For example:
-> efm-oam port 1/1 hello-interval 5
6 Activate remote loop back processing on the port by using the efm-oam port remote-loopback
command. For example:
-> efm-oam port 1/1 remote-loopback process
7 Activate propagation of critical events and dying gasp events on the port by using the efm-oam port
propagate-events command. For example:
-> efm-oam port 1/1 propagate-events critical-event enable
Note. The above step is optional. By default, propagation of critical events and dying gasp is enabled on
the port.
8 Configure the threshold, window frame values and notify status for errored frame period events on the
port by using the efm-oam errored-frame-period command. For example:
-> efm-oam port 1/1 errored-frame-period window 3000000 threshold 1 notify
enable
9 Configure the threshold, window, and notify status for errored frame events on the port by using the
efm-oam errored-frame command. For example:
-> efm-oam port 1/1 errored-frame window 32 threshold 10 notify enable
page 52-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring EFM (LINK OAM) Quick Steps for Configuring LINK OAM
10 Configure the threshold, window and notify-status for errored-frame-seconds-summary on the port by
using the efm-oam errored-frame-seconds-summary command. For example:
-> efm-oam port 1/1 errored-frame-seconds-summary window 700 threshold 1 notify
enable
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 52-5
LINK OAM Overview Configuring EFM (LINK OAM)
Site A Site B
OAM information is conveyed in slow protocol frames called OAM Protocol Data Units (OAMPDUs).
OAMPDUs contain the appropriate control and status information used to monitor, test and troubleshoot
OAM-enabled links. OAMPDUs traverse a single link, being passed between peer OAM nodes, and as
such, are not forwarded by MAC clients (for example, bridges or switches). OAM does not include
functions such as station management, bandwidth allocation or provisioning functions.
The mandatory LINK OAM functions include discovery operations (determining if the other end of the
link is OAM capable and what OAM functions it supports), state machine implementation and some
critical event flows. OAM remote loopback can be used for fault localization and link performance testing.
The features of the LINK OAM protocol discussed in this section are:
• “Discovery” on page 52-7
page 52-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring EFM (LINK OAM) LINK OAM Overview
Discovery
Discovery is the first phase of the IEEE 802.3ah OAM protocol. During discovery, information about
LINK OAM node’s capabilities, configuration, and identity are exchanged in the form of OAM protocol
data units (OAMPDUs).
The interconnected LINK OAM nodes notify the peer of their OAM configuration information and the
OAM capabilities of the local nodes by exchanging Information OAMPDUs and determine whether LINK
OAM connections can be established. A LINK OAM connection between two nodes is established only
when the settings concerning Loopback, link detecting, and link event of the both sides match.
Note. LINK OAM requires that frames be exchanged with a minimum frequency to maintain the relation-
ship (keep-alive). If no OAMPDUs are received in a 5 second window, the OAM peering relationship is
lost and must be restored to perform OAM functions. Use efm-oam port keepalive-interval command to
configure the keepalive time interval.
Link Monitoring
Error detection in an Ethernet network is difficult, especially when the physical connection in the network
is not disconnected but network performance is degrading gradually. Link monitoring is used to detect and
indicate link faults in various environments. Link monitoring uses the Event Notification OAMPDU, and
sends events to the remote OAM node when there is a disorder detected on the link. The error events
defined are:
Errored frame event - An errored frame event occurs when the number of detected error frames over a
specific interval exceeds the predefined threshold.
Errored frame period event - An errored frame period event occurs if the number of frame errors in
specific number of received frames exceeds the predefined threshold.
Errored frame seconds event - When the number of error frame seconds detected on a port over a detec-
tion interval reaches the error threshold, an errored frame seconds event occurs.
For configuring errored frame, errored frame period, and errored frame seconds events on a port, see
“Configuring Link Monitoring” on page 52-10
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 52-7
Interaction With Other Features Configuring EFM (LINK OAM)
For setting up the notification of critical events on a port, see “Enabling and Disabling Propagation of
Events” on page 52-10
Link Aggregate
LINK OAM will not work on the logical link aggregate port. But, it can run on the individual aggregable
(physical) port.
ERP
LINK OAM is supported in Ethernet Ring Protection (ERP) switching mechanism. ERP (ITU-T G.8032/
Y.1344) is a self-configuring algorithm that maintains a loop-free topology while providing data path
redundancy and network scalability. ERP provides fast recovery times for Ethernet ring topologies by
utilizing traditional Ethernet MAC and bridge functions.
page 52-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring EFM (LINK OAM) Configuring LINK OAM
To enable LINK OAM globally on a range of ports, use the efm-oam command, as shown:
-> efm-oam port 2/1-10 status enable
To disable LINK OAM globally on a range of ports, use the disable form of the command, as shown:
-> efm-oam port 2/1-10 status disable
To enable LINK OAM mode to active, use the port mode command, as shown:
-> efm-oam port 2/1-10 mode active
To configure the time interval by which the information OAMPDUs should be transmitted out of an LINK
OAM enabled port, use the efm-oam port hello-interval command.
-> efm-oam port 2/1-10 hello-interval 10
Note. By default, the keep-alive interval value is 5 seconds and the hello-interval value is set to 1 second.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 52-9
Configuring Link Monitoring Configuring EFM (LINK OAM)
Note. The above commands are optional. By default, propagation of critical events and dying gasp is
enabled on the port.
To disable notification of errored frame period events, use the following command.
-> efm-oam port 2/1-10 errored-frame-period notify disable
page 52-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring EFM (LINK OAM) Configuring Link Monitoring
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 52-11
Configuring LINK OAM Loopback Configuring EFM (LINK OAM)
When the remote-loopback is in ignore mode, the session started by peer LINK OAM will not be
processed by the local port.
For remote loop back processing to be ignored on the port, use the following command.
-> efm-oam port 2/1-10 remote-loopback ignore
After configuring the port to process remote loopback, the port should be initiated for loopback session to
start.
-> efm-oam port 1/1 remote-loopback start
The above command will initiate the loopback control PDU towards the peer port to start. To stop the
remote-loopback sessionl, use the following command.
-> efm-oam port 1/1 remote-loopback stop
To configure the number of frames to be sent by the current LINK OAM port to the remote port’s MAC
address (l1 ping) and the delay between each consecutive sent frames and to start the ping operation, use
the following command.
-> efm-oam port 1/20 l1-ping num-frames 12 delay 500 start
Note. By default, the number of frames value is 5 frames and the delay is set to 1000 milliseconds.
page 52-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring EFM (LINK OAM) Verifying the LINK OAM Configuration
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 52-13
Verifying the LINK OAM Configuration Configuring EFM (LINK OAM)
page 52-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
53 Configuring MPLS
Multiprotocol Label Switching (MPLS) is a label switching technology that provides the ability to set up
connection-oriented paths over a connectionless IP network. MPLS sets up a specific path for a sequence
of packets. The packets are identified by a label inserted into each packet.
This implementation of MPLS provides the network architecture that is needed to set up a Virtual Private
LAN Service (VPLS). VPLS allows multiple customer sites to transparently connect through a single
bridging domain over an IP/MPLS-based network.
The MPLS architecture provided is based on the Label Distribution Protocol (LDP). The LDP consists of a
set of procedures used by participating Label Switching Routers (LSRs) to define Label Switched Paths
(LSPs), also referred to as MPLS tunnels. These tunnels provide the foundation necessary to provision
VPLS.
This chapter documents the OmniSwitch implementation of an LDP-based MPLS network architecture.
For information about how to configure VPLS, see Chapter 54, “Configuring VPLS.”.
In This Chapter
This chapter describes the basic components of MPLS and how to configure them through the Command
Line Interface (CLI). CLI commands are used in the configuration examples; for more details about the
syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide
The following information and procedures are included in this chapter:
• “MPLS Specifications” on page 53-2.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-1
MPLS Specifications Configuring MPLS
MPLS Specifications
IETF Internet-Drafts Supported draft-ietf-bfd-base-08.txt — Bidirectional Forward-
ing Detection
draft-ietf-bfd-v4v6-1hop-08.txt — BFD for IPv4
and IPv6 (Single Hop)
RFCs Supported 3031–Multiprotocol Label Switching Architecture
3036–Label Distribution Protocol Specification
3478–Graceful Restart Mechanism for LDP.
4762–Virtual Private LAN Service (VPLS) using
LDP Signaling.
Platforms Supported OmniSwitch 9000E
Note: MPLS is not supported on the
OS9-XNI-U12E module.
Services supported Virtual Private LAN Service
Maximum number of service instances 1024*
(VPLS) per system
Maximum number of pseudo wires/VCs per 8K*
system
Maximum number of Service Access Points 8192*
(SAPs) and service bindings (virtual ports)
Maximum number of Service Distribution 32
Point (SDP) sessions.
Maximum number of LDP/Target LDP 32*
neighbors
Maximum number of LDP/Target LDP ses- 32*
sions
Maximum number of LSP tunnels (push/pop 32*
entries)
Maximum number of LSP swap entries 32**
Maximum number of static LSPs 1024
Maximum number of backup static LSPs 16
page 53-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Defaults
MPLS Defaults
The following table shows the default settings of the configurable LDP-based MPLS parameters.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-3
Quick Steps for Configuring MPLS Configuring MPLS
The quick steps described in this section are based on the assumption that the above requirements for
configuring an MPLS transport network are in place.
By default, the MPLS and LDP instances are enabled on the switch when the required Alcatel-Lucent soft-
ware license is downloaded and applied.
1 To change the status of the MPLS instance on the switch, use the configure router mpls shutdown
command. For example:
-> configure router mpls no shutdown
-> configure router mpls shutdown
2 To change the status of the LDP instance on the switch, use the configure router ldp shutdown
command: for example:
-> configure router ldp no shutdown
-> configure router ldp shutdown
3 Configure MPLS Label Switched Paths (LSPs) using LDP or static LSPs. To configure LDP, see
“Quick Steps for Configuring LDP” on page 53-5. To configure static LSPs, see “Quick Steps for Config-
uring Static LSPs” on page 53-8.
Note. Optional. Verify the MPLS status for the switch using the show router mpls status command.
For example:
MPLS Status
page 53-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Quick Steps for Configuring MPLS
Verify the LDP status for the switch using the show router ldp status command. For example:
See the “Static LSP and FRR Commands” chapter and the “Label Distribution Protocol Commands” chap-
ter in the OmniSwitch AOS Release 6 CLI Reference Guide for information about the fields in the above
displays.
Note. Optional. When an LDP interface is created, global default parameter values are applied to that
interface. To verify the interface configuration use the show router ldp interface command. For example:
LDP Interfaces
No. of Interfaces: 1
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-5
Quick Steps for Configuring MPLS Configuring MPLS
Interface "vlan-30"
Admin State: Up, Oper State: Up,
Hold Time: 15, Hello Factor: 3,
Keepalive Timeout: 30, Keepalive Factor: 3,
Transport Addr: System, Last Modified: 05/26/2009 23:14:27,
Active Adjacencies: 1,
Tunneling: Disabled,
Lsp Name : None
See the “Label Distribution Protocol Commands” chapter in the OmniSwitch AOS Release 6 CLI Refer-
ence Guide for information about the fields in the above displays.
2 Optional. By default, the LDP interface is administratively enabled when the interface is created, To
disable the administrative status, use the configure router ldp interface-parameters interface shut-
down command. For example:
-> configure router ldp interface-parameters interface no shutdown
To configure the hello timeout interval for a specific LDP interface, use the interface parameter to
specify an interface name. For example:
-> configure router ldp interface-parameters interface vlan-10 hello 40 2
2 Configure the global keepalive timeout interval using the configure router ldp interface-parameters
keepalive command. This command sets the default value that is applied to all LDP interfaces when they
are created. For example:
-> configure router ldp interface-parameters timeout 50 10
To configure the keepalive timeout interval for a specific LDP interface, use the interface parameter to
specify an interface name. For example:
-> configure router ldp interface-parameters interface vlan-10 keepalive 50 10
3 Select the system IP address or the LDP IP interface address as the transport address for the LDP inter-
face using the configure router ldp interface-parameters transport-address command. The transport
address is used to establish LDP TCP sessions. For example:
-> configure router ldp interface-parameters interface vlan-10 transport-address
system
-> configure router ldp interface-parameters interface vlan-10 transport-address
interface
page 53-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Quick Steps for Configuring MPLS
4 Configure the hello timeout interval for targeted LDP sessions using the configure router ldp
targeted-session hello command. For example:
-> configure router ldp targeted-session hello 20 2
5 Configure keepalive timeout interval for targeted LDP sessions using the configure router ldp
targeted-session keepalive command. For example:
-> configure router ldp targeted-session keepalive 40 2
1 Enable the Graceful Restart Helper for the switch using the configure router ldp graceful-restart-
helper command. For example:
-> configure router ldp graceful-restart-helper
2 Configure the reconnect time advertised to neighboring LDP routers using the configure router ldp
reconnect-time command. For example:
-> configure router ldp reconnect-time 300
3 Configure the MPLS forwarding state hold time using the configure router ldp fwd-state-holding-
time command. For example:
-> configure router ldp fwd-state-holding-time 300
4 Configure the amount of time stale label-FEC bindings are retained using the configure router ldp
maximum-recovery-time command. For example:
-> configure router ldp maximum-recovery-time 300
5 Configure the amount of time to wait for a neighbor to re-establish an LDP session using the configure
router ldp neighbor-liveness-time command. For example:
-> configure router ldp neighbor-liveness-time 300
Note. Optional. Verify LDP parameter settings using the show router ldp parameters command. For
example:
Interface Parameters
Keepalive Timeout (sec): 30, Keepalive Factor: 3,
Hold Time (sec): 15, Hello Factor: 3,
Propagate Policy: system, Transport Address: system,
Deaggregate FECs: False, Route Preference: 9,
Label Distribution: downstreamUnsolicited, Label Retention: liberal,
Control Mode: ordered, Loop Detection: none
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-7
Quick Steps for Configuring MPLS Configuring MPLS
See the “Label Distribution Protocol Commands” chapter in the OmniSwitch AOS Release 6 CLI Refer-
ence Guide for information about the fields in the above displays.
2 Optional. By default, the MPLS interface is administratively enabled when the interface is created. To
disable the administrative status, use the configure router mpls interface shutdown command. For
example:
-> configure router mpls interface vlan-10 shutdown
Note. Optional. Verify the interface configuration using the show router mpls interface command. For
example:
MPLS Interfaces
Interfaces : 3
See the “Static LSP and FRR Commands” chapter in the OmniSwitch AOS Release 6 CLI Reference Guide
for information about the fields in the above displays.
page 53-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Quick Steps for Configuring MPLS
2 Configure the destination of the static LSP using the configure router mpls static-lsp to command.
Specify the system IP (Loopback0) address of the far-end (egress) router for the tunnel. For example:
-> configure router mpls static-lsp to-R3 to 10.10.10.2
3 Configure the MPLS push operation and next-hop value using the configure router mpls static-lsp
push next-hop command. For example:
-> configure router mpls static-lsp to-R3 push 777 next-hop 192.168.10.2
The above command pushes label 777 onto the top of the label stack and then forwards the packet to the
next-hop router in the static LSP.
4 Optional. By default, a static LSP is disabled when it is created. To enable the administrative status of
the static LSP use the configure router mpls static-lsp shutdown command with the no shutdown
option. For example:
-> configure router mpls static-lsp to-R3 no shutdown
2 Configure the label-map swap operation using the configure router mpls interface label-map swap
next-hop command:
-> configure router mpls interface vlan-10 label-map 777 swap 888 next-hop
192.168.10.2
The above command swaps label 777 out of the label stack and replaces it with label 888 and then forwards
the packet to the next-hop router (192.168.10.2) in the static LSP.
3 Optional. By default, the MPLS label-map is administratively enabled. To disable the administrative
status of the label-map, use the configure router mpls interface label-map shutdown command. For
example:
-> configure router mpls interface vlan-10 label-map 777 shutdown
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-9
Quick Steps for Configuring MPLS Configuring MPLS
1 Configure the incoming label number that the egress router will process using the configure router
mpls interface label-map command. For example:
-> configure router mpls interface vlan-10 label-map 888
2 Configure the label-map pop operation using the configure router mpls interface label-map pop
command:
-> configure router mpls interface vlan-10 label-map 888 pop
The above command pops (removes) label 888 off of the label stack and then forwards the packet on to the
customer site. This action marks the end of MPLS label switching and the static LSP tunnel.
3 Optional. By default, the MPLS label-map is administratively enabled. To disable the administrative
status of the label-map, use the configure router mpls interface label-map shutdown command. For
example:
-> configure router mpls interface vlan-10 label-map 888 shutdown
• A protect-swap label-map is created on a transit router to protect the next-hop segment in the LSP.
2 Configure the destination of the “to-R3-backup” static LSP using the configure router mpls static-lsp
to command. Specify the same destination system IP (Loopback0) address that is used by the protected
static LSP. For example, the following command configures 10.10.10.2 as the destination for “to-R3-
backup”. The protected LSP is also configured with the 10.10.10.2 destination address.
-> configure router mpls static-lsp to-R3-backup to 10.10.10.2
When the above command is used, “to-R3-backup” automatically becomes a backup tunnel for the pro-
tected static LSP. In other words, there are now redundant static LSP tunnels. FRR will redirect traffic to the
backup tunnel if the protected tunnel is down.
3 Configure the MPLS push operation and next-hop value for “to-R3-backup” using the configure
router mpls static-lsp push next-hop command. Specify the system IP address for the next router in the
backup tunnel, not the next router in the protected tunnel. For example:
page 53-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Quick Steps for Configuring MPLS
-> configure router mpls static-lsp to-R3-backup push 777 next-hop 192.168.11.1
The above command pushes label 777 onto the top of the label stack and then forwards the packet to the to
192.168.11.1, which is the next-hop router in the “to-R3-backup” path.
4 By default, a static LSP is disabled when it is created. To enable the static LSP use the configure
router mpls static-lsp shutdown command with the no shutdown option. For example, the following
command enables the “to-R3-backup” static LSP:
-> configure router mpls static-lsp to-R3-backup no shutdown
The above command swaps label 777 out of the label stack and replaces it with label 778 and then forwards
the packet to the next-hop router (192.168.11.2).
2 By default, the MPLS label-map is administratively disabled. To enable the label-map, use the
configure router mpls interface label-map shutdown command with the no shutdown option. For
example, the following command enables the label-map associated with MPLS interface “vlan-10”:
-> configure router mpls interface vlan-10 label-map 777 no shutdown
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-11
MPLS Overview Configuring MPLS
MPLS Overview
MPLS directs a flow of IP packets along a Label Switched Path (LSP). LSPs are simplex, meaning that the
traffic flows in one direction (unidirectional) from an ingress router to an egress router. Two LSPs are
required for duplex traffic. Each LSP carries traffic in a specific direction, forwarding packets from one
router to the next across the MPLS domain.
When an ingress router receives a packet, it adds an MPLS header to the packet and forwards it to the next
hop in the LSP. The labeled packet is forwarded along the LSP path until it reaches the egress router
(destination point). The MPLS header is removed and the packet is forwarded based on Layer 3 informa-
tion such as the IP destination address. The physical path of the LSP is not constrained to the shortest path
that the IGP would choose to reach the destination IP address.
In addition, the lookup may reveal outgoing data link encapsulation and other information needed to prop-
erly forward the packet.
page 53-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Overview
• The router at the end of an LSP is the egress Label Edge Router (ELER). The egress router strips the
MPLS encapsulation which changes it from an MPLS packet to a data packet, and then forwards the
packet to its final destination using information in the forwarding table. Each LSP can have only one
egress router. The ingress and egress routers in an LSP cannot be the same router.
A router in the network can act as an ingress, egress, or transit router for one or more LSPs, depending on
the network design.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-13
MPLS Overview Configuring MPLS
page 53-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Overview
Router B
Network Segment S
Router A Router C
LDP Graceful Restart Helping and Restarting Router Example
If the restarting router, Router X, was the Designated Router (DR) on network segment S when the help-
ing relationship began, the helper neighbor, Router Y, maintains Router X as the DR until the helping rela-
tionship is terminated. If there are multiple adjacencies with the restarting Router X, Router Y will act as a
helper on all other adjacencies.
Note. See “Configuring LDP Graceful Restart” on page 53-29 for more information on configuring grace-
ful restart.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-15
Interaction With Other Features Configuring MPLS
page 53-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Interoperability With Alcatel-Lucent SR Series
• Some show command output sections or fields do not apply to the OmniSwitch. Where possible, these
sections or fields were removed or display “N/A” in the field contents.
• The OmniSwitch uses a slot/port designation for port numbering; the SR uses a slot/mod/port designa-
tion for port numbering.
System IP Address
The system IP address identifies a router as an MPLS router. On the OmniSwitch, however, the user-
configured Loopback0 interface address is used as the system IP address.
Note. Interoperability between the SR Series dynamic FRR and the AOS OmniSwitch static FRR is not
supported.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-17
Configuring MPLS Configuring MPLS
Configuring MPLS
The MPLS core network directs a flow of packets along a Label Switched Path (LSP) from an ingress
Label Switch Router (LSR) to an egress LSR through a transit LSR. This implementation of MPLS is
based on the Label Distribution Protocol (LDP) and depends on Layer 3 routing protocols such as RIP,
OSPF, ISIS, or Static Routes to set up LSPs through the core.
Configuring the MPLS network core using OmniSwitch routers requires the following steps:
• Configure the core IP network. Set up a stable IP network by configuring a routing protocol or static
routes. This task includes configuring the necessary VLANs, port assignments, and IP interfaces that
provide the connections over which MPLS tunnels will traverse. See “Preparing the Network for
MPLS” on page 53-19.
• Configure the system IP address on each LSR. The system IP address identifies a router as an MPLS
router that will participate in one or more LSPs. On the OmniSwitch, the “Loopback0” interface serves
as the system IP address and is configured on each OmniSwitch LSR (ingress, egress, or transit). See
the “Configuring IP” chapter in the OmniSwitch AOS Release 6 Network Configuration Guide for
information about how to configure the “Loopback0” interface.
• Install the Alcatel-Lucent software license for MPLS. A software license is required to run MPLS
on the OmniSwitch. See “Installing the MPLS Software License” on page 53-19.
• Enable the MPLS instance on the router. When the MPLS software license is installed on the
OmniSwitch, MPLS is globally enabled for the switch by default. Enabling or disabling the MPLS
instance is allowed. See “Activating MPLS” on page 53-20.
• Enable the LDP instance on the router. When the MPLS software license is installed on the
OmniSwitch, LDP is also globally enabled for the switch by default. Enabling or disabling the LDP
instance is allowed. See “Activating LDP” on page 53-20.
• Configure MPLS LSPs (LDP or static). There are two methods for building MPLS LSPs: LDP
signaling and static LSPs. Static LSPs and LDP-signaled LSPs are mutually exclusive; a service is
associated with one type or the other. There are different configuration requirements and procedures for
each type of LSP. See “Configuring LDP” on page 53-20 or “Configuring Static LSPs” on page 53-23
for more information.
• Configure graceful restart (optional). Configuring switches with redundant CMMs for graceful
restart is described in “Configuring LDP Graceful Restart” on page 53-29.
Once the MPLS core network of LSPs is constructed, the next step is to configure services. This imple-
mentation supports the provisioning of VPLS services over the IP/MPLS network. For more information
about provisioning VPLS over IP/MPLS, see the “Configuring VPLS” chapter in this guide.
At the end of the chapter is a simple MPLS network diagram with instructions on how it was created on a
router-by-router basis. See “MPLS Application Example” on page 53-30 for more information.
page 53-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Configuring MPLS
2 Save the lmLicense.dat file in the /flash directory of the primary CMM.
3 To install the license onto the switch, use the license apply command and reboot the switch.
Note. For multiple entries of serial numbers, MAC addresses, and authorization codes, use a CSV format-
ted file and upload the file on to the website. A single license file lmLicense.dat is generated for all the
switches.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-19
Configuring MPLS Configuring MPLS
Activating MPLS
By default, the MPLS instance is created and enabled for the switch when the MPLS software license is
downloaded and installed on the switch. As a result, it is not necessary to load or activate MPLS to start
using the feature.
To change the MPLS status for the switch, use the configure router mpls shutdown command. For
example, the following command disables the MPLS instance for the switch:
-> configure router mpls shutdown
The following command enables the MPLS instance for the switch:
-> configure router mpls no shutdown
Activating LDP
By default, the LDP instance is created and enabled for the switch when the MPLS software license is
downloaded and installed on the switch. As a result, it is not necessary to load or activate LDP to start
configuring LDP components.
To change the LDP status for the switch, use the configure router ldp shutdown command. For exam-
ple, the following command disables the LDP instance for the switch:
-> configure router ldp shutdown
The following command enables the LDP instance for the switch:
-> configure router ldp no shutdown
Configuring LDP
Using LDP to create LSPs (tunnels) is supported with this implementation of MPLS. The LDP interacts
with the underlying routing protocol to obtain routing information that is required to set up LSPs. Services,
such as VPLS, use LDP to initiate and manage tunnels from an ingress router (origination point) through
transit routers to an egress router (endpoint).
By default, the LDP instance is enabled for the switch when the MPLS software license is downloaded and
applied. This process also enables global default parameter values for LDP interfaces and targeted LDP
(tLDP) sessions.
Configuring LDP involves creating LDP interfaces on each router that will participate in the LSP and
modifying LDP parameter values on the global level or on a per-interface basis.
The LDP interface is enabled by default, along with global interface parameters that are applied when an
interface is configured (see “Modifying LDP Interface Parameters” on page 53-21 for more information).
page 53-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Configuring MPLS
To delete an LDP interface, first make sure the interface is administratively disabled. If necessary, use the
configure router ldp interface-parameters interface shutdown command to disable the interface. For
example:
-> configure router ldp interface-parameters interface vlan-40 shutdown
Once the LDP interface is disabled, use the no form of the configure router ldp interface-parameters
interface command to delete the interface. For example:
-> configure router ldp interface-parameters no interface vlan-40
The above command configures a 40-second timeout period with a factor number of 2. The factor number
specifies the number of hello messages to transmit during the timeout period. This number is divided into
the timeout value to determine the interval at which messages are sent. As a result, the hello timeout is set
to 40 seconds with an interval of 20 seconds (40 divided by 2).
To configure the hello timeout parameter for a specific LDP interface, use the interface parameter with
the configure router ldp interface-parameters hello command. For example:
-> configure router ldp interface-parameters interface vlan-40 hello 50 10
To set the hello timeout parameter back to the default value, use the no form of the configure router ldp
interface-parameters hello command. For example:
-> configure router ldp interface-parameters no hello
-> configure router ldp interface-parameters interface vlan-40 no hello
The LDP interface helot timeout parameter value reverts back to the global value, which serves as the
default value for all LDP interfaces.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-21
Configuring MPLS Configuring MPLS
The above command configures a 20-second timeout period with a factor number of 5. The factor number
specifies the number of keepalive messages to transmit during the timeout period. This number is then
divided into the timeout value to determine the interval at which messages are sent. As a result, the
keepalive timeout is set to 20 seconds with an interval of 4 seconds (20 divided by 5).
To configure the keepalive timeout parameter for a specific LDP interface, use the interface parameter
with the configure router ldp interface-parameters keepalive command. For example:
-> configure router ldp interface-parameters interface vlan-40 keepalive 20 5
To set the keepalive timeout parameter back to the default value, use the no form of the configure router
ldp interface-parameters keepalive command. For example:
-> configure router ldp interface-parameters no keepalive
-> configure router ldp interface-parameters interface vlan-40 no keepalive
The LDP interface keepalive timeout parameter value reverts back to the global value, which serves as the
default value for LDP interfaces.
By default, the T-LDP hello timeout is 45 seconds and the timeout factor is 3. This calculates out to a hello
interval value of 15, which means that every 15 seconds a hello timeout message is sent.
To set the T-LDP hello timeout parameter back to the default value, use the no form of the configure
router ldp targeted-session hello command. For example:
-> configure router ldp targeted-session no hello
To change the keepalive timeout and interval for T-LDP sessions, use the configure router ldp targeted-
session keepalive command. For example:
-> configure router ldp targeted-session hello 20 2
By default, the T-LDP keepalive timeout is 40 seconds and the timeout factor is 4. This calculates out to a
hello interval value of 10, which means that every 10 seconds a keepalive timeout message is sent.
To set the T-LDP keepalive timeout parameter back to the default value, use the no form of the configure
router ldp targeted-session keepalive command. For example:
-> configure router ldp targeted-session no keepalive
page 53-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Configuring MPLS
Avoid using the IP interface address if there are multiple interface connections between two LDP peers.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-23
Configuring MPLS Configuring MPLS
• The destination address specified for the Static LSP on the ingress router has to match the Loopback0
IP address of the egress router if the static LSP is associated with a Service Distribution Point (SDP)
tunnel. SDPs are used to provision VPLS services.
• A Service Distribution Point (SDP), used to provision VPLS services, is associated with either a static
LSP or an LDP-signaled LSP, but not both.
• The static LSP configuration is supported on three different types of topologies: linear, triangular mesh,
and square mesh. These topologies are supported as long as the same router does not form both the
ingress and egress nodes of the static LSP.
• ECMP LSPs are not supported with the static LSP feature. Only a single next-hop can be specified at
each hop of the Static LSP.
page 53-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Configuring MPLS
• LSP tunnels forward packets in one direction. As a result, two uni-directional static LSP tunnels are
required to form a bi-directional tunnel communication between two routers in a Provider network.
By default, the interface is enabled. To administratively disable the interface, use the configure router
mpls interface shutdown command. For example:
-> configure router mpls interface mpls-vlan-10 shutdown
To enable an interface that was previously disabled, use the configure router mpls interface shutdown
command with the no shutdown option. For example:
-> configure router mpls interface mpls-vlan-10 no shutdown
Once the label-map is created, configure a label-map swap (transit router) or pop (egress router) action to
associate with the label-map number.
The above command swaps incoming label number 777 for outgoing label number 888 and forwards the
packet to the next-hop router (192.168.30.1). The incoming label-map for label 777 was previously
configured using the configure router mpls interface label-map command.
Note that if an ARP entry for the specified next hop exists, then the static LSP is marked as operational. If
an ARP entry does not exist, then the static LSP is marked as operationally down and the local router
continues to ARP for the configured next hop at a fixed interval.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-25
Configuring MPLS Configuring MPLS
When a label-map protect-swap action is configured, the static Fast ReRoute (FRR) mechanism is auto-
matically invoked and will use the protect-swap label-map to redirect packets to the alternate path. See
“Using Static Fast ReRoute (FRR)” on page 53-28 for more information.
When the label is popped off the top of the packet, MPLS switching stops and the packet is forwarded
according to the service header information.
Note that disabling the label-map does not remove the label-map configuration from the switch. However,
incoming packets are dropped if they contain a label number that matches the disabled label-map number.
page 53-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Configuring MPLS
To remove a static LSP instance from the ingress router, administratively disable (see “Enable or Disable
the Static LSP Instance” on page 53-28) the LSP instance and then use the no form of the configure
router mpls static-lsp command. For example:
-> configure router mpls static-lsp to-R3 shutdown
The above commands shutdown the “to-R3” static LSP instance and then delete the instance from the
switch configuration.
Once the static LSP instance is created and associated with a name, configuring the destination system IP
address and a label-map push action for the instance is required.
When configuring the static LSP destination, specify the system IP address of the far-end router for the
Service Distribution Point (SDP) to which the static LSP is associated.
Note that if an ARP entry for the specified next hop exists, then the static LSP is marked as operational. If
an ARP entry does not exist, then the static LSP is marked as operationally down and the local router
continues to ARP for the configured next hop at a fixed interval.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-27
Configuring MPLS Configuring MPLS
Note that disabling the static LSP instance does not remove the LSP configuration from the switch.
However, packet forwarding to the next-router is stopped until the instance is enabled.
page 53-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Configuring MPLS
configure router ldp graceful- Configures the graceful restart helper status for the LDP router. This
restart-helper signals to other LDP routers whether or not this router is able to help
with the graceful restart process.
configure router ldp reconnect- Configures the Reconnect Timeout value that a router advertises in the
time FT Session TLV of LDP messages. The Reconnect Timeout specifies
the amount of time that neighboring LDP routers should wait for the
sender of the LDP message to gracefully restart and resume sending
LDP messages to the neighbor.
configure router ldp Configures the amount of time the router retains stale MPLS label-for-
maximum-recovery-time warding equivalence class (FEC) bindings received from a neighboring
LDP router as the result of a graceful restart process.
configure router ldp fwd-state- Configures the amount of time that the LDP router retains its MPLS for-
holding-time warding state after a restart. During this time, the router is considered in
a restarting state. When the timer expires, the router is considered
restarted.
configure router ldp neighbor- Configures the amount of time the router will wait for a neighboring
liveness-time router to re-establish an LDP session. If the neighboring router fails to
establish a session within this amount of time, the local router will
delete the stale label-FEC (Forwarding Equivalence Class) bindings
received from the neighboring router.
For more information about graceful restart commands, see the “Label Distribution Protocol Commands”
chapter in the OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-29
MPLS Application Example Configuring MPLS
1/4 1/3
R1
10.10.10.1
-30 4 19 VLA
L AN .0/2 2.1
68
N-
10
V .30 .10
68 Protected .0/
9 2.1 24
1 Links
1/2 1/2
1/1 VLAN-20 1/6
192.168.20.0/24
5/2
R3 R2
OS
10.10.10.3 P 10.10.10.2
VL F En
40 A ab
.40 N-40 led 50
.40 A N- 0/24
.
.0/
24 VL 8.50
6
2.1
19
1/2 1/5
R4
10.10.10.4
Static LSPs require the manual configuration of static routes and VC labels on each router interface in the
static path. LDP signaling, however, uses the underlying routing protocol to set up LSPs and dynamically
discover routes and labels.
page 53-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Application Example
Note. Configuring VPLS is not included in this chapter, but example commands used to configure
services for the example MPLS network are provided in “Configuring Example VPLS Services” on
page 53-37. For more information, see the “Configuring VPLS” chapter in the OmniSwitch AOS Release 6
Network Configuration Guide.
-> vlan 30
-> ip interface vlan-30 address 192.168.30.1 vlan 30
-> vlan 30 port default 1/4
The above commands created VLANs 10, VLAN 30, IP interfaces for the VLANs, and the Loopback0
interface address.
• VLAN 10 handles the connection between R1 and R2, using IP interface 192.168.10.1 and port 1/3.
• VLAN 30 handles the connection between R1 and R3, using IP interface 192.168.30.1 and port 1/4.
• The Loopback0 interface was assigned 10.10.10.1, which serves as the MPLS system IP interface.
2 Enable the MPLS instance (enabled by default), create and enable MPLS interfaces and label-map
actions.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-31
MPLS Application Example Configuring MPLS
Router 2 (connects to R1 over VLAN 1, R3 over VLAN 20, and R4 over VLAN 50)
-> vlan 20
-> ip interface vlan-20 address 192.168.20.2 vlan 20
-> vlan 20 port default 1/6
-> vlan 50
-> ip interface vlan-50 address 192.168.50.2 vlan 50
-> vlan 50 port default 1/5
The above commands created VLANs 10, VLAN 20, VLAN 50, IP interfaces for the VLANs, and the
Loopback0 interface address.
• VLAN 10 handles the connection between R2 and R1, using IP interface 192.168.10.2 and port 1/2.
• VLAN 20 handles the connection between R2 and R3, using IP interface 192.168.20.2 and port 1/6.
• VLAN 50 handles the connection between R2 and R4, using IP interface 192.168.50.2 and port 1/5.
• The Loopback0 interface was assigned 10.10.10.2, which serves as the MPLS system IP interface.
2 Enable the MPLS instance (enabled by default) and create and enable static LSP instances.
The above commands created static LSP “to-R3”, and a backup static LSP “to-R3-alt”.
page 53-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Application Example
• The “to-R3” instance provides a static LSP from R2 through transit router R1 to egress router R3
(10.10.10.3). This instance pushes label 777 onto packets and forwards them to R1, where the label
is swapped and the packets are forwarded to R3.
• The “to-R3-alt” instance provides a backup static LSP from R2 directly to R3 (10.10.10.3). If the
“to-R3” tunnel goes down, the Fast ReRoute (FRR) mechanism redirects packets to the “to-R3-alt”
tunnel. The “to-R3-alt” instance then pushes label 112 onto packets and forwards them to R3.
3 Create and enable MPLS interfaces and label-map actions.
The above commands created MPLS interfaces vlan-10, vlan-20, and vlan-50.
• MPLS interface vlan-10 will pop incoming label 666 off of the packet, marking the end of MPLS
switching. This same interface will also swap incoming label 668 for label 667 and forward the
label packets to R4 (192.168.50.4).
• MPLS interface vlan-20 will pop incoming label 111 off of the packet, marking the end of MPLS
switching. This same interface will also swap incoming label 222 for label 333 and forward the
label packets to R4 (192.168.50.4).
• MPLS interface vlan-50 will swap incoming label 556 for label 557 and forward the label packets to
R1 (192.168.10.1).
• MPLS interface vlan-50 is also configured with a protect-swap action that is activated if the vlan-50
is unable to perform the swap action. The protect-swap swill swap incoming label 556 for label 558
and forward the label packets to R3 (192.168.20.3).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-33
MPLS Application Example Configuring MPLS
Router 3 (connects to R1 over VLAN 30, R2 over VLAN 20, and R4 over VLAN 40).
-> vlan 20
-> ip interface vlan-20 address 192.168.20.3 vlan 20
-> vlan 20 port default 1/1
-> vlan 30
-> ip interface vlan-30 address 192.168.30.3 vlan 30
-> vlan 30 port default 1/2
-> vlan 40
-> ip interface vlan-40 address 40.40.40.3 vlan 40
-> vlan 40 port default 5/2
The above commands created VLANs 20, 30, and 40, IP interfaces for the VLANs, and the Loopback0
interface address.
• VLAN 20 handles the connection between R3 and R2, using IP interface 192.168.20.3 and port 1/1.
• VLAN 30 handles the connection between R3 and R1 using IP interface 192.168.30.3 and port 1/2.
• VLAN 40 handles the connection between R3 and R4, using IP interface 40.40.40.3 and port 5/2.
• The Loopback0 interface was assigned 10.10.10.3, which serves as the MPLS system IP interface.
2 Enable the MPLS instance (enabled by default) and create and enable static LSP instances.
The above commands created static LSP “to-R2”, backup static LSP “to-R2-alt”, static LSP “to-R4”,
and backup static LSP “to-R4-alt”.
• The “to-R2” instance provides a static LSP from R3 through transit router R1 to egress router R2
(10.10.10.2). This instance pushes label 555 onto packets and forwards them to R1, where the label
is swapped and the packets are forwarded to R2.
page 53-34 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Application Example
• The “to-R2-alt” instance provides a backup static LSP from R3 directly to R2 (10.10.10.2). If the
“to-R2” tunnel goes down, the Fast ReRoute (FRR) mechanism redirects packets to the “to-R2-alt”
tunnel. The “to-R2-alt” instance then pushes label 111 onto packets and forwards them to R2.
• The “to-R4” instance provides a static LSP from R3 through transit routers R1 and R2 to egress
router R4 (10.10.10.4). This instance pushes label 556 on to packets and forwards them to R1,
where the label is swapped and the packets are forwarded to R2 for swapping and forwarding to R4.
• The “to-R4-alt” instance provides a backup static LSP from R3 directly to R4 (10.10.10.4). If the
“to-R4” tunnel goes down, the Fast ReRoute (FRR) mechanism redirects packets to the “to-R4-alt”
tunnel. The “to-R4-alt” instance then pushes label 222 onto packets and forwards them to R2, where
the label is swapped and forwarded on to R4.
3 Create and enable MPLS interfaces and label-map actions.
5 Enable the LDP instance (enabled by default) and create the LDP interface required for the signaled-
LSP between R3 and R4.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-35
MPLS Application Example Configuring MPLS
-> vlan 40
-> vlan 40 port default 1/2
-> ip interface vlan-40 address 40.40.40.3 vlan 40
-> vlan 50
-> vlan 50 port default 1/5
-> ip interface vlan-50 address 192.168.50.1
2 Enable the MPLS instance (enabled by default) and create and enable static LSP instances.
page 53-36 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Application Example
5 Enable the LDP instance (enabled by default) and create the LDP interface required for the signaled-
LSP between R4 and R3.
Note. This section contains example commands used to configure VPLS services for the example MPLS
network. See the “Configuring VPLS” chapter in the OmniSwitch AOS Release 6 Network Configuration
Guide for more information about how to provision VPLS services.
The following steps provide a tutorial for configuring the above components to provision VPLS 100 and
200 over the example MPLS network shown on page 53-30.
Router 1 (no services configured)
In this example, R1 is a transit router for services between R2, R3, and R4. As a result, no VPLS services
are configured on this router.
Router 2
1 Create SDP 20 and associate the SDP with the “to-R3” and “to-R3-alt” static LSP tunnels.
2 Create VPLS 100 and associate the service with the Customer 1 account.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-37
MPLS Application Example Configuring MPLS
4 Create a SAP on access ports 1/3 and 1/15 and associate the SAP with VPLS 100.
Router 3
1 Create SDP 20 and associate the SDP with the “to-R2” and “to-R2-alt” static LSP tunnels.
2 Create SDP 30 and associate the SDP with the “to-R4” and “to-R4-alt” static LSP tunnels.
3 Create SDP 40 for use with LDP-enabled LSP between R3 and R4.
4 Create VPLS 100 and associate the service with the Customer 1 account.
page 53-38 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS MPLS Application Example
6 Create a SAP on access ports 1/8 and 1/7 and associate the SAP with VPLS 100.
7 Create a SAP on access port 1/14 and associate the SAP with VPLS 200. Note that VPLS 200 will
forward traffic over the LDP-signaled LSP between R3 and R4.
Router 4
1 Create SDP 20 and associate the SDP with the “to-R3” static LSP tunnel.
2 Create SDP 40 for use with LDP-enabled LSP between R4 and R4.
3 Create VPLS 100 and associate the service with the Customer 1 account.
5 Create a SAP on access port 1/10 and associate the SAP with VPLS 100.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-39
MPLS Application Example Configuring MPLS
6 Create a SAP on access port 1/12 and associate the SAP with VPLS 200. Note that VPLS 200 will
forward traffic over the LDP-signaled LSP between R3 and R4.
page 53-40 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring MPLS Verifying the MPLS Configuration
show router mpls status Displays the status and other configuration information for the MPLS
instance.
show router ldp status Displays the status and other configuration information for the LDP
instance.
show router ldp interface Displays the LDP interface configuration for the switch.
show router ldp parameters Displays the global LDP parameter values for the switch.
show router ldp session Displays information about LDP sessions.
show router ldp peer Displays information about LDP peers.
show router ldp discovery Displays the discovery status of the LDP Hello adjacencies between the
local router and LDP peers.
show router ldp bindings Displays the contents of the MPLS Label Information Base (LIB).
show router mpls static-lsp Displays the static LSP configuration for the switch.
show router mpls interface Displays the MPLS interface configuration for the switch.
show router mpls label Displays the MPLS labels that are exchanged.
show router mpls label-range Displays the MPLS label ranges, which includes the label type, start and
end label values, aging, and the number of labels available.
In addition to using the above show commands to verify the MPLS configuration, the following
commands are available to verify MPLS Label Switched Paths (LSPs):
For more information about the use and resulting displays form all of the above commands, see the
OmniSwitch AOS Release 6 CLI Reference Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 53-41
Verifying the MPLS Configuration Configuring MPLS
page 53-42 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
54 Configuring VPLS
Virtual Private LAN Service (VPLS) is a class of virtual private network (VPN) service that allows the
connection of multiple sites in a single bridged domain over a provider-managed IP/MPLS network. The
customer sites in a VPLS instance appear to be on the same LAN, regardless of their location. VPLS uses
an Ethernet interface on the customer-facing (access) side which simplifies the LAN/WAN boundary and
allows for rapid and flexible service provisioning.
VPLS enables each customer to maintain control of their own routing strategies. All customer routers in
the VPLS service are part of the same subnet. This simplifies the IP addressing plan, especially when
compared to a mesh constructed from many separate point-to-point connections. The VPLS service
management is simplified since the service is not aware of nor participates in the IP addressing and
routing.
A VPLS service provides connectivity between two or more Service Access Points (SAPs) on one router
(a local service) or on multiple routers (a distributed service). The connection appears to be a bridged
domain to the customer sites so protocols, including routing protocols, can traverse the VPLS service.
This implementation of VPLS is provided over an IP/MPLS network architecture, which is based on the
Label Distribution Protocol (LDP). This protocol consists of a set of procedures used by participating
Label Switching Routers (LSRs) to define Label Switched Paths (LSPs), also referred to as MPLS tunnels.
These tunnels provide the foundation necessary to provision VPLS.
This chapter documents the OmniSwitch implementation of VPLS. For information about how to
configure MPLS, see Chapter 53, “Configuring MPLS.”
In This Chapter
This chapter describes the basic components of a service and how to configure services through the
Command Line Interface (CLI). CLI commands are used in the configuration examples; for more details
about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Reference Guide.
This chapter provides an overview of VPLS and includes the following topics:
• “VPLS Specifications” on page 54-2.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-1
VPLS Specifications Configuring VPLS
VPLS Specifications
IETF Internet-Drafts Supported draft-ietf-bfd-base-08.txt — Bidirectional Forward-
ing Detection
draft-ietf-bfd-v4v6-1hop-08.txt — BFD for IPv4
and IPv6 (Single Hop)
RFCs Supported 3031–Multiprotocol Label Switching Architecture
3036–Label Distribution Protocol Specification
3478–Graceful Restart Mechanism for LDP.
4762–Virtual Private LAN Service (VPLS) using
LDP Signaling.
Platforms Supported OmniSwitch 9000E
Maximum number of service instances 1024*
(VPLS) per system
Maximum number of pseudo wires/VCs per 8K*
system
Maximum number of Service Access Points 8192*
(SAPs) and service bindings (virtual ports)
Maximum number of Service Distribution 32
Point (SDP) sessions.
Maximum number of LDP/Target LDP 32*
neighbors
Maximum number of LDP/Target LDP ses- 32*
sions
Maximum number of LSP tunnels (push/pop 32*
entries)
Maximum number of LSP swap entries 32**
Maximum number of static LSPs 1024
Maximum number of backup static LSPs 16
page 54-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS VPLS Defaults
VPLS Defaults
Parameter Description Command Default Value/Comments
MPLS status for the switch. configure router mpls shutdown Enabled
LDP status for the switch. configure router ldp shutdown Enabled
Customer (subscriber) account configure service customer create Customer 1 (default
account assigned to new
services)
Service Distribution Point (SDP) configure service sdp shutdown Disabled
administrative status when the
SDP is created.
LDP-signaled LSPs for the SDP configure service sdp ldp Disabled
Auto-label signaling for the SDP configure service sdp signaling Enabled (Targeted LDP)
Override the advertised VC MTU configure service sdp adv-mtu- Disabled
value with the service MTU value. override
The administrative MTU value for configure service sdp path-mtu 0 (value is derived from
the SDP the corresponding tunnel)
VPLS administrative status when configure service vpls shutdown Disabled
the service is created
Default VC ID for each end of the configure service vpls def-mesh-vc-id VPLS service ID is used
MPLS tunnel for the service. as the default VC ID
MAC flush message sent on port configure service vpls send-flush-on- Disabled
or Service Access Point (SAP) failure
failure.
The service MTU configure service vpls service-mtu 1514
VPLS mesh-SDP binding status configure service vpls mesh-sdp Disabled
when the binding is created shutdown
Layer 2 profile for specifying how configure service l2profile def-access-profile:
control packets are process on stp, gvrp = tunnel
access (customer-facing) ports. 802.3ad = peer
802.1x, 802.1ab = discard
amap = discard
Service mode for ports when configure service port mode access Network port
MPLS is enabled for the switch.
Default profile applied to access configure service port l2profile def-access-profile
ports
Access port encapsulation type configure service port encap-type null (only one SAP is
allowed on the port)
SAP administrative status when configure service vpls sap shutdown Disabled
the SAP is created
SAP trust mode for packets configure service vpls sap trusted Trusted (tagged)
ingressing on access ports. Priority 0 (untagged)
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-3
Quick Steps for Configuring VPLS Configuring VPLS
1 Create a customer account using the configure service customer create command. For example:
2 Optional. Configure a description for the customer account using the configure service customer
description command. For example:
-> configure service customer 10 description “Customer A”
3 Optional. Configure contact information for the customer account using the configure service
customer contact command. For example:
-> configure service customer 10 contact “Thomas Smith - Tech Support”
4 Optional. Configure a contact phone number for the customer account using the configure service
customer phone command. For example:
-> configure service customer 10 phone “818-444-1234”
5 Create a Service Distribution Point (SDP) using the configure service sdp create command. For
example:
-> configure service sdp 10 create
6 Optional. Configure a description for the SDP using the configure service sdp description command.
For example:
-> configure service sdp 10 description “R3-to-R4”
7 Associate a SDP with a remote router using the configure service sdp far-end command and specify-
ing the system (Loopback0) IP address of the far-end router. For example:
-> configure service sdp 10 far-end 10.10.10.1
Note that once a far-end address is specified for the SDP, a service tunnel instance is created between the
local and remote routers. A return SDP tunnel is required from the remote router to the local router, as SDP
tunnels are uni-directional.
8 By default, the administrative status of the SDP is disabled. To enable the SDP, use the configure
service sdp shutdown command with the no shutdown option. For example:
-> configure service sdp 10 no shutdown
9 If the SDP is going to use Label Switched Paths (LSPs) generated by the Label Distribution Protocol
(LDP), enable LDP for the SDP using the configure service sdp ldp command and skip to Step 12. For
example:
-> configure service sdp 10 ldp
page 54-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Quick Steps for Configuring VPLS
10 If the SDP is going to use static LSPs, first disable LDP-signaled LSPs using the no form of the
configure service sdp ldp command then disable auto-label signaling (targeted LDP) for the SDP using
the configure service sdp signaling command with the off option. For example:
By default, auto-label signaling is enabled for SDPs; it is only necessary to disable signaling when the SDP
is associated with static LSPs, which are manually configured to handle label-mapping actions.
11 Once LDP and auto-label signaling is disabled for the SDP, then associate the necessary static LSPs
with the SDP using the configure service sdp lsp command. For example, the following command associ-
ates SDP 10 with the static LSP named “path-to-R4”:
-> configure service sdp 10 lsp path-to-R4
12 Create a VPLS service and associate that service with a customer account using the configure service
vpls create command. For example:
-> configure service vpls 100 customer 10 create
13 Configure a description for the VPLS service using the configure service vpls description command.
For example:
-> configure service vpls 100 description “VPLS100-CustA”
14 By default, the administrative status for the VPLS service is disabled. To enable the service, use the
configure service vpls shutdown command with the no shutdown option. For example:
-> configure service vpls 100 no shutdown
15 Bind the VPLS service to the SDP tunnel using the configure service vpls mesh-sdp command. For
example, the following command binds VPLS service 100 to mesh SDP 10:
-> configure service vpls 100 mesh-sdp 10 create
16 Configure customer-facing ports using the configure service port mode access with command. For
example:
-> configure service port 1/2 mode access
17 Configure the encapsulation type for the access port using the configure service port encap-type
command. The encapsulation type determines if the port will support one or multiple Service Access
Points (SAPs). For example, use the null option to support only one SAP on the port:
-> configure service port 1/2 encap-type null
The following command example configures the port to support multiple SAPs (VLAN 802.1q tags):
-> configure service port 1/4 encap-type dot1q
18 Create a Service Access Point (SAP) using the configure service vpls sap create command. For
example, the following command creates a SAP on access port 1/4 that will direct customer traffic that is
802.1q-tagged with VLAN ID 50 to service 100:
-> configure service vpls 100 sap 1/4:50
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-5
Quick Steps for Configuring VPLS Configuring VPLS
19 (Optional) Create a Layer 2 port profile to discard GVRP and STP control frames received on access
ports using the configure service l2profile command. For example, the following commands create the
“discard-stp-gvrp” profile and configure the profile to discard stp and gvrp:
Note that new profiles inherit the default settings for processing control packets; the above commands only
change the settings for STP and GVRP in the specified profile.
20 (Optional) Associate the “discard-stp-gvrp” profile with access port 1/4 using the configure service
port l2profile command. For example:
-> configure service port 1/4 l2profile “discard-stp-gvrp”
See “Verifying the VPLS Configuration” on page 54-32 for information about how to display the VPLS
configuration for the switch.
page 54-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS VPLS Overview
VPLS Overview
A VPLS-capable network consists of Customer Edges (CE), Provider Edges (PE), and a core MPLS
network. The CE device is a router or switch located at the customer's premises and is connected to the PE
via an Attachment Circuit (AC). In the case of VPLS, it is assumed that Ethernet is the Layer 2 protocol
used between the CE and the PE.
The PE device is where the services originate and terminate and where all the necessary tunnels are set up
to connect to all the other PEs. As VPLS is an Ethernet Layer 2 service, the PE must be capable of Media
Access Control (MAC) learning, bridging, and replication on a per-VPLS basis.
The PE routers that participate in a VPLS are connected using MPLS Label Switched Path (LSP) tunnels
in a full-mesh composed of mesh Service Distribution Points (SDPs). Multiple VPLS services are
supported over the same LSP tunnels.
Signaling is used to negotiate a set of ingress and egress virtual circuit (VC)/pseudowire (PW) labels on a
per-service basis. The VC labels are used by the PE routers for de-multiplexing traffic arriving from
different VPLS services over the same set of LSP tunnels.
VPLS is provided over MPLS by:
• Connecting bridging-capable PE routers with a full mesh of MPLS LSP tunnels.
The IP/MPLS core network interconnects the PEs but does not participate in the virtual private network
(VPN) functionality. Traffic is simply switched based on the MPLS labels.
The following illustration provides an example of an MPLS-based VPLS network:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-7
VPLS Overview Configuring VPLS
VPLS Instance 2
CE4
PE3
VPLS Instance 1 VPLS Instance 1
Pseudo Wires
CE5
CE1
VPLS Instance 1
CE2
PE1
MPLS Tunnels
Virtual
Bridges VPLS Instance 1
CE3 CE6
VPLS Instance 2
PE2
CE7
VPLS Instance 2
Loop Prevention
To prevent forwarding loops, the "Split Horizon" rule is used. In the VPLS context, this rule implies that a
PE must never send a packet on a pseudowire (PW) if that packet was received from a PW. This ensures
that traffic cannot form a loop over the backbone network using PWs.
The fact that there is always a full mesh of PWs between the PE devices ensures that every destination
within the VPLS will be reached by a broadcast packet.
page 54-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS VPLS Overview
Service Entities
This implementation of MPLS-based VPLS makes use of a service model architecture. A service is a
globally unique entity that refers to a type of connectivity service for either Internet or VPN connectivity.
Each service is uniquely identified by a service ID within a service area.
The following logical service entities are used to construct a service:
• Customers. The terms customer and subscribers are synonymous. An account is created for each
customer and assigned an ID. The customer ID is required and associated with the service at the time
the service is created.
• Service Access Point (SAP)—A SAP is associated with a service ID, access ports, and an encapsula-
tion value used to classify customer traffic. The SAP binds access ports and customer traffic received
on those ports to the service.
• Service Distribution Points (SDPs). A SDP provides a logical point at which customer traffic is
directed from one PE to another PE through a one-way service tunnel. SDPs are used to set up distrib-
uted services, which consist of at least one SAP on a local node, one SAP on a remote node, and an
SDP binding the service to the service tunnel.
The following illustration shows how the above components are used to tunnel customer traffic through a
service provider network:
SAP1 SAP1
SDP1 SDP2
VPLS1 VC1 VPLS1
SAP2 LSP Tunnel SAP2
VC2
VPLS2 VPLS2
SAP3 SAP3
Transit Router(s)
VPLS3 VPLS1
SDP2 PE1 SDP2 PE2
LS
P
Tu
nn
el
Transit Router(s)
VPLS3
SDP1
PE3
VPLS Service Components
• An LSP tunnel is setup for the SDP using the far end system IP address (Loopback0 IP Address) of the
PEs. This forms the basis for setting up the services (VPLS instances).
• VPLS1 and VPLS2 are bound as a mesh-SDP to SDP1 on PE1 and to SDP2 on PE2. Binding of a
service (VPLS instance) to an SDP is required to set up a Virtual Circuit (VC) / pseudo wire (PW) to
the far end.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-9
VPLS Overview Configuring VPLS
• The Label Distribution Protocol will set up a label path, VC1 and VC2, on top of the LSP Tunnel. The
VC is setup and managed by a Targeted LDP (TLDP) session. TLDP is enabled by default at the time
LDP is enabled.
• VPLS1 can associate with SDP1 and any other SDP (for example,: SDP2) on PE1, since a given VPLS
instance can bind to multiple SDPs.
page 54-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Interaction With Other Features
Protocol Default
stp tunnel
802.1x discard
802.1ab discard
802.3ad peer
gvrp tunnel
amap discard
How control frames are handled is configurable using Layer 2 port profiles. See “Configuring Layer 2
Profiles for Access Ports” on page 54-22 for more information.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-11
Interaction With Other Features Configuring VPLS
VLAN Management
• This implementation of VPLS provides a bridging domain that is separate from the VLAN bridging
domain. Although both may exist on the same switch, once ports/VLANs are configured for use with
one of these domains, these entities are no longer configurable for the other domain.
• When a port is configured as a VPLS access port, the default VLAN for the port is reserved for VPLS
use and is no longer configurable using VLAN management commands.
VLAN Stacking
• VLAN Stacking services are not configurable on VPLS access and network ports, but are allowed on
the same switch.
• Prior to configuring MPLS/VPLS for the switch, identify and configure VLAN Stacking user and
network ports.
• IP interfaces are configurable on VPLS network ports but are not allowed on VLAN Stacking network
ports. This ensures that the VLAN Stacking network is kept separate from the MPLS/VPLS network.
• If a customer frame received on an access port is double tagged, only the outer tag is used to classify
the packet into a VPLS service.
• This implementation of VPLS requires the configuration of Service Access Points (SAPs) to identify
page 54-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Interoperability With Alcatel-Lucent SR Series
• Some show command output sections or fields do not apply to the OmniSwitch. Where possible, these
sections or fields were removed or display “N/A” in the field contents.
• The OmniSwitch uses a slot/port designation for port numbering; the SR uses a slot/mod/port designa-
tion for port numbering.
System IP Address
The system IP address identifies a router as an MPLS router. On the OmniSwitch, however, the user-
configured Loopback0 interface address is used as the system IP address.
Note. Interoperability between the SR Series dynamic FRR and the AOS OmniSwitch static FRR is not
supported. See Chapter 53, “Configuring MPLS,” for information about configuring static FRR.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-13
Interoperability With Alcatel-Lucent SR Series Configuring VPLS
page 54-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Configuring VPLS Services
1 Create a customer account. Specifying a customer account ID is required at the time a service is
created. See “Configuring Customer Accounts” on page 54-15.
2 Create Service Distribution Points (SDPs). A SDP provides a logical service tunnel through which
traffic is directed from one PE to another PE. Configuring SDPs provides the foundation on which
services are carried through the IP/MPLS core network. See “Configuring Service Distribution Points
(SDPs)” on page 54-16.
3 Create a service. Configure a service to carry customer traffic through the provider network. The
service is associated with a customer ID at the time the service is created. Subsequently, the service is
bound to a SAP to receive customer traffic and bound to a SDP that will distribute that traffic through the
provider network. “Creating a VPLS Service” on page 54-19.
4 Bind services to SDPs. Once a service is created, it is then bound to an SDP. This implementation
supports mesh-SDP bindings. Spoke binding are not supported. See “Binding Services to SDPs” on
page 54-20.
5 Configure access ports. By default, a switch port is considered a network port when MPLS is active
on the switch. However, customer-facing ports (referred to as access ports) are required to identify which
ports will receive customer traffic and the type of traffic to direct to a specific service. See “Configuring
Service Access Ports” on page 54-22.
6 Configure access port profiles. A default port profile is automatically assigned to an access port.
Profile attributes determine how Layer 2 control frames received on the port are processed. It is only
necessary to configure a new profile if the default attribute values are not sufficient. See “Configuring
Layer 2 Profiles for Access Ports” on page 54-22.
7 Create Service Access Points (SAP). A SAP binds an access port to a service and specifies an encap-
sulation value that is used to identify the type of customer traffic to map to the associated service. A SAP
is associated with a service at the time the SAP is created. See “Configuring Service Access Points
(SAPs)” on page 54-21.
Although the customer ID is the only required component of an account, the following commands are
available for configuring optional account parameters:
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-15
Configuring VPLS Services Configuring VPLS
• A default customer account (customer 1) already exists in the switch configuration. This account is
automatically assigned to a service when the service is created.
To verify customer account information, use the show service customer command. For example:
Customer
Customer-ID 1
Description: Default customer
Customer-ID 129
Contact: VJ Smith,
Description: Customer 129,
Phone: 100-232-4407
Customer-ID 1234
Contact: John Clark,
Description: Customer 1234,
Phone: 100-434-1248
Total Customers : 3
• Obtain the system IP address of the originating and far-end (endpoint) router.
• Enable Label Distribution Protocol (LDP) Label Switched Paths (LSPs) or assign static LSPs to the
SDP ID.
page 54-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Configuring VPLS Services
• Each router must have an SDP defined for every remote router to which the local router will provide
service. In addition, a return path SDP is required from every remote router to the local router, as SDP
tunnels are uni-directional.
• To configure the MPLS transport for the SDP, first create LSPs and then associate them with the SDP.
• More than one SDP to the same far-end router is allowed as long as each SDP uses a different type of
transport. For example, one SDP can use LDP-signaled LSPs and the other SDP can use a static LSP.
However, a service can only use one SDP for any given far-end router.
• A VPLS service requires an SDP binding. By default, no SDP is associated with a service. The SDP is
created first and then bound to the service.
• An SDP is not specific or exclusive to any one service or any type of service. An SDP can have more
than one service binding. However, any administrative or operational activity that occurs on the SDP
affects all the services associated with that SDP.
• In the SDP configuration, automatic ingress and egress labeling (targeted LDP) is enabled by default.
Ingress and egress VC labels are signaled over a targeted LDP (TLDP) connection between two rout-
ers. Note that if signaling is disabled for an SDP, then services using that SDP must configure ingress
and egress VC labels manually.
Creating a SDP
A SDP is identified by an ID number. This ID number is used to bind the SDP to a service and LSPs. The
configure service sdp create command is used to create the SDP ID. For example, the following
command creates a SDP with 10 as the ID number:
-> configure service sdp 10 create
Optionally configure a description for the SDP ID using the configure service sdp description command.
For example:
-> configure service sdp 10 description “PE-R1 to PE-R2”
Note. Note that when the far-end address is configured for a SDP, a tunnel is created between the local
router, on which the SDP was created, and the far-end router.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-17
Configuring VPLS Services Configuring VPLS
To configure the SDP to use static LSPs, first disable LDP using the no form of the configure service sdp
ldp command. For example:
-> configure service 10 no ldp
Once LDP is disabled, the next step is to disable auto-label signaling for the SDP using the configure
service sdp signaling command with the off option. For example:
-> configure service sdp 10 signaling off
After disabling LDP and auto-label signaling, configure the SDP to use static LSPs with the configure
service sdp lsp command. For example, the following command binds SDP 10 to a static LSP named “to-
R3”:
-> configure service sdp 10 lsp to-R3
To override the advertised VC MTU with the service MTU, use the configure service sdp adv-mtu-over-
ride command. For example:
-> configure service sdp 10 adv-mtu-override
Deleting an SDP
Before deleting an SDP from the switch configuration, remove any VPLS services bound to the SDP and
disable the administrative status for the SDP. Once this is done, use the no form of the configure service
sdp create command to delete the SDP. For example:
-> configure service no sdp 10
page 54-18 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Configuring VPLS Services
Once created, the service ID is then used to bind the service to an SDP and a SAP on each local and
remote router for the service. See “Configuring Service Distribution Points (SDPs)” on page 54-16 and
“Configuring Service Access Points (SAPs)” on page 54-21 for more information.
Optionally configure a description for the service using the configure service vpls description command.
For example:
-> configure service vpls 100 description “cust10-vpls100”
Refer to the OmniSwitch AOS Release 6 CLI Reference Guide for more information about the above VPLS
parameters and related commands.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-19
Configuring VPLS Services Configuring VPLS
By default, the VC type for the mesh-SDP binding is set to Ethernet. Use the configure service vpls
mesh-sdp command with the vc-type option to change the VC type to VLAN. For example:
-> configure service vpls 100 mesh-sdp 10 vc-type vlan
Note that when configuring services between an OmniSwitch router and an SR Series router, the VC type
is dependent upon the encapsulation type used on the access ports. For example, if the ports use null
encapsualtion, set the VC type to Ethernet; if the ports use dot1q encapsulation, set the VC type to VLAN.
Note that static MAC addresses configured on one edge device are not propagated to other edge devices
associated with the same VPLS instance. Each edge device has an independent forwarding database for the
associated VPLS.
To delete a static MAC address entry for the mesh-SDP binding, use the no form of the configure service
vpls mesh-sdp static-mac command. For example:
-> configure service vpls 100 mesh-sdp no static-mac 00:2a:95:01:3e:32
Static MAC addresses for mesh-SDP and SAP bindings are also configurable using OmniSwitch Source
Learning commands. For more information, see Chapter 3, “Managing Source Learning.”
page 54-20 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Configuring VPLS Services
• Configure the access port encapsulation mode to determine if the port will support a single SAP (one
customer service) or multiple SAPs (customer services).
• Configure Layer 2 profiles to determine how control packets are processed on access ports.
• Create a SAP by associating a SAP ID with a VPLS service ID. A SAP ID is comprised of an access
port and an encapsulation value, which is used to identify the type of customer traffic to map to the
associated service.
• When a SAP is deleted, all configuration parameters for the SAP are also deleted.
• A SAP is owned by and associated with the service that was specified at the time the SAP was created.
• A port with a dot1q encapsulation type classifies traffic for the SAP based on a specific IEEE 802.1Q
VLAN ID value. The VLAN ID is preserved from SAP ingress to a SAP egress. As a result, the VLAN
IDs have end-to-end significance, which means the same VLAN ID configuration is required at each
end of the service.
• If a port is administratively shutdown, all SAPs on that port become operationally out of service.
• If the customer frame is double tagged, only the outer tag is used for SAP classification.
• The access port mode is supported only on fixed ports or link aggregates. Only access ports are associ-
ated with SAPs.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-21
Configuring VPLS Services Configuring VPLS
• The default encapsulation type for an access port is null, which means the SAP supports only one
customer service (dotq supports multiple services).
• The MTU for a SAP should not exceed the MTU of the PE network.
Protocol default
stp tunnel
802.1x discard
802.1ab discard
802.3ad peer
gvrp tunnel
amap discard
If the default profile values are not sufficient, use the configure service l2profile command to create a
new profile. For example, the following command creates a profile named “no-stp-gvrp”:
-> configure service l2profile no-stp-gvrp create
page 54-22 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Configuring VPLS Services
Once the profile is created, the configure service l2profile command is used to change processing selec-
tions for a specified protocol. For example, the following commands configure the “no-stp-gvrp” profile to
discard STP and GVRP frames that ingress on the port to which the profile is assigned:
• When a profile is created, the new profile inherits the default profile settings for processing control
frames. The default settings are applied with the new profile unless they are explicitly changed. For
example, the profile “no-stp-gvrp” was configured to discard STP and GVRP frames. No other proto-
col settings were changed, so the default settings still apply for the other protocols.
• Remove any profile associations with access ports before attempting to modify or delete the profile.
To delete a Layer 2 profile, use the no form of the configure service l2profile command. For example,
the following command deletes the “no-stp-gvrp” profile:
-> configure service no l2profile no-stp-gvrp
Use the show service l2profile command to view a list of profiles that are already configured for the
switch. This command also displays the attribute values for each profile.
To change the profile associated with the access port back to the default profile (def-access-profile), use
the default option with the configure service port l2profile command. For example:
-> configure service port 1/4 l2profile default
Use the show service port command to display profile associations for access ports.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-23
Configuring VPLS Services Configuring VPLS
• An access port or link aggregate number configured with either a null or dot1q encapsulation type.
• An encapsulation value (0, all, or VLAN ID) that identifies the type of customer traffic ingressing on
the access port that the SAP will direct to the service.
Configuring the encapsulation value for the SAP ID depends on the encapsulation type (null or dot1q)
configured for the access port. Use the following table to determine the appropriate value to use:
Once the above components are configured, use the configure service vpls sap create to create a SAP.
For example, the following command creates a SAP that will direct customer traffic ingressing on access
port 1/4 that is tagged with VLAN ID 50 to service 100:
-> configure service vpls 100 sap 1/4:50 create
In the above example, the 1/4:50 designation is often referred to as the SAP ID or the encapsulation ID. In
addition, the access port was configured with a dot1q encapsulation type. This means that if no other SAPs
are configured for port 1/4, then any traffic ingressing on that port is dropped if the traffic is not tagged
with VLAN 50.
When a SAP is trusted, the priority value contained in tagged customer packets is used; untagged packets
are assigned the default priority value (zero). When a SAP is untrusted, the priority value configured for
the SAP is assigned to both tagged and untagged customer packets.
page 54-24 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS Configuring VPLS Services
Note that static MAC addresses configured on one edge device are not propagated to other edge devices
associated with the same VPLS instance. Each edge device has an independent forwarding database for
the associated VPLS.
To delete a static MAC address entry for the SAP, use the no form of the configure service vpls sap
static-mac command. For example:
-> configure service vpls 100 sap 1/4:50 no static-mac 00:2a:95:01:3e:41
Static MAC addresses for SAP and mesh-SDP bindings are also configurable using OmniSwitch Source
Learning commands. For more information, see the “Source Learning Commands” chapter in this guide.
Use the command to display the SAPs configured for the switch. Use the command to display a list of
services and the SAPs associated with each service.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-25
VPLS Configuration Example Configuring VPLS
• The messages and databases (FEC, VC labels) updated as a result of the LSP's are also included.
The illustration below shows the example VPLS configuration described in this section. In this configura-
tion, the provider edge bridges will encapsulate customer traffic tagged with VLAN ID 100 into VPLS
service 100. The customer traffic is then transparently bridged through the service and sent out to the
destined customer site.
9.1.1.3/32; 26 9.1.1.3/32; 25
VPLS Configuration
page 54-26 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS VPLS Configuration Example
The following tables provide the Routing Information Base (RIB) and interface-to-label mapping for the
routers in the above diagram.
Router 1 (PE1-Label Edge Router)
The following steps provide a tutorial on how to set up the SDP/VPLS configuration in the example
diagram on page 54-26. These steps are based on the assumption that the following network preparation is
already in place:
• VLANs and port assignments are configured for the connections between each router.
• The IP interfaces named “IF0” (10.1.1.1/24), “IF1” (10.1.1.2/24), “IF2” (11.1.1.1/24), and “IF3”
(11.1.1.2/24) are created on the appropriate routers and are assigned to the connecting VLANs for each
router.
• OSPF is configured for the IP interfaces. See Chapter 1, “Configuring OSPF,” for more information.
• MPLS and LDP are enabled for the switch. See Chapter 53, “Configuring MPLS,” for more informa-
tion.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-27
VPLS Configuration Example Configuring VPLS
Router 3 (PE2)
-> configure router ldp interface-parameters interface IF3
The above command creates SDP 8 on Router 1 (PE1) and specifies Router 3 (PE2; system IP 9.1.1.3) as
the remote endpoint for the SDP tunnel.
• A tunnel session is initiated to the far end (PE2). MPLS uses LDP for signaling the LSP's. The label
assignment is signaled by Targeted LDP (T-LDP).
• Label 21 is bound to the local host interface. This defines the host FEC for PE1 (9.1.1.1,21).
• PE1 sends a down stream unsolicited (DU) message to the transit router (Router 2). When the transit
router receives the host FEC from Router 1, LDP will create a push/swap entry for this label
(9.1.1.1,21/22).
• The transit router sends a down stream unsolicited message to PE2. The far-end (PE2) creates a push
entry for FEC (9.1.1.1,22)
Router 3 (PE2)
-> configure service sdp 8 far-end 9.1.1.1
The above command creates SDP 8 on Router 3 (PE2) and specifies Router 1 (PE1; system IP 9.1.1.1) as
the remote endpoint for the SDP tunnel.
page 54-28 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS VPLS Configuration Example
• A T-LDP session is established between PE1 and PE2. The LSP tunnel path is setup between PE1 and
PE2.
• The label distribution for the path between PE1 and PE2 is as follows:
Note. The label distribution path is in the opposite direction of the data flow.
Router 3 (PE2)
On both PE1 and PE2, the above commands create a customer account with ID 100, create a VPLS service
with ID 100, and bind the service to SDP 8.
• A pseudo wire (also referred to as VC) is setup between the far-end VPLS instances.
• A VC label is associated with the VPLS instance. This is the inner MPLS label that will be carried
from the egress port of the tunnel initiation to the ingress port of the tunnel termination (PE1 to PE2).
• Since the service is bound to the SDP 8, VPLS service 100 will use the tunnel created in Step 3. In this
case, the tunnel label is 21 (Outer label).
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-29
VPLS Configuration Example Configuring VPLS
Set the port encapsulation mode to dot1q (classify traffic based on customer VLAN ID tag):
-> configure service port 1/1 encap-type dot1q
Create the SAP in the VPLS instance 100 with customer VLAN ID 100 as the dot1q encapsulation value.
Note that any given SAP can only exist in one VPLS instance.
Router 3 (PE2)
Configure port 2/1 as an access port (by default all ports are of type network):
-> configure service port 2/1 mode access
Set the port encapsulation mode to dot1q (classify traffic based on customer VLAN ID tag):
-> configure service port 2/1 encap-type dot1q
Create the SAP in the VPLS instance 100 with customer VLAN ID 100 as the dot1q encapsulation value.
Note that any given SAP can only exist in one VPLS instance.
The above commands create a virtual bridge between port 1/1 on PE1 and port 2/1 on PE2 for customer
VLAN 100 traffic, send bi-directional traffic, and verify the flow/connectivity.
page 54-30 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Configuring VPLS VPLS Configuration Example
Router 3 (PE2):
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 54-31
Verifying the VPLS Configuration Configuring VPLS
For more information about the resulting displays from these commands, see the OmniSwitch AOS Release
6 CLI Reference Guide.
page 54-32 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
55 Using Switch Logging
Switch logging is an event logging utility that is useful in maintaining and servicing the switch. Switch
logging uses a formatted string mechanism to either record or discard event data from switch applications.
The log records are copied to the output devices configured for the switch. Log records can be sent to a
text file and written into the flash file system. The log records can also be scrolled to the switch’s console
or to a remote IP address.
Switch logging information can be customized and configured through Command Line Interface (CLI)
commands, WebView, and SNMP. Log information can be helpful in resolving configuration or
authentication issues, as well as general switch errors.
This chapter describes the switch logging feature, how to configure it and display switch logging
information through the Command Line Interface (CLI). CLI commands are used in the configuration
examples. For more details about the syntax of commands, see the OmniSwitch AOS Release 6 CLI Refer-
ence Guide.
In This Chapter
The following procedures are described:
• “Enabling Switch Logging” on page 55-6
Notes. Switch logging commands are not intended for use with low-level hardware and software
debugging. It is strongly recommended that you contact an Alcatel-Lucent Customer Service representa-
tive for assistance with debugging functions.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 55-1
Switch Logging Specifications Using Switch Logging
page 55-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Switch Logging Switch Logging Defaults
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 55-3
Quick Steps for Configuring Switch Logging Using Switch Logging
-> swlog
2 Specify the ID of the application to be logged along with the logging severity level.
Here, the application ID specifies bridging and the severity is set to the “warning” level.
3 Specify the output device to which the switch logging information will be sent.
4 Specify the debug level for the console with option or level number.
5 Specify the output device to which the switch logging information will be sent.
In this example, the switch logging information will be sent to the console port.
Note. Optional. To verify the switch logging configuration, enter the show swlog command. The display
is similar to the following output:
Application ID Level
--------------------+----------------
BRIDGE ( 10) warning (5)
INTERFACE ( 6) off (1)
QDRIVER ( 2) off (1)
For more information about this command, or the “Switch Logging Commands” chapter in the
OmniSwitch AOS Release 6 CLI Reference Guide.
page 55-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Switch Logging Switch Logging Overview
Notes. Although switch logging provides complementary functionality to switch debugging facilities, the
switch logging commands are not intended for use with low-level hardware and software debugging
functions.
The show configuration snapshot command can be used to capture and save all switch logging configu-
ration settings in a text file that can be viewed, edited, and used as a configuration file. See the “Working
with Configuration Files” chapter of the OmniSwitch AOS Release 6 Switch Management Guide.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 55-5
Switch Logging Commands Overview Using Switch Logging
Numeric
CLI Keyword Application ID
Equivalent
IDLE 255 APPID_IDLE
DIAG 0 APPID_DIAGNOSTICS
IPC-DIAG 1 APPID_IPC_DIAGNOSTICS
QDRIVER 2 APPID_QDRIVER
QDISPATCHER 3 APPID_QDISPATCHER
IPC-LINK 4 APPID_IPC_LINK
NI-SUPERVISION 5 APPID_NI_SUP_AND_PROBER
INTERFACE 6 APPID_ESM_DRIVER
802.1Q 7 APPID_802.1Q
VLAN 8 APPID_VLAN_MGR
page 55-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Switch Logging Switch Logging Commands Overview
Numeric
CLI Keyword Application ID
Equivalent
GM 9 APPID_GROUPMOBILITY (RESERVED)
BRIDGE 10 APPID_SRCLEANING
STP 11 APPID_SPANNINGTREE
LINKAGG 12 APPID_LINKAGGREGATION
QOS 13 APPID_QOS
RSVP 14 APPID_RSVP
IP 15 APPID_IP
IPMS 17 APPID_IPMS
AMAP 18 APPID_XMAP
GMAP 19 APPID_GMAP
AAA 20 APPID_AAA
IPC-MON 21 APPID_IPC_MON
IP-HELPER 22 APPID_BOOTP_RELAY
PMM 23 APPID_MIRRORING_MONITORING
MODULE 24 APPID_L3HRE
SLB 25 APPID_SLB
EIPC 26 APPID_EIPC
CHASSIS 64 APPID_CHASSISUPER
PORT-MGR 65 APPID_PORT_MANAGER
CONFIG 66 APPID_CONFIGMANAGER
CLI 67 APPID_CLI
SNMP 68 APPID_SNMP_AGENT
WEB 69 APPID_WEBMGT
MIPGW 70 APPID_MIPGW
SESSION 71 APPID_SESSION_MANAGER
TRAP 72 APPID_TRAP_MANAGER
POLICY 73 APPID_POLICY_MANAGER
DRC 74 APPID_DRC
SYSTEM 75 APPID_SYSTEM_SERVICES
HEALTH 76 APPID_HEALTHMON
NAN-DRIVER 78 APPID_NAN_DRIVER
RMON 79 APPID_RMON
TELNET 80 APPID_TELNET
PSM 81 APPID_PSM
FTP 82 APPID_FTP
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 55-7
Switch Logging Commands Overview Using Switch Logging
Numeric
CLI Keyword Application ID
Equivalent
SMNI 83 APPID_SMNI
DISTRIB 84 APPID_DISTRIB
EPILOGUE 85 APPID_EPILOGUE
LDAP 86 APPID_LDAP
NOSNMP 87 APPID_NOSNMP
SSL 88 APPID_SSL
DBGGW 89 APPID_DBGGW
LANPOWER 108 APPID_LANPOWER
The level keyword assigns the error-type severity level to the specified application IDs. Values range from
2 (highest severity) to 9 (lowest severity). The values are defined in the following table:
The following command makes the same assignment by using the severity level and application numbers.
-> swlog appid 75 interface level 3
page 55-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Switch Logging Switch Logging Commands Overview
The following command makes the same assignment by using the severity level.
-> swlog console level 3
To disable the switch logging output to the console, enter the following command:
-> no swlog output console
No confirmation message will appear on the console screen for either command.
To disable the switch logging output to flash memory, enter the following command:
-> no swlog output flash
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 55-9
Switch Logging Commands Overview Using Switch Logging
Note. You can also send syslog files to multiple hosts (maximum of four).
page 55-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Switch Logging Switch Logging Commands Overview
• The switch logging severity level for each application that is not set to the “info” (6) setting.
Log Device(s)
----------------
flash
console
->
For this example, switch logging is enabled. Switch logging information is being sent to the switch’s flash
memory and to the console. Additionally, the severity level for the chassis application ID has been set to
the “debug3” (or “9”) severity level.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 55-11
Switch Logging Commands Overview Using Switch Logging
Note. Use the ls command, which is described in the OmniSwitch AOS Release 6 Switch Management
Guide, to determine the amount of available flash memory.
For example, to set the switch logging file to 500000 bytes enter:
-> swlog output flash file-size 500000
This command will cause the switch to clear all the switch logging information and begin recording again.
As a result, the switch will display a shorter file when you execute the show log swlog command. You
may want to use swlog clear when the switch logging display is too long due to some of the data being old
or out of date.
No confirmation message will appear on the screen.
page 55-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Using Switch Logging Switch Logging Commands Overview
Note. Switch logging frequently records a very large volume of data. It can take several minutes for all the
switch logging information to scroll to the console screen.
------------------------+--------------+-----+--------------------------------
MON NOV 11 12:42:11 2005 SYSTEM info Switch Logging files cleared by
command
MON NOV 11 13:07:26 2005 WEB info The HTTP session login successful!
MON NOV 11 13:18:24 2005 WEB info The HTTP session login successful!
MON NOV 11 13:24:03 2005 TELNET info New telnet connection, Address,
128.251.30.88
MON NOV 11 13:24:03 2005 TELNET info Session 4, Created
MON NOV 11 13:59:04 2005 WEB info The HTTP session user logout
successful!
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page 55-13
Switch Logging Commands Overview Using Switch Logging
page 55-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
A Software License
and Copyright Statements
This appendix contains Alcatel-Lucent and third-party software vendor license and copyright statements.
.
IMPORTANT Please read the terms and conditions of this license agreement carefully before opening
this package.
By opening this package, you accept and agree to the terms of this license agreement. If you are not
willing to be bound by the terms of this license agreement, do not open this package. Please
promptly return the product and any materials in unopened form to the place where you obtained it
for a full refund.
1. License Grant. This is a license, not a sales agreement, between you (the “Licensee”) and Alcatel-
Lucent. Alcatel-Lucent hereby grants to Licensee, and Licensee accepts, a non-exclusive license to use
program media and computer software contained therein (the “Licensed Files”) and the accompanying
user documentation (collectively the “Licensed Materials”), only as authorized in this License Agreement.
Licensee, subject to the terms of this License Agreement, may use one copy of the Licensed Files on the
Licensee’s system. Licensee agrees not to assign, sublicense, transfer, pledge, lease, rent, or share their
rights under this License Agreement. Licensee may retain the program media for backup purposes with
retention of the copyright and other proprietary notices. Except as authorized under this paragraph, no
copies of the Licensed Materials or any portions thereof may be made by Licensee and Licensee shall not
modify, decompile, disassemble, reverse engineer, or otherwise attempt to derive the Source Code.
Licensee is also advised that Alcatel-Lucent products contain embedded software known as firmware
which resides in silicon. Licensee may not copy the firmware or transfer the firmware to another medium.
2. Alcatel-Lucent’s Rights. Licensee acknowledges and agrees that the Licensed Materials are the sole
property of Alcatel-Lucent and its licensors (herein “its licensors”), protected by U.S. copyright law, trade-
mark law, and are licensed on a right to use basis. Licensee further acknowledges and agrees that all rights,
title, and interest in and to the Licensed Materials are and shall remain with Alcatel-Lucent and its licen-
sors and that no such right, license, or interest shall be asserted with respect to such copyrights and trade-
marks. This License Agreement does not convey to Licensee an interest in or to the Licensed Materials,
but only a limited right to use revocable in accordance with the terms of this License Agreement.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-1
Alcatel-Lucent License Agreement Software License and Copyright Statements
3. Confidentiality. Alcatel-Lucent considers the Licensed Files to contain valuable trade secrets of
Alcatel-Lucent, the unauthorized disclosure of which could cause irreparable harm to Alcatel-Lucent.
Except as expressly set forth herein, Licensee agrees to use reasonable efforts not to disclose the Licensed
Files to any third party and not to use the Licensed Files other than for the purpose authorized by this
License Agreement. This confidentiality obligation shall continue after any termination of this License
Agreement.
4. Indemnity. Licensee agrees to indemnify, defend and hold Alcatel-Lucent harmless from any claim,
lawsuit, legal proceeding, settlement or judgment (including without limitation Alcatel-Lucent’s reason-
able United States and local attorneys’ and expert witnesses’ fees and costs) arising out of or in connec-
tion with the unauthorized copying, marketing, performance or distribution of the Licensed Files.
5. Limited Warranty. Alcatel-Lucent warrants, for Licensee’s benefit alone, that the program media
shall, for a period of ninety (90) days from the date of commencement of this License Agreement (referred
to as the Warranty Period), be free from defects in material and workmanship. Alcatel-Lucent further
warrants, for Licensee benefit alone, that during the Warranty Period the Licensed Files shall operate
substantially in accordance with the functional specifications in the User Guide. If during the Warranty
Period, a defect in the Licensed Files appears, Licensee may return the Licensed Files to Alcatel-Lucent
for either replacement or, if so elected by Alcatel-Lucent, refund of amounts paid by Licensee under this
License Agreement. EXCEPT FOR THE WARRANTIES SET FORTH ABOVE, THE LICENSED
MATERIALS ARE LICENSED “AS IS” AND ALCATEL-LUCENT AND ITS LICENSORS
DISCLAIM ANY AND ALL OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUD-
ING (WITHOUT LIMITATION) ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW THE EXCLUSION
OF IMPLIED WARRANTIES SO THE ABOVE EXCLUSIONS MAY NOT APPLY TO LICENSEE.
THIS WARRANTY GIVES THE LICENSEE SPECIFIC LEGAL RIGHTS. LICENSEE MAY ALSO
HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE.
6. Limitation of Liability. Alcatel-Lucent’s cumulative liability to Licensee or any other party for any
loss or damages resulting from any claims, demands, or actions arising out of or relating to this License
Agreement shall not exceed the license fee paid to Alcatel-Lucent for the Licensed Materials. IN NO
EVENT SHALL ALCATEL-LUCENT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, CONSE-
QUENTIAL, SPECIAL, OR EXEMPLARY DAMAGES OR LOST PROFITS, EVEN IF ALCATEL-
LUCENT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO
NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSE-
QUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION TO INCIDENTAL OR
CONSEQUENTIAL DAMAGES MAY NOT APPLY TO LICENSEE.
7. Export Control. This product is subject to the jurisdiction of the United States. Licensee may not
export or reexport the Licensed Files, without complying with all United States export laws and regula-
tions, including but not limited to (i) obtaining prior authorization from the U.S. Department of Commerce
if a validated export license is required, and (ii) obtaining “written assurances” from licensees, if required.
8. Support and Maintenance. Except as may be provided in a separate agreement between Alcatel-
Lucent and Licensee, if any, Alcatel-Lucent is under no obligation to maintain or support the copies of the
Licensed Files made and distributed hereunder and Alcatel-Lucent has no obligation to furnish Licensee
with any further assistance, documentation or information of any nature or kind.
9. Term. This License Agreement is effective upon Licensee opening this package and shall continue until
terminated. Licensee may terminate this License Agreement at any time by returning the Licensed Materi-
als and all copies thereof and extracts therefrom to Alcatel-Lucent and certifying to Alcatel-Lucent in
writing that all Licensed Materials and all copies thereof and extracts therefrom have been returned or
erased by the memory of Licensee’s computer or made non-readable. Alcatel-Lucent may terminate this
License Agreement upon the breach by Licensee of any term hereof. Upon such termination by Alcatel-
page A-2 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Software License and Copyright Statements Alcatel-Lucent License Agreement
Lucent, Licensee agrees to return to Alcatel-Lucent or destroy the Licensed Materials and all copies and
portions thereof.
10. Governing Law. This License Agreement shall be construed and governed in accordance with the
laws of the State of California.
11. Severability. Should any term of this License Agreement be declared void or unenforceable by any
court of competent jurisdiction, such declaration shall have no effect on the remaining terms herein.
12. No Waiver. The failure of either party to enforce any rights granted hereunder or to take action against
the other party in the event of any breach hereunder shall not be deemed a waiver by that party as to
subsequent enforcement of rights or subsequent actions in the event of future breaches.
13. Notes to United States Government Users. Software and documentation are provided with restricted
rights. Use, duplication or disclosure by the government is subject to (i) restrictions set forth in GSA ADP
Schedule Contract with Alcatel-Lucent’s reseller(s), or (ii) restrictions set forth in subparagraph (c) (1)
and (2) of 48 CFR 52.227-19, as applicable.
14.Third Party Materials. Licensee is notified that the Licensed Files contain third party software and
materials licensed to Alcatel-Lucent by certain third party licensors. Some third party licensors (e.g., Wind
River and their licensors with respect to the Run-Time Module) are third part beneficiaries to this License
Agreement with full rights of enforcement. Please refer to the section entitled “Third Party Licenses and
Notices” on page A-4 for the third party license and notice terms.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-3
Third Party Licenses and Notices Software License and Copyright Statements
2 Redistributions in binary form must reproduce applicable copyright statements and notices, this list of
conditions, and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3 Redistributions must contain a verbatim copy of this document.
4 The names and trademarks of the authors and copyright holders must not be used in advertising or
otherwise to promote the sale, use or other dealing in this Software without specific, written prior permis-
sion.
6 The OpenLDAP Foundation may revise this license from time to time. Each revision is distinguished
by a version number. You may use the Software under terms of this license revision or under the terms of
any subsequent revision of the license.
THIS SOFTWARE IS PROVIDED BY THE OPENLDAP FOUNDATION AND CONTRIBUTORS “AS
IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OPENLDAP FOUNDATION OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEM-
PLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
OpenLDAP is a trademark of the OpenLDAP Foundation.
Copyright 1999-2000 The OpenLDAP Foundation, Redwood City,
California, USA. All Rights Reserved. Permission to copy and
distributed verbatim copies of this document is granted.
page A-4 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Software License and Copyright Statements Third Party Licenses and Notices
C. Linux
Linux is written and distributed under the GNU General Public License which means that its source code
is freely-distributed and available to the general public.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users. This General Public License applies to most of
the Free Software Foundation’s software and to any other program whose authors commit to using it.
(Some other Free Software Foundation software is covered by the GNU Library General Public License
instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you want it, that you can change the soft-
ware or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask
you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the source
code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author’s protection and ours, we want to make certain that everyone understands that there
is no warranty for this free software. If the software is modified by someone else and passed on, we want
its recipients to know that what they have is not the original, so that any problems introduced by others
will not reflect on the original authors’ reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that
redistributors of a free program will individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use
or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-5
Third Party Licenses and Notices Software License and Copyright Statements
verbatim or with modifications and/or translated into another language. (Hereinafter, translation is
included without limitation in the term “modification”.) Each licensee is addressed as “you”.
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running the Program is not restricted, and the output from the Program is
covered only if its contents constitute a work based on the Program (independent of having been made by
running the Program). Whether that is true depends on what the Program does.
1 You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate copy-
right notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and give any other recipients of the Program a copy of this License along with
the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2 You may modify your copy or copies of the Program or any portion of it, thus forming a work based on
the Program, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a You must cause the modified files to carry prominent notices stating that you changed the files and
the date of any change.
b You must cause any work that you distribute or publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties
under the terms of this License.
c If the modified program normally reads commands interactively when run, you must cause it, when
started running for such interactive use in the most ordinary way, to print or display an announcement
including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you
provide a warranty) and that users may redistribute the program under these conditions, and telling the
user how to view a copy of this License. (Exception: if the Program itself is interactive but does not
normally print such an announcement, your work based on the Program is not required to print an
announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Program, and can be reasonably considered independent and separate works in them-
selves, then this License, and its terms, do not apply to those sections when you distribute them as sepa-
rate works. But when you distribute the same sections as part of a whole which is a work based on the
Program, the distribution of the whole must be on the terms of this License, whose permissions for other
licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is
not the intent of this section to claim rights or contest your rights to work written entirely by you; rather,
the intent is to exercise the right to control the distribution of derivative or collective works based on the
Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work
based on the Program) on a volume of a storage or distribution medium does not bring the other work
under the scope of this License.
3 You may copy and distribute the Program (or a work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:
a Accompany it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily used for software inter-
change; or,
page A-6 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Software License and Copyright Statements Third Party Licenses and Notices
b Accompany it with a written offer, valid for at least three years, to give any third party, for a charge
no more than your cost of physically performing source distribution, a complete machine-readable
copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a
medium customarily used for software interchange; or,
c Accompany it with the information you received as to the offer to distribute corresponding source
code. (This alternative is allowed only for noncommercial distribution and only if you received the
program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an
executable work, complete source code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control compilation and installation of the
executable. However, as a special exception, the source code distributed need not include anything that is
normally distributed (in either source or binary form) with the major components (compiler, kernel, and so
on) of the operating system on which the executable runs, unless that component itself accompanies the
executable.
If distribution of executable or object code is made by offering access to copy from a designated place,
then offering equivalent access to copy the source code from the same place counts as distribution of the
source code, even though third parties are not compelled to copy the source along with the object code.
4 You may not copy, modify, sublicense, or distribute the Program except as expressly provided under
this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or
rights, from you under this License will not have their licenses terminated so long as such parties remain
in full compliance.
5 You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Program or its derivative works. These actions are prohibited
by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any
work based on the Program), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Program or works based on it.
6 Each time you redistribute the Program (or any work based on the Program), the recipient automati-
cally receives a license from the original licensor to copy, distribute or modify the Program subject to
these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the
rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
7 If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or other-
wise) that contradict the conditions of this License, they do not excuse you from the conditions of this
License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and
any other pertinent obligations, then as a consequence you may not distribute the Program at all. For
example, if a patent license would not permit royalty-free redistribution of the Program by all those who
receive copies directly or indirectly through you, then the only way you could satisfy both it and this
License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the
balance of the section is intended to apply and the section as a whole is intended to apply in other circum-
stances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or
to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the
free software distribution system, which is implemented by public license practices. Many people have
made generous contributions to the wide range of software distributed through that system in reliance on
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-7
Third Party Licenses and Notices Software License and Copyright Statements
consistent application of that system; it is up to the author/donor to decide if he or she is willing to distrib-
ute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
8 If the distribution and/or use of the Program is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Program under this License may add
an explicit geographical distribution limitation excluding those countries, so that distribution is permitted
only in or among countries not thus excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
9 The Free Software Foundation may publish revised and/or new versions of the General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in
detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this
License which applies to it and “any later version”, you have the option of following the terms and condi-
tions either of that version or of any later version published by the Free Software Foundation. If the
Program does not specify a version number of this License, you may choose any version ever published by
the Free Software Foundation.
10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions
are different, write to the author to ask for permission. For software which is copyrighted by the Free Soft-
ware Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free soft-
ware and of promoting the sharing and reuse of software generally.
NO WARRANTY
page A-8 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Software License and Copyright Statements Third Party Licenses and Notices
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-9
Third Party Licenses and Notices Software License and Copyright Statements
E. University of California
Provided with this product is certain TCP input and Telnet client software developed by the University of
California, Berkeley.
Copyright (C) 1987. The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice
and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and
other materials related to such distribution and use acknowledge that the software was developed by the
University of California, Berkeley. The name of the University may not be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
F. Carnegie-Mellon University
Provided with this product is certain BOOTP Relay software developed by Carnegie-Mellon University.
G. Random.c
PR 30872 B Kesner created May 5 2000
PR 30872 B Kesner June 16 2000 moved batch_entropy_process to own task iWhirlpool to make code
more efficient
random.c -- A strong random number generator
Version 1.89, last modified 19-Sep-99
Copyright Theodore Ts’o, 1994, 1995, 1996, 1997, 1998, 1999. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, and the entire permission notice
in its entirety, including the disclaimer of warranties.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. The name of the author may not be used to endorse or promote products derived from this software
without specific prior written permission. ALTERNATIVELY, this product may be distributed under the
terms of the GNU Public License, in which case the provisions of the GPL are required INSTEAD OF the
page A-10 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Software License and Copyright Statements Third Party Licenses and Notices
above restrictions. (This clause is necessary due to a potential bad interaction between the GPL and the
restrictions contained in a BSD-style copyright.)
THIS SOFTWARE IS PROVIDED “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE, ALL OF WHICH ARE HEREBY DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROF-
ITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABIL-
ITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF NOT
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
H. Apptitude, Inc.
Provided with this product is certain network monitoring software (“MeterWorks/RMON”) licensed from
Apptitude, Inc., whose copyright notice is as follows: Copyright (C) 1997-1999 by Apptitude, Inc. All
Rights Reserved. Licensee is notified that Apptitude, Inc. (formerly, Technically Elite, Inc.), a California
corporation with principal offices at 6330 San Ignacio Avenue, San Jose, California, is a third party bene-
ficiary to the Software License Agreement. The provisions of the Software License Agreement as applied
to MeterWorks/RMON are made expressly for the benefit of Apptitude, Inc., and are enforceable by
Apptitude, Inc. in addition to Alcatel-Lucent. IN NO EVENT SHALL APPTITUDE, INC. OR ITS
SUPPLIERS BE LIABLE FOR ANY DAMAGES, INCLUDING COSTS OF PROCUREMENT OF
SUBSTITUTE PRODUCTS OR SERVICES, LOST PROFITS, OR ANY SPECIAL, INDIRECT,
CONSEQUENTIAL OR INCIDENTAL DAMAGES, HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, ARISING IN ANY WAY OUT OF THIS AGREEMENT.
I. Agranat
Provided with this product is certain web server software (“EMWEB PRODUCT”) licensed from Agranat
Systems, Inc. (“Agranat”). Agranat has granted to Alcatel-Lucent certain warranties of performance,
which warranties [or portion thereof] Alcatel-Lucent now extends to Licensee. IN NO EVENT,
HOWEVER, SHALL AGRANAT BE LIABLE TO LICENSEE FOR ANY INDIRECT, SPECIAL, OR
CONSEQUENTIAL DAMAGES OF LICENSEE OR A THIRD PARTY AGAINST LICENSEE ARIS-
ING OUT OF, OR IN CONNECTION WITH, THIS DISTRIBUTION OF EMWEB PRODUCT TO
LICENSEE. In case of any termination of the Software License Agreement between Alcatel-Lucent and
Licensee, Licensee shall immediately return the EMWEB Product and any back-up copy to Alcatel-
Lucent, and will certify to Alcatel-Lucent in writing that all EMWEB Product components and any copies
of the software have been returned or erased by the memory of Licensee’s computer or made non-read-
able.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-11
Third Party Licenses and Notices Software License and Copyright Statements
page A-12 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Software License and Copyright Statements Third Party Licenses and Notices
N.Remote-ni
Provided with this product is a file (part of GDB), the GNU debugger and is licensed from Free Software
Foundation, Inc., whose copyright notice is as follows: Copyright (C) 1989, 1991, 1992 by Free Software
Foundation, Inc. Licensee can redistribute this software and modify it under the terms of General Public
License as published by Free Software Foundation Inc.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without
even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for more details.
O.GNU Zip
GNU Zip -- A compression utility which compresses the files with zip algorithm.
Copyright (C) 1992-1993 Jean-loup Gailly.
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO
THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-13
Third Party Licenses and Notices Software License and Copyright Statements
Copyright (C) by Beman Dawes, David Abrahams, 1998-2003. All rights reserved.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-
INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE
DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER
LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,
ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.
R. U-Boot
Provided with this product is a software licensed from Free Software Foundation Inc. This is used as OS
Bootloader; and located in on-board flash. This product is standalone and not linked (statically or dynami-
cally) to any other software.
Version 1.1.0
Copyright (C) 2000-2004. All rights reserved.
S. Solaris
Provided with this product is free software; Licensee can redistribute it and/or modify it under the terms of
the GNU General Public License.
Copyright (C) 1992-1993 Jean-loup Gailly. All rights reserved.
page A-14 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Software License and Copyright Statements Third Party Licenses and Notices
4. Neither the name of the University nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS'' AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE. FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL.
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS.
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION). HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT. LIABIL-
ITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The copyright of the products such as crypto, dhcp, net, netinet, netinet6, netley, netwrs, libinet6 are same
as that of the internet protocol version 6.
U. CURSES
Copyright (C) 1987. The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above copyright notice
and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and
other materials related to such distribution and use acknowledge that the software was developed by the
University of California, Berkeley. The name of the University may not be used to endorse or promote
products derived from this software without specific prior written permission.
V. ZModem
Provided with this product is a program or code that can be used without any restriction.
Copyright (C) 1986 Gary S. Brown. All rights reserved.
X. OpenLDAP
Provided with this software is an open source implementation of the Lightweight Directory Access Proto-
col (LDAP).
Version 3
Copyright (C) 1990, 1998, 1999, Regents of the University of Michigan, A. Hartgers, Juan C. Gomez. All
rights reserved.
OmniSwitch AOS Release 6 Network Configuration Guide January 2013 page A-15
Third Party Licenses and Notices Software License and Copyright Statements
This software is not subject to any license of Eindhoven University of Technology.Redistribution and use
in source and binary forms are permitted only as authorized by the OpenLDAP Public License.
This software is not subject to any license of Silicon Graphics Inc.or Purdue University. Redistribution and
use in source and binary forms are permitted without restriction or fee of any kind as long as this notice is
preserved.
Y. BITMAP.C
Provided with this product is a program for personal and non-profit use.
Copyright (C) Allen I. Holub, All rights reserved.
Z. University of Toronto
Provided with this product is a code that is modified specifically for use with the STEVIE editor. Permis-
sion is granted to anyone to use this software for any purpose on any computer system, and to redistribute
it freely, subject to the following restrictions:
1. The author is not responsible for the consequences of use of this software, no matter how awful, even if
they arise from defects in it.
2.The origin of this software must not be misrepresented, either by explicit claim or by omission.
3. Altered versions must be plainly marked as such, and must not be misrepresented as being the original
software.
Version 1.5
Copyright (C) 1986 by University of Toronto and written by Henry Spencer.
AA.Free/OpenBSD
Copyright (c) 1982, 1986, 1990, 1991, 1993 The Regents of University of California. All Rights Reserved.
page A-16 OmniSwitch AOS Release 6 Network Configuration Guide January 2013
Index aaa authentication vlan multiple-mode command 44-32
aaa authentication vlan single-mode command 44-32
aaa avlan default dhcp command 44-31
aaa avlan dns command 44-29
aaa avlan http language command 44-8
aaa ldap-server command
LDAP authentication 42-32
aaa radius-server command 41-8
qos log lines command 36-21 RADIUS authentication 42-16, 42-17, 42-19
qos port servicing mode command 36-28 aaa vlan no command 44-26
qos stats interval command 36-24 Access Control Lists
see ACLs
access list 25-15
Numerics creating 25-15
10 Gigabit Ethernet Access Loop 16-4
see Ethernet Access Node 16-4
10/100/1000 ports Access Node Identifier 16-7
defaults 1-3 accounting servers 44-35
802.1AB 19-1 ACE/Server
defaults 19-3 for authentication 42-8
specifications 19-2 ACLs
verify information about 19-20 application examples 37-4, 37-22, 38-3, 38-4
802.1p bridged traffic 37-6
trusted ports 36-30 defaults 37-3, 38-2
802.1Q 6-1 disposition 37-5, 37-7
application examples 6-8 interaction with VRRP 31-10, 31-19
defaults 6-2 Layer 2 37-11
enabling notification 19-15 Layer 2 application examples 37-12
enabling tagging 6-5 Layer 3 37-12
frame type 6-6 Layer 3 application examples 37-13
overview 6-3 multicast 37-14
specifications 6-2 security features 37-16
trusted ports 36-5, 36-31 verify information about 37-20, 38-21
verify information about 6-10 actions
802.1Q ports combined with conditions 36-9, 36-11
trusted 36-30 creating policy actions 36-36
802.1X 41-1, 43-13 for ACLs 37-10
accounting 41-7 Address Resolution Protocol
and DHCP 41-6 see ARP
components 41-5 advertisements 26-6
defaults 41-2 destination address 26-9
port authorization 41-9 IP address preference 26-10
port parameters 41-9, 43-25 lifetime 26-10
port timeouts 41-9 transmission interval 26-9
re-authentication 41-6, 41-10 Alcatel Mapping Adjacency Protocol 20-1, 33-1
specifications 40-3, 41-2, 43-3 alerts 55-8
802.1x command 41-2 AMAP
802.1x initialize command 41-11 see Alcatel Mapping Adjacency Protocol
802.1x re-authenticate command 41-11 amap common time command 20-6
802.3ad amap disable command 20-5
see dynamic link aggregation amap discovery time command 20-5
amap enable command 20-5
A Application example
aaa accounting 802.1x command 41-11 Learned Port Security Configuration 48-3
aaa accounting vlan command 44-32, 44-35 application example
aaa ace-server clear command 42-8 Ethernet OAM 51-8
aaa authentication 802.1x command 41-8 MST 7-14
and 802.1X port behavior 41-6 MSTI 7-16
VLAN Stacking 21-2, 21-42
M O
MAC address table 3-1, 3-5
OSPF 25-4
aging time 3-9
defaults 24-3, 27-3
duplicate MAC addresses 3-5
graceful restart on switches 53-15
learned MAC addresses 3-5
loading software 27-16
static MAC addresses 3-5
specifications 24-2, 27-2
MAC address VLAN rules 45-6
OSPF redistribution policies
MAC addresses
deleting 21-23, 21-25, 23-24, 23-26, 25-16
aging time 3-9, 8-23
dynamic link aggregation 10-16, 10-17, 10-20, 10-24,
12-45 P
learned 3-5 pending configuration 36-61
statically assigned 3-5 pending policies
mac-address-table command 3-5 deleting 36-62
mac-address-table-aging-time command 3-9 testing 36-46
map groups 36-58 Per VLAN DHCP 28-13, 28-36
application 36-71 PIM-SM 34-7
creating 36-59 ping
verifying information 36-60 IP 21-37
master router ping command 21-37
VRRP 31-7 policies
MLD Zapping 34-36 application examples 36-64
mobile port properties 5-16 applied 36-61
authentication 5-17 built-in 36-14
BPDU ignore 5-11 conditions 36-35
default VLAN membership 5-12 creating policy actions 36-36
restore default VLAN 5-12 how the switch uses them 36-4
mobile ports 5-11 Policy Based Routing 36-72
application examples 5-3, 5-6, 5-8 precedence 36-39, 37-6
authentication 4-11 redirect linkagg 36-69