E680 User Guide V7.4.9 EN
E680 User Guide V7.4.9 EN
E680 User Guide V7.4.9 EN
User Guide
Issue V7.4.9
Date 2024-02-06
Copyright © Suzhou Centec Communications Co., Ltd. All rights reserved.
No part of this document may be reproduced in any form or by any means without prior written
permission of Suzhou Centec Communications Co., Ltd.
The Centec trademarks, service marks ("Marks") and other Centec trademarks are the property of
Suzhou Centec Communications Co., Ltd.. Centec Switch Series and Chips Series products of marks
are trademarks or registered trademarks of Suzhou Centec Communications Co., Ltd. You are not
permitted to use these Marks without the prior written consent of Centec.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Centec and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Telephone 86-512-62885358
Fax 86-512-62885870
Website http://www.centec.com
Email support@centec.com
Table of Contents
Table of Contents
1 Preface .............................................................................................17
1.1 Declaration ..................................................................................... 17
1.2 Suggestion feedback .......................................................................... 17
1.3 Audience ........................................................................................ 17
2 Basic Configuration Guide ......................................................................18
2.1 ConfiguringSystem Management ............................................................ 18
2.1.1 Overview .................................................................................................. 18
2.1.2 Configuration Examples ................................................................................ 18
2.2 ConfiguringUser Management ............................................................... 20
2.2.1 Overview .................................................................................................. 20
2.2.2 Configuration Examples ................................................................................ 21
2.3 ConfiguringFTP ................................................................................ 23
2.3.1 Overview .................................................................................................. 23
2.3.2 Configurations ........................................................................................... 23
2.3.3 Configuration Examples ................................................................................ 24
2.4 ConfiguringFTP Server ........................................................................ 25
2.4.1 Overview .................................................................................................. 25
2.4.2 Configuration Examples ................................................................................ 25
2.5 ConfiguringTFTP ............................................................................... 26
2.5.1 Overview .................................................................................................. 26
2.5.2 Configuration Examples ................................................................................ 27
2.6 ConfiguringSCP ................................................................................ 28
2.6.1 Overview .................................................................................................. 28
2.6.2 Configuration Examples ................................................................................ 28
2.7 ConfiguringTelnet ............................................................................. 29
2.7.1 Overview .................................................................................................. 29
2.7.2 Configuration Examples ................................................................................ 29
2.8 ConfiguringSSH ................................................................................ 30
2.8.1 Overview .................................................................................................. 30
2.8.2 Configuration Examples ................................................................................ 30
2.9 ConfiguringTime & Timezone................................................................ 32
2.9.1 Overview .................................................................................................. 32
2.9.2 Configuration Examples ................................................................................ 32
2.10 ConfiguringLicense .......................................................................... 33
2.10.1 Overview ................................................................................................ 33
List of Tables
Table 2-1 FTP Commands .......................................................................... 24
Table 9-1 Terminology ............................................................................ 381
Table 9-2 Default Configuration ................................................................ 382
Revision History
Date Version Description
2021-04-25 R0.1 Internal release
2021-10-10 R1.0 Initial release
2022-03-07 R1.1 Update document for new product version
2022-06-30 R1.2 Update document for new product version
2022-11-01 V7.4.4 Product version update. For product version V7.4.4
2022-12-16 V7.4.5 Product version update. For product version V7.4.5
2023-04-07 V7.4.6 Product version update. For product version V7.4.6
2023-08-10 V7.4.7 Product version update. For product version V7.4.7
2023-11-08 V7.4.8 Product version update. For product version V7.4.8
2024-02-06 V7.4.9 Product version update. For product version V7.4.9
1 Preface
1.1 Declaration
This document updates at irregular intervals because of product upgrade or other
reason.
Email: support@centec.com
1.3 Audience
This document is for the following audiences:
User can create a notification (one line or multiple lines) to display on all
connected terminals. In the following example, the delimiting character is #. All
characters between two delimiting characters will display on the terminals when
user connect the device.
The message length is at most 99 lines with 1023 character in each line.
User can create a notification (one line or multiple lines) to display on all
connected terminals. “Login mode” is required for displaying this message. Please
reference the section of “Configuring User Management”.
All characters between two delimiting characters will display on the terminals
when user connect the device.
The message length is at most 99 lines with 1023 character in each line.
User can create a notification (one line or multiple lines) to display on all
connected terminals.
In the following example, the delimiting character is #. All characters between two
delimiting characters will display on the terminals when user enter the EXEC mode.
The message length is at most 99 lines with 1023 character in each line.
1. Configuration steps
Switch# configure terminal
Switch(config)# banner motd # This is a switch of IT DEPARTMENT !!! #
Switch(config)# exit
2. Configuration files
switch# show running
banner motd ^C
This is a switch of IT DEPARTMENT !!!
^C
In “no login” mode, anyone can load the switch without authentication.
In “login” mode, there is only one default user.
In “login local” mode, if you want to load the switch you need to have a user
account. Local user authentication uses local user accounts and passwords that
you create to validate the login attempts of local users. Each switch has a
maximum of 32 local user accounts. Before you can enable local user
authentication, you must define at least one local user account. You can set up
local user accounts by creating a unique username and password combination
for each local user. Each username must be fewer than 32 characters. You can
configure each local user account with a privilege level; the valid privilege
levels are 1 or 4. Once a local user is logged in, only the commands those are
available for that privilege level can be displayed.
There is only one user can enter the configure mode at the same time.
After the above setting, login the switch will need a username and password, and
user can login with the username and password created before. This is a sample
output of the login prompt.
Username:
Username: testname
Password:
Authentication succeed:
Password:
Switch#
After the above setting, login the switch will need the line password, and user can
login with the password created before. This is a sample output of the login prompt.
Password:
Step 1 Power on the system. Boot loader will start to run. The follow information will be
printed on Console.
CPU: MPC8247 (HiP7 Rev 14, Mask 1.0 1K50M) at 350 MHz
Board: 8247 (PCI Agent Mode)
I2C: ready
DRAM: 256 MB
In: serial
Out: serial
Err: serial
Net: FCC1 ETHERNET, FCC2 ETHERNET [PRIME]
Press ctrl+b to stop autoboot: 3
Step 2 Press ctrl+b. stop autoboot.
Bootrom#
Step 3 Under boot loader interface, use the following instructions.
Bootrom# boot_flash_nopass
Bootrom# Do you want to revert to the default config file ? [Y|N|E]:
2.3 ConfiguringFTP
2.3.1 Overview
Brief Introduction
You can download a switch configuration file from an FTP server or upload the file
from the switch to an FTP server. You download a switch configuration file from a
server to upgrade the switch configuration. You can overwrite the current startup
configuration file with the new one. You upload a switch configuration file to a
server for backup purposes. You can use this uploaded configuration for future
downloads to the switch or another switch of the same type.
Principle Description
N/A
2.3.2 Configurations
Predecessor Task
You can copy configurations files to or from an FTP server. The FTP protocol
requires a client to send a remote username and password on each FTP request to a
server.
Ensure that the switch has a route to the FTP server. The switch and the FTP
server must be in the same network if you do not have a router to route traffic
between subnets. Check connectivity to the FTP server by using the ping
command.
If you are accessing the switch through the console or a Telnet session and you
do not have a valid username, make sure that the current FTP username is the
one that you want to use for the FTP download.
When you upload a configuration file to the FTP server, it must be properly
configured to accept the write request from the user on the switch.
For more information, see the documentation for your FTP server.
Command Description
ftp> ls List all files in the user directory
ftp> put 1.txt Upload file 1.txt in current directory to
ftp server
ftp> get 1.txt Download file 1.txt from ftp server to
current directory
ftp> delete 1.txt Delete file 1.txt in ftp server ( have
read and write server permissions)
Step 2 Connect to IPv4 FTP server
DUT1# ftp mgmt-if 10.10.25.33
Step 3 Connect to IPv6 FTP server
DUT1# ftp mgmt-if 1000:1001::81
Ensure that the switch has a route to the FTP server. The switch and the FTP
server must be in the same network if you do not have a router to route traffic
between subnets. Check connectivity to the FTP server by using the ping
command.
If you are accessing the switch through the console or a Telnet session and you
do not have a valid username, make sure that the current FTP username is the
one that you want to use for the FTP download.
When you upload a configuration file to the FTP server, it must be properly
configured to accept the write request from the user on the switch.
For more information, see the documentation for your FTP server.
Clent connect to FTP server, enter the username and password。The IP address of
server management interface is 10.10.10.10
2.5 ConfiguringTFTP
2.5.1 Overview
Brief Introduction
You can download a switch configuration file from a TFTP server or upload the file
from the switch to a TFTP server. You download a switch configuration file from a
server to upgrade the switch configuration. You can overwrite the current file with
the new one. You upload a switch configuration file to a server for backup purposes;
this uploaded file can be used for future downloads to the same or another switch
of the same type.
Ensure that the workstation acting as the TFTP server is properly configured.
Ensure that the switch has a route to the TFTP server. The switch and the TFTP
server must be in the same network if you do not have a router to route traffic
between subnets. Check connectivity to the TFTP server by using the ping
command.
For download operations, ensure that the permissions on the file are set correctly.
During upload operations, if you are overwriting an existing file (including an empty
file, if you had to create one) on the server, ensure that the permissions on the file
are set correctly.
2.6 ConfiguringSCP
2.6.1 Overview
Brief Introduction
SCP,which is short for secure copy, is a part of SSH protocol. It is a remote copy
technology which is based on SSH protocol. User can download a switch
configuration file from a SCP server or upload the file from the switch to a SCP
server. User can download a switch configuration file from a server to upgrade the
switch configuration and overwrite the current file with the new one. User can
upload a switch configuration file to a server for backup purposes; this uploaded
file can be used for future downloads to the same or another switch of the same
type.
Ensure that the workstation acting as the SCP server is properly configured.
Ensure that the switch has a route to the SCP server. The switch and the SCP server
must be in the same network if you do not have a router to route traffic between
subnets. Check connectivity to the SCP server by using the ping command.
For download operations, ensure that the permissions on the file are set correctly.
During upload operations, if you are overwriting an existing file (including an empty
file, if you had to create one) on the server, ensure that the permissions on the file
are set correctly.
2.7 ConfiguringTelnet
2.7.1 Overview
Brief Introduction
Telnet is a network protocol used on the Internet or local area networks to provide
a bidirectional interactive text-oriented communications facility using a virtual
terminal connection. User data is interspersed in-band with Telnet control
information in an 8-bit byte oriented data connection over the Transmission Control
Protocol (TCP). Telnet was developed in 1969 beginning with RFC 15, extended in
RFC 854, and standardized as Internet Engineering Task Force (IETF) Internet
Standard STD 8, one of the first Internet standards. Historically, Telnet provided
access to a command-line interface (usually, of an operating system) on a remote
host. Most network equipment and operating systems with a TCP/IP stack support a
Telnet service for remote configuration (including systems based on Windows NT).
Because of security issues with Telnet, its use for this purpose has waned in favor of
SSH.
2.8 ConfiguringSSH
2.8.1 Overview
Brief Introduction
The Secure Shell (SSH) is a protocol that provides a secure, remote connection to a
device. SSH provides more security for remote connections than Telnet does by
providing strong encryption when a device is authenticated. SSH supports the Data
Encryption Standard (DES) encryption algorithm, the Triple DES (3DES) encryption
algorithm, and password-based user authentication. The SSH feature has an SSH
server and an SSH integrated client, which are applications that run on the switch.
You can use an SSH client to connect to a switch running the SSH server. The SSH
server works with the SSH client supported in this release and with SSH clients. The
SSH client also works with the SSH server supported in this release and with SSH
servers.
Use the following command to display the information of time and date:
2.10 ConfiguringLicense
2.10.1 Overview
Brief Introduction
License will control the features on the switch; each switch has its own license to
avoid the unauthorized user to use the advanced features. There are totally three
kinds of licenses: Enterprise Base, Metro Service, and Metro Advanced. Different
license will contain different features. Customer can apply different license to
satisfy different requirement. If switch has no license, it can only provide L2
features. Different switch can’t share the same license. In order to get the license
for the specify switch, first generate the unique device identifier(UDI) for the
switch and then send the UDI to vendor to apply the license, at last get the license
from vendor and use the license on the switch.
Send UDI file to vendor, vendor will generate license for customer requirement.
Get the license to local from remote FTP server, and reload the system.
You must reload the switch for the license to take effect.
If the switch has more than one license, all the features contain by the licenses can
take effect
Step 4 Validation
The service currently supports JSON-RPC over HTTP protocol together with HTTP
Basic authentication.
Principle Description
RPC API service uses standard JSON-RPC over HTTP protocol to communicate the
switch and your program. User may issue switch CLI commands through JSON-RPC
method: ‘executeCmds’. By default, the CLI mode is in privileged EXEC mode (#).
User could send JSON-RPC request via an HTTP POST request to URL:
http://:/command-api. The detailed JSON-RPC request and response are show
below:
1. JSON-RPC Request
{
"params":[ Parameters for command
{
"format":"text", Expected response format,
can be ‘text’ or ‘json’,
the default format is ‘text’
"version":1, The API version
"cmds":[ List of CLI commands
"show run", CLI command 1
"config t", CLI command 2
"vlan database", CLI command 3
"vlan 1-8", CLI command 4
"interface eth-0-1", CLI command 5
"switchport mode trunk", CLI command 6
2. JSON-RPC Response
{
"jsonrpc":"2.0", JSON RPC protocol version.
Always 2.0.
"id":"70853aff-af77-420e-8f3c-fa9430733a19", JSON RPC unique identifier
"result":[ Result list of objects
from each CLI command executed.
{
"sourceDetails":"version 5.1.6.fcs\n!\n …", Output information of CLI
Command 1.
The Original ASCII output
information returned from CLI command if this command is successfully executed.
"errorCode":-1003, Error code if it is
available.
"errorDesc":"unsupported command…", Error description if it is
available.
"warnings":"% Invalid…", Warnings if it is
available.
Formatted JSON object will
also be returned if it is available.
},
{ }, Output information of CLI
Command 2.
{ }, Output information of CLI
Command 3.
{ }, Output information of CLI
Command 4.
{ }, Output information of CLI
Command 5.
{ }, Output information of CLI
Command 6.
{ }, Output information of CLI
Command 7.
{ }, Output information of CLI
Command 8.
{ }, Output information of CLI
Command 9.
{
"sourceDetails":" Interface name : eth-0-1\n Switchport
mode : trunk\n …\n"
} Output information of CLI
Command 10.
]
}
import pyjsonrpc
import json
http_client = pyjsonrpc.HttpClient(
url = "http://10.10.39.64:80/command-api",
username = "username",
password = "password"
)
cmds = {}
cmd_list = ["show run", "config t", "vlan database", "vlan 1-8", "interface eth-0-
1", "switchport mode trunk", "switchport trunk allowed vlan add 2", "shutdown",
"end", "show interface switchport"]
cmds['cmds'] = cmd_list
cmds['format'] = 'text'
cmds['version'] = 1
try:
response = http_client.call("executeCmds", cmds)
print("json response:");
json_result = json.dumps(response, indent=4)
print(json_result)
except Exception, e:
if e.code == 401:
print "Unauthorized user"
else:
print e.message
print e.data
4. Error code
Here is a list of JSON-RPC 2.0 error code:
Currently, only HTTP Basic authentication is supported. User will receive status
code: 401 (Unauthorized access) if user provides invalid user name or password.
HTTP authentication settings of RPC API service will take effect after you
restart this service or reboot the system.
2.12 ConfiguringHTTP
2.12.1 Overview
Brief Introduction
This chapter describes how to configure the switch to start the Web management
function.
Use this step to specify the source address of WEB http server, only loopback
address is supported. If the source address of WEB http server is specified, it will
be the only address to access the WEB. If the source address of WEB http server is
not specified, user can access the WEB via the same address as telnet. The route
between the device and the client is necessary.
2.13 ConfiguringDiagnostic
2.13.1 Overview
Brief Introduction
Diag(diagnostistic-information) module is mainly used for system information
collection, status statistics, register viewing, providing information diagonsis for
users. All in all, provide users with detailed and clear information for problem
diagnosis.
Diagnostic-Information Discard:
Drop-Reason Description
------------------------------+------------------------------------
DROP_TTL_CHK TTL check fail
DROP_ACL_DENY Acl deny
DROP_PKT_ERR Packet check error
DROP_ISOLATE_CHK Port isolate check fail
DROP_TRANSIT_DISABLE Transit disable
DROP_IP_CHK Ip address or packet check fail
DROP_VLAN_FILTER Vlan filtering
DROP_STP_CHK Stp check fail
DROP_CHKSUM_ERR Checksum error
DROP_PARSER_ERR Parser error
DROP_TRAFFIC_MANAGER Trafic manager check fail
DROP_NET_RX Netrx check fail
DROP_NET_TX Nettx check fail
Others Other drop reasons
3.1 ConfiguringInterface
3.1.1 Overview
Brief Introduction
Interface status, speed and duplex are configurable.
When the interface is configured as “no shutdown”, it can work normally after
cable is connected. When the interface is configured as “shutdown”, no matter the
cable is connected or not, the interface can not work.
If the device supports combo ports, user can choose to enable copper or fiber mode.
The two modes of one port can not work together at same time. The configuration
of speed or duplex at combo ports cannot be effective when combo port is working
at fiber mode.
The rule of physical port name is as following: interface name format is eth-[slot]-
[port]; [slot] is 0 for single pizza-box switch; when stacking is enabled, the [slot]
number is according to the configuration. The [port] number is begin with 1, and
increase from up to down, from left to right. The following figure shows the
interface name of the device:
To get more information about the interface type and number, please
reference to the product spec.
full mode: the interface can transmit and receive packets at same time.
half mode: the interface can transmit or receive packets at same time.
auto mode: the interface should negotiate with the other side to decide the
duplex mode.
User can choose proper duplex mode according to the network state.
Use the following command to display the brief status of the interfaces:
Use the following command to display the brief status of the interfaces:
Use the following command to display the status of the layer3 sub-interface:
The flap of interface link state is a potential error caused by hardware or line
problem. The administrator can also configure the detection conditions of interface
link flap to suppress the flap.
Use the following command to display the configuration of error disable recovery:
Use the following command to display the configuration of error disable flap:
Dynamic address: the source address learnt by the switch and will be aged
after aging time if this address is not hit. We only support IVL learning mode.
Static address: the source address manually added by administrators.
Following is a brief description of terms and concepts used to describe the MAC
address table:
IVL: Independent VLAN Learning: for a given set of VLANs, if a given individual
MAC Address is learned in one VLAN, it can’t be used in forwarding decisions
taken for that address relative to any other VLAN in the given set.
SVL: Shared VLAN Learning: for a given set of VLANs, if an individual MAC
Address is learned in one VLAN, it can be used in forwarding decisions taken
for that address relative to all other VLANs in the given set.
The aging time is not exact time. If aging time set to N, then the dynamic address
will be aged after N~2N interval. The default aging time is 300 seconds.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set dynamic address aging time
Switch(config)# mac-address-table ageing-time 10
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
Unicast address can be only bound to one port. According to the picture, Mac-Da
0000.1234.5678 should forward via eth-0-1.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set static mac address table
Switch(config)# mac-address-table 0000.1234.5678 forward eth-0-1 vlan 1
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set static multicast mac address table
Switch(config)# mac-address-table 0100.0000.0000 forward eth-0-1 vlan 1
Switch(config)# mac-address-table 0100.0000.0000 forward eth-0-2 vlan 1
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
MAC filter will discard these frames whose source or destination address is set to
discard. The MAC filter has higher priority than MAC address.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Add unicast address to be discarded
Switch(config)# mac-address-table 0000.1234.5678 discard
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
MAC filter will discard these frames whose source or destination address is set to
discard with VLAN matches. The MAC filter has higher priority than MAC address.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create VLAN
Switch(config)# vlan 2
Use the following command to display the mac address filter with special VLAN:
3.5 ConfiguringVLAN
3.5.1 Overview
Brief Introduction
VLAN (Virtual Local Area Network) is a switched network that is logically segmented
the network into different broadcast domain so that packets are only switched
between ports that are designated for the same VLAN. Each VLAN is considered as a
logical network, and packets send to stations that do not belong to the same VLAN
must be forwarded through a router.
Principle Description
Following is a brief description of terms and concepts used to describe the VLAN:
Tagged Frame: Tagged Frame is inserted with 4 Bytes VLAN Tag, show in the picture
below:
Trunk Link: Both tagged and untagged frames can be transmitted on this link. Trunk
link allow for multiple VLANs to cross this link, show in the picture below:
Access Link: Only untagged frames can be transmitted on this link. Access link is at
the edge of the network, where end stations attach, show in the picture below:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Use the following command to display the information of the switch port interface:
1. Topology
Network topology is shown in the picture above. The following configuration steps
are same for Switch1 and Switch2.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 10,20
Switch(config-vlan)# exit
Step 3 Enter the interface configure mode, set the switch port mode and bind to the vlan
Set eth-0-1’s switch port mode as trunk, set native vlan as 10, and allow all VLANs
on this interface:
Set eth-0-2’s switch port mode as access, and bind to vlan 10:
Use the following command to display the information of the switch port interface:
The traditional method to improve the quality of voice traffic is using ACL to
separate the voice packets, and using QoS to ensure the transmit quality.
The voice VLAN feature can identify the voice packets by source mac, which makes
the conguration more convenient.
Send packet to eth-0-1, the format of the packet is as below(priority in Vlan tag is
0):
0x0000: 0000 0a02 0001 0055 0000 0011 8100 0002 ........k.......
0x0010: 0800 aadd aadd aadd aadd aadd aadd aadd ................
0x0020: aadd aadd aadd aadd aadd aadd aadd aadd ................
0x0030: aadd aadd aadd aadd aadd aadd ............
Receive packet from eth-0-2, the format of the packet received is as below
(priority in Vlan tag is 5)
:.
0x0000: 0000 0a02 0001 0055 0000 0011 8100 a002 ........k.......
0x0010: 0800 aadd aadd aadd aadd aadd aadd aadd ................
0x0020: aadd aadd aadd aadd aadd aadd aadd aadd ................
0x0030: aadd aadd aadd aadd aadd aadd ............
VLAN classification rules have 3 types: mac based, ip based and protocol based.
MAC based vlan classification rule will classify packets to specified VLAN according
to the source MAC address of incoming packets; IP based vlan classification rule will
classify packets according to the source IP address of incoming packets; And
protocol based vlan classification rule will classify packets according to the layer3
type of incoming packets. The following layer3 types can be supported: ARP, IP(v4),
MPLS, Mcast MPLS, PPPoE, RARP.
Different types of vlan classification rules can be added to same vlan classification
group. VLAN classification group can only be applied on switchport. Only one type
of vlan classification rules can take effect on one switchport.
Rule 1 is mac based rule, it will classify the packets with MACSA 2222.2222.2222 to
vlan 5;
Rule 2 is ip based rule, it will classify the packets sourced from IP adress 1.1.1.1/24
to vlan 5;
Rule 3 is protocol based rule, it will classify all arp packets to vlan 5.
Add rule 1, rule2, rule3 to group 31. Then apply group 31 to 3 interfaces: eth-0-1,
eth-0-2, eth-0-3. These 3 interfaces have different vlan classification type. eth-0-1
is configured to ip based vlan class, this means only ip based rules can take effect
on this interface. eth-0-2 is configured to mac based vlan class, this means only
mac based rules can take effect on this interface. eth-0-3 is configured to protocol
based vlan class, this means only protocol based rules can take effect on this
interface.
2. Configuration Steps
Step 1 Enter the configure mode
interface eth-0-1:
interface eth-0-2:
interface eth-0-3:
interface eth-0-6:
on the 4096 numbers VLAN, if the clients are permitted to use their respective
VLAN ID by their own manner.
Using 802.1Q tunneling, the client’s VLAN tag is encapsulated in the public VLAN
tag and packets with two tags will traverse on backbone network. The client’s
VLAN tag will be shield and only the public VLAN tag will be used to transmit. By
separating data stream, the client’s VLAN tag is transmitted transparently and
different VLAN tags can be used repeatedly. Therefore, using 802.1Q tunneling
expands the available VLAN tags. Two types of 802.1q tunneling are supported:
basic 802.1Q tunneling and selective 802.1Q tunneling. Basic 802.1Q tunneling is
founded on tagging on ports and all dates will be encapsulated a common VLAN tag
of the same port, so this type has great limitations in practical applications. While
selective 802.1Q tunneling can separate data stream and encapsulate different
VLAN tags base on different data.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Use the following command to display the information of the switch port interface:
Use the following command to display the information of the vlan mapping table:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the switch port mode
Switch(config)# interface eth-0-1
Switch(config-if)# no shutdown
Switch(config-if)# switchport mode dot1q-tunnel
Step 3 Exit the configure mode
Switch(config-if)# end
Step 4 Validation
This example shows how to configure a switchport to basic dot1q-tunnel port. You
can use show the configuration on the switchport:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
eth-0-1:
eth-0-2:
Use the following command to display the information of the vlan mapping table:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 2,3,10,20,30
Switch(config-vlan)# exit
Step 3 Create evc and set dot1q mapped vlan
Switch(config)# ethernet evc evc_c1
Switch(config-evc)# dot1q mapped-vlan 2
Switch(config-evc)# exit
Switch(config)# ethernet evc evc_c2
Switch(config-evc)# dot1q mapped-vlan 3
Switch(config-evc)# exit
Switch(config)# ethernet evc evc_c3
Switch(config-evc)# dot1q mapped-double-vlan 10 20
Switch(config-evc)# exit
Switch(config)# ethernet evc evc_c4
Switch(config-evc)# dot1q mapped-vlan 30
Switch(config-evc)# exit
Step 4 Create vlan mapping table and bind the vlan and evc
Switch(config)# vlan mapping table vm
Switch(config-vlan-mapping)# raw-vlan 10 evc evc_c1
Switch(config-vlan-mapping)# raw-vlan 30-40 evc evc_c2
Switch(config-vlan-mapping)# raw-vlan untagged evc evc_c3
Switch(config-vlan-mapping)# raw-vlan out-of-range evc evc_c4
Switch(config-vlan-mapping)# raw-vlan 10 20 egress-vlan untag
Switch(config-vlan-mapping)# exit
Step 5 Enable vlan translation on the interface and apply the vlan mapping table
eth-0-1:
eth-0-2:
Use the following command to display the information of the vlan mapping table:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the global attributes of LACP
Switch1 configuration:
Switch2 configuration:
Switch(config-if)# no shutdown
Switch(config-if)# exit
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Use the following command to display the information of the interface agg:
Configure channel-group
1. Topology
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the global attributes of LACP
Set the system priority of this switch. This priority is used for determining the
system that is responsible for resolving conflicts in the choice of aggregation groups.
A lower numerical value has a higher priority.Set the load balance mode. In this
case we choose source MAC address for load balance.
Switch1 configuration:
Switch2 configuration:
Use the following command to display the information of the interface agg:
Configuring Static-channel-group
1. Topology
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and add the interface to the channel group
Switch(config)# interface eth-0-1
Switch(config-if)# no shutdown
Switch(config-if)# static-channel-group 1
Switch(config-if)# exit
Switch(config)# interface eth-0-2
Switch(config-if)# static-channel-group 1
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-3
Switch(config-if)# static-channel-group 1
Switch(config-if)# no shutdown
Switch(config-if)# exit
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
Use the following command to display the information of the interface agg:
Use the following command to display the information of flow control on specified
interface:
Use the following command to display the information of flow control on specified
interface:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, and set the storm control level
User can set different level for Unknown unicast/multicast/broad cast packets:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, and set the storm control pps
User can set different pps for Unknown unicast/multicast/broad cast packets:
Loopback Detection can detects whether the interface of device exists loopback.
When enable loopback detection on a interface, device will send detection packets
from this interface by periodically. If the device receives detection packets sent
from the interface, this interface is considered that there is a loop existed and the
device can send alarm information to network management system. Administraitors
discover loopback problem througt alarm information and resolve the problem to
avoid longtime network abnormal. In addition, the device can control the specific
interface and configured Trap according the requirement, and disable the interface
to quickly reduce the impact in the network of loopback to the minimum.
The device send the lopback detection packets time interval range is 1 to 300
seconds.The loopback status recover period default is 3 times of the interface send
interval.
Use the following command to display the packet interval of Loopback Detect:
Switch(config)# end
Step 4 Validation
Use the following command to display the information of Loopback Detect on the
interface:
When Layer 2 protocol tunneling is enabled, edge switches on the inbound side of
the service-provider infrastructure encapsulate Layer 2 protocol packets with a
new Layer 2 header and send them across the service-provider network. Core
switches in the network do not process these packets but forward them as normal
packets. Layer 2 protocol packets pass the service-provider infrastructure and
reach customer switches on the outbound side of the service-provider network. The
new Layer 2 header will be stripped when the Layer 2 protocol packets are sent to
customer switches. Layer 2 protocol tunneling can be used independently or can
enhance 802.1Q tunneling.
The designed Layer2 protocol packets include STP BPDU, LACP slow proto, DOT1X
EAPOL, CFM.
In this example, one link is between Switch1 and Switch2. Switch1 eth-0-1 and
Switch2 eth-0-1 are configured tunnel port. Switch1 eth-0-2 and Switch2 eth-0-2
are configured uplink port. If protocol packets are received on port eth-0-1 of
Switch1, packets should be added new Layer 2 header and sent out from uplink
port. The new Layer 2 header will be as follows: MAC da should be tunnel dmac;
MAC sa should be switch route-mac; VLAN ID should be tunnel vid; VLAN priority
(cos) should be Layer 2 Protocol cos; Ethertype should be 0xFFEE. When the
packets with new Layer 2 header are received on port eth-0-2 of Switch2, new
Layer 2 header will be stripped and the packets will be sent to port eth-0-1 of
Switch2.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 2-4
Switch(config-vlan)# exit
Step 3 Create evc and set dot1q mapped vlan
Switch(config)# ethernet evc evc_c1
Switch(config-evc)# dot1q mapped-vlan 2
Switch(config-evc)# exit
Step 4 Enable l2 protocol,set the tunnel destination mac and add l2 protocao mac
address
Switch(config)# l2protocol enable
Switch(config)# l2protocol tunnel-dmac 0100.0CCD.CDD2
Switch(config)# l2protocol mac 3 0180.C200.0008
Switch(config)# l2protocol mac 4 0180.C200.0009
Switch(config)# l2protocol full-mac 0100.0CCC.CCCC
Step 5 Enter the interface configure mode and set the attributes of the interfaces. Bind
the l2 protocol mac and the evc
Switch(config)# interface eth-0-1
Switch(config-if)# no shutdown
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 2-4
Switch(config-if)# spanning-tree port disable
Switch(config-if)# l2protocol mac 3 tunnel evc evc_c1
Switch(config-if)# l2protocol mac 4 tunnel evc evc_c2
Switch(config-if)# l2protocol full-mac tunnel evc evc_c3
Switch(config)# interface eth-0-2
Switch(config-if)# no shutdown
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 2-4
Switch(config-if)# l2protocol uplink enable
Step 6 Exit the configure mode
Switch(config-if)# end
Step 7 Validation
Use the following command to display the information of tunnel destination mac:
3.14 ConfiguringMSTP
3.14.1 Overview
Brief Introduction
The MSTP (Multiple Spanning Tree Algorithm and Protocol (IEEE 802.1Q-2005))
enables multiple VLANs to be mapped to the same spanning-tree instance, thereby
reducing the number of spanning-tree instances needed to support a large number
of VLANs. The MSTP provides for multiple forwarding paths for data traffic and
enables load balancing. It improves the fault tolerance of the network because a
failure in one instance (forwarding path) does not affect other instances
(forwarding paths). The most common initial deployment of MSTP is in the
backbone and distribution layers of a Layer 2 switched network; this deployment
provides the highly-available network required in a service-provider environment.
When the switch is in the multiple spanning-tree (MST) modes, the Rapid Spanning
Tree Protocol (RSTP), which is based on IEEE 802.1w, is automatically enabled. The
RSTP provides rapid convergence of the spanning tree through explicit handshaking
that eliminates the IEEE 802.1D forwarding delay and quickly transitions root ports
and designated ports to the forwarding state.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the mode of STP
Switch(config)# spanning-tree mode mstp
Step 3 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 10
Switch(config-vlan)# vlan 20
Switch(config-vlan)# exit
Step 4 Enter the MSTP configure mode,create region and instance. Bind the vlan to the
instance.
Switch(config)# spanning-tree mst configuration
Switch(config-mst)# region RegionName
Switch(config-mst)# instance 1 vlan 10
Switch(config-mst)# instance 2 vlan 20
Switch(config-mst)# exit
Step 5 Enter the interface configure mode, set the attributes of the interfaces
Switch(config)# interface eth-0-9
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan all
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch1:
Switch2:
Switch3:
Switch4:
Address 304c.275b.b200
Bridge ID Priority 32770 (0x8002)
Address 2225.fa28.c900
Interface Role State Cost Priority.Number Type
--------------------------------------------------------------------------------
eth-0-9 Alternate Discarding 20000 128.9 P2p
eth-0-10 Alternate Discarding 20000 128.10 P2p
eth-0-17 Rootport Forwarding 20000 128.17 P2p
eth-0-18 Alternate Discarding 20000 128.18 P2p
Address 9c9a.7d91.9f00
Bridge ID Priority 32769 (0x8001)
Address 80a4.be55.6400
Interface Role State Cost Priority.Number Type
--------------------------------------------------------------------------------
eth-0-9 Alternate Discarding 20000 128.9 P2p
eth-0-10 Alternate Discarding 20000 128.10 P2p
eth-0-17 Rootport Forwarding 20000 128.17 P2p
eth-0-18 Alternate Discarding 20000 128.18 P2p
##### MST2: Vlans: 20
Root ID Priority 2 (0x0002)
Address 304c.275b.b200
Bridge ID Priority 32770 (0x8002)
Address 80a4.be55.6400
Interface Role State Cost Priority.Number Type
--------------------------------------------------------------------------------
eth-0-9 Rootport Forwarding 20000 128.9 P2p
eth-0-10 Alternate Discarding 20000 128.10 P2p
eth-0-17 Designated Forwarding 20000 128.17 P2p
eth-0-18 Designated Forwarding 20000 128.18 P2p
3.15 ConfiguringMLAG
3.15.1 Overview
Brief Introduction
In the network topology of high availability data center, typically TOR switch or
server connects to two aggregative switches in order to provide redundancy
protection and load sharing. In this situation, Spanning Tree Protocol (STP) can
prevent frame loops by blocking half of ports on aggregative switches; however, it
will reduce usage of network bandwidth in half; although using MSTP can improve
bandwidth utilization to a certain extent, it increases the complexity of the
network and is not conducive to operation and problem location.
Using MLAG (Multi-Chassis Link Aggregation) can solve this problem. MLAG is a
virtualization technology that presents two different switches as a unique node to
establish aggregation-link with the same terminal or device. Between two switches,
there is one peer-link that is connected to make the two switches look like one
device logically. Ports on these two devices generate aggregative ports to make all
ports can participate with forwarding data traffic. Thus MLAG brings the reliability
from the link level to the device level by forming an Active-Active system.
Background
Compared with stacking, although MLAG devices still need to be managed
separately; MLAG device is simple enough to take lower risk of split-brain. Known
unicast traffic forwarding chooses local agg port other than MLAG peer’s to prevent
too much traffic accross the peer-linkto avoid the bandwidth lack of the conection
and lower network latency.
Principle Description
1. Basic principle
Terminology
The figure above is the diagram that shows MLAG network. In the diagram, the
MLAG domain contains two switches; the device which connects with can be a
server or a switch, or another MLAG domain. Switch A and Switch B each has two
ports that join into different MLAG groups; relevant terminologies are shown in the
following:
MLAG: Multi-Chassis Link Aggregation; two devices forms into a MLAG called
MLAG Peer
MLAG group: interfaces that join the same MLAG group, will be seen as the
same aggregation port by external device
Orphan Port: is the interfaces that are not join into MLAG group on MLAG
devices
Peer-link: used for interconnecting two devices which forms into a MLAG;
while port from one side of MLAG group has failure, the traffic will pass
through peer-link to forward by the MLAG Peer device.
Peer-address: communication address of the MLAG protocol on the MLAG Peer
device
Reload-delay: after restarting the device, non-peer-link port will set to
errdisable status for a period to prevent network looping before MLAG
neighbors established; when this timer timeout, these ports will be in admin
up status automatically (this timer is configurable).
System ID: default is the Route-MAC address of the device. System ID is used
for MLAG master and slave role election. (It is different from LACP system-id).
As shown in Figure above, the following explains the process of establishing MLAG
and its principle of forwarding:
For known unicast traffic, it will check the local MAC address table to conduct
forwarding since two sides both having MAC address tables. The green lines in
the figure show the traffic entering from Switch A, looking up Switch A’s mac
address table and forwarding; the traffic entering into Switch B is not shown in
the figure, it has the same forwarding principles as Switch A.
For unknown unicast or broadcast traffic will need to flood, like it shows in
blue line; it will pass through PEER-LINK to flood into MLAG PEER device,
Switch B will see that MLAG 1 and 2 all have UP status member on Switch A
according to MLAG protocol. Therefore, Switch B will discard this part of
traffic to prevent flow loopback and double flow problems.
When all ports within one MLAG group are losing efficacy on Switch A,
conducting update operations for MAC table, leading data traffic to peer link
Data traffic will reach to Switch B from peer link to continue lookup MAC table;
and forwarding from its corresponding MLAG group from Switch B
When MLAG port which lose efficacy restores again on Switch A, system will
operate switch back
This switching only affects the traffic on the expired interface, and will not
affect other traffic; in the figure, it will only influence the traffic to MLAG 1
on Switch A, the traffic to MLAG2 will forward normally.
When Switch A finds that local MLAG 1 interface is expired, it will notify Switch
B by MLAG protocol; Switch B will not discard traffics to MLAG 1 anymore after
it receiving messages from Switch A.
When MLAG port restore again from expired status, Switch A will notify Switch
B using MLAG protocol; Switch B will discard traffics to MLAG 1 again.
When Peer link disconnect and the hold time is timed out, MLAG device will be
divided into two single switches.
If Device 1 and Device 2 are using LACP aggregative connection with MLAG
device, when Peer link expired and MLAG divides, Switch A and Switch B will
use different ID independently. Hence, there is only one link path is active, so
there is no risk of looping.
If Device 1 and Device 2 are connecting with MLAG device using static link
aggregation, the two links are still in active; since members cannot forward
traffic within the same aggregative group, it will not cause looping.
2. Surrounding Features
LACP messages that are sent by two MLAG devices on MLAG interface has the
same Actor System Priority and Actor System ID
LACP messages that are sent by two MLAG devices on MLAG interface has the
same Actor Key
MLAG device use the same LACP System id as the master. (LACP System id includes
LACP System Priority and LACP System MAC). Master device should synchronize the
LACP System id with the slave device.
MLAG slave device should use the LACP System MAC after MLAG established. If the
MLAG master goes down or reboot, the MLAG session is down and the slave device
should switch to its own LACP System MAC,this event will lead LACP protocol
negotiate again and LACP link changes from up to down, then up again after
negotiation succeed. To enhance the reliability in this scene, our device provides a
command to configure MLAG LACP System MAC. After this command is configured,
all MLAG interfaces can use same LACP system MAC.
LACP System id is conceps of LACP protocol, which are used for indicating a device
in lacp protocol. It is recommend to use LACP mode aggregation to avoid
unidirection link. Static aggregation is used only if the remote device does not
support LACP.
The port in errdisable status is similar to the port being “down” status, it will not
participate in forwarding; it can restore by command “no shutdown”, and using
“show errdisable recovery” to check the status.
Virtual mac needs to setup a mac address that is nonexistent at local; the address
cannot be the same as the route-mac of device or the mac address of interface.
When the bond mode is configured as 0 or 2, the switch needs to configure static
port aggregation, and the aggregated ports are added to the mlag group; it does
not need to setup mlag group for other bond mode.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 10,4094
Switch(config-vlan)# exit
Step 3 Create a static agg
Switch(config)# interface eth-0-1
Switch(config-if)# static-channel-group 1
Switch(config-if)# no shutdown
Switch(config-if)# exit
Step 4 Set the attributes of the peer link interface
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
The valid range of priority is 1-245. The larger number indicates higher priority.
The priority is not configured by default. System uses MAC address to select MLAG
master when there is no priority configured. The device with higher priority will
become mlag master.
NOTE: the priority is configurable since version V7.4.9. If the remote device’s
version is lower than V7.4.9, it is NOT recommended to set the priority, because it
may led mlag negotiation abnormal.
configure SWITCH A
configure SWITCH B
Use the following command to display the information of mac address table on
Switch B
2. Requirement
Use two devices to join the MLAG. Use a dedicated link (eth-0-8) as the DAD(dual-
active-detection) link. If the peer link fail but the keep-alive packets can be
received from the DAD link, the MLAG slave device should set the MLAG port to err-
disable status.
3. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Configure Layer 3 interface and address
configure SWITCH A
configure SWITCH B
Set the local and remote address on both devices. It is suggested to set the DAD
link interface as “reserved interface”, which will never set to err-disable status by
DAD function.
configure SWITCH A
configure SWITCH B
Switch(config-if)# exit
Switch(config)# mlag configuration
Switch(config-mlag)# dual-active-detection source 12.1.2.2 peer 12.1.2.1
Switch(config-mlag)# dual-active-detection reserved interface eth-0-8
Switch(config-mlag)# exit
Step 4 Validation
Use the following command to display the information of mlag DAD on Switch A
Use the following command to display the information of mlag DAD on SwitchB
HB src ip : 12.1.2.1
HB peer ip : 12.1.2.2
HB mac : ea90.aecc.cc00
HB priority : 0
HB role : Slave
DAD occur : No
The peer-link or MLAG agg interface can NOT set the stp path-cost/link-
type/priority
If the interface with stp path-cost/link-type/priority settings change to peer-
link or MLAG interface, the stp path-cost/link-type/priority value will restore
to default and record a log.
e-stp only supports stp/rstp mode, can NOT use mstp.
If e-stp is enabled, it is recommended that two MLAG device use same stp
parameters, otherwise stp may work abnormal.
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the mode of spanning-tree (Optional)
2. Requirement
Host 1 and Host 2 are in the same network section, its dual network interface cards
(NIC) use active-active method to connect into MLAG device, and it needs network
without looping, Host 1 and Host 2 realize Layer 2 interflow. MLAG1 will use
dynamic aggregation link, MLAG 2 will use static aggregation link.
3. Configuration Steps
Note: The channel-group 55 used to interconnect the two switches in the example
configuration can be modified according to different standards of boards, use any
channel-group serial number will not affect the configuration of this example.
Two devices doing MLAG, choose at least two 10G links for interconnection (in the
case of service port 10G)
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
Check MLAG device status, one devices is in Master and another is in Slave state.
remote_syspri: 32768
mlag_syspri : 32768
peer-link : agg55
peer conf : Yes
reload-delay : 300
if you need to add a new VLAN for subsequent service expansion, please
execute clear mac address-table dynamic vlan x on both devices to reset the mac
table entries of the new vlan after completing the configuration of the new vlan
both devices to ensure the synchronization of the mac addresses of the two
devices.With the software version later than V7.4.2, system can clear mac address
automatically, users do not need to process with this step.
MLAG Device as Layer 3 Network ( each VLAN has only one address)
1. Topology
2. Requirement
Host 1 and Host 2 use dual network cards with active-active method to connect to
MLAG device, networking across network section; their gateway is on MLAG device,
requires gateway active-active and it does not use VRRP.
3. Configuration Steps
Note: The channel-group 55 used to interconnect the two switches in the example
configuration can be modified according to different standards of boards, use any
channel-group serial number will not affect the configuration of this example.
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
In a Layer 3 scenario, it is recommended that both the switch service port and the
peer port be set to lacp short timeout mode with the command “lacp timeout
short”.
configure SWITCH A
configure SWITCH B
configure SWITCH A
Switch_A(config-if)# exit
Switch_A(config)# interface vlan 20
Switch_A(config-if)# ip address 192.168.2.253/24
Switch_A(config-if)# ip virtual-router address 192.168.2.1
Switch_A(config-if)# exit
Switch_A(config)# ip virtual-router mac 0000.0000.aaaa
Switch_A(config)# end
configure SWITCH B
Check the status of MLAG neighbor; MLAG will be Established status after
configurations.
Check the status of MLAG device, the two devices will be Master/Slave status.
remote_syspri: 32768
mlag_syspri : 32768
peer-link : agg55
peer conf : Yes
reload-delay : 300
2. Requirement
Host 1 and Host 2 use dual network cards with active-active method to connect to
MLAG device, networking across network section; their network gateway
deployment is on MLAG device, and it has multiple ip addresses on the same vlan
and switch is the network gateway of these networks.
3. Configuration Steps
Note: The channel-group 55 used to interconnect the two switches in the example
configuration can be modified according to different standards of boards, use any
channel-group serial number will not affect the configuration of this example.
configure SWITCH A
configure SWITCH B
configure SWITCH A
Switch_A(config-vlan)# exit
Switch_A(config)# interface vlan 4094
Switch_A(config-if)# ip address 10.10.0.1/30
Switch_A(config-if)# end
configure SWITCH B
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
configure SWITCH A
configure SWITCH B
Check the status of MLAG neighbor, MLAG should be Established after configuring
MLAG.
Check the status of MLAG device, the two devices are in Master/Slave status.
2. Requirement
Host 1 and Host 4 use single network card to connect to MLAG device, Host 2 and
Host 3 use dual network cards with active-active method to connect to MLAG
device, networking across network section; its network gateway deployment is on
MLAG device, requires gateway active-active and it does not use VRRP.
3. Configuration Steps
Note: The channel-group 55 used to interconnect the two switches in the example
configuration can be modified according to different standards of boards, use any
channel-group serial number will not affect the configuration of this example.
configure SWITCH A
configure SWITCH B
configure SWITCH A
Switch_A(config-vlan)# exit
Switch_A(config)# interface vlan 4094
Switch_A(config-if)# ip address 10.10.0.1/30
Switch_A(config-if)# end
configure SWITCH B
configure SWITCH A
configure SWITCH B
configure SWITCH A
Switch_A(config-if)# exit
Switch_A(config)# interface eth-0-22
Switch_A(config-if)# no shutdown
Switch_A(config-if)# lacp timeout short
Switch_A(config-if)# switchport access vlan 20
Switch_A(config-if)# channel-group 2 mode active
Switch_A(config-if)# exit
Switch_A(config)# interface agg 1
Switch_A(config-if)# mlag 1
Switch_A(config-if)# exit
Switch_A(config)# interface agg 2
Switch_A(config-if)# mlag 2
Switch_A(config-if)# end
configure SWITCH B
configure SWITCH A
configure SWITCH B
2. Requirement
While the size of networking increasing, sometime it requires multiple MLAG
cascading, asking for connections between Host 1/2/3 and deploying gateway on
SWITCH C/D, and the messages are sent by HOST 1/2 should pass through Layer 2
to forward to SWITCH C/D.
3. Configuration Steps
Note: The channel-group 55 used to interconnect the two switches in the example
configuration can be modified according to different standards of boards, use any
channel-group serial number will not affect the configuration of this example.
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH D
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH D
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH D
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH D
Switch_D(config-if-range)# no shutdown
Switch_D(config-if-range)# lacp timeout short
Switch_D(config-if-range)# switchport mode trunk
Switch_D(config-if-range)# switchport trunk allowed vlan add 10,20
Switch_D(config-if-range)# channel-group 54 mode active
Switch_D(config-if-range)# exit
Switch_D(config)# interface agg 54
Switch_D(config-if)# mlag 54
Switch_D(config-if)# end
Step 5 Configure MALG Group for HOST Connection
configure SWITCH A
configure SWITCH B
Switch_B(config-if)# mlag 1
Switch_B(config-if)# exit
Switch_B(config)# interface agg 2
Switch_B(config-if)# mlag 2
Switch_B(config-if)# end
configure SWITCH C
configure SWITCH D
The gateway is deployed on SWITCH C/D, SWITCH A/B does not need to be
configured.
configure SWITCH C
Switch_C(config-if)# exit
Switch_C(config)# interface vlan 30
Switch_C(config-if)# ip address 192.168.3.253/24
Switch_C(config-if)# ip virtual-router address 192.168.3.1
Switch_C(config-if)# exit
Switch_C(config)# ip virtual-router mac 0.0.1
Switch_C(config)# end
configure SWITCH D
Check the status of MLAG neighbor, MLAG should be Established after configuring
MLAG.
Check the status of MLAG device, the two devices are in Master/Slave status
local_sysid : 8e79.b120.2e00
remote_sysid : 1a53.71e9.c000
mlag_sysid : 8e79.b120.2e00
local_syspri : 32768
remote_syspri: 32768
mlag_syspri : 32768
peer-link : agg55
peer conf : Yes
reload-delay : 300
After configuring HOST, it should use ping to pass through gateway. It can also use
ping between HOSTs.
3.16 ConfiguringHash
3.16.1 Overview
Brief Introduction
1. Linkagg Hash
Linkagg can aggregate several physical interface to be a logical channel to enhance
proformance and redundancy.When use linkagg transmit packets,it could be cause
the same data stream transmitting on different physical interfaces.Because of
that,the opposite equipment can receive packet disordering. In order to avoid this
phennomenon,linkagg can accrod packets property to get a hash value,then it
chooses appropriate physical interface to transmit packets.Besides this,it also can
improve linkagg load balancing result.
2. ECMP Hash
Equal-cost multi-path routing is a routing strategy where next-hop packet
forwarding to a single destination can occur over multiple “best paths” which tie
for top place in routing metric calculations.Multi-path routing cam be used in
conjunction with most routing protocols,because it is a per-hop decision limited to
a single router.It can substantially increase bandwidth by load-balancing traffic
over multiple paths.Ecmp hash is used to do load balance.
3. EFD Hash
Elephant Flow Detect(EFD). According to the academic institutions of the actual
network of the study found that more than 80% of the bandwidth is occupied by
elephant flow, the bandwidth and transmission cache of these flow is large, but not
sensitive to delay, which is sensitive to delay The flow caused a great impact.EFD
hash is used to detect elephant flow by recognising packet features.
Use the following command to display the information of hash field user:
ip: ipsa
inner-ip-protocol inner-l4-sourceport
inner-l4-destport
Use the following command to display the information of hash value global:
Use the following command to display the information of hash field user:
ip: ipsa
HA :hash arithmetic
hash-value name: aaa
LBT LBM PT HF HA
----------------------------------------------------------------------
port-channel unicast all user xor
port-channel non-unicast all NOCFG NOCFG
ecmp - all NOCFG NOCFG
ecmp flow id all NOCFG NOCFG
Use the following command to display the application of hash value on port:
Use the following command to display the information of hash field user:
ip: ipsa
Use the following command to display the application of hash value on port:
Use the following command to display the information of hash field user:
mpls enable
----------------------------------------------------------------------
hash field select
Packet HashField
----------------------------------------------------------------------
l2: macsa
ip: ipsa
ip ipsa
!
hash-value aaa
port-channel unicast select user
!
class-map match-any cmap1
match access-group mac
!
policy-map pmap1
class cmap1
port-channel load-balance round-robin disable
load-balance hash-value aaa
!
interface eth-0-3
service-policy input pmap1
!
interface null0
!
Use the following command to display the information of hash field user:
ip: ipsa
Use the following command to display the application of hash value on port:
Use the following command to display the application of hash value on port:
Use the following command to display the information of hash field user:
ip: ipsa
Use the following command to display the information of hash value global:
Use the following command to display the information of hash field user:
ip: ipsa
Use the following command to display the application of hash value on port:
Use the following command to display the information of hash field user:
ip: ipsa
inner-ip-protocol inner-l4-sourceport
inner-l4-destport
Use the following command to display the information of hash value global:
3.17 ConfiguringPORT-XCONNECT
3.17.1 Overview
Brief Introduction
This feature can forward the packet directly according to the destination-interface
configured without looking up any table items and forwarding.
!
!
!
temperature 0 0 0
!
vlan database
!
interface eth-0-1
port-xconnect destination-interface eth-0-2
!
interface eth-0-2
!
interface eth-0-3
4.1 ConfiguringARP
4.1.1 Overview
Brief Introduction
The Address Resolution Protocol (ARP) is a protocol used to dynamically map
between Internet host addresses and Ethernet addresses. ARP caches Internet-
Ethernet address mappings. When an interface requests a mapping for an address
not in the cache, ARP queues the message, which requires the mapping, and
broadcasts a message on the associated network requesting the address mapping. If
a response is provided, the new mapping is cached and any pending message is
transmitted. ARP will queue at most one packet while waiting for a response to a
mapping request; only the most recently transmitted packet is kept. If the target
host does not respond after 3 requests, the host is considered to be down, allowing
an error to be returned to transmission attempts during this interval. If a target
host does not send message for a period (normally one hour), the host is considered
to be uncertainty, and several requests (normally 6, 3 unicast and 3 broadcast) will
send to the host before delete the ARP entry. ARP entries may be added, deleted or
changed manually. Manually added entries may be temporary or permanent.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Configure the layer 3 interface and set the ip address
Switch(config)# interface eth-0-1
Switch(config-if)# no switchport
Switch(config-if)# ip address 11.11.11.1/24
Step 3 Configure arp aging timeout value and the arp retry interval value
Switch(config-if)# arp timeout 1200
Switch(config-if)# arp retry-interval 2
Switch(config-if)# exit
Step 4 Add a static arp entry
Switch(config)# arp 11.11.11.2 1a.a011.eca2
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
Use the following command to display the information of the arp entry:
Use the following command to display the information of the arp configurations on
the interface:
As seen in the above topology, PC1 is belonged to VLAN10 and PC2 is belonged to
VLAN20. If ARP proxy feature is not enabled, then PC1 and PC2 can not
communicate with each other. As following, these steps are shown to enable ARP
proxy feature for both VLAN interface 10 and VLAN interface 20.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 10,20
Switch(config-vlan)# exit
Step 3 Enter the interface configure mode, set the switch port mode and bind to the vlan
Switch(config)# interface eth-0-22
Switch(config-if)# switchport access vlan 10
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-23
Switch(config-if)# switchport access vlan 20
Switch(config-if)# no shutdown
Switch(config-if)# exit
Step 4 Create the vlan interface, configure the ip address, and enable arp proxy
Switch(config)# interface vlan 10
Switch(config-if)# ip address 192.168.10.1/24
Switch(config-if)# proxy-arp enable
Switch(config-if)# exit
Switch(config)# interface vlan 20
Switch(config-if)# ip address 192.168.20.1/24
Use the following command to display the information of the arp proxy
configuration on the switch:
Use the following command to display the information of the arp entry on the
switch:
As the above topology, eth-0-2, eth-0-3 and eth-0-4 are belonging to VLAN 10. eth-
0-3 and eth-0-4 are both in port isolate group 1, and eth-0-2 is in port isolate group
3, so packets received in eth-0-3 can not flood to eth-0-4, but packets received in
eth-0-2 can flood to both eth-0-3 and eth-0-4. PC1 is connecting with port eth-0-3
and PC2 is connecting with port eth-0-4.Configure as the following step for
communicating with PC1 and PC2.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 10
Switch(config-vlan)# exit
Step 3 Enter the interface configure mode, set the switch port mode and bind to the vlan
Switch A configuration:
Switch B configuration:
Switch A configuration:
Switch B configuration:
After configuring port isolation as blow, eth-0-3 and eth-0-4 on swichB are isolated
in layer 2 network.
Use the following command to display the information of the arp entry on switchA:
Use the following command to display the information of the arp configurations on
the interface of switchA:
In this configuration example, host1 and host2 connected to switch1 and switch2
individually through interface eth-0-1. Switch1 and switch2 built an ebgp connect.
After enabling arp host-route funtion on interfaces connected to host, the switch
can convert ARP entries to host-routes and redisitribute them to route protocols.
With route-map, switch can purely advertise host route without network route,
reducing ineffective flows due to addvertising network route.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Configure the layer 3 interface and set the ip address
Switch(config)# interface eth-0-1
Switch(config-if)# no shutdown
Switch(config-if)# no switchport
Switch(config-if)# ip address 10.1.1.254/24
Step 3 Enable arp host-route function under the interface
Switch(config-if)# arp host-route enable
Switch(config-if)# exit
Step 4 Add a static arp entry
Switch(config)# arp 10.1.1.2 1.1.1
Step 5 Enable BGP redistributing connected routes
Switch(config)# router bgp 100
Switch(config-router)# redistribute connected
Step 6 Exiting the cofigure mode
Switch(config-router)# end
Step 7 Validation
2. Configuration Steps
Step 1 Enter the configure mode
This figure is the networking topology for testing DHCP relay functions. We need
two Linux boxes and one Switch to construct the test bed.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode,set the attributes and ip address
Switch(config)# interface eth-0-12
Switch(config-if)# no switchport
Switch(config-if)# ip address 4.4.4.2/24
Switch(config-if)# no shutdown
Switch(config-if)# exit
Ipconfig /all
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 5.5.5.1
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 5.5.5.2
DHCP Server . . . . . . . . . . . : 4.4.4.1
DNS Servers . . . . . . . . . . . : 4.4.4.1
If DHCP server was in the same subnet with client,it can normal work after connect
to subnet. Otherwise DHCP relay was needed for server providing DHCP
service ,which can help to forward DHCP message between server and client.
Besides these, some raw options were also be supported . Options with specified
command line or options that the dhcp server does not need to support are not
supported to be configure by the “option” CLI. These unsupported options are 3, 6,
15, 44, 46, 50, 51, 52, 53, 54, 55, 57, 58, 59, 61, 67, 82 and 150.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Configure on DUT1:
Step 3 Enter the interface configure mode,set the attributes and ip address
Configure on DUT1:
Switch(config)#interface eth-0-9
Switch (config-if)#no switchport
Switch (config-if)# no shutdown
Switch (config-if)# ip address 5.5.5.1/24
Switch (config-if)# dhcp server enable
Switch (config-if)#exit
Configure on DUT2:
Switch#configure terminal
Switch(config)#interface eth-0-9
Switch (config-if)#no switchport
Switch (config-if)# no shutdown
Switch (config-if)# ip address dhcp
Switch (config-if)#exit
Step 4 Validation
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable DHCP server globally, configure the ip address pool and DHCP relay
Configure on DUT1:
Configure on DUT2:
Configure on DUT1:
Step 4 Enter the interface configure mode,set the attributes and ip address
Configure on DUT1:
Switch(config)#interface eth-0-9
Switch (config-if)#no switchport
Switch (config-if)# no shutdown
Switch (config-if)# ip address 5.5.5.1/24
Configure on DUT2:
Switch(config)#interface eth-0-17
Switch (config-if)#no switchport
Switch (config-if)# no shutdown
Switch (config-if)# ip address 4.4.4.1/24
Switch (config-if)# dhcp-server 1
Configure on DUT3:
Switch(config)#interface eth-0-17
Switch (config-if)#no switchport
Switch (config-if)# no shutdown
Switch (config-if)# ip address dhcp
Switch (config-if)#exit
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
4.7 ConfiguringDNS
4.7.1 Overview
Brief Introduction
The DNS protocol controls the Domain Name System (DNS), a distributed database
with which you can map hostnames to IP addresses. When you configure DNS on
your switch, you can substitute the hostname for the IP address with all IP
commands, such as ping, telnet, connect, and related Telnet support operations. IP
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the dns domain name and dns server address
Switch(config)#dns domain server1
Switch(config)#dns server 202.100.10.20
Step 3 Set static hostname-to-address mappings (optional)
Switch(config)# ip host www.example1.com 192.0.2.141
Step 4 Validation
Switch# show dns server
Current DNS name server configuration:
Server IP Address
--------------------------------------------------------------
1 nameserver 202.100.10.20
In these systems, routes through a data network are described by fixed paths
(statically). These routes are usually entered into the router by the system
administrator. An entire network can be configured using static routes, but this
type of configuration is not fault tolerant. When there is a change in the network
or a failure occurs between two statically defined nodes, traffic will not be
rerouted. This means that anything that wishes to take an affected path will either
have to wait for the failure to be repaired or the static route to be updated by the
administrator before restarting its journey. Most requests will time out (ultimately
failing) before these repairs can be made. There are, however, times when static
routes can improve the performance of a network. Some of these include stub
networks and default routes.
This example shows how to enable static route in a simple network topology.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode,set the attributes and ip address
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on Switch1:
Note:Specify the destination prefix and mask for the network for which a gateway
is required, for example, 10.10.12.0/24. Add a gateway for each of them (in this
case 10.10.10.2 for all). Since R2 is the only next hop available, you can configure
a default route instead of configuring the same static route for individual addresses.
Configure on Switch2:
Configure on Switch3:
5.2 ConfiguringRIP
5.2.1 Overview
Brief Introduction
Routing Information Protocol (RIP) is an IP route exchange protocol that uses a
distance vector (a number representing distance) to measure the cost of a given
route. The cost is a distance vector because the cost is often equivalent to the
number of router hops between the source and the destination networks. RIP can
receive multiple paths to a destination. The system evaluates the paths, selects
the best path, and saves the path in the IP route table as the route to the
destination. Typically, the best path is the path with the fewest hops. A hop is
another router through which packets must travel to reach the destination. If RIP
receives a RIP update from another router that contains a path with fewer hops
than the path stored in the route table, the system replaces the older route with
the newer one. The system then includes the new path in the updates it sends to
other RIP routers. RIP routers also can modify a route’s cost, generally by adding to
it, to bias the selection of a route for a given destination. In this case, the actual
number of router hops may be the same, but the route has an administratively
higher cost and is thus less likely to be used than other, lower-cost routes. A RIP
route can have a maximum cost of 15. Any destination with a higher cost is
considered unreachable. Although limiting to larger networks, the low maximum
hop count prevents endless loops in the network.
This chapter contains basic RIP configuration examples. To see details on the
commands used in these examples, or to see the outputs of the Validation
commands, refer to the RIP Command Reference. To avoid repetition, some
Common commands, like configure terminal, have not been listed under the
Commands Used section.
Principle Description
Reference to RFC 2453
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address
Configure on Switch1:
Configure on Switch2:
Configure on Switch1:
Configure on Switch2:
Use the following command to display the protocol state of rip process on Switch1:
In this example, Switch2 is configured to receive and send RIP version 1 and 2 on
eth-0-9 and eth-0-20.
2. Configuration Steps
Step 1 Enter the configure mode
Use the following command to display the protocol state of rip process on Switch2:
A RIP offset list allows you to add to the metric of specific inbound or outbound
routes learned or advertised by RIP. RIP offset lists provide a simple method for
adding to the cost of specific routes and therefore biasing the router’s route
selection away from those routes. An offset list consists of the following
parameters:
An ACL that specifies the routes to which to add the metric. The direction:
In: applies to routes the router learns from RIP neighbors.
Out: applies to routes the router is advertising to its RIP neighbors.
The offset value that will be added to the routing metric of the routes that
match the ACL.
The interface that the offset list applies (optional).
If a route matches both a global offset list (without specified interface) and an
interface-based offset list, the interface-based offset list takes precedence. The
interface-based offset list’s metric is added to the route in this case.
This example Switch1 will advertise route 1.1.1.0 out of int eth-0-13 with metric 3.
2. Configuration Steps
Step 1 precondition
Switch1
interface eth-0-1
no switchport
ip address 1.1.1.1/24
!
interface eth-0-9
no switchport
ip address 10.10.11.10/24
!
interface eth-0-13
no switchport
ip address 13.1.1.1/24
!
router rip
network 1.1.1.0/24
network 10.10.11.0/24
network 13.1.1.0/24
Switch2
interface eth-0-9
no switchport
ip address 10.10.11.50/24
!
interface eth-0-20
no switchport
ip address 10.10.12.10/24
!
router rip
network 10.10.11.0/24
network 10.10.12.0/24
Switch3
interface eth-0-13
no switchport
ip address 13.1.1.2/24
!
interface eth-0-20
no switchport
ip address 10.10.12.50/24
!
router rip
network 10.10.12.0/24
network 13.1.1.0/24
Display the routes on Switch3. The metric for the route which distributed by
Switch1 is 3 now.
By default, RIP assigns the default RIP administrative distance (120) to RIP routes.
When comparing routes based on administrative distance, the router selects the
route with the lower distance. You can change the administrative distance for RIP
routes.
This example all Switches have two router protocols, RIP and OSPF, OSPF route has
higher priority, Switch3 will change route 1.1.1.0 with administrative distance 100.
2. Configuration Steps
Step 1 precondition
Switch1
interface eth-0-1
no switchport
ip address 1.1.1.1/24
!
interface eth-0-9
no switchport
ip address 10.10.11.10/24
!
router ospf
network 1.1.1.0/24 area 0
network 10.10.11.0/24 area 0
!
router rip
network 1.1.1.0/24
network 10.10.11.0/24
Switch2
interface eth-0-9
no switchport
ip address 10.10.11.50/24
!
interface eth-0-20
no switchport
ip address 10.10.12.10/24
!
router ospf
network 10.10.11.0/24 area 0
network 10.10.12.0/24 area 0
!
router rip
network 10.10.11.0/24
network 10.10.12.0/24
Switch3
interface eth-0-20
no switchport
ip address 10.10.12.50/24
!
router ospf
network 10.10.12.0/24 area 0
!
router rip
network 10.10.12.0/24
Display the routes on Switch3. The distance for the rip route is 100 now.
Configuring Redistribution
1. Topology
You can configure the router to redistribute static routes, direct connected routes
or routes learned through Open Shortest Path First (OSPF) into RIP. When you
redistribute a route from one of these other protocols into RIP, the router can use
RIP to advertise the route to its RIP neighbors.
Change the default redistribution metric (optional). The router assigns a RIP metric
of 1 to each redistributed route by default. You can change the default metric to a
value up to 16.
2. Configuration Steps
Step 1 precondition
Switch1
interface eth-0-9
no switchport
ip address 10.10.11.10/24
!
router rip
network 10.10.11.0/24
Switch2
interface eth-0-1
no switchport
ip address 2.2.2.2/24
!
interface eth-0-9
no switchport
ip address 10.10.11.50/24
!
interface eth-0-20
no switchport
ip address 10.10.12.10/24
!
router ospf
network 10.10.12.0/24 area 0
!
router rip
network 10.10.11.0/24
!
ip route 20.20.20.0/24 10.10.12.50
Switch3
interface eth-0-1
no switchport
ip address 3.3.3.3/24
!
interface eth-0-2
no switchport
ip address 20.20.20.20/24
!
interface eth-0-20
no switchport
ip address 10.10.12.50/24
!
router ospf
network 3.3.3.0/24 area 0
network 10.10.12.0/24 area 0
Normally, routers that are connected to broadcast-type IP networks and that use
distance-vector routing protocols employ the split horizon mechanism to reduce
the possibility of routing loops. Split horizon blocks information about routes from
being advertised by a router out of any interface from which that information
originated. This behavior usually optimizes communications among multiple routers,
particularly when links are broken. However, with non-broadcast networks (such as
Frame Relay), situations can arise for which this behavior is less than ideal. For
these situations, you might want to disable split horizon for RIP.
You can avoid including routes in updates sent to the same gateway from which
they were learned. Using the split horizon command omits routes learned from one
neighbor, in updates sent to that neighbor. Using the poisoned parameter with this
command includes such routes in updates, but sets their metrics to infinity. Thus,
advertising these routes means that they are not reachable.
2. Configuration Steps
Step 1 precondition
Switch1
interface eth-0-1
no switchport
ip address 1.1.1.1/24
!
interface eth-0-9
no switchport
ip address 10.10.11.10/24
!
router rip
network 10.10.11.0/24
redistribute connected
Switch2
interface eth-0-9
no switchport
ip address 10.10.11.50/24
!
router rip
network 10.10.11.0/24
Step 2 Enabling debug on Switch2 (optional)
Switch# debug rip packet send detail
Switch# terminal monitor
Step 3 Enter the configure mode
Disable Split-horizon:
Switch(config)#interface eth-0-9
Switch(config-if)# no ip rip split-horizon
Configuring Timers
RIP use several timers that determine such variables as the frequency of routing
updates, the length of time before a route becomes invalid, and other parameters.
You can adjust these timers to tune RIP performance to better suit your internet-
work needs. You can make the following timer adjustments:
The rate (time in seconds between updates) at which routing updates are sent.
The interval of time (in seconds) after which a route is declared invalid.
The amount of time (in seconds) that must pass before a route is removed
from the routing table.
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable RIP routing process and set the timers
Specify the routing table update timer in 10 seconds. Specifies the routing
information timeout timer in 180 seconds. Specifies the routing garbage collection
timer in 120 seconds:
Use the following command to display the protocol state of rip process:
A RIP distribute list allows you to permit or deny learning or advertising of specific
routes. A distribute list consists of the following parameters:
2. Configuration Steps
Step 1 precondition
Switch1
interface eth-0-9
no switchport
ip address 10.10.11.10/24
!
router rip
network 10.10.11.0/24
Switch2
interface eth-0-1
no switchport
ip address 1.1.1.1/24
!
interface eth-0-2
no switchport
ip address 2.2.2.2/24
!
interface eth-0-3
no switchport
ip address 3.3.3.3/24
!
interface eth-0-9
no switchport
ip address 10.10.11.50/24
!
router rip
network 1.1.1.0/24
network 2.2.2.0/24
network 3.3.3.0/24
network 10.10.11.0/24
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address
Switch1:
Switch2:
Use the following command to display the protocol state of rip process:
Sending updates every 30 seconds with +/-5 seconds, next due in 23 seconds
Timeout after 180 seconds, Garbage collect after 120 seconds
Outgoing update filter list for all interface is not set
Incoming update filter list for all interface is not set
Default redistribution metric is 1
Redistributing:
connected metric default
Default version control: send version 2, receive version 2
Interface Send Recv Key-chain
eth-0-9 2 2
Routing for Networks:
10.10.11.0/24
Routing Information Sources:
Gateway Distance Last Update Bad Packets Bad Routes
10.10.11.50 120 00:00:45 1 0
Number of routes (including connected): 2
Distance: (default is 120)
Switch# show ip rip interface
eth-0-9 is up, line protocol is up
Routing Protocol: RIP
Receive RIP packets
Send RIP packets
Passive interface: Disabled
Split horizon: Enabled with Poisoned Reversed
IP interface address:
10.10.11.10/24
In md5 authentication, both the key ID and key string are matched for
authentication. R1 will receive only packets that match both the key ID and the key
string in the specified key chain (within the accept lifetime) on that interface In
the following example, Switch2 has the same key ID and key string as Switch1. For
additional security, the accept lifetime and send lifetime are configured such that
every fifth day the key ID and key string changes. To maintain continuity, the
accept lifetimes should be configured to overlap; however, the send lifetime should
not be overlapping.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address
Switch1:
Switch2:
Switch(config-if)# exit
Step 4 Create a key chain,and set the key string and lifetime
Switch(config)# key chain SUN
Switch(config-keychain)# key 1
Switch(config-keychain-key)# key-string key1
Switch(config-keychain-key)# accept-lifetime 12:00:00 Mar 2 2012 14:00:00 Mar 7
2012
Switch(config-keychain-key)# send-lifetime 12:00:00 Mar 2 2012 12:00:00 Mar 7 2012
Switch(config-keychain-key)# exit
Switch(config-keychain)# key 2
Switch(config-keychain-key)# key-string Earth
Switch(config-keychain-key)# accept-lifetime 12:00:00 Mar 7 2012 14:00:00 Mar 12
2012
Switch(config-keychain-key)# send-lifetime 12:00:00 Mar 7 2012 12:00:00 Mar 12 2012
Switch(config-keychain-key)# exit
Switch(config-keychain)# exit
Step 5 Specify the authentication string and mode
Switch(config)# interface eth-0-9
Switch(config-if)# ip rip authentication key-chain SUN
Switch(config-if)# ip rip authentication mode md5
Step 6 Exit the configure mode
Switch(config-if)# end
Step 7 Validation
Use the following command to display the protocol state of rip process:
5.3 ConfiguringOSPF
5.3.1 Overview
Brief Introduction
OSPF is an Interior Gateway Protocol (IGP) designed expressly for IP networks,
supporting IP subnet ting and tagging of externally derived routing information.
OSPF also allows packet authentication and uses IP multicast when sending and
receiving packets.
The implementation conforms to the OSPF Version 2 specifications with these key
features:
OSPF typically requires coordination among many internal routers, area border
routers (ABRs) connected to multiple areas, and autonomous system boundary
routers (ASBRs). The minimum configuration would use all default parameter values,
no authentication, and interfaces assigned to areas. If you customize your
environment, you must ensure coordinated configuration of all routers.
Principle Description
Reference to RFC 2328
Step 2 Configure the Routing process and associate the network with a specified OSPF
area
Switch(config)# router ospf 100
Switch(config-router)# network 10.10.10.0/24 area 0
Switch(config-router)# quit
This example shows the minimum configuration required for enabling OSPF on an
interface Switch1 and 2 are two routers in Area 0 connecting to network
10.10.10.0/24
Configure one interface so that it belongs to only one area. However, you
can configure different interfaces on a router to belong to different areas.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address
Configure on Switch1:
Configure on Switch2:
Configure on Switch1:
Configure on Switch2:
Note: To using OSPF among two devices which are directly connected, the area IDs
must be same. The ospf process IDs can be same or different.
Switch1:
Switch2:
Configuring Priority
1. Topology
This example shows the configuration for setting the priority for an interface You
can set a high priority for a router to make it the Designated Router (DR). Router
Switch3 is configured to have a priority of 10, which is higher than the default
priority (default priority is 1) of Switch1 and 2; making it the DR.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on L2 Switch:
Configure on Switch3:
Switch1:
Switch2:
Switch3:
Switch1:
Switch2:
Switch3:
You can optionally configure several OSPF area parameters. These parameters
include authentication for password-based protection against unauthorized access
to an area and stub areas. Stub areas are areas into which information on external
routes is not sent. Instead, the area border router (ABR) generates a default
external route into the stub area for destinations outside the autonomous system
(AS).
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on Switch4:
Configure on L2 Switch:
Switch(config-if)# quit
Switch(config)# interface eth-0-13
Switch(config-if)# no shutdown
Switch(config-if)# quit
Switch(config)# interface eth-0-17
Switch(config-if)# no shutdown
Switch(config-if)# quit
Step 3 Set the ospf priority on the interface
Configure on Switch3:
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on Switch4:
Switch1:
Switch2:
Switch3:
Switch4:
* - candidate default
Gateway of last resort is 10.10.11.11 to network 0.0.0.0
O*IA 0.0.0.0/0 [110/2] via 10.10.11.11, eth-0-21, 00:12:46
C 10.10.10.0/24 is directly connected, eth-0-21
C 10.10.10.12/32 is in local loopback, eth-0-21
In this example the configuration causes RIP routes to be imported into the OSPF
routing table and advertised as Type 5 External LSAs into Area 0.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Switch(config-if)# no shutdown
Switch(config-if)# ip address 10.10.10.13/24
Switch(config-if)# quit
Configure on Switch4:
Configure on L2 Switch:
Configure on Switch3:
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on Switch2:
Configure on Switch4:
Switch1:
Switch2:
Switch3:
Switch4:
Switch1:
LS age: 317
Options: 0x2 (*|-|-|-|-|-|E|-)
LS Type: AS-external-LSA
Link State ID: 1.1.1.1 (External Network Number)
Advertising Router: 10.10.10.11
LS age: 438
Options: 0x2 (*|-|-|-|-|-|E|-)
LS Type: AS-external-LSA
Link State ID: 10.10.11.0 (External Network Number)
Advertising Router: 10.10.10.11
LS Seq Number: 80000001
Checksum: 0x0472
Length: 36
Network Mask: /24
Metric Type: 2 (Larger than any link state path)
TOS: 0
Metric: 20
Forward Address: 0.0.0.0
External Route Tag: 0
Switch2:
LS age: 367
Options: 0x2 (*|-|-|-|-|-|E|-)
LS Type: AS-external-LSA
Link State ID: 1.1.1.1 (External Network Number)
Advertising Router: 10.10.10.11
LS Seq Number: 80000001
Checksum: 0x4a47
Length: 36
Network Mask: /32
Metric Type: 2 (Larger than any link state path)
TOS: 0
Metric: 20
Forward Address: 0.0.0.0
External Route Tag: 0
LS age: 487
Options: 0x2 (*|-|-|-|-|-|E|-)
LS Type: AS-external-LSA
Link State ID: 10.10.11.0 (External Network Number)
Advertising Router: 10.10.10.11
LS Seq Number: 80000001
Checksum: 0x0472
Length: 36
Network Mask: /24
Metric Type: 2 (Larger than any link state path)
TOS: 0
Metric: 20
Forward Address: 0.0.0.0
External Route Tag: 0
Switch3:
LS age: 396
Options: 0x2 (*|-|-|-|-|-|E|-)
LS Type: AS-external-LSA
Link State ID: 1.1.1.1 (External Network Number)
Advertising Router: 10.10.10.11
LS Seq Number: 80000001
Checksum: 0x4a47
Length: 36
Network Mask: /32
Metric Type: 2 (Larger than any link state path)
TOS: 0
Metric: 20
Forward Address: 0.0.0.0
External Route Tag: 0
LS age: 517
Options: 0x2 (*|-|-|-|-|-|E|-)
LS Type: AS-external-LSA
Link State ID: 10.10.11.0 (External Network Number)
Advertising Router: 10.10.10.11
LS Seq Number: 80000001
Checksum: 0x0472
Length: 36
Network Mask: /24
Metric Type: 2 (Larger than any link state path)
TOS: 0
Metric: 20
Forward Address: 0.0.0.0
External Route Tag: 0
OSPF Cost
1. Topology
You can make a route the preferred route by changing its cost. In this example,
cost has been configured to make Switch2 the next hop for Switch1.
The default cost on each interface is 1(1000M speed). Interface eth2 on Switch2
has a cost of 100 and interface eth2 on Switch3 has a cost of 150. The total cost to
reach(Switch4 network 10.10.14.0) through Switch2 and Switch3:
Therefore, Switch1 chooses Switch2 as its next hop for destination Switch4
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address. Set the ospf
cost under the interface configure mode
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on Switch4:
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on Switch4:
Switch1:
Switch2:
Switch3:
Switch4:
In the example below, Switch1 and B are configured for both the interface and area
authentications. The authentication type of interface eth-0-9 on Switch1 and
interface eth-0-9 on Switch2 is null authentication mode The authentication type of
interface eth-0-1 on Switch2 and interface eth-0-1 on Switch3 is simple
authentication mode The authentication type of interface eth-0-2 on Switch3 and
interface eth-0-2 on Switch4 is MD5 authentication mode in area1,if you define
area 1 authentication type first, you needn’t define interface authentication type,
only define authentication key value.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode, set the attributes and ip address. Set the ospf
authentication under the interface configure mode
Configure on Switch1:
Switch(config)#interface eth-0-9
Switch(config-if)#no switchport
Switch(config-if)#ip address 9.9.9.1/24
Switch(config-if)#ip ospf authentication
Switch(config-if)#ip ospf authentication null
Switch(config-if)# exit
Configure on Switch2:
Switch(config)#interface eth-0-1
Switch(config-if)#no switchport
Switch(config-if)#ip address 1.1.1.1/24
Switch(config-if)#ip ospf authentication
Switch(config-if)#ip ospf authentication-key test
Switch(config-if)# exit
Switch(config)#interface eth-0-9
Switch(config-if)#no switchport
Switch(config-if)#ip address 9.9.9.2/24
Switch(config-if)#ip ospf authentication
Switch(config-if)#ip ospf authentication null
Switch(config-if)# exit
Configure on Switch3:
Switch(config)#interface eth-0-2
Switch(config-if)#no switchport
Switch(config-if)#ip address 2.2.2.1/24
Switch(config-if)# ip ospf message-digest-key 2 md5 ospf
Switch(config-if)# exit
Switch(config)#interface eth-0-1
Switch(config-if)#no switchport
Switch(config-if)#ip address 1.1.1.2/24
Configure on Switch4:
Switch(config)#interface eth-0-2
Switch(config-if)#no switchport
Switch(config-if)#ip address 2.2.2.2/24
Switch(config-if)# ip ospf message-digest-key 2 md5 ospf
Switch(config-if)# exit
Step 3 Configure the Routing process and associate the network with a specified OSPF
area
Configure on Switch1:
Configure on Switch2:
Configure on Switch3:
Configure on Switch4:
Switch1:
Switch2:
Switch3:
Switch4:
Switch3:
Use the following command to display the protocol state of ospf process:
Switch3:
SPF schedule delay 5 secs, Hold time between two SPFs 10 secs
Refresh timer 10 secs
Number of incomming current DD exchange neighbors 0/5
Number of outgoing current DD exchange neighbors 0/5
Number of external LSA 0. Checksum 0x000000
Number of opaque AS LSA 0. Checksum 0x000000
Number of non-default external LSA 0
External LSA database is unlimited.
Number of LSA originated 17
Number of LSA received 57
Number of areas attached to this router: 2
Area 0 (BACKBONE)
Number of interfaces in this area is 1(1)
Number of fully adjacent neighbors in this area is 1
Area has no authentication
SPF algorithm last executed 01:06:56.340 ago
SPF algorithm executed 16 times
Number of LSA 6. Checksum 0x034b09
Area 1
Number of interfaces in this area is 1(1)
Number of fully adjacent neighbors in this area is 1
Number of fully adjacent virtual neighbors through this area is 0
Area has message digest authentication
SPF algorithm last executed 00:03:29.430 ago
SPF algorithm executed 17 times
Number of LSA 5. Checksum 0x0230e3
the safety of our system, the OSPF authentication-key is shown as encryption words.
Configuring OSPF GR
GR is a mechanism used to ensure that data can be forwarded normally when the
routing protocol is restarted. OSPF GR can ensure that the device running OSPF can
GR Restarter: indicates the device that generates the protocol restart event and
has the GR capability.
GR Helper: A device that has a neighbor relationship with the GR Restarter and
assists the GR restarter to complete GR.
Switch(config)#router ospf 1
Switch(config-router)#router-id 1.1.1.1
Switch(config-router)#network 3.3.3.0/24 area 0
Switch(config-router)#exit
Switch(config)#interface eth-2-9
Switch(config-if)#no shutdown
Switch(config-if)#no switchport
Switch(config-if)#ip address 3.3.3.2/24
Switch(config-if)# exit
Configure on Switch3:
Switch(config)#router ospf 1
Switch(config-router)#router-id 3.3.3.3
Switch(config-router)#network 3.3.3.0/24 area 0
Switch(config-router)#exit
Switch(config)#interface eth-0-9
Switch(config-if)#no shutdown
Switch(config-if)#no switchport
Switch(config-if)#ip address 3.3.3.3/24
Switch(config-if)# exit
Stacking slot1:
Switch3:
Use the following command to display the neighbor of ospf,even though master
crash,standby will maintain full with neighbor:
Stacking:
Switch3:
Note: Create a prefix-list. If the sequence of the rule is not specified, system
should automatically assign an sequence number for it. Support different actions
such as permit and deny. Support to add description string for a prefix-list.
Used by rip
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create a prefix-list
Switch(config)# ip prefix-list aa seq 11 deny 35.0.0.0/8 le 16
Switch(config)# ip prefix-list aa permit any
Step 3 Apply the prefix-list under the router rip configure mode
Switch(config)# router rip
Switch(config-router)# distribute-list prefix aa out
Switch(config-router)# exit
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Used by Route-map
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create a prefix-list
Switch(config)# ip prefix-list aa seq 11 deny 3.3.3.0/8 le 24
Switch(config)# ip prefix-list aa permit any
Step 3 create a route map to match the prefix-list
Switch(config)# route-map abc permit
Switch(config-route-map)# match ip address prefix-list aa
Switch(config-route-map)# set local-preference 200
Switch(config-route-map)# exit
Switch(config)# route-map abc permit 20
Switch(config-route-map)# exit
Step 4 Apply the route under the router bgp configure mode
Switch(config)# router bgp 1
Switch(config-router)# neighbor 1.1.1.2 remote-as 1
Switch(config-router)# neighbor 1.1.1.2 route-map abc out
Switch(config-router)# network 2.2.2.2/32
Switch(config-router)# network 3.3.3.3/32
Step 5 Exit the configure mode
Switch(config-router)# end
Step 6 Validation
If the permit parameter is specified, and the match criteria are met, the route is
redistributed as specified by set actions. If the match criteria are not met, the next
route map with the same tag is tested. If the deny parameter is specified, and the
match criteria are met, the route is not redistributed, and any other route maps
with the same map tag are not examined. Routes are checked from line to line
looking for a match. If there is no match and the bottom of the route map is
reached, then the router denies the route from being redistributed. There is always
an implicit deny at the end of a route map.
Specify the sequence parameter to indicate the position a new route map is to
have in the list of route maps already configured with the same name.
Step 6 Validation
DUT1# show route-map
route-map abc, permit, sequence 10
Match clauses:
ip address acl1
Set clauses:
local-preference 200
route-map abc, permit, sequence 20
Match clauses:
Set clauses:
DUT2# show ip bgp
BGP table version is 6, local router ID is 1.1.1.2
Status codes: s suppressed, d damped, h history, * valid, > best, i - internal,
S Stale
Origin codes: i - IGP, e - EGP, ? - incomplete
Network Next Hop Metric LocPrf Weight Path
*>i2.2.2.2/32 1.1.1.1 0 100 0 i
*>i3.3.3.3/32 1.1.1.1 0 200 0 i
The figure above is a typical topology: After Enabling PBR on interface eth-0-1 of
Switch1, packets from 172.16.6.1 should be forwarded to 172.16.4.2, and other
packets should be forwarded according to the original routes.
Configure on Switch1:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create an ip access list to match source ip address
Switch(config)# ip access-list acl1
Switch(config-ip-acl)# 10 permit any 172.16.6.0 0.0.0.255 any
Switch(config-ip-acl)# exit
Step 3 Create a route map, to match the ip access list and set the nexthop ip
Switch(config)# route-map rmap permit 10
Switch(config-route-map)# match ip address acl1
Switch(config-route-map)# set ip next-hop 172.16.4.2
Switch(config-route-map)# exit
Step 4 Enter the interface configure mode, set the attributes and ip address, and apply
the route map
Switch(config)# interface eth-0-1
Switch(config-if)# no switchport
Switch(config-if)# ip address 172.16.5.2/24
Switch(config-if)# no shutdown
Switch(config-if)# ip policy route-map rmap
Switch(config-if)# exit
Step 5 Create a static route with the nexthop ip 172.16.4.3 (optional)
To forwarding the packets which not hit the PBR, we can use a static route.
Dynamic protocols such as RIP/OSPF are can also meet this requirement.
The figure above is a typical topology: Switch2 will forward packet to eth-0-13
according PBR routes, when Switch4 eth-0-13 shutdown, bfd session statues will be
down, then track 1 will be down, and the PBR next-hop 4.1.1.2 will be invalid,
packet will forward to eth-0-14.
2. Configuration Steps
Step 1 Configure on Switch1:
Switch1# configure terminal
Switch1(config)# interface eth-0-1
Switch1(config-if)# no shutdown
Switch1(config-if)# no switchport
Switch1(config-if)# ip address 1.1.1.1/24
Switch1(config-if)# interface eth-0-9
Switch1(config-if)# no shutdown
Switch1(config-if)# no switchport
Switch1(config-if)# ip address 2.1.1.1/24
Switch1(config-if)# quit
Switch1(config)# ip route 5.1.1.0/24 2.1.1.2
Switch1(config)# ip route 6.1.1.0/24 2.1.1.2
Step 2 Configure on Switch2:
Switch2# configure terminal
Switch2(config)# ip access-list acl1
Switch2(config-ip-acl)# 10 permit any host 2.1.1.1 any
Switch2(config-ip-acl)# quit
Switch2(config)# route-map rmap permit 10
Switch2(config-route-map)# match ip address acl1
Switch2(config-route-map)# set ip next-hop 4.1.1.2 track 1
Switch2(config-route-map)# quit
Switch2(config)# interface eth-0-9
Switch2(config-if)# no shutdown
Switch2(config-if)# no switchport
Switch2(config-if)# ip address 2.1.1.2/24
Switch2(config-if)# ip policy route-map rmap
Switch2(config-if)# interface eth-0-13
Switch2(config-if)# no shutdown
Switch2(config-if)# no switchport
Switch2(config-if)# ip address 4.1.1.1/24
Switch2(config-if)# interface eth-0-14
Switch2(config-if)# no shutdown
Switch2(config-if)# no switchport
Switch2(config-if)# ip address 5.1.1.1/24
Switch2(config-if)# quit
Switch2(config)# track 1 bfd source interface eth-0-13 destination 4.1.1.2
Switch2(config-track)# quit
Switch2(config)# ip route 1.1.1.0/24 2.1.1.1
Switch2(config)# ip route 6.1.1.0/24 5.1.1.2
Step 3 Configure on Switch4:
Number of Sessions: 1
5.7 ConfiguringBGP
5.7.1 Overview
Brief Introduction
The Border Gateway Protocol (BGP) is an inter-Autonomous System routing protocol.
Principle Description
For more BGP information please reference [RFC 1771, RFC 4271].
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and set the attributes
Switch1:
Switch2:
Switch1:
Switch1:
Switch2:
Switch1:
Switch2:
Configure IBGP
1. Topology
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and set the attributes
Switch1:
Switch(config)#interface loopback 0
Switch(config-if)# ip address 10.10.10.10/32
Switch(config-if)# exit
Switch2:
Switch1:
Switch2:
Switch1:
Switch2:
Switch(config)# end
Step 6 Validation
Switch1:
Switch2:
0 announced prefixes
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and set the attributes
Switch1:
Switch2:
Switch1:
Switch2:
Switch1:
Switch2:
5.8 ConfiguringISIS
5.8.1 Overview
Brief Introduction
Intermediate System to Intermediate System(ISIS) is a link state routing protocol
that uses the shortest path first (SPF) algorithm for routing algorithms. It is actually
very similar to OSPF. It also uses Hello protocol to find neighboring nodes and uses a
propagation protocol to send link information. ISIS can operate on different subnets,
including broadcast LANs, WANs and point-to-point links.
Principle Description
1. NET
The Network Entity Title (NET) indicates the network layer information of the IS
itself, excluding the transport layer information (SEL = 0). It can be regarded as a
special kind of NSAP, that is, an NSAP address whose SEL is 0. Therefore, NET is the
same length as NSAP, with a maximum of 20 bytes and a minimum of 8 bytes.
Generally, a router can be configured with a NET. When an area needs to be re-
divided, for example, multiple areas are combined, or an area is divided into
multiple areas. In this case, multiple NETs can be configured during reconfiguration
Still can guarantee the correctness of the route. As a router default can be
configured up to three regional addresses, so up to only three NET configuration.
When configuring multiple NETs, you must ensure that their System IDs are the
2. ISIS area
1. Two-level structure In order to support large-scale routing networks, IS-IS adopts a two-level
hierarchical structure in the routing domain. A large routing domain is divided into one or
more Areas. Routes in the area are managed by Level-1 routers and inter-area routes are
managed by Level-2 routers.
2. Level-1 and Level-2
Level-1 router The Level-1 router is responsible for the intra-area routing. It
only establishes the neighbor relationship with the Level-1 and Level-1-2
routers in the same area and maintains a Level-1 LSDB. The Level-1 router
contains the routing information of the area. The packet is forwarded to the
nearest Level-1-2 router.
Level-2 router The Level-2 router is responsible for inter-area routing. It can
establish the neighbor relationship with Level-2 and Level-1-2 routers in the
same area or other areas and maintains a Level-2 LSDB. The LSDB contains
inter-area routing information. All Level-2 routers and Level-1-2 routers form
the backbone network in the routing domain and are responsible for
communication between different areas. The Level-2 routers in the routing
domain must be physically contiguous to ensure continuity of the backbone
network. Only Level-2 routers can exchange data packets or routing
information with routers outside the routing domain.
Level-1-2 router Routers belonging to Level-1 and Level-2 are called Level-1-2
routers. They can establish Level-1 neighbor relationships with Level-1 and
Level-1-2 routers in the same area or with Level-1 routers in the same area or
with other areas Level-2 and Level-1-2 routers form a Level-2 neighbor
relationship. Level-1 routers must pass through Level-1-2 routers to connect to
other areas. The Level-1-2 router maintains two LSDBs. The Level-1 LSDB is
used for intra-area routing. The Level-2 LSDB is used for inter-area routing.
3. The route type of the interface For a router of type Level-1-2, you may need to set up Level-
1 adjacency with only one peer and establish only Level-2 adjacency with the other peer. You
can set the routing layer type of the corresponding interface to limit the adjacencies that can
be established on the interface. For example, Level-1 interfaces can only establish Level-1
adjacencies. Level-2 interfaces can only establish Level-2 adjacencies. For Level-1-2 routers,
you can also save bandwidth by preventing Level-1 Hello packets from being sent to the
Level-2 backbone network by configuring some interfaces as Level-2.
4. Route infiltration (Route Leaking) Generally, an IS-IS area is also called a Level-1 area. Routes
in the area are managed by Level-1 routers. All Level-2 routers form a Level-2 area.
Therefore, an IS-IS routing domain can contain multiple Level-1 areas but only one Level-2
area.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Configure the Routing process and set the net
Step 4 Validation
Area (null):
System Id Interface SNPA State Holdtime Type Protocol
0000.0000.0002 eth-0-9 4a98.a825.3d00 Up 21 L1 IS-IS
Up 21 L2 IS-IS
Area (null):
Destination Metric Next-Hop Interface Tag
C 1.1.1.1/32 10 -- loopback0 0
L1 2.2.2.2/32 20 10.10.10.11 eth-0-9 0
C 10.10.10.0/24 10 -- eth-0-9 0
Area (null):
System Id Interface SNPA State Holdtime Type Protocol
0000.0000.0001 eth-0-9 a821.1873.ae00 Up 9 L1 IS-IS
Up 9 L2 IS-IS
NLPID: IPV4
IP Address: 10.10.10.11
Metric: 10 IS 0000.0000.0001.01
Metric: 10 IP 10.10.10.0 255.255.255.0
Metric: 10 IP 2.2.2.2 255.255.255.255
Metric: 20 IP 1.1.1.1 255.255.255.255
Area (null):
Destination Metric Next-Hop Interface Tag
L1 1.1.1.1/32 20 10.10.10.10 eth-0-9 0
C 2.2.2.2/32 10 -- loopback0 0
C 10.10.10.0/24 10 -- eth-0-9 0
Distribution of stock quotes, video transmissions such as news services and remote
classrooms, and video conferencing are all examples of applications that use
multicast routing.
Internet Group Management Protocol (IGMP) is used among hosts on a LAN and
the routers (and multilayer switches) on that LAN to track the multicast groups
of which hosts are members.
Protocol-Independent Multicast (PIM) protocol is used among routers and
multilayer switches to track which multicast packets to forward to each other
and to their directly connected LANs. PIM has two modes: Sparse-mode and
Dense-mode.
6.2 ConfiguringIGMP
6.2.1 Overview
Brief Introduction
To participate in IP multicasting, multicast hosts, routers, and multilayer switches
must have the IGMP operating. This protocol defines the querier and host roles:
A host can be a member of more than one multicast group at a time. How active a
multicast group is and what members it has can vary from group to group and from
time to time. A multicast group can be active for a long time, or it can be very
short-lived. Membership in a group can constantly change. A group that has
members can have no activity.
IGMP general queries are destined to the address 224.0.0.1 (all systems on a
subnet).
IGMP group-specific queries are destined to the group IP address for which the
switch is querying.
IGMP group membership reports are destined to the group IP address for which
the switch is reporting.
IGMP Version 2 (IGMPv2) leave messages are destined to the address 224.0.0.2
(all-multicast-routers on a subnet). In some old host IP stacks, leave messages
might be destined to the group IP address rather than to the all-routers
address.
Principle Description
Reference to RFC 1112,RFC 2236,RFC 3376
Step 3 Enter the interface configure mode,set the attributes and ip address
Switch(config)# interface eth-0-1
Switch(config-if)# no switchport
Switch(config-if)# ip address 10.10.10.10/24
Switch(config-if)# exit
Switch(config)# interface eth-0-2
Switch(config-if)# no switchport
Switch(config-if)# ip address 10.10.11.10/24
Switch(config-if)# exit
Step 4 Enable pim-sm on the interface
Switch(config)# interface eth-0-1
Switch(config-if)# ip pim sparse-mode
Switch(config-if)# exit
Switch(config)# interface eth-0-2
Switch(config-if)# ip pim sparse-mode
Switch(config-if)# exit
Step 5 Set the attributes for igmp
Switch(config)# interface eth-0-1
Switch(config-if)# ip igmp version 2
Switch(config-if)# ip igmp query-interval 120
Switch(config-if)# ip igmp query-max-response-time 12
Switch(config-if)# ip igmp robustness-variable 3
Switch(config-if)# ip igmp last-member-query-count 3
Switch(config-if)# ip igmp last-member-query-interval 2000
Switch(config-if)# exit
Step 6 Set the maxinum igmp group count(optional)
6.3 ConfiguringPIM-SM
6.3.1 Overview
Brief Introduction
The Protocol Independent Multicasting-Sparse Mode (PIM-SM) is a multicast routing
protocol designed to operate efficiently across Wide Area Networks (WANs) with
sparsely distributed groups. It helps network nodes that are geographically
dispersed to conserve bandwidth, and reduces traffic by simultaneously delivering
a single stream of information to multiple locations.
Principle Description
The PIM-SM module is based on the following IETF standard: RFC 4601
Terminology:
Tree Information Base (TIB): The TIB is the collection of state at a PIM router
storing the state of all multicast distribution trees at that router. It is created
by receiving Join/Prune messages, Assert messages, and IGMP information from
local hosts.
Upstream: Towards to root of the tree. The root of the tree might be either
the Source or the RP.
Downstream: Away from the root of the tree. The root of tree might be
either the Source or the RP.
Source-Based Trees: In the Source-Based Trees concept, the forwarding
paths are based on the shortest unicast path to the source. If the unicast
routing metric is hop counts, the branches of the multicast Source-Based Trees
are minimum hop. If the metric is delay, the branches are minimum delay. For
every multicast source, there is a corresponding multicast tree that directly
connects the source to all receivers. All traffic to the members of an
associated group passes along the tree made for their source. Source-Based
Trees have two entries with a list of outgoing interfaces– the source address
and the multicast group.
Shared Trees:Shared trees or RP trees (RPT) rely on a central router called
the Rendezvous Point (RP) that receives all traffic from the sources, and
forwards that traffic to the receivers. All hosts might not be receivers. There is
a single tree for each multicast group, regardless of the number of sources.
Only the routers on the tree know about the group, and information is sent
only to interested receivers. With an RP, receivers have a place to join, even if
no source exists. The shared tree is unidirectional, and information flows only
from the RP to the receivers. If a host other than the RP has to send data on
the tree, the data must first be tunneled to the RP, and then multicast to the
members. This means that even if a receiver is also a source, it can only use
the tree to receive packets from the RP, and not to send packets to the RP
(unless the source is located between the RP and the receivers).
Bootstrap Router (BSR):When a new multicast sender starts sending data
packets, or a new receiver starts sending the Join message towards the RP for
that multicast group, it needs to know the next-hop router towards the RP. The
BSR provides group-to-RP mapping information to all the PIM routers in a
domain, allowing them to map to the correct RP address.
Sending out Hello Messages: PIM routers periodically send Hello messages to
discover neighboring PIM routers. Hello messages are multicast using the
address 224.0.0.13 (ALL-PIM-ROUTERS group). Routers do not send any
acknowledgement that a Hello message was received. A hold time value
determines the length of time for which the information is valid. In PIM-SM, a
downstream receiver must join a group before traffic is forwarded on the
interface.
Electing a Designated Router: In a multi-access network with multiple
routers connected, one of them is selected to act as a designated router (DR)
DR is deleted, and the interface is removed from the Source and Group lists of
the group.
Forwarding Multicast Packets:PIM-SM routers forward multicast traffic onto
all interfaces that lead to receivers that have explicitly joined a multicast
group. Messages are sent to a group address in the local subnetwork, and have
a Time to Live (TTL) of 1. The router performs an RPF check, and forwards the
packet. Traffic that arrives on the correct interface is sent onto all outgoing
interfaces that lead to downstream receivers if the downstream router has
sent a join to this router, or is a member of this group.
This section provides PIM-SM configuration examples for two relevant scenarios.
The following graphic displays the network topology used in these examples:
Every router includes the ip pim rp-address 11.1.1.1 statement, even if it does not
have any source or group member attached to it.
There is only one RP address for a group scope in the PIM domain.
Step 2 Enter the interface configure mode,set the attributes and ip address, and enable
pim-sm
Configuring on Switch1:
Configuring on Switch2:
Configuring on Switch1:
Configuring on Switch2:
Use the following command to show ip pim sparse-mode rp mapping. 11.1.1.1 is the
RP for all multicast groups 224.0.0.0/4 which is statically configured.
Use the following command to show the pim sparse-mode multicast routes:
Switch1:
Switch2:
Step 2 Enter the interface configure mode,set the attributes and ip address, and enable
pim-sm
Configuring on Switch1:
Configuring on Switch2:
Configuring on Switch1:
Configuring on Switch2:
Configuring on Switch1:
Configuring on Switch2:
The highest priority router is chosen as the RP. If two or more routers have
the same priority, a hash function in the BSR mechanism is used to choose the RP,
to make sure that all routers in the PIM-domain have the same RP for the same
group. Use the ip pim rp-candidate IFNAME PRIORITY command to change the
default priority of any candidate RP.
Use the show ip pim sparse-mode rp mapping command to display the group-to-RP
mapping details. The output displays information about RP candidates. There are
two RP candidates for the group range 224.0.0.0/4. RP Candidate 11.1.1.1 has a
default priority of 192, whereas, RP Candidate 12.1.1.2 has been configured to
have a priority of 2. Since RP candidate 12.1.1.2 has a higher priority, it is selected
as RP for the multicast group 224.0.0.0/24. Only permit filters would be cared in
group list.
Switch2:
RP: 11.1.1.1
Info source: 11.1.1.1, via bootstrap, priority 192
Uptime: 01:55:23, expires: 00:02:13
To display information about the RP router for a particular group, use the following
command. This output displays that 12.1.1.2 has been chosen as the RP for the
multicast group 224.1.1.1.
Switch2:
After RP information reaches all PIM routers in the domain, various state machines
maintain all routing states as the result of Join/Prune from group membership. To
display information on interface details and the multicast routing table, refer to
the Configuring RP Statically section above.
The Bootstrap Router (BSR) mechanism for the class of multicast routing protocols
in the PIM domain use the concept of a Rendezvous Point as a means for receivers
to discover the sources that send to a particular multicast group. The BSR
mechanism is one way that a multicast router can learn the set of group-to-RP
mappings required in order to function.
Some of the PIM routers within a PIM domain are configured as Candidate-RPs (C-
RPs). A subset of the C-RPs will eventually be used as the actual RPs for the domain.
An RP configured with a lower value in the priority field has higher a priority.
Some of the PIM routers in the domain are configured to be Candidate-BSRs (C-
BSRs). One of these C-BSRs is elected to be the bootstrap router (BSR) for the
domain, and all PIM routers in the domain learn the result of this election through
BSM (Bootstrap messages). The C-BSR with highest value in priority field is Elected-
BSR.
The C-RPs then reports their candidacy to the elected BSR, which chooses a subset
of the C-RPs and distributes corresponding group-to-RP mappings to all the routers
in the domain through Bootstrap messages.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Configure the bsr candidate and rp candidate
Switch1:
Switch2:
PIM-SSM is the routing protocol that supports the implementation of SSM and is
derived from PIM sparse mode (PIM-SM).
PIM-SSM can work with PIM-SM on the multicast router. By default, PIM-SSM is
disabled.
Enable pim-ssm on the switch and set the ssm group range as group range specified
in an access list:
The 2 commands above are alternative. The final configuration should over write
the previous one and take effect.
Configuring PIM-SM GR
Graceful restart (GR) is a high availability (HA) technology that ensures nonstop
forwarding during a protocol restart. PIM GR is a multicast protocol GR technology
that ensures normal multicast forwarding during an active/standby switchover on a
switch with two main control units.Currently, PIM GR applies only to PIM-SM.
During an active/standby switchover, the PIM protocol on the new active control
unit needs to learn join states from downstream neighbors and learn group
memberships from IGMP hosts. It does so with the following operations: 1.restore
PIM multicast routing entries on new avtive control; 2.maintain the join state of
downstream neighbors and the multicast data forwarding; 3. stop learning of new
multicast routing entries until GR period end.
PIM GR enables a device to quickly restore PIM routing entries on the new active
main control unit and update multicast forwarding entries on interface cards
quickly after an active/standby switchover. This function minimizes the impact of
the active/standby switchover on multicast traffic forwarding.
6.4 ConfiguringPIM-DM
6.4.1 Overview
Brief Introduction
The Protocol Independent Multicasting-Dense Mode (PIM-DM) is a multicast routing
protocol designed to operate efficiently across Wide Area Networks (WANs) with
densely distributed groups. It helps network nodes that are geographically
dispersed to conserve bandwidth, and reduces traffic by simultaneously delivering
a single stream of information to multiple locations.
PIM-DM assumes that when a source starts sending, all down stream systems want
to receive multicast datagrams. Initially, multicast datagrams are flooded to all
areas of the network. PIM-DM uses RPF to prevent looping of multicast datagrams
while flooding. If some areas of the network do not have group members, PIM-DM
will prune off the forwarding branch by instantiating prune state.
Prune state has a finite lifetime. When that lifetime expires, data will again be
forwarded down the previously pruned branch. Prune state is associated with an
(S,G) pair. When a new member for a group G appears in a pruned area, a router
can “graft” toward the source S for the group, thereby turning the pruned branch
back into a forwarding branch.
Principle Description
The PIM-DM module is based on the following IETF standard: RFC 3973
This section provides PIM-DM configuration examples for two relevant scenarios.
The following graphic displays the network topology used in these examples:
In this example, using the above topology, multicast data stream comes to eth-0-1
of Switch1, host is connected to eth-0-1 of Switch2.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode,set the attributes and ip address, and enable
pim-dm
Configuring on Switch1:
Configuring on Switch2:
Configuring on Switch1:
Configuring on Switch2:
The “show ip pim dense-mode interface” command displays the interface details
for Switch1.
The “show ip pim dense-mode neighbor” command displays the neighbor details for
Switch1.
The “show ip pim dense-mode mroute detail” command displays the IP multicast
routing table.
Switch1:
Switch2:
eth-0-1, in 'olist':
Downstream State: NoInfo
Assert State: NoInfo
Layer 2 multicast groups learned through IGMP snooping are dynamic. If you specify
group membership for a multicast group address statically, your setting supersedes
any automatic manipulation by IGMP snooping. Multicast group membership lists
can consist of both user-defined and IGMP snooping-learned settings
VRRP, RIP and OSPF used multicast IP address, so you need to avoid use such
multicast IP addresses, which have same multicast MAC address with multicast IP
address reserved by VRRP, RIP and OSPF.
VRRP used multicast group address 224.0.0.18, so when igmp snooping and VRRP
are working, you need to avoid using multicast group address that matched same
mac address with group address 224.0.0.18.
OSPF used multicast group address 224.0.0.5, so when igmp snooping and OSFP are
working, you need to avoid using multicast group address that matched same mac
address with group address 224.0.0.18.
RIP used multicast group address 224.0.0.9, so when igmp snooping and RIP are
working, you need to avoid using multicast group address that matched same mac
address with group address 224.0.0.9.
(holding the member ports for a each multicast group) are associated with the
querier. Without a querier the tables are not created and snooping will not work.
6.6 ConfiguringMVR
6.6.1 Overview
Brief Introduction
Multicast VLAN Registration (MVR) is designed for applications using wide-scale
deployment of multicast traffic across an Ethernet ring-based service provider
network (for example, the broadcast of multiple television channels over a service-
provider network). MVR allows a subscriber on a port to subscribe and unsubscribe
to a multicast stream on the network-wide multicast VLAN. It allows the single
multicast VLAN to be shared in the network while subscribers remain in separate
VLANs. MVR provides the ability to continuously send multicast streams in the
multicast VLAN, but to isolate the streams from the subscriber VLANs for
bandwidth and security reasons.
MVR assumes that subscriber ports subscribe and unsubscribe (join and leave) these
multicast streams by sending out IGMP join and leave messages. These messages
can originate from an IGMP version-2-compatible host with an Ethernet connection.
Although MVR operates on the underlying mechanism of IGMP snooping, the two
features operation affect with each other. One can be enabled or disabled with
affecting the behavior of the other feature. If IGMP snooping and MVR are both
enabled, MVR reacts only to join and leave messages from multicast groups
configured under MVR. The switch CPU identifies the MVR IP multicast streams and
their associated MAC addresses in the switch forwarding table, intercepts the IGMP
messages, and modifies the forwarding table to include or remove the subscriber as
a receiver of the multicast stream, and the receivers must be in a different VLAN
from the source. This forwarding behavior selectively allows traffic to cross
between different VLANs.
Principle Description
Terminology:
terminology Description
MVR Multicast Vlan Registration.
Source vlan The vlan for receiving multicast traffic
for MVR.
Source port The port in the source vlan for sending
report or leave to upstream.
Enable MVR in the Switch2, it is required that only one copy of multicast traffic
from Switch1 is sent to Switch2, but HostA and HostC can both receive this
multicast traffic.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Configure on swich1:
Step 3 Enter the interface configure mode,set the attributes and ip address, and enable
pim-sm
Configure on swich1:
Configure on swich2:
Configure on swich2:
Switch(config)# no ip multicast-routing
Switch(config)# mvr
Switch(config)# mvr vlan 111
Switch(config)# mvr group 238.255.0.1 64
Switch(config)# mvr source-address 12.12.12.1
Switch(config)# interface eth-0-1
Switch(config-if)# mvr type source
Switch(config)# interface eth-0-2
Switch(config-if)# mvr type receiver vlan 10
Switch(config)# interface eth-0-3
Switch(config-if)# mvr type receiver vlan 30
Switch(config-if)# exit
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
Switch1
Switch2
Port security feature also binds a MAC to a port so that the port does not forward
packets with source addresses that are outside of defined addresses. If a MAC
addresses configured or learnt on a secure port attempts to access another port,
this is also considered as a security violation.
Static secure MAC addresses: These are manually configured by the interface
configuration command “switchport port-security mac-address”.
Dynamic secure MAC addresses: These are dynamically learnt.
errdisable: discard the packet and set the port to errdisable status. Please
reference to Ethernet configuration guide, chapter errdisable.
protect: discard only.
restrict: discard and record the event in log.
According to the topology above, only receive three Mac entries and discard source
mac 0000.000B.000B after the following configuration:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode,set the attributes, and enable pim-sm
Switch(config)# interface eth-0-1
Switch(config-if)# switchport
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security maximum 3
Switch(config-if)# switchport port-security mac-address 0000.1111.2222 vlan 1
Switch(config-if)# switchport port-security mac-address 0000.aaaa.bbbb vlan 1
Switch(config-if)# switchport port-security violation restrict
Switch(config-if)# exit
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
Switch# show port-security
Port Security Work Mode: Hardware
User can set the action for unknown source MAC packets after the MAC address
table count exceed max by using command line “vlan X mac-limit action”. Three
types of actions are supported:
Discard: Packet with an unknown source MAC address from the vlan will be
discarded and its source MAC address will not be learnt.
Warn: Packet with an unknown source MAC address from the vlan will be
discarded, its source MAC address will not be learnt, but warning log will be
printed in syslog.
Forward: Packets from the vlan will be forwarded without MAC learning or
warning log.
Step 2 Enter the vlan configure mode and create vlan, set the the maximum of MAC
addresses and the action at exceeding
Switch# configure terminal
Switch(config)# vlan database
Switch(config)# vlan 2
Switch(config-vlan)# vlan 2 mac-limit maximum 100
Switch(config-vlan)# vlan 2 mac-limit action discard
Switch(config-vlan)# exit
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
Switch# show vlan-security
Vlan learning-en max-mac-count cur-mac-count action
-------------------------------------------------------
2 Enable 100 0 Discard
7.3 ConfiguringTime-Range
7.3.1 Overview
Brief Introduction
A time range is created that defines specific absolute times or periodic times of the
day and week in order to implement time-based function, such as ACLs. The time
range is identified by a name and then referenced by a function,which by itself
has no relevance. Therefore, the time restriction is imposed on the function itself.
The time range relies on the system clock.
7.4 ConfiguringACL
7.4.1 Overview
Brief Introduction
Access control lists (ACLs) classify traffic with the same characteristics. The ACL
can have multiple access control entries (ACEs), which are commands that match
fields against the contents of the packet. ACLs can filter packets received on
interface by many fields such as ip address, mac address and deny or permit the
packets.
Principle Description
The following terms and concepts are used to describe ACL:
Access control entry (ACE): Each ACE includes an action element (permit or
deny) and a series of filter element based on criteria such as source address,
destination address, protocol, and protocol-specific parameters.
MAC ACL: MAC ACL can filter packet by mac-sa and mac-da, and the mac-
address can be masked, or configured as host id, or configured as any to filter
all MAC addresses. MAC ACL can also filter other L2 fields such as COS, VLAN-ID,
INNER-COS, INNER-VLAN-ID, L2 type, L3 type.
IPv4 ACL: IPv4 ACL can filter packet by ip-sa and ip-da, and ip-address can be
masked, or configured as host id, or configured as any to filter all IPv4 address.
IPv4 ACL can also filter other L3 fields such as DSCP, L4 protocol and L4 fields
such as TCP port, UDP port, and so on.
Time Range: Time range can define a period of time only between which the
ACE can be valid if the ACE is associated to the time range.
In this example, use MAC ACL on interface eth-0-1, to permit packets with source
mac 0000.0000.1111 and deny any other packets. Use IPv4 ACL on interface eth-0-2,
to permit packets with source ip 1.1.1.1/24 and deny any other packets.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create access list
ip access list:
class cmap2
!
interface eth-0-1
service-policy input pmap1
!
interface eth-0-2
service-policy input pmap2
!
Principle Description
Following is a brief description of terms and concepts used to describe the extend
ACL:
Extend IPv4 ACL: Extend IPv4 ACL takes advantages of MAC ACL and IPv4 ACL,
which combines MAC ACE with IPv4 ACE in an ACL to provide more powerful
function of access-controlling traverse packets.
MAC ACE: Filter packets by mac-sa and mac-da, and the mac-address can be
masked, or configured as host id, or configured as any to filter all MAC
addresses. Other L2 fields, such as COS, VLAN-ID, INNER-COS, INNER-VLAN-ID,
L2 type, L3 type, can also be filtered by MAC ACE.
IPv4 ACE: Filter packets by ip-sa and ip-da, and ip-address can be masked, or
configured as host id, or configured as any to filter all IPv4 address. Other L3
fields such as DSCP, L4 protocol and L4 fields, such as TCP port, UDP port, can
also be filtered by IPv4 ACE.
The MAC ACE and IPv4 ACE in an extend IPv4 ACL can be configured alternately in
arbitrary order which is completely specified by user.
In this example, use extend IPv4 ACL on interface eth-0-1, to permit packets with
source mac 0000.0000.1111 and cos value of 2, permit all TCP packets, and deny
any other packets.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create access list
Switch(config)# ip access-list ipxacl extend
Switch(config-ex-ip-acl)# permit src-mac host 0000.0000.1111 dest-mac any cos 2
Switch(config-ex-ip-acl)# permit tcp any any
Switch(config-ex-ip-acl)# deny src-mac any dest-mac any
Switch(config-ex-ip-acl)# end
Step 3 Create class-map, and bind the access list
Switch(config)# class-map cmap
Switch(config-cmap)# match access-group ipxacl
Switch(config-cmap)# exit
Step 4 Create policy-map and bind the class map
Switch(config)# policy-map pmap
Switch(config-pmap)# class cmap
Switch(config-pmap-c)# exit
Switch(config-pmap)# exit
Step 5 Apply the policy to the interface
Switch(config)# interface eth-0-1
Switch(config-if)# service-policy input pmap
Switch(config-if)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
!
Switch# show access-list ip
ip access-list ipxacl extend
10 permit src-mac host 0000.0000.1111 dest-mac any cos 2
20 permit tcp any any
30 deny src-mac any dest-mac any
Principle Description
The following terms and concepts are used to describe ACLv6.
Access control entry (ACE): Each ACE includes an action element (permit or
deny) and a filter element based on criteria such as source address,
destination address, protocol, and protocol-specific parameters.
IPv6 ACL: IPv6 ACL can filter packet by ipv6-sa and ipv6-da, and ipv6-address
can be masked, or configured as host id, or configured as any to filter all IPv6
address. IPv6 ACL can also filter other L3 fields such as L4 protocol and L4
fields such as TCP port, UDP port, and so on.
Time Range: Time range can define a period of time only between which the
ACE can be valid if the ACE is associated to the time range.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable IPv6 globally
Switch(config)# ipv6 enable
Step 3 Create access list
If IPv6 is enabled globally, the IPv6 packet will not obey the MAC ACL rules:
Principle Description
The following terms and concepts are used to describe ACL:
In this example, use Flex MAC ACL on interface eth-0-1, to permit packets with
source mac 0000.0000.1111 and deny any other packets. Use Flex IPv4 ACL on
interface eth-0-2, to permit packets with source ip 1.1.1.1/24 and deny any other
packets.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create access list template
Switch(config)# mac-ip access-list-template template_mac_ip
Switch(config-acl-mac-ip-template)# mac-field src-mac
Switch(config-acl-mac-ip-template)# ip-field src-ip
Switch(config-acl-mac-ip-template)# exit
Step 3 Create flex access list
Switch(config)# end
Step 8 Validation
7.8 ConfiguringPort-Group
7.8.1 Overview
Brief Introduction
Port-group is designed to implement a port group based on ACL rules. Multiple
interfaces can be added to the port group, supporting physical interfaces and
aggregation interfaces. When the user applies ACL policy to the port group, there’s
only one rule and the action of ACL has a aggregate effect.
7.9 ConfiguringVLAN-Group
7.9.1 Overview
Brief Introduction
Vlan-group is designed to implement a vlan group based on ACL rules. Multiple vlan
can be added to the vlan group. When the user applies ACL policy to the vlan group,
there’s only one rule and the action of ACL has a aggregate effect.
member vlan 10
member vlan 20
Principle Description
The following terms and concepts are used to describe ACL: - Access control
entry (ACE): Each ACE includes an action element (permit or deny) and a series of
filter element based on criteria such as source address, destination address,
protocol, and protocol-specific parameters. - COPP ACL:COPP ACL deals with
packets according to their exceptions, the system can support the following
exceptions: any,ipda, fwd-to-cpu, slow-protocol, bpdu, erps, eapol, smart-link,
dhcp, rip,ospf, pim, bgp, vrrp, ldp, ptp, rsvp, icmp-redirect, mcast-rpf-fail,macsa-
mismatch,vlan-security-discard, post-security-discard, ip-option,udld,dot1x-mac-
bypass, 12protocol-tunnel, arp, igmp, ssh, telnet, mlag. COPP only deals with the
packets transmitted to cpu, it will not handle the forwarding packets. - Time
Range: Time range can define a period of time only between which the ACE can be
valid if the ACE is associated to the time range.
In this example, use COPP ACL on interface eth-0-1, to discard the packets with arp
exception transmitted to cpu. In the first place, you can use ixia to create a packet,
Destination Address:001E.0811.065D, Source Address:0000.0010.0000, the type of
arp is arp-request, Sender Hardware Address:0000.0000.0000, Target Protocol
Address:10.0.0.1,the rest configuration information is as follows.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create copp access list
arp 1029059 0
total 1029059 0
7.11 ConfiguringDot1x
7.11.1 Overview
Brief Introduction
IEEE 802 Local Area Networks are often deployed in environments that permit
unauthorized devices to be physically attached to the LAN infrastructure, or Permit
unauthorized users to attempt to access the LAN through equipment already
attached.
Port-based network access control makes use of the physical access characteristics
of IEEE 802 LAN infrastructures in order to provide a means of authenticating and
authorizing devices attached to a LAN port that has point-to-point connection
characteristics, and of preventing access to that port in cases in which the
authentication and authorization process fails.
With 802.1X port-based authentication, the devices in the network have specific
roles:
Client: the device (PC) that requests access to the LAN and switch services and
responds to requests from the switch. The client software with support the
follow the 802.1X standard should run on the PC. For linux system, we
recommend the application which named “xsupplicant”.
Authentication server: performs the actual authentication of the client. The
authentication server validates the identity of the client and notifies the
switch whether or not the client is authorized to access the LAN and switch
services. Because the switch acts as the proxy, the authentication service is
transparent to the client. In this release, the Remote Authentication Dial-In
User Service (RADIUS) security system with Extensible Authentication Protocol
(EAP) extensions is the only supported authentication server. RADIUS operates
in a client/server model in which secure authentication information is
exchanged between the RADIUS server and one or more RADIUS clients.
Switch (edge switch or wireless access point): controls the physical access to
the network based on the authentication status of the client. The switch acts
Principle Description
Reference to IEEE Std 802.1X- 2004
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable dot1x globally
Switch(config)# dot1x system-auth-ctrl
Step 3 Enter the interface configure mode, set the attributes of the interface and enable
dot1x
Switch(config)# interface eth-0-25
Switch(config-if)# switchport mode access
Switch(config-if)# dot1x port-control auto
Switch(config-if)# no shutdown
Switch(config-if)# exit
session 1: 1 - 0011.0100.0001
----------------------------------------
user name : admin
abort:F fail:F start:F timeout:F success:T
PAE: state: Authenticated - portMode: Auto
PAE: reAuthCount: 0 - rxRespId: 0
BE: state: Idle - reqCount: 0 - idFromServer: 5
force-authorized:
force-unauthorized:
Device sends accounting start request to server after user is authenticated when
dot1x accounting is enabled, if no corresponding response is received, start-fail
policy is needed :
online:In order to avoid the impact of network failure on users, online policy
can be configured to allow users to be online.
User can configure realtime accounting to make device send realtime accounting
request to server periodically. Server keeps accounting users only when received
realtime accounting request, so that abnormal accounting can be avoided when
server can not receive accounting stop packet from device.
Meanwhile, user can configure max times of realtime accounting with no response
and the action when realtime accounting fails. By default, the max times of
realtime accounting with no response is set to 3, and user is allowed to be online
after realtime accounting failure.
Enable dot1x handshake with client on a port; Specify the handshake period.
Figure 7-9 Configure the shared-key, authorization port and account port
When the authentication server does not receive a response to its EAPOL
request/identity frame, clients that are not 802.1x-capable are put into the guest
VLAN for the port, if one is configured. However, the server does not grant 802.1x-
capable clients that fail authentication access to the network. Any number of hosts
is allowed access when the switch port is moved to the guest VLAN.
The guest VLAN feature is not supported on internal VLANs (routed ports) or trunk
ports; it is supported only on access ports.
Guest VLAN is supported on access port, and not supported on routed port or trunk
port.
In the above topology, eth-0-22 is an IEEE 802.1X enabled port, and it is in the
native VLAN 10, the configured guest VLAN for this port is VLAN 20. So clients that
are not 802.1X capable will be put into VLAN 20 after the authenticator had send
max EAPOL request/identity frame but got no response.
We use remote linux Radius server as authenticate server, the server’s address is
202.38.100.7, and the IP address for the connected routed port eth-0-23 is
202.38.100.1. When the client is authenticated by the radius server, then it can
access the public internet which is also in VLAN 10.
2. Configuration Steps
Step 1 Enter the configure mode
Init state:
portEnabled : true
portControl : Auto
portMode : Port based
portStatus : Unauthorized
Mac Auth bypass : disabled
reAuthenticate : disabled
reAuthPeriod : 3600
Max user number : 255
Current session number : 0
Accept user number : 0
Reject user number : 0
Guest VLAN : 20
Assign VLAN : N/A
QuietPeriod : 60
ReqMax : 2
TxPeriod : 30
SuppTimeout : 30
ServerTimeout : 30
CD: adminControlledDirections : in
CD: operControlledDirections : in
CD: bridgeDetected : false
========================================
unauthorized:
session 1: 1 - 0011.0100.0001
----------------------------------------
user name : admin
abort:F fail:T start:F timeout:F success:F
PAE: state: Held - portMode: Auto
PAE: reAuthCount: 1 - rxRespId: 0
BE: state: Idle - reqCount: 0 - idFromServer: 92
eth-0-39(u) eth-0-40(u)
eth-0-41(u) eth-0-42(u)
eth-0-43(u) eth-0-44(u)
eth-0-45(u) eth-0-46(u)
eth-0-47(u) eth-0-48(u)
10 VLAN0010 ACTIVE 0 Disable
20 VLAN0020 ACTIVE 0 Disable eth-0-22(u)
Client is authenticated
authorized:
session 1: 1 - 0011.0100.0001
----------------------------------------
user name : admin
abort:F fail:F start:F timeout:F success:T
PAE: state: Authenticated - portMode: Auto
PAE: reAuthCount: 0 - rxRespId: 0
BE: state: Idle - reqCount: 0 - idFromServer: 207
eth-0-17(u) eth-0-18(u)
eth-0-19(u) eth-0-20(u)
eth-0-21(u) eth-0-24(u)
eth-0-25(u) eth-0-26(u)
eth-0-27(u) eth-0-28(u)
eth-0-29(u) eth-0-30(u)
eth-0-31(u) eth-0-32(u)
eth-0-33(u) eth-0-34(u)
eth-0-35(u) eth-0-36(u)
eth-0-37(u) eth-0-38(u)
eth-0-39(u) eth-0-40(u)
eth-0-41(u) eth-0-42(u)
eth-0-43(u) eth-0-44(u)
eth-0-45(u) eth-0-46(u)
eth-0-47(u) eth-0-48(u)
10 VLAN0010 ACTIVE 0 Disable eth-0-22(u)
20 VLAN0020 ACTIVE 0 Disable
Verify that each of these intercepted packets has a valid IP-to-MAC address binding
before updating the local ARP cache or before forwarding the packet to the
appropriate destination.
ARP inspection determines the validity of an ARP packet based on valid IP-to-MAC
address bindings stored in a trusted database, the DHCP snooping binding database.
This database is built by DHCP snooping if DHCP snooping is enabled on the VLANs
and on the switch. If the ARP packet is received on a trusted interface, the switch
forwards the packet without any checks. On entrusted interfaces, the switch
forwards the packet only if it is valid.
Principle Description
Following is a brief description of terms and concepts used to describe the ARP
Inspection:
DHCP Snooping: DHCP snooping is a security feature that acts like a firewall
between untrusted hosts and trusted DHCP servers. This feature builds and
maintains the DHCP snooping binding database, which contains information
about untrusted hosts with leased IP addresses.
Address Resolution Protocol (ARP): ARP provides IP communication within a
Layer 2 broadcast domain by mapping an IP address to a MAC address. For
example, Host B wants to send information to Host A , but it does not have the
MAC address of Host A in its ARP cache. Host B generates a broadcast message
for all hosts within the broadcast domain to obtain the MAC address associated
with the IP address of Host A. All hosts within the broadcast domain receive
the ARP request, and Host A responds with its MAC address.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
=================================================================
2 0 0 0
Validate DHCP messages received from untrusted sources and filters out invalid
messages.
Build and maintain the DHCP snooping binding database, which contains
information about untrusted hosts with leased IP addresses.
Utilize the DHCP snooping binding database to validate subsequent requests
from untrusted hosts.
Other security features, such as dynamic ARP inspection (DAI), also use information
stored in the DHCP snooping binding database. DHCP snooping is enabled on a per-
VLAN basis. By default, the feature is inactive on all VLANs. You can enable the
feature on a single VLAN or a range of VLANs. The DHCP snooping feature is
implemented in software basis. All DHCP messages are intercepted in the BAY and
directed to the CPU for processing.
This figure is the networking topology for testing DHCP snooping functions. We
need two Linux boxes and one switch to construct the test bed.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 12
Switch(config-vlan)# exit
Step 3 Enter the interface configure mode, add the interface into the vlan
Switch(config)# interface eth-0-12
Switch(config-if)# switchport
Switch(config-if)# switchport access vlan 12
Switch(config-if)# dhcp snooping trust
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-11
Switch(config-if)# switchport
Switch(config-if)# switchport access vlan 12
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface vlan 12
Switch(config-if)# ip address 12.1.1.1/24
Switch(config-if)# exit
Step 4 Set DHCP attributes
Switch(config)# dhcp snooping verify mac-address
Switch(config)# service dhcp enable
Switch(config)# dhcp snooping
Switch(config)# dhcp snooping vlan 12
Step 5 Exit the configure mode
Switch(config)# exit
Step 6 Validation
IP source guard uses source IP address filtering, which filters the IP traffic that is
based on its source IP address. Only the IP traffic with a source IP address that
matches the IP source binding entry is permitted. A port’s IP source address filter is
changed when a new DHCP-snooping binding entry for a port is created or deleted.
The port ACL is modified and reapplied in the hardware to reflect the IP source
binding change. By default, if you enable IP source guard without any DHCP-
snooping bindings on the port, a default ACL that denies all IP traffic is installed on
the port. When you disable IP source guard, any IP source filter ACL is removed
from the port.
Also IP source guard can use source IP and MAC address Filtering. When IP source
guard is enabled with this option, IP traffic is filtered based on the source IP and
Mac addresses. The switch forwards traffic only when the source IP and MAC
addresses match an entry in the IP source binding table. If not, the switch drops all
other types of packets except DHCP packet.
The switch also supports to have IP, MAC and VLAN Filtering. When IP source guard
is enabled with this option, IP traffic is filtered cased on the source IP and MAC
addresses. The switch forwards traffic only when the source IP, MAC addresses and
VLAN match an entry in the IP source binding table.
Principle Description
The following terms and concepts are used to describe the IP source guard:
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable arp as-layer-3
Switch(config)# arp as-layer-3 enable
Step 3 Enter the vlan configure mode and create vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 3
Switch(config-vlan)# exit
Step 4 Enter the interface configure mode and set the attributes
Switch(config)# interface eth-0-16
Switch(config-if)# switchport
Switch(config-if)# no shutdown
Switch(config-if)# switchport access vlan 3
Switch(config-if)# exit
Step 5 Add IP source guard entries
Remove by interface:
Remove by vlan:
Remove all:
7.16 ConfiguringPrivate-VLAN
7.16.1 Overview
Brief Introduction
Private-vlan a security feature which is used to prevent from direct l2
communication among a set of ports in a vlan.
It can provide a safer and more flexible network solutions by isolating the ports
which in the same VLAN.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create vlan
Switch (config)# vlan database
Switch (config-vlan)# vlan 2
Switch (config-vlan)# quit
Step 3 Enter the interface configure mode and set the attributes
Promiscuous port: promiscuous port in pvlan can communicate with any other
ports in this pvlan
Isolate port: isolate port in pvlan can only communicate with promiscuous port in
this pvlan
7.17 ConfiguringAAA
7.17.1 Overview
Brief Introduction
Authentication verifies users before they are allowed access to the network and
network services. System can use AAA authentication methods and Non-AAA
authentication methods. RADIUS Authentication is one of AAA authentication
methods. RADIUS is a distributed client/server system that secures networks
against unauthorized access. RADIUS is widely used protocol in network
The figure above is the networking topology for RADIUS authentication functions.
We need one Switch and two computers for this test.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable AAA
Switch(config)# aaa new-model
Switch(config)# aaa authentication login radius-login radius local
Step 3 Configure Radius server
Switch(config)# radius-server host 1.1.1.2 auth-port 1819 key keyname
Switch(config)# radius-server host 2001:1000::1 auth-port 1819 key keyname
Step 4 Configure a layer 3 interface and set ip address
Switch(config)# interface eth-0-23
Switch(config-if)# no switchport
Switch(config-if)# ip address 1.1.1.1/24
Switch(config-if)# quit
Step 5 set authentication mode
Switch(config)# line vty 0 7
Switch(config-line)#login authentication radius-login
Switch(config-line)#privilege level 4
Switch(config-line)#no line-password
Telnet output:
Make sure the cables is linked correctly You can use command to check log
messages if Switch can’t do RADIUS authentication:
7.18 ConfiguringTACACS+
7.18.1 Overview
Brief Introduction
Authentication verifies users before they are allowed access to the network and
network services. System can use AAA authentication methods and Non-AAA
authentication methods. TACACS+ Authentication is one of AAA authentication
methods. TACACS+ is a distributed client/server system that secures networks
against unauthorized access. TACACS+ is widely used protocol in network
environments. It is commonly used for embedded network devices such as routers,
modem servers, switches, etc. TACACS+ clients run on support routers and switches.
Clients send authentication requests to a central TACACS+ server, which contains all
user authentication and network service access information.
The figure above is the networking topology for TACACS+ authentication functions.
We need one Switch and two computers for this test. One computer as TACACS+
server, it ip address of the eth0 interface is 1.1.1.2/24. Switch has TACACS+
authentication function. The ip address of interface eth-0-23 is 1.1.1.1/24. The
management ip address of switch is 10.10.29.215, management port (only in-band
management port) is connected the PC for test login, PC’s ip address is 10.10.29.10
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable AAA
Switch# configure terminal
Switch(config)# aaa new-model
Switch(config)# aaa authentication login tac-login tacacs-plus local
Switch(config)# aaa authorization exec default tacacs-plus
Switch(config)# aaa accounting exec default start-stop tacacs-plus
Switch(config)# aaa accounting commands default tacacs-plus
Step 3 Configure tacacs+ server
Switch(config)# tacacs-server host 1.1.1.2 port 123 key keyname primary
Step 4 Configure a layer 3 interface and set ip address
Switch(config)# interface eth-0-23
Switch(config-if)# no switchport
Switch(config-if)# ip address 1.1.1.1/24
Switch(config-if)# quit
Step 5 set authentication mode
Switch(config)# line vty 0 7
Switch(config-line)#login authentication tac-login
Switch(config-line)#privilege level 4
Switch(config-line)#no line-password
Step 6 Exit the configure mode
Switch(config-line)# end
Step 7 Validation
Telnet output:
It can provide a safer and more flexible network solutions by isolating the ports
which in the same VLAN.
Port 1 and port 8 are in the same isolate group 1, they are isolated. So port1 can
not communicate with port 8. Port 9 is in a different isolate group 3, so port 9 can
communicate with port 1 and port 8.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the port isolate mode globally
The mode “l2” means only layer 2 packets are isolated. The mode “all” means all
packet are isolated include the packets forward according to layer 3 routes.
Groups ID: 3
eth-0-9
7.20 ConfiguringDDoS
7.20.1 Overview
Brief Introduction
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS
attack) is an attempt to make a computer resource unavailable to its intended
users. Although the means to carry out, motives for, and targets of a DoS attack
may vary, it generally consists of the concerted efforts of a person or people to
prevent an Internet site or service from functioning efficiently or at all,
temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or
services hosted on high-profile web servers such as banks, credit card payment
gateways, and even root name servers. The term is generally used with regards to
computer networks, but is not limited to this field, for example, it is also used in
reference to CPU resource management.
DDoS prevent is a feature which can protect our switch from follow kinds of denial-
of-service attack and intercept the attack packets.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set DDoS
Enable ICMP flood intercept and set the max received ICMP packet rate 100 packets
per-second
Enable UDP flood intercept and set the max received UDP packet rate 100 packets
per-second
Enable SYN flood intercept and set the max received SYN packet rate 100 packets
per-second
Enable Small-packet attack intercept and set the received packet length is be more
than or equal to 32
Switch(config)# end
Step 4 Validation
Switch# show ip-intercept config
Current DDoS Prevent configuration:
============================================================
ICMP Flood Intercept :Enable Maxcount:500
UDP Flood Intercept :Enable Maxcount:500
SYN Flood Intercept :Enable Maxcount:500
Small-packet Attack Intercept :Enable Packet Length:45
Smurf Attack Intercept :Enable
Fraggle Attack Intercept :Enable
MAC Equal Intercept :Enable
IP Equal Intercept :Enable
Switch# show ip-intercept statistics
Current DDoS Prevent statistics:
============================================================
Resist Small-packet Attack packets number : 1730
Resist ICMP Flood packets number : 0
Resist SYN Flood packets number : 0
Resist Fraggle Attack packets number : 0
Resist UDP Flood packets number : 0
Current DDoS Prevent mgmt-if statistics:
============================================================
Resist ICMP Flood packets number : 0
Resist SYN Flood packets number : 0
Resist Fraggle Attack packets number : 0
Resist UDP Flood packets number : 0
If you are using keys as the security method, you must specify the lifetime for the
keys and change the keys on a regular basis when they expire. To maintain stability,
each party must be able to store and use more than one key for an application at
the same time. A keychain is a sequence of keys that are collectively managed for
authenticating the same peer, peer group, or both. Keychain groups a sequence of
keys together under a keychain and associates each key in the keychain with a
lifetime.
To display the keychain configuration, use the command show key chain in the
privileged EXEC mode“
7.22 ConfiguringPort-Block
7.22.1 Overview
Brief Introduction
By default, the switch floods packets with unknown destination MAC addresses out
of all ports. If unknown unicast and multicast traffic is forwarded to a protected
port, there could be security issues. To prevent unknown unicast or multicast
traffic from being forwarded from one port to another, you can block a port
(protected or unprotected) from flooding unknown unicast or multicast packets to
other ports.
To display the port-block configuration, use the command show port-block in the
privileged EXEC mode:
8.1 ConfiguringSTM
8.1.1 Overview
Brief Introduction
Switch Table Management (STM) is used to configure system resources in the switch
to optimize support for specific features, depending on how the switch is used in
the network.
You can select a profile to provide maximum system usage for some functions; for
example, use the default profile to balance resources and use vlan profile to obtain
max MAC entries.
layer2: The VLAN template supports the maximum number of unicast MAC
addresses. It would typically be selected for a Layer 2 switch.
layer3: The routing template maximizes system resources for unicast routing,
typically required for a router or aggregator in the center of a network.
ipv6: The ipv6 template,support the ipv6 functions.
mpls: The mpls template supports the maximum number of MPLS/MAC entries.
default: The default template gives balance to all functions.
When users configured a profile mode which is not exist in the next reboot
image, then default hardware configure will be used when system up with the next
image. The hardware configure may be different from the default profile.
You must reload the switch for the configuration to take effect.
Use the “stm prefer layer2” global configuration command only on switches
intended for Layer 2 switching with no routing.
Do not use the layer3 profile if you do not have routing enabled on your switch.
The stm prefer layer3 global configuration command prevents other features from
using the memory allocated to IPv4 unicast routing in the routing profile.
8.2 ConfiguringSyslog
8.2.1 Overview
Brief Introduction
The system message logging software can save messages in a log file or direct the
messages to other devices. The system message logging facility has these features:
By default, the switch logs normal but significant system messages to its internal
buffer and sends these messages to the system console. You can specify which
system messages should be saved based on the type of the severity level. The
messages are time-stamped to enhance real-time debugging and management.
You can access the logged system messages using the switch command-line
interface (CLI) or by saving them to a properly configured log server. The switch
software saves the log messages in an internal buffer that can store up to 1000
messages. You can monitor the system messages remotely by accessing the switch
through Telnet or the console port, or by viewing the logs on a log server.
Principle Description
Terminology:
Terminology Description
Logging Current logging configuration
Show Show logging configuration
Levels Severity level information
Enable Enable write log to local file
Disable Disable write log to local file
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable logging server and set the attributes
Switch(config)# logging server enable
Switch(config)# logging server address 1.1.1.1
Switch(config)# logging server address 2001:1000::2
Switch(config)# logging server severity debug
Switch(config)# logging server facility mail
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
Switch# show logging
Current logging configuration:
============================================================
logging buffer 500
logging timestamp bsd
logging file enable
logging level file warning
logging level module debug
logging server enable
logging server severity debug
logging server facility mail
logging server address 1.1.1.1
logging server address 2001:1000::2
logging alarm-trap enable
logging alarm-trap level middle
logging merge enable
logging merge fifo-size 1024
logging merge timeout 10
logging operate disable
8.3 ConfiguringMirror
8.3.1 Overview
Brief Introduction
Mirror function can send one or more copies of packets which are passing through
the ports/vlans or sending and receiving by CPU to one or more specified
destination ports. It can also send the copies to the CPU and keep in memory or
flash files.
The copies of the packets are used for network analyze. The mirror function does
not affect the original network traffic.
Principle Description
1. 1.Mirror session
A mirror session is an association of a mirror destination with one or more mirror
source. The mirror destination and mirror source will describe later.
Mirror sessions do not interfere with the normal operation of the switch. However,
an oversubscribed mirror destination, for example, a 10-Gbps port monitoring a
100-Gbps port, results in dropped or lost packets.
2. Mirror direction
The device supports to set the direction of the mirror source, there are 3 options
for choose: TX/RX/BOTH.
Receive (RX) mirror: The goal of receive (or ingress) mirror is to monitor as much
as possible packets received by the source interface or VLAN before any
modification or processing is performed by the switch. A copy of each packet
received (except these packets: BPDU, LACPDU, BMGPDU, packets have been
discarded by IP-MAC binding check for Vlan_based mirror, CRC error packets for
both Port_based and vlan_based mirror) by the source is sent to the destination
port for that mirror session. You can monitor a series or range of ingress ports or
VLANs in a mirror session. Packets that are modified because of routing are copied
without modification; that is, the original packet is copied. Packets that are
modified because of quality of service (QoS)—for example, modified Differentiated
Services Code Point (DSCP)—are copied with modification. Packets that are
modified because of VLAN translation or VLAN classification is copied with the
modification. Some features that can cause a packet to be dropped during receive
processing have no effect on mirror, the destination port can receive a copy of the
packet even if the actual incoming packet is dropped. These features include
ingress ACL, VLAN’s ingress filter, MAC filter, STP, VLAN tag control, port security,
unknown routing packets.
Transmit (TX) mirror: The goal of transmit (or egress) mirror is to monitor as much
as possible packets sent by the source interface after all modification and
processing is performed by the switch. A copy of each packet (except these packets:
packets from CPU port for Vlan_based mirror, mirroring packets for both
Port_based and vlan_based mirror) sent by the source is sent to the destination
port for that mirror session. Some features that can cause a packet to be dropped
during transmit processing might have affect on mirror.
Both: In a mirror session, you can monitor a single port for both received and sent
packets.
3. Mirror source
The Mirror source is the original traffic of the network. The types of source are
described as following:
Source VLAN: A source vlan is a vlan which need to be monitored. User should
create a vlan interface before set a vlan as mirror source.
CPU:User can set CPU as mirror source to monitor the packets send to or receive
from the CPU. The copies of packets send to the mirror destination are before cpu-
traffic-limit process. Only session 1 support CPU as mirror source currently.
4. Mirror destination
Mirror function will copy the packets and sent the copies to the mirror destination.
Local destination port: The destination port should be a physical port or link agg
port, member of link agg port is not supported. The destination port has these
characteristics:
CPU destination:send the copies of packet to the CPU of current device. If there
is no analyzer available, user can use CPU as mirror destination and save the result
for user or developers analyze packets.
You can analyze network traffic passing through ports or vlans by using mirror
function to send a copy of the traffic to another port on the switch that has been
connected to a Switch Probe device or other Remote Monitoring (RMON) probe or
security device. However, when there is no other monitoring device for capturing
packets, normal mirror destination to ports doesn’t work. So we can set CPU as
mirror destination to send a copy of the traffic to CPU for storing packets. It
supports the cli to display the packets of mirror CPU and write the packets in a text
file. It is a very functional debug tool. Mirror does not affect the switching of
network traffic on source ports or source vlans; a copy of the packets received or
sent by the source interfaces are sent to the destination CPU. The cpu-traffic-limit
rate can be configured. CPU can participate as a destination in only one mirror
session.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the destination of mirror
Switch(config)# interface eth-0-2
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# monitor session 1 destination interface eth-0-2
Step 3 Set the source of mirror
Switch(config)# monitor session 1 source interface eth-0-1 both
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Switch# show monitor session 1
Session 1
----------
Status : Valid
Type : Local Session
Source Ports :
Receive Only :
Transmit Only :
Both : eth-0-1
Source VLANs :
Receive Only :
Transmit Only :
Both :
Destination Port : eth-0-2
----------
Status : Valid
Type : Local Session
Source Ports :
Receive Only :
Transmit Only :
Both :
Source VLANs :
Receive Only : 10
Transmit Only :
Both :
Destination Port : eth-0-2
Copy the packets of eth-0-1 and send them to eth-0-2 and eth-0-3
The rules of mirror source are same as single destination port. The following case
use source port for example.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the destination group of mirror
Switch(config)# interface eth-0-2
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-3
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# monitor session 1 destination group 1
Switch(config-monitor-d-group)# member eth-0-2
Switch(config-monitor-d-group)# member eth-0-3
Switch(config-monitor-d-group)# exit
Step 3 Set the source of mirror
Switch(config)# interface eth-0-1
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# monitor session 1 source interface eth-0-1
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Session 1
----------
Status : Valid
Type : Local Session
Source Ports :
Receive Only :
Transmit Only :
Both : eth-0-1
Source VLANs :
Receive Only :
Transmit Only :
Both :
Destination Port : eth-0-2 eth-0-3
If local device cannot connect to an analyzer directly, User can choose remote
mirror to send the copies of packets with specified vlan tag.
The remote device can pick out the packets with this vlan for analyze.
The following example copies the packets form Switch1’s eth-0-1, and send them
to Switch2 via Switch1’s eth-0-2. Switch2 sends these packets to the analyzer.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the destination of mirror
Switch(config)# vlan database
Switch(config-vlan)# vlan 15
Switch(config-vlan)# exit
Switch(config-if)# exit
4. Add both ports in to the same vlan (15), and make the packet flood in this
vlan
Switch# configure terminal
Switch(config)# no spanning-tree enable
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Set the destination of mirror
Switch(config)# monitor session 1 destination cpu
Step 5 Optional s
Set the action after the packet buffer is exceeded: “drop” means discard the latest
packet; “replace” means discard the oldest packet.
This example shows how to set up a mirror session, session 1, for monitoring source
port traffic to a destination cpu. You can use show monitor session to see the
configuration.
This example shows how to display the mirror cpu traffic-limit rate:
Switch# ls flash:/mirror
Directory of flash:/mirror
total 8
-rw-r----- 1 2287 Dec 23 01:16 MirCpuPkt-2016-12-23-01-15-54.txt
-rw-r----- 1 2568 Jan 3 11:41 MirCpuPkt-2017-01-03-11-41-33.txt
14.8T bytes total (7.9T bytes free)
This example shows how to display the files of the flash. *.pcap files can open with
packets analyzer applications such as wireshark. Please referenc to the “ftp” and
“tftp” part to download the files.
Switch#ls flash:/mirror
Directory of flash:/mirror
total 12
-rw-r----- 1 2287 Dec 23 01:16 MirCpuPkt-2016-12-23-01-15-54.txt
-rw-r----- 1 2568 Jan 3 11:41 MirCpuPkt-2017-01-03-11-41-33.txt
-rw-r--r-- 1 704 Jan 3 13:07 test.pcap
14.8T bytes total (7.9T bytes free)
This example shows how to display the actions after the buffer is full
Before you can assign switch information, make sure you have connected a PC or
terminal to the console port, and configured the PC or terminal software
parameters to match the default console port parameters. After login in the switch,
you can modify the console parameters.
After the above setting, console port parameter has been changed, and the PC or
terminal can’t configure the switch by console port. You must update PC or
terminal console speed from 115200 to 19200 to match the new console parameter
and can continue configure the switch by console port.
Configuring Temperature
The switch supports temperature alarm management. You can configure three
temperature thresholds: low, high and critical. When switch temperature is lower
than low threshold or higher than higher threshold, the switch will be alarm. If the
switch temperature is higher than critical threshold, the switch will cut off its
power automatically.
Switch(config)# temperature 5 70 90
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
Switch# show environment
---------------------------------------------------------
Sensor status (Degree Centigrade):
Index Temperature Lower_alarm Upper_alarm Critical_limit
1 50 5 70 90
Configuring Fan
The switch supports to manage fan automatically. If the fan is fail or the fan tray is
absent, the switch will be alarm. And if the fan tray supports speed-adjust, the
switch can adjust the fan speed depending on the real-time temperature. The
switch has three temperature thresholds: Tlow=50, Thigh=65 and Tcrit=80 Celsius
scales. If Temperature<Tlow, the fan will stall; if Tlow<=Temperature<Thigh, the
fan will run on 30% speed rate; if Thigh<=Temperature<Tcrit, the fan will run on 70%
speed rate; if Tcrit>=Temperature, the fan will run on 100% speed rate. And there
has a temperature hysteresis Thyst=2 Celsius scales. Assuming temperature has
previously crossed above Tlow, Thigh or Tcrit, then the temperature must drop
below the points corresponding Thyst(Tlow-Thyst, Thigh-Thyst or Tcrit-Thyst) in
order for the condition to drive fan speed rate to lower level. For example:
The Tlow, Thigh, Tcrit, Thyst and fan speed rate for each temperature threshold
are hard code, and couldn’t be modified.
Configuring Power
The switch supports to manage power status automatically. If the power is failed or
the fan in power is failed, the switch will be alarm. If power is removed or inserted,
the switch will notice user also.
User can show the power status to verify the power status.
Configuring Transceiver
The switch supports manage the transceiver information, and the transceiver
information includes basic information and diagnostic information. The basic
information includes transceiver type, vendor name, PN, S/N, wavelength and link
length for supported type. The diagnostic information includes real-time
temperature, voltage, current, optical transmit power, optical receive power and
the threshold about these parameters. If the transceiver is inserted or removed,
the real-time parameter is out of threshold, the switch will notice the users.
Upgrade bootrom
The switch supports to upgrade the bootrom image when system is running. And
after upgrading, you must reboot the switch to take effect.
After the above setting, you can show uboot version information of platform:
Upgrade EPLD
The switch supports to upgrade the EPLD image when system is running. And after
upgrading, you must reboot the switch to take effect.
After the above setting, then power off and restart the device,you can show epld
version information with command:
8.5 ConfiguringBootrom
8.5.1 Overview
Brief Introduction
The main function of Bootrom is to initialize the board simply and load the system
image to boot. You can use some necessary commands in bootrom mode.
Bootrom can load the system image both from TFTP server and persistent storage
like flash. Then you can configure the Switch and TFTP server IP address as
environment variables in Bootrom mode for boot the system image.
2. Method 3: Boot the system from TFTP server and reboot automatically
bootrom:> boot_tftp OS-ms-v3.1.9.it.r.bin
3. Method 4: Boot the system from TFTP server and reboot automatically
without password
bootrom:> boot_tftp_nopass OS-ms-v3.1.9.it.r.bin
4. Validation
After the above setting, you can get show information:
bootrom:> reset
………………..
TFTP from server 10.10.29.160; our IP address is 10.10.29.118
Filename 'OS-ms-v3.1.9.it.r.bin'.
Load address: 0xaa00000
Loading: octeth0: Up 100 Mbps Full duplex (port 0)
#################################################################
#####################
done
Bytes transferred = 12314539 (bbe7ab hex), 1829 Kbytes/sec
4. Boot the system from FLASH and reboot automatically without password
bootrom:> boot_flash_nopass OS-ms-v3.1.9.it.r.bin
Do you want to revert to the default config file ? [Y|N|E]:Y
5. Validation
After the above setting, you can get show information:
bootrom:> reset
……
Do you want to revert to the default config file ? [Y|N|E]:Y
### JFFS2 loading '/boot/OS-ms-v3.1.9.it.r.bin' to 0xaa00000
Scanning JFFS2 FS: . done.
### JFFS2 load complete: 12314539 bytes loaded to 0xaa00000
## Booting image at 0aa00000 ...
Verifying Checksum ... OK
Uncompressing Kernel Image ... OK
……
Set boot IP
Step 1 Set Switch IP address , details information as follows
bootrom:> setenv ipaddr 10.10.29.101
bootrom:> saveenv
Step 2 Set TFTP server IP address , details information as follows
bootrom:> setenv serverip 10.10.29.160
bootrom:> saveenv
Step 3 validation
bootrom:> printenv
printenv
bootdelay=5
baudrate=9600
download_baudrate=9600
…………………
stderr=serial
ipaddr=10.10.29.101
serverip=10.10.29.160
Environment size: 856/2044 bytes
Upgrade bootrom
Step 1 upgrade the Bootrom image from TFTP server
bootrom:> upgrade_uboot bootrom.bin
Step 2 validation
bootrom:> version
version
Bootrom 3.0.3 (Development build) (Build time: Aug 4 2011 - 11:47:06)
Set gateway IP
Step 1 Set Switch gateway IP address , details information as follows
bootrom:> setenv gatewayip 10.10.37.1
bootrom:> saveenv
Step 2 Set network mask , details information as follows
bootrom:> setenv netmask 255.255.255.0
bootrom:> saveenv
Step 3 validation
bootrom:> printenv
printenv
bootdelay=5
baudrate=9600
download_baudrate=9600
…………………
stderr=serial
gatewayip=10.10.38.1
netmask=255.255.255.0
Environment size: 856/2044 bytes
Use this command to display the diagnostic bootup level for current and next.
Note that we use deploy file to control the configuration file and image file
downloaded by switch. Switch fetch these file according the deploy file, which is a
XML-formatted file. The deploy file named smartdeploy.xml , while its content like
below:
<SmartDeploy>
<ftype>init</ftype>
<hostprefix>Bruce</hostprefix>
<defItem>
<option>enable</option>
<image>def.bin</image>
<config>def.cfg</config>
</defItem>
<groups>
<Item>
<type>MAC</type>
<value>001e.0808.9100</value>
<image>switchOs.bin</image>
<config>startup.cfg</config>
</Item>
<Item>
<type>productid</type>
<value>09SWITCH-E48-10</value>
<image>productid.bin</image>
<config>productid.cfg</config>
</Item>
<Item>
<type>SN</type>
<value>E054GD116004</value>
<image>sn.bin</image>
<config>sn.cfg</config>
</Item>
</groups>
</SmartDeploy>
There are three kind of item used by switch to find out image file and configuration
file fit itself. Switch will search fit item according sequence like MAC, SN , product-
id。We just specify the file name in the deploy file, and place all these file on tftp
server.
This figure is the network topology of testing SmartConfig function,We need two
switches and two linux boxes to construct the test bed。”switch” in the figure is
the switch we enable SmartCofng on. Note that the address of TFTP server
provided by DHCP server can be used by switch to connect to TFTP server directly
or via routes.
Enable smartConfig
Step 1 Enter the configure mode
Switch#configure terminal
Step 2 Enable smartConfige
Switch(config)#smart-config initial-switch-deployment
Step 3 Exit the configure mode
Switch (config)#exit
Step 4 Validation
initial-switch-deployment: on
hostname-prefix: on
Send log message to console: on
Using smartConfig
SmartConfig was enable default , so we just make sure there is no startup-
config.conf file. Then switch will start SmartConfig next boot. And we can delete
startup-config.conf manually, so that Smartconfig will work after reboot. Procedure
of configure SmartConfig as fallow:
smartconfig/
|--conf/
|--images/
|--smartdeploy.xml
Step 2 Configuring DHCP server
User can find no more than 50 reboot logs through this command.
Ping operates by sending Internet Control Message Protocol (ICMP) echo request
packets to the target host and waiting for an ICMP response. In the process it
measures the time from transmission to reception (round-trip time) [1] and records
any packet loss. The results of the test are printed in form of a statistical summary
of the response packets received, including the minimum, maximum, and the mean
round-trip times, and sometimes the standard deviation of the mean.
Traceroute is a computer network tool for measuring the route path and transit
times of packets across an Internet Protocol (IP) network.
9.2 ConfiguringNTP
9.2.1 Overview
Brief Introduction
NTP is a tiered time distribution system with redundancy capability. NTP measures
delays within the network and within the algorithms on the machine on which it is
running. Using these tools and techniques, it is able to synchronize clocks to within
milliseconds of each other when connected on a Local Area Network and within
Some of the hosts act as time servers, that is, they provide what they believe is the
correct time to other hosts. Other hosts act as clients, that is, they find out what
time it is by querying a time server. Some hosts act as both clients and time servers,
because these hosts are links in a chain over which the correct time is forwarded
from one host to the next. As part of this chain, a host acts first as a client to get
the correct time from another host that is a time server. It then turns around and
functions as a time server when other hosts, acting as clients, send requests to it
for the correct time.
1. Topology
2. Configuration Steps
Step 1 Enter the configure mode
Switch#configure terminal
Step 2 Enter the vlan configure mode and create a vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 10
Switch(config-vlan)# exit
Step 3 Enter the interface configure mode and join the vlan
Switch(config)# interface eth-0-26
Switch(config-if)# switch access vlan 10
Switch(config-if)# no shutdown
Switch(config-if)# exit
Step 4 create a vlan interface and set the IP address
Configuring NTP Server (Use the ntpd of linux system for example)
Step 1 Display eth1 ip address
[root@localhost octeon]# ifconfig eth1
eth1 Link encap:Ethernet HWaddr 00:08:C7:89:4B:AA
inet addr:6.6.6.6 Bcast:6.6.6.255 Mask:255.255.255.0
inet6 addr: fe80::208:c7ff:fe89:4baa/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:3453 errors:1 dropped:0 overruns:0 frame:1
TX packets:3459 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:368070 (359.4 KiB) TX bytes:318042 (310.5 KiB)
Step 2 Check networks via Ping
[root@localhost octeon]# ping 6.6.6.5
PING 6.6.6.5 (6.6.6.5) 56(84) bytes of data.
64 bytes from 6.6.6.5: icmp_seq=0 ttl=64 time=0.951 ms
64 bytes from 6.6.6.5: icmp_seq=1 ttl=64 time=0.811 ms
64 bytes from 6.6.6.5: icmp_seq=2 ttl=64 time=0.790 ms
Step 3 Configure ntp.conf
[root@localhost octeon]# vi /etc/ntp.conf
server 127.127.1.0 # local clock
fudge 127.127.1.0 stratum 5
#
# Drift file. Put this in a directory which the daemon can write to.
# No symbolic links allowed, either, since the daemon updates the file
# by creating a temporary in the same directory and then rename()'ing
# it to the file.
#
driftfile /var/lib/ntp/drift
broadcastdelay 0.008
broadcast 6.6.6.255
#
# PLEASE DO NOT USE THE DEFAULT VALUES HERE. Pick your own, or remote
# systems might be able to reset your clock at will. Note also that
# ntpd is started with a -A flag, disabling authentication, that
# will have to be removed as well.
#
#disable auth
keys /etc/ntp/keys
trustedkey 1
Step 4 Configure keys
[root@localhost octeon]# vi /etc/ntp/keys
#
# PLEASE DO NOT USE THE DEFAULT VALUES HERE. Pick your own, or remote
# systems might be able to reset your clock at will. Note also that
# ntpd is started with a -A flag, disabling authentication, that
# will have to be removed as well.
#
1 M serverkey
Step 5 Start ntpd service
[root@localhost octeon]# ntpd
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and set loopback phy external
Switch (config)# interface eth-0-1
Switch (config-if)# no shutdown
Switch (config-if)# loopback phy external
Step 3 Exit the configure mode
Switch (config-if)# end
Step 4 Validation
Switch# show phy loopback
Interface Type DestIntf SwapMac
--------------------------------------------
eth-0-1 external - -
--------------------------------------------
2. Configuration Steps
Step 1 Enter the configure mode
Switch # configure terminal
Step 2 Enter the interface configure mode and set loopback phy internal and specify the
destination interface
Switch (config)# interface eth-0-2
Switch (config-if)# no shutdown
Switch (config-if)# exit
2. Configuration Steps
Step 1 Enter the configure mode
Switch # configure terminal
Step 2 Enter the interface configure mode and set loopback phy mac-address swap
Switch (config)# interface eth-0-1
Switch (config-if)# no shutdown
Switch (config-if)# loopback port mac-address swap
Step 3 Exit the configure mode
Switch (config-if)# end
Step 4 Validation
Switch# show phy loopback
Interface Type DestIntf SwapMac
--------------------------------------------
eth-0-1 port - yes
--------------------------------------------
When L2 ping is started, the L2 ping protocol packet (with ether type
‘36873(0x9009)’) is sent from a specified physical port to another specified
destination port. At the destination end, the L2 ping protocol will be sent back via
non 802.1ag loopback, or via a configuration “l2 ping response”. The device which
is pinging, will receive the ping response packet, and print the ping result.
2. Configuration Steps
The configurations are almost same on Switch1 and Switch2, except the parts
which are specially pointed out.
Configure on Switch2:
Operate on Switch1:
L2 ping completed.
-----------------------------------
10 packet(s) transmitted, 10 received, 0 % packet loss
9.5 ConfiguringRMON
9.5.1 Overview
Brief Introduction
RMON is an Internet Engineering Task Force (IETF) standard monitoring specification
that allows various network agents and console systems to exchange network
monitoring data. You can use the RMON feature with the Simple Network
Management Protocol (SNMP) agent in the switch to monitor all the traffic flowing
among switched on all connected LAN segments.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and create a stats and a history
Switch(config)# interface eth-0-1
Switch(config-if)# rmon collection stats 1 owner test
Switch(config-if)# rmon collection history 1 buckets 100 interval 1000 owner test
Switch(config-if)# exit
Step 3 Create an event with log and trap both set.
Switch(config)# rmon event 1 log trap public description test_event owner test
Step 4 Create a alarm using event 1 we created before and monitor the alarm on
ETHERSTATSBROADCASTPKTS on eth-0-1
Switch(config)# rmon alarm 1 etherStatsEntry.6.1 interval 1000 delta rising-
threshold 1000 event 1 falling-threshold 1 event 1 owner test
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
Switch# show rmon statistics
Rmon collection index 1
Statistics ifindex = 1, Owner: test
Input packets 0, octets 0, dropped 0
Broadcast packets 0, multicast packets 0, CRC alignment errors 0,
collisions 0
Undersized packets 0, oversized packets 0, fragments 0, jabbers 0
# of packets received of length (in octets):
64: 0, 65-127: 0, 128-255: 0
256-511: 0, 512-1023: 0, 1024-max: 0
Switch# show rmon history
History index = 1
Data source ifindex = 1
Buckets requested = 100
Buckets granted = 100
Interval = 1000
Owner: test
Switch# show rmon event
Event Index = 1
Description: test_event
Event type Log & Trap
Event community name: public
Last Time Sent = 00:00:00
Owner: test
Switch# show rmon alarm
Alarm Index = 1
Alarm status = VALID
Alarm Interval = 1000
Alarm Type is Delta
Alarm Value = 00
Alarm Rising Threshold = 1000
Alarm Rising Event = 1
Alarm Falling Threshold = 1
Alarm Falling Event = 1
Alarm Owner is test
9.6 ConfiguringSNMP
9.6.1 Overview
Brief Introduction
SNMP is an application-layer protocol that provides a message format for
communication between managers and agents. The SNMP system consists of an
SNMP manager, an SNMP agent, and a MIB. The SNMP manager can be part of a
network management system (NMS). The agent and MIB reside on the switch. To
configure SNMP on the switch, you define the relationship between the manager
and the agent. The SNMP agent contains MIB variables whose values the SNMP
manager can request or change. A manager can get a value from an agent or store
a value into the agent. The agent gathers data from the MIB, the repository for
information about device parameters and network data. The agent can also
respond to a manager’s requests to get or set data. An agent can send unsolicited
traps to the manager. Traps are messages alerting the SNMP manager to a condition
on the network. Error user authentication, restarts, link status (up or down), MAC
address tracking, closing of a Transmission Control Protocol (TCP) connection, loss
of connection to a neighbor, or other significant events may send a trap.
Principle Description
SNMP module is based on the following RFC draft:
Following is a brief description of terms and concepts used to describe the SNMP
protocol:
As shown in the figure SNMP agent gathers data from the MIB. The agent can send
traps, or notification of certain events, to the SNMP manager, which receives and
processes the traps. Traps alert the SNMP manager to a condition on the network
such as improper user authentication, restarts, link status (up or down), MAC
address tracking, and so forth. The SNMP agent also responds to MIB-related
queries sent by the SNMP manager in get-request, get-next-request, and set-
request format.
Enable SNMP
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable SNMP globally
Switch(config)# snmp-server enable
Step 3 Exit the configure mode
Switch(config)# end
Step 4 Validation
Switch# show running-config
snmp-server enable
A MIB view, which defines the subset of all MIB objects accessible to the given
community
Read and write or read-only permission for the MIB objects accessible to the
community
Beginning in privileged EXEC mode, follow these steps to configure SNMP on the
switch.
Set engineID; Set the user name, password, and authentication type; Create SNMP
server; Set the authority for the group member.
Enable all supported traps; Configure a remote trap manager which IP is “10.0.0.2”;
Configure a remote trap manager which IPv6 address is “2001:1000::1”.
Enable all supported traps; Configure a trap notify item for SNMPv3; Configure a
remote trap manager’s IP address; Configure a remote trap manager’s IPv6 address;
Add a local user to SNMPv3 notifications.
9.7 ConfiguringSflow
9.7.1 Overview
Brief Introduction
sFlow is a technology for monitoring traffic in data networks containing switches
and routers. In particular, it defines the sampling mechanisms implemented in a
sFlow Agent for monitoring traffic, and the format of sample data used by the
sFlow Agent when forwarding data to a central data collector.
The architecture and sampling techniques used in the sFlow monitoring system are
designed to provide continuous site-wide (and network-wide) traffic monitoring for
high speed switched and routed networks.
The sFlow Agent uses two forms of sampling: statistical packet-based sampling of
switched flows, and time-based sampling of network interface statistics.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable sflow globally
Switch(config)# sflow enable
Step 3 Set the global attribute for sflow
Set the agent IP address,set the collector IP address and udp port. If the udp port
is not specified, it means default port 6364.
At list one Agent and one collector must be configured for sflow. User can
use IPv4 or IPv6.
9.8 ConfiguringLLDP
9.8.1 Overview
Brief Introduction
LLDP ( Link Layer Discovery Protocol ) is the discovery protocol on link layer
defined as standard in IEEE 802.1ab. Discovery on Layer 2 can locate interfaces
attached to the devices exactly with connection information on layer 2, such as
VLAN attribute of port and protocols supported, and present paths among client,
switch, router, application servers and other network servers. This detailed
description is helpful to get useful information for diagnosing network fast, like
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable SNMP globally
Switch(config)# lldp enable
Step 3 Enter the interface configure mode and set the attributes of LLDP on the interface
Switch(config)# interface eth-0-9
Switch(config)# no shutdown
Switch(config-if)# no lldp tlv 8021-org-specific vlan-name
Switch(config-if)# lldp tlv med location-id ecs-elin 1234567890
Switch(config-if)# lldp enable txrx
Switch(config-if)# exit
Step 4 Set LLDP timers (optional)
9.9 ConfiguringIPFIX
9.9.1 Overview
Brief Introduction
Traffic on a data network can be seen as consisting of flows passing through
network elements. For administrative or other purposes, it is often interesting,
useful, or even necessary to have access to information about these flows that pass
through the network elements. This requires uniformity in the method of
representing the flow information and the means of communicating the flows from
the network elements to the collection point. This is what IPFIX can do.
Before IPFIX was introduced, there is a Cisco private method NetFlow. IPFIX is
similar to NetFlow and is based on NetFlow version 9.
Set the aging time as 300 seconds. The aging time is 1800 seconds by default.
9.10 ConfiguringPTP
9.10.1 Overview
Brief Introduction
The Precision Time Protocol (PTP), as defined in the IEEE 1588 standard,
synchronizes with nanosecond accuracy the real-time clocks of the devices in a
network. The clocks are organized into a master-member hierarchy. PTP identifies
the switch port that is connected to a device with the most precise clock. This
clock is referred to as the master clock. All the other devices on the network
synchronize their clocks with the master and are referred to as members.
Constantly exchanged timing messages ensure continued synchronization.
PTP is particularly useful for industrial automation systems and process control
networks, where motion and precision control of instrumentation and test
equipment are important.
You can globally configure the switch to pass PTP packets through the switch as
normal multicast traffic (PTP disabled), to synchronize all switch ports with the
grand master clock (transparent mode), or you can configure boundary (or ordinary)
clock mode, where the switch participates in selecting the best master clock and
can act as the master clock if no better clocks are detected.
Principle Description
Table 9-1 Terminology
Terminology Description
GPS Global Positioning System
NTP Network Time Protocol
Configure Switch1 to be an ordinary clock with priority1 0. This will lead the Switch
have the highest priority in this PTP timing domain, that means, the master of this
domain.
Enable PTP globally and Set the priority1 properties to 0. Enter the interface mode,
set the delay mechanism to peer mode and enable PTP on interface.
Set the device type to boundary clock and enable PTP globally. Enter the interface
mode and set the delay mechanism to peer mode. Enable PTP on interface.
Enable PTP globally and set the slave-only properties to TRUE. Enter the interface
mode and set the delay mechanism to peer mode. Enable PTP on interface.
GM UTC Offset : 34
GM UTC Offset Valid : false
GM Time Scale : PTP
GM Time Traceable : false
GM Leap59 : false
GM Leap61 : false
GM Frequency Traceable : false
Priority1 : 128
Priority2 : 128
Clock Accuracy : 0xfe
Clock Class : 248
Time Source : internal-oscillator(160)
UTC Offset : 34
Leap59 : false
Leap61 : false
Local Clock Identity : 5E:C4:DC:FF:FE:AE:78:00
Set systime via PTP: : false
----------------------- BMC Properties -----------------------
Receive Member : eth-0-9
Parent Clock Identity : 60:4D:39:FF:FE:FF:C5:00
Parent Port Number : 9
Mean Path Delay : 0
Offset From Master : 0
Step Removed : 1
GM Clock Identity : 60:4D:39:FF:FE:FF:C5:00
GM Priority1 : 0
GM Priority2 : 128
GM Clock Accuracy : 0xfe
GM Clock Class : 248
GM Time Source : internal-oscillator(160)
GM UTC Offset : 34
GM UTC Offset Valid : false
GM Time Scale : PTP
GM Time Traceable : false
GM Leap59 : false
GM Leap61 : false
GM Frequency Traceable : false
---------------------------------------------------------------
Announce : 2944 Sync : 5837
Delay_Req : 0 Pdelay_Req : 5876
Delay_Resp : 0 Pdelay_Resp : 5876
Follow_Up : 5837 Pdelay_Resp_Follow_Up : 5875
Unknown : 0
Send Packet Statistics
---------------------------------------------------------------
Announce : 15 Sync : 30
Delay_Req : 0 Pdelay_Req : 5876
Delay_Resp : 0 Pdelay_Resp : 5876
Follow_Up : 27 Pdelay_Resp_Follow_Up : 5876
Unknown : 0
Discard Packet Statistics
---------------------------------------------------------------
Announce : 0 Sync : 9
Delay_Req : 0 Pdelay_Req : 0
Delay_Resp : 0 Pdelay_Resp : 0
Follow_Up : 9 Pdelay_Resp_Follow_Up : 0
Unknown : 0
Follow_Up : 0 Pdelay_Resp_Follow_Up : 0
Unknown : 0
Set the device type to peer-to-peer transparent clock and enable PTP globally.
Enter the interface mode and enable PTP on interface.
10.1 ConfiguringQoS
10.1.1 Overview
Brief Introduction
Quality of Service (QoS) can be used to give certain traffic priority over other
traffic. Without QoS, all traffic in a network has the same priority and chance of
being delivered on time. If congestion occurs, all traffic has the same chance of
being dropped. With QoS, specific network traffic can be prioritized to receive
preferential treatment. In turn, a network performs more predictably, and utilizes
bandwidth more effectively.
All switches and routers accessing the Internet depend on class information to give
the same forwarding treatment to packets with the same class information, and
give different treatment to packets with different class information. A packet can
be assigned class information, as follows:
Class information can be used by switches and routers along a path to limit the
amount of allotted resources per traffic class.
Principle Description
Following is a brief description of terms and concepts used to describe QoS:
ACL
Access control lists (ACLs) classify traffic with the same characteristics. IP traffic is
classified using IP ACLs, and non-IP traffic is classified using MAC ACLs. The ACL can
have multiple access control entries (ACEs), which are commands that match fields
against the contents of the packet.
CoS Value
Class of Service (CoS) is a 3-bit value used to classify the priority of Layer-2 frames
upon entry into a network.
QoS classifies frames by assigning priority-indexed CoS values to them, and gives
preference to higher-priority traffic.
Layer-2 802.1Q frame headers have a 2-byte Tag Control Information field that
carries the CoS values in the 3 most significant bits, called the User Priority bits.
On interfaces configured as Layer-2 802.1Q trunks, all traffic is in 802.1Q frames,
except for traffic in the native VLAN.
Other frame types cannot carry Layer-2 CoS values. CoS values range from 0 to 7.
DSCP Value
Differentiated Services Code Point (DSCP) is a 6-bit value used to classify the
priority of Layer-3 packets upon entry into a network.
IP-Precedence Value
IP-Precedence is a 3-bit value used to classify the priority of Layer-3 packets upon
entry into a network.
EXP Value
EXP value is a 3-bit value used to classify the priority of MPLS packets upon entry
into a network.
Classification
Classification distinguishes one kind of traffic from another by examining the fields
in the packet. The process generates an internal priority for a packet, which
identifies all future QoS actions to be taken on the packet.
Each packet is classified upon entry into the network. At the ingress, the packet is
inspected, and the priority is determined based on ACLs or the configuration. The
Layer-2 CoS value is then mapped to a priority value.
The classification is carried in the IP packet header using 6 bits or 3 bits from the
deprecated IP TOS field to carry the classification information. Classification can
also occur in the Layer-2 frame.
Classification occurs on an ingress physical port, but not at the switch virtual
interface level.
Shaping
Shaping is to change the rate of incoming traffic flow to regulate the rate in such a
way that the outgoing traffic flow behaves more smoothly. If the incoming traffic is
highly bursty, it needs to be buffered so that the output of the buffer is less bursty
and smoother.
Policing
The policer limits the bandwidth consumed by a traffic flow. The result is given to
the marker.
Individual: QoS applies the bandwidth limits specified in the policer, separately,
to each matched traffic class. An individual policer is configured within a
policy map.
Aggregate: QoS applies the bandwidth limits specified in an aggregate policer,
cumulatively, to all matched traffic flows. An aggregate policer is configured
by specifying the policer name within a policy map. The bandwidth limits of
the policer are specified. In this way, the aggregate policer is shared by
multiple classes of traffic within one or multiple policy map.
Marking
Marking determines how to handle a packet when it is out of profile. It assesses the
policer and the configuration information to determine the action required for the
packet, and then handles the packet using one of the following methods:
Queuing
The packet internal priority can be mapped to one of the egress queues. The unit
of queue depth is buffer cell. Buffer cell is the granularity, which is 288 bytes, for
packet storing.
Tail Drop
Tail drop is the default congestion-avoidance technique on the interface. With tail
drop, packets are queued until the thresholds are exceeded. The packets with
different priority and color are assigned to different drop precedence. The mapping
between priority and color to queue and drop precedence is configurable. You can
modify the three tail-drop threshold to every egress queue by using the queue
threshold interface configuration command. Each threshold value is packet buffer
cell.
WRED
WRED reduces the chances of tail drop by selectively dropping packets when the
output interface begins to show signs of congestion. By dropping some packets
early rather than waiting until the queue is full, WRED avoids dropping large
numbers of packets at once. Thus, WRED allows the transmission line to be fully
used at all times. WRED also drops more packets from large users than small.
Therefore, sources that generate the most traffic are more likely to be slowed
down versus sources that generate little traffic.
You can enable WRED and configure the two thresholds for a drop-precedence
assigned to every egress queues. The WRED’s color drop precedence map is the
same as tail-drop’s. Each min-threshold represents where WRED starts to randomly
drop packets. After min-threshold is exceeded, WRED randomly begins to drop
packets assigned to this threshold. As the queue max-threshold is approached,
WRED continues to drop packets randomly with the rate of drop-probability. When
the max-threshold is reached, WRED drops all packets assigned to the threshold. By
default, WRED is disabled.
Scheduling
Scheduling forwards conditions packets using combination of WDRR and SP. Every
queue belongs to a class. The class range from 0 to 7, and 7 is the highest priority.
Several queues can be in a same class, or non queue in some class. Packets are
scheduled by SP between classes and WDRR between queues in a class.
Class Map
A class map names and isolates specific traffic from other traffic. The class map
defines the criteria used to match against a specific traffic flow to further classify
it. The criteria can match several access groups defined by the ACL.
If there is more than one type of traffic to be classified, another class map can be
created under a different name. After a packet is matched against the class-map
criteria, it is further classified using a policy map.
Policy Map
A policy map specifies on which traffic class to act. This can be implemented as
follows:
Mapping Tables
During QoS processing, the switch represents the priority of all traffic (including
non-IP traffic) with an internal priority value:
During policing, QoS can assign another priority and color to an IP or non-IP
packet (if the packet matches the class-map). This configurable map is called
the policed-priority-color map.
Before the traffic reaches the scheduling stage, and replace CoS or DSCP is set,
QoS uses the configurable priority-color-to-CoS or priority-color-to-DSCP map
to derive a CoS or DSCP value from the internal priority color.
Each QoS domain has an independent set of map tables mentioned above.
Time-range
By using time-range, the aces in the class-map can be applied based on the time of
day or week. First, define a time-range name and set the times and the dates or
the days of the week in the time range. Then enter the time-range name when
adding an ace. You can use the time-range to define when the aces in the class-
map are in effect, for example, during a specified time period or on specified days
of the week.
You can control over permitting or denying a user access to resources, such as
an application, which is identified by an IP address and a port number.
You can obtain the traffic statistics during appointed time.
You can define when the action of a traffic class is in effect.
SRTCM
TRTCM
CIR
CBS
EIR
EBS
PIR
PBS
Input traffic is classified to a specified traffic class. All qos policies are attached to
this traffic class.
Type qos of class-map is used to identify traffic. The identification rules can be
CoS/DSCP/IP Precendence/EXP/ACL.
Type qos of policy-map is used to assign traffic class. Type qos of class-map is
refered by same type of policy-map.
configure terminal.
ip access-list ACCESS-LIST-NAME. ACCESS-LIST-NAME = name of IP ACL
create ACEs, Repeat this step as needed. For detail, please refer to ACL
configuration Guide
The following example shows allowing access only for hosts on three specified
networks. Wildcard bits correspond to the network address host portions. If a host
has a source address that does not match the access list statements, it is rejected.
Use the “no ip access-list” in global configure mode to remove the ACL. Use
the “no sequence-num” in ACL configure mode to remove the ACE.
Terminology:
Create class-map
The following shows classifying IP traffic on a physical-port basis using class maps.
This involves creating a class map, and defining the match criterion. In this case it
is configuring a class map named cmap1 with 1 match criterion: IP access list ip-acl,
which allows traffic from any source to any destination.
Use the “no policy-map” in global configure mode to remove the policy-map.
Use the “no policer” in policy-class configure mode to remove the policer, Use the
“no set” in policy-class configure mode to reset the default value for priority or
color.(By default the priority is 0 and color is green.)
Step 5 Enter the interface configure mode and apply the policy-map
Switch(config)# interface eth-0-1
Switch(config-if)# service-policy type qos input pmap1
Switch(config-if)# exit
CLASS-MAP-NAME: cmap1
match access-group: ip-acl
set traffic-class : 5
set color : yellow
policer color-blind cir 48000 cbs 10000 ebs 16000 violate drop
an 8000-byte normal burst size, it is considered out of profile, and is dropped. The
policy map is attached to an ingress interface.
Step 6 Enter the interface configure mode and apply the policy-map
Switch(config)# interface eth-0-1
Switch(config-if)# service-policy type qos input aggflow1
Switch(config-if)# exit
Switch(config)# exit
Step 7 Exit the configure mode
Switch(config)# end
Step 8 Validation
Configuring Schedule
Packets are scheduled by SP between different classes and WDRR between queues
in the same class.
The following example shows configuring schedule parameters for egress queues. In
this example, traffic 5 and 6 belongs to class 6, which is highest priority. Traffic 2
belongs class 0, the bandwidth is 20%.
Step 3 Create policy-map and match the class-map; Set the priority in policy-class
configure mode
Switch(config)# policy-map type traffic-class tc
Switch(config-pmap-tc)# class type traffic-class tc5
Switch(config-pmap-tc-c)# priority level 6
Switch(config-pmap-tc-c)# exit
Switch(config)# end
Step 6 Validation
Switch# show qos interface eth-0-1 egress
TC Priority Bandwidth Shaping(kbps) Drop-Mode Max-Queue-Limit(Cell) ECN
0 0 - - dynamic level 10 -
1 0 - - random-drop 596 Disable
2 0 20 - dynamic level 10 -
3 0 - - tail-drop 2000 2000
4 0 - - dynamic level 10 -
5 6 - - dynamic level 10 -
6 6 - - dynamic level 10 -
7 7 - - tail-drop 64 -
In this example it is configuring tail drop threshold for traffic class 3. In this
example, packet drop threshold is 2000.
1 0 - - dynamic level 10 -
2 0 - - dynamic level 10 -
3 0 - - tail-drop 2000 2000
4 0 - - dynamic level 10 -
5 0 - - dynamic level 10 -
6 0 - - dynamic level 10 -
7 7 - - tail-drop 64 -
Configuring WRED
WRED reduces the chances of tail drop by selectively dropping packets when the
output interface detects congestion. By dropping some packets early rather than
waiting until the queue is full, WRED avoids TCP synchronization dropping and
thereafter improves the overall network throughput.
The following example shows configuring WRED threshold for traffic class 1. In this
example, the max-threshold is 596, min-threshold is 596/8=71. If buffered packets
exceed min-threshold, the subsequent packet will be dropped randomly.
6 0 - - dynamic level 10 -
7 7 - - tail-drop 64 -
Queue shaping
All the traffic in the egress queue can be shaped, and all the exceeding traffic will
be buffered. If no buffer, it is dropped.
The following example shows creating a queue shaping for queue 3. In this example,
if the traffic in queue 3 exceeds 1000Mbps, it is buffered.
Use the “no shape rate” command to unset the shape rate.
Step 5 Enter the interface configure mode and apply the policy-map
Switch(config)# interface eth-0-1
Switch(config-if)# service-policy type traffic-class tc
Switch(config-if)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
Switch# show qos interface eth-0-1 egress
TC Priority Bandwidth Shaping(kbps) Drop-Mode Max-Queue-Limit(Cell) ECN
0 0 - - dynamic level 10 -
1 0 - - random-drop 596 Disable
2 0 20 - dynamic level 10 -
3 0 - 1000000 tail-drop 2000 2000
4 0 - - dynamic level 10 -
5 6 - - dynamic level 10 -
6 6 - - dynamic level 10 -
7 7 - - tail-drop 64 -
The following example shows creating an ingress port policer. In this example, if
the received traffic exceeds a 48000-kbps average traffic rate, it is dropped.
The following example shows creating a port shaping. In this example, if the
received traffic exceeds a 1000Mbps, it is buffered.
Switch(config)# end
Step 4 Validation
Switch# show running-config interface eth-0-1
Building configuration...
!
interface eth-0-1
service-policy type traffic-class tc
qos policer input color-blind cir 48000 cbs 10000 ebs 20000 violate drop
qos shape rate pir 1000000
!
Principle Description
Overlay tunneling encapsulates IPv6 packets in IPv4 packets for delivery across an
IPv4 infrastructure (a core network or the Internet. By using overlay tunnels, you
can communicate with isolated IPv6 networks without upgrading the IPv4
infrastructure between them. Overlay tunnels can be configured between border
routers or between a border router and a host; however, both tunnel endpoints
must support both the IPv4 and IPv6 protocol stacks. The IPv6 over IPv4 tunnel
processes packets in the following ways:
A host in the IPv6 network sends an IPv6 packet to Switch1 at the tunnel
source.
After determining according to the routing table that the packet needs to be
forwarded through the tunnel, Switch1 encapsulates the IPv6 packet with an
IPv4 header and forwards it through the physical interface of the tunnel.
The benefit of the technique is that current ipv4 networks do not need to update
on all nodes. Only the edge nodes are required to support dual stack and tunnel.
IPv6 over IPv4 tunnels are divided into manually configured tunnels and automatic
tunnels, depending on how the IPv4 address of the tunnel destination is acquired:
Manual
6to4
Intra-site Automatic Tunnel Addressing Protocol (ISATAP)
The details of the 3 types of overlay tunneling mechanisms are described below:
Manual Tunnel
6to4 Tunnel
6to4 relay
A 6to4 tunnel is only used to connect 6to4 networks, whose IP prefix must be
2002::/16. However, IPv6 network addresses with the prefix such as 2001::/16 may
also be used in IPv6 networks. To connect a 6to4 network to an IPv6 network, a
6to4 router must be used as a gateway to forward packets to the IPv6 network.
Such a router is called 6to4 relay router.
As shown in the above figure, a static route must be configured on the border
router (Switch1) in the 6to4 network and the next-hop address must be the 6to4
address of the 6to4 relay router (Switch3). In this way, all packets destined for the
IPv6 network will be forwarded to the 6to4 relay router, and then to the IPv6
network. Thus, interworking between the 6to4 network (with the address prefix
starting with 2002) and the IPv6 network is realized.
ISATAP Tunnel
ISATAP is an automatic overlay tunneling mechanism that uses the underlying IPv4
network as a NBMA link layer for IPv6. ISATAP is designed for transporting IPv6
packets within a site where a native IPv6 infrastructure is not yet available; for
example, when sparse IPv6 hosts are deployed for testing. ISATAP tunnels allow
individual IPv4 or IPv6 dual-stack hosts within a site to communicate with other
such hosts on the same virtual link, basically creating an IPv6 network using the
IPv4 infrastructure.
When an ISATAP tunnel is used, the destination address of an IPv6 packet and the
IPv6 address of a tunnel interface both adopt special ISATAP addresses. ISATAP uses
a well-defined IPv6 address format composed of any unicast IPv6 prefix (/64),
which can be link local, or global (including 6to4 prefixes), enabling IPv6 routing
locally or on the Internet. The IPv4 address is encoded in the last 32 bits of the
IPv6 address, enabling automatic IPv6-in-IPv4 tunneling. The ISATAP address format
is prefix(64bit):0:5EFE: IPv4-address.
As shown in the above Figure, two IPv6 networks are connected over an IPv4
network. Configure an IPv6 manual tunnel between Switch1 and Switch2 to make
the two IPv6 networks reachable to each other.
2. Configuration Steps
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
As shown in the above Figure, two 6to4 networks are connected to an IPv4 network
through two 6to4 routers (Switch1 and Switch2) respectively. Configure a 6to4
tunnel to make Host1 and Host2 reachable to each other.
The IPv4 address of eth-0-1 on Switch1 is 2.1.1.1/24, and the corresponding 6to4
prefix is 2002:0201:0101::/48 after it is translated to an IPv6 address. Assign
interface tunnel 1 to subnet 2002:0201:0101::/64 and eth-0-2 to subnet
2002:0201:0101:1::/64.
The IPv4 address of eth-0-1 on Switch2 is 5.1.1.1/24, and the corresponding 6to4
prefix is 2002:0501:0101::/48 after it is translated to an IPv6 address. Assign
interface tunnel 1 to subnet 2002:0501:0101::/64 and eth-0-2 to subnet
2002:0501:0101:1::/64.
2. Configuration Steps
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
As shown in the above Figure, Switch1 is a 6to4 router, and 6to4 addresses are used
on the connected IPv6 network. Switch2 serves as a 6to4 relay router and is
connected to the IPv6 network (2001::/16). Configure a 6to4 tunnel between
Router A and Router B to make Host A and Host B reachable to each other.
2. Configuration Steps
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
S 2001::/16 [1/0]
via 2002:601:101::1 (recursive via ::, tunnel1), 00:00:32
C 2002:201:101::/64
via ::, tunnel1, 00:00:04
C 2002:201:101::1/128
via ::1, tunnel1, 00:00:04
S 2002:601:101::/48 [1/0]
via ::, tunnel1, 00:00:22
Interface tunnel1
Interface current state: UP
The maximum transmit unit is 1480 bytes
IPv6 is enabled, link-local address is fe80::201:101
Global unicast address(es):
2002:201:101::1, subnet is 2002:201:101::/64
ICMP error messages limited to one every 1000 milliseconds
ICMP redirects are always sent
ND DAD is enabled, number of DAD attempts: 1
ND router advertisement is disabled
ND reachable time is 30000 milliseconds
ND advertised reachable time is 0 milliseconds
ND retransmit interval is 1000 milliseconds
ND advertised retransmit interval is 0 milliseconds
ND router advertisements max interval: 600 secs
ND router advertisements min interval: 198 secs
ND router advertisements live for 1800 seconds
ND router advertisements hop-limit is 0
Hosts use stateless autoconfig for addresses.
2. Configuration Steps
The automatic tunnel interfaces using the same encapsulation protocol cannot
share the same source IP address
To encapsulate and forward IPv6 packets whose destination address does not
belong to the network segment where the receiving tunnel interface resides,
you need to configure a static route to reach the destination IPv6 address
through this tunnel interface on the router. Because automatic tunnels do not
support dynamic routing, you can configure a static route to that destination
IPv6 address with this tunnel interface as the outbound interface or the peer
tunnel interface address as the next hop
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable ipv6 globally
Switch(config)# ipv6 enable
Step 3 Enter the interface configure mode and set the attributes of the interface
Switch(config)# interface eth-0-1
Switch(config-if)# no switchport
Switch(config-if)# ip address 1.1.1.1/24
Switch(config-if)# tunnel enable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-2
Switch(config-if)# no switchport
Switch(config-if)# ipv6 address 3001::1/64
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface tunnel1
Switch(config-if)# tunnel source eth-0-1
Switch(config-if)# tunnel mode ipv6ip isatap
Switch(config-if)# ipv6 address 2001::/64 eui-64
Switch(config-if)# no ipv6 nd ra suppress
Switch(config-if)# exit
Step 4 Create static routes
Switch(config)# ip route 2.1.1.0/24 1.1.1.2
Switch(config)# ipv6 route 2001::/16 tunnel1
Step 5 Configuring static arp
Switch(config)# arp 1.1.1.2 0.0.2222
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
Switch# show interface tunnel1
Interface tunnel1
Interface current state: UP
Hardware is Tunnel
Index 8193 , Metric 1 , Encapsulation TUNNEL
VRF binding: not bound
Tunnel protocol/transport IPv6/IP ISATAP, Status Valid
Tunnel source 1.1.1.1(eth-0-1), destination UNKNOWN
The specific configuration on the ISATAP host is related to its operating system. The
following example shows the configuration of the host running the Windows XP.
Install IPv6.
C:\>ipv6 install
After carrying out the above command, look at the information on the ISATAP
interface.
11.2 ConfiguringNDP
11.2.1 Overview
Brief Introduction
Nodes (hosts and routers) use Neighbor Discovery to determine the link-layer
addresses for neighbors known to reside on attached links and to quickly purge
cached values that become invalid.
Hosts also use Neighbor Discovery to find neighboring routers that are willing to
forward packets on their behalf.
Finally, nodes use the protocol to actively keep track of which neighbors are
reachable and which are not, and to detect changed link-layer addresses. When a
router or the path to a router fails, a host actively searches for functioning
alternates.
In this example, interface eth-0-1 assigned with ipv6 address 3000::1/64, on subnet
3000::/64, there are two hosts, and their IP addresses are 3000::2, 3000::3, MAC
address are 001a-a011-eca2, 001a-a011-eca3. Neighbor entry of host 3000::2 is
added manually, the entry of host 3000::3 is added dynamically. The reachable
time of neighbor entries for interface eth-0-1 configure to 10 minutes, NS interval
on interface eth-0-1 configure to 2 seconds.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and set the attributes of the interface
Switch (config)# interface eth-0-1
Switch (config-if)# no switchport
Switch (config-if)# no shutdown
Switch (config-if)# ipv6 address 3000::1/64
Switch (config-if)# ipv6 nd reachable-time 600
Switch (config-if)# ipv6 nd ns-interval 2000
Switch (config-if)# exit
Step 3 Add a static neighbor entry
Switch (config)# ipv6 neighbor 3000::2 001a.a011.eca2
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Switch # show ipv6 neighbors
IPv6 address Age Link-Layer Addr State Interface
3000::2 - 001a-a011-eca2 REACH eth-0-1
3000::3 6 001a-a011-eca3 REACH eth-0-1
fe80::6d8:e8ff:fe4c:e700 6 001a-a011-eca3 STALE eth-0-1
By contrast, relay receive DHCPv6 messages and then generate a new DHCPv6
message to send out on another interface. The relay sets the link address (used by
server to identify the subnet that client is belong to), and, if configured, adds the
remote-id option in the packet and forwards it to the DHCPv6 server..
This figure is the networking topology for testing DHCPv6 relay functions. We need
two Linux boxes and one Switch to construct the test bed.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enable DHCPv6 relay globally
Switch(config)# service dhcpv6 enable
Switch(config)# dhcpv6 relay
Switch(config)# dhcpv6 relay remote-id option
Switch(config)# dhcpv6 relay pd route
Step 3 Configure the DHCPv6 server
Switch(config)# dhcpv6-server 1 2001:1000::1
Step 4 Enter the interface configure mode and set the attributes of the interface
Switch(config)# interface eth-0-12
Switch(config-if)# no switchport
Switch(config-if)# ipv6 address 2001:1000::2/64
Switch(config-if)# no shutdown
Switch(config-if)# exit
Validate DHCPv6 messages received from untrusted sources and filters out
invalid messages.
Build and maintain the DHCPv6 snooping binding database, which contains
information about untrusted hosts with leased IPv6 addresses.
The DHCPv6 snooping feature is implemented in software basis. All DHCPv6
messages are intercepted in the chip and directed to the CPU for processing.
This figure is the networking topology for testing DHCPv6 snooping functions. We
need two PCs and one switch to construct the test bed.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the vlan configure mode and create the vlan
Switch(config)# vlan database
Switch(config-vlan)# vlan 2
Switch(config-vlan)# exit
Step 3 Enter the interface configure mode and set the attributes of the interface
Switch(config)# interface eth-0-11
Switch(config-if)# switchport
Switch(config-if)# switchport access vlan 2
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-12
Switch(config-if)# switchport
Switch(config-if)# switchport access vlan 2
Switch(config-if)# dhcpv6 snooping trust
Switch(config-if)# no shutdown
Switch(config-if)# exit
Step 4 Enable DHCPv6 snooping globally and set the attributes
Switch(config)# service dhcpv6 enable
Switch(config)# dhcpv6 snooping
Switch(config)# dhcpv6 snooping vlan 2
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
!
Switch# show running-config interface eth-0-11
!
interface eth-0-11
switchport access vlan 2
!
Packets forwarded 21
Packets invalid 0
Packets dropped 0
In these systems, routes through a data network are described by fixed paths
(statically). These routes are usually entered into the router by the system
administrator. An entire network can be configured using static routes, but this
type of configuration is not fault tolerant. When there is a change in the network
or a failure occurs between two statically defined nodes, traffic will not be
rerouted. This means that anything that wishes to take an affected path will either
have to wait for the failure to be repaired or the static route to be updated by the
administrator before restarting its journey. Most requests will time out (ultimately
failing) before these repairs can be made. There are, however, times when static
routes can improve the performance of a network. Some of these include stub
networks and default routes.
2. Configuration Steps
The following example shows how to deploy static routes in a simple environment.
Configuring Switch1:
Configuring Switch3:
13.2 ConfiguringOSPFv3
13.2.1 Overview
Brief Introduction
OSPF is an Interior Gateway Protocol (IGP) designed expressly for IP networks,
supporting IP subnet ting and tagging of externally derived routing information.
Addressing semantics have been removed from OSPFv3 packets and the basic
Link State Advertisements (LSAs).
OSPFv3 now runs on a per-link basis rather than on a per-IP-subnet basis.
Authentication has been removed from the OSPFv3 protocol.
Principle Description
The OSPFv3 module is based on the following RFC: RFC 5340 – OSPF for IPv6
Use the command “no router ipv6 ospf process-id” in global configure mode
to delete the OSPFv3 instance.
2. Configuration Steps
This example shows the minimum configuration required for enabling OSPFv3 on an
interface Switch1 and 2 are two routers in Area 0 connecting to prefix
2004:12:9::/96.
Configuring Switch1:
Configuring Switch2:
Configuring Priority
1. Topology
2. Configuration Steps
This example shows the configuration for setting the priority for an interface. You
can set a high priority for a router to make it the Designated Router (DR). Router
Switch3 is configured to have a priority of 10, which is higher than the default
priority (default priority is 1) of Switch1 and 2; making it the DR.
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
2. Configuration Steps
You can optionally configure several OSPFv3 area parameters. These parameters
include authentication for password-based protection against unauthorized access
to an area and stub areas. Stub areas are areas into which information on external
routes is not sent. Instead, the area border router (ABR) generates a default
external route into the stub area for destinations outside the autonomous system
(AS).
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch4:
Switch(config)#interface eth-0-13
Switch(config-if)#no switchport
Switch(config-if)#no shutdown
Switch(config-if)# ipv6 address 2004:13:13::2/96
Switch(config-if)# ipv6 router ospf 100 area 0 instance 0
Switch(config-if)# exit
Switch(config)#interface eth-0-17
Switch(config-if)#no switchport
Switch(config-if)#no shutdown
Switch(config-if)# ipv6 address 2004:23:17::1/96
Switch(config-if)# ipv6 router ospf 200 area 0 instance 0
Switch(config-if)# exit
2. Configuration Steps
In this example the configuration causes RIPng routes to be imported into the
OSPFv3 routing table and advertised as Type 5 External LSAs into Area 0.
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch3:
Configuring Switch4:
Switch(config)#interface eth-0-13
Switch(config-if)# no switchport
Switch(config-if)# no shutdown
Switch(config-if)# ipv6 address 2004:13:13::2/96
Switch(config-if)# ipv6 router ospf 100 area 0 instance 0
Switch(config-if)# exit
Switch(config)#interface eth-0-17
Switch(config-if)#no switchport
Switch(config-if)#no shutdown
Switch(config-if)# ipv6 address 2004:23:17::1/96
Switch(config-if)# ipv6 router ospf 200 area 0 instance 0
Switch(config-if)# exit
2. Configuration Steps
You can make a route the preferred route by changing its cost. In this example,
cost has been configured to make Switch2 the next hop for Switch1.
The default cost on each interface is 1(1000M speed). Interface eth2 on Switch2
has a cost of 100 and interface eth2 on Switch3 has a cost of 150. The total cost to
reach(Switch4 network 10.10.14.0) through Switch2 and Switch3:
Therefore, Switch1 chooses Switch2 as its next hop for destination Switch4
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch4:
Switch(config)#interface eth-0-17
Switch(config-if)#no switchport
Switch(config-if)#no shutdown
Switch(config-if)# ipv6 address 2004:14:17::1/96
Switch(config-if)# ipv6 router ospf 100 area 0 instance 0
Switch(config-if)# exit
Switch(config)#interface eth-0-17
Switch(config-if)#no switchport
Switch(config-if)#no shutdown
Switch(config-if)# ipv6 address 2004:23:17::1/96
Switch(config-if)# ipv6 router ospf 200 area 0 instance 0
Switch(config-if)# ipv6 ospf cost 100
Switch(config-if)# exit
O 2004:3:1::/96 [110/102]
via fe80::bc22:aeff:fe64:aa00, eth-0-9, 00:08:06
C 2004:12:9::/96
via ::, eth-0-9, 01:15:43
C 2004:12:9::1/128
via ::1, eth-0-9, 01:15:43
C 2004:14:17::/96
via ::, eth-0-17, 00:18:38
C 2004:14:17::1/128
via ::1, eth-0-17, 00:18:38
O 2004:23:17::/96 [110/101]
via fe80::bc22:aeff:fe64:aa00, eth-0-9, 00:08:06
O 2004:34:9::/96 [110/102]
via fe80::bc22:aeff:fe64:aa00, eth-0-9, 00:03:56
C fe80::/10
via ::, Null0, 01:15:44
C 2004:3:1::/96
via ::, eth-0-1, 00:13:54
C 2004:3:1::1/128
via ::1, eth-0-1, 00:13:54
O 2004:12:9::/96 [110/2]
via fe80::bc22:aeff:fe64:aa00, eth-0-17, 00:19:47
O 2004:14:17::/96 [110/2]
via fe80::ee66:91ff:fe45:db00, eth-0-9, 00:02:27
C 2004:23:17::/96
via ::, eth-0-17, 01:09:02
C 2004:23:17::2/128
via ::1, eth-0-17, 01:09:02
C 2004:34:9::/96
via ::, eth-0-9, 00:04:52
C 2004:34:9::1/128
via ::1, eth-0-9, 00:04:52
C fe80::/10
via ::, Null0, 01:09:04
Monitoring OSPFv3
You can display specific statistics such as the contents of IPv6 routing tables,
caches, and databases.
LS age: 600
LS Type: Router-LSA
Link State ID: 0.0.0.0
Advertising Router: 1.1.1.1
LS Seq Number: 0x80000008
Checksum: 0x9A57
Length: 40
Flags: 0x00 (-|-|-|-|-)
Options: 0x000013 (-|R|-|-|E|V6)
LS age: 1261
LS Type: Network-LSA
Link State ID: 0.0.0.13
Advertising Router: 3.3.3.3
LS Seq Number: 0x80000004
Checksum: 0x727E
Length: 36
Options: 0x000013 (-|R|-|-|E|V6)
Attached Router: 3.3.3.3
LS age: 1623
LS Type: Intra-Area-Prefix-LSA
Link State ID: 0.0.0.2
Advertising Router: 3.3.3.3
LS Seq Number: 0x80000004
Checksum: 0x8FA8
Length: 48
Number of Prefixes: 1
Referenced LS Type: 0x2002
Referenced Link State ID: 0.0.0.13
Referenced Advertising Router: 3.3.3.3
Prefix: 2004:12:9::/96
Prefix Options: 0 (-|-|-|-)
Metric: 0
Switch# show ipv6 ospf database inter-prefix
LS age: 641
LS Type: Link-LSA
Link State ID: 0.0.0.9
Advertising Router: 1.1.1.1
LS Seq Number: 0x80000005
Checksum: 0x9C1C
Length: 60
Priority: 1
Options: 0x000013 (-|R|-|-|E|V6)
Link-Local Address: fe80::20e6:7eff:fee2:d400
Number of Prefixes: 1
Prefix: 2004:12:9::/96
Prefix Options: 0 (-|-|-|-)
LS age: 698
LS Type: Link-LSA
Link State ID: 0.0.0.17
Prefix: 2004:12:9::/96
Prefix Options: 0 (-|-|-|-)
LS age: 1535
LS Type: Link-LSA
Link State ID: 0.0.0.13
Advertising Router: 3.3.3.3
LS Seq Number: 0x80000008
Checksum: 0x6E9A
Length: 60
Priority: 10
Options: 0x000013 (-|R|-|-|E|V6)
Link-Local Address: fe80::ba5d:79ff:fe55:ed00
Number of Prefixes: 1
Prefix: 2004:12:9::/96
Prefix Options: 0 (-|-|-|-)
13.3 ConfiguringRIPng
13.3.1 Overview
Brief Introduction
Routing Information Protocol Next Generation (RIPng) is an IPv6 route exchange
protocol that uses a distance vector (a number representing distance) to measure
the cost of a given route. The cost is a distance vector because the cost is often
equivalent to the number of router hops between the source and the destination
networks. RIPng can receive multiple paths to a destination. The system evaluates
the paths, selects the best path, and saves the path in the IPv6 route table as the
route to the destination.
Typically, the best path is the path with the fewest hops. A hop is another router
through which packets must travel to reach the destination. If RIPng receives a
RIPng update from another router that contains a path with fewer hops than the
path stored in the route table, the system replaces the older route with the newer
one. The system then includes the new path in the updates it sends to other RIPng
routers. RIPng routers also can modify a route’s cost, generally by adding to it, to
bias the selection of a route for a given destination. In this case, the actual number
of router hops may be the same, but the route has an administratively higher cost
and is thus less likely to be used than other, lower-cost routes. A RIPng route can
have a maximum cost of 15. Any destination with a higher cost is considered
unreachable. Although limiting to larger networks, the low maximum hop count
prevents endless loops in the network.
This chapter contains basic RIPng configuration examples. To see details on the
commands used in these examples, or to see the outputs of the Validation
commands, refer to the RIPng Command Reference. To avoid repetition, some
Common commands, like configure terminal, have not been listed under the
Commands Used section.
UDP port number: RIPng uses UDP port number 521 to send or receive package.
Multicast address: RIPng uses FF02::9 to multicast package to other routers of
link local.
Nexthop address: RIPng uses 128 bit ipv6 address.
Source address: RIPng uses IPv6 link-local address FE80::/10 to be the source
address when updating package to neighbor.
Principle Description
The RIPng module is based on the following RFC: RFC 2080 – RIPng for IPv6
2. Configuration Steps
This example shows how to enable RIPng protocols on two switches:
If a route matches both a global offset list (without specified interface) and an
interface-based offset list, the interface-based offset list takes precedence. The
interface-based offset list’s metric is added to the route in this case.
1. Topology
This example Switch 1 will advertise route 2001:db8:48::2/64 out of interface eth-
0-12 with metric 3.
2. Configuration Steps
Step 1 Check the current configuration
1. Topology
2. Configuration Steps
Step 1 Check the current configuration
Configuring Redistribution
You can configure the router to redistribute static routes, direct connected routes
or routes learned through Open Shortest Path First (OSPF) into RIPng. When you
redistribute a route from one of these other protocols into RIPng, the router can
use RIPng to advertise the route to its RIPng neighbors.
Change the default redistribution metric (optional). The router assigns a RIPng
metric of 1 to each redistributed route by default. You can change the default
metric to a value up to 16.
1. Topology
2. Configuration Steps
Step 1 Check the current configuration
You can avoid including routes in updates sent to the same gateway from which
they were learned. Using the split horizon command omits routes learned from one
neighbor, in updates sent to that neighbor. Using the poisoned parameter with this
command includes such routes in updates, but sets their metrics to infinity. Thus,
advertising these routes means that they are not reachable.
1. Topology
2. Configuration Steps
Step 1 Check the current configuration
Disable split-horizon:
Switch(config)#interface eth-0-12
Switch(config-if)# no ipv6 rip split-horizon
Switch(config-if)# exit
Enable split-horizon:
Switch(config)#interface eth-0-12
Switch(config-if)# ipv6 rip split-horizon
Switch(config-if)# exit
Configuring Timers
RIPng use several timers that determine such variables as the frequency of routing
updates, the length of time before a route becomes invalid, and other parameters.
You can adjust these timers to tune RIPng performance to better suit your internet-
work needs. You can make the following timer adjustments:
The rate (time in seconds between updates) at which routing updates are sent.
The interval of time (in seconds) after which a route is declared invalid.
The amount of time (in seconds) that must pass before a route is removed
from the routing table.
Set the routing table update timer to 10 seconds. Set the routing information
timeout timer to 180 seconds. Set the routing garbage collection timer to 120
seconds.
1. Topology
2. Configuration Steps
Step 1 Check the current configuration
Used by RIPng
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create IPv6 Prefix list
Switch(config)# ipv6 prefix-list aa seq 11 deny 2001:db8::1/32 le 48
Switch(config)# ipv6 prefix-list aa permit any
Step 3 Apply the IPv6 Prefix list
Switch(config)# router ipv6 rip
Switch(config-router)# distribute-list prefix aa out
Switch(config-router)# exit
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Switch# show ipv6 prefix-list
ipv6 prefix-list aa: 2 entries
seq 11 deny 1:db8::1/32 le 48
seq 15 permit any
Used by Route-map
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Create IPv6 Prefix list
Switch(config)# ipv6 prefix-list ripng_pre_1 seq 11 permit
fe80::a8f0:d8ff:fe7d:c501/128
Switch(config)# ipv6 prefix-list ripng_pre_1 permit any
Step 3 Apply the IPv6 Prefix list to the route map
Switch(config)# route-map ripng_rmap permit
Switch(config-route-map)# match ipv6 address prefix-list ripng_pre_1
Switch(config-route-map)# set local-preference 200
Switch(config-route-map)# exit
Step 4 Apply the route map to the RIPng instance
Switch(config)# router ipv6 rip
Switch(config-router)# redistribute static route-map ripng_rmap
Switch(config-router)# exit
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
Switch # show route-map
route-map ripng_rmap, permit, sequence 10
Match clauses:
ipv6 next-hop prefix-list ripng_pre_1
Set clauses:
ipv6 next-hop local fe80::1
Distribution of stock quotes, video transmissions such as news services and remote
classrooms, and video conferencing are all examples of applications that use
multicast routing.
Mulitcast Listener Discovery (MLD) is used among hosts on a LAN and the
routers (and multilayer switches) on that LAN to track the multicast groups of
which hosts are members.
Protocol-Independent Multicast (PIM) protocol is used among routers and
multilayer switches to track which multicast packets to forward to each other
and to their directly connected LANs. PIM has two modes: Sparse-mode and
Dense-mode. Currently, we only support Sparse-mode
14.2 ConfiguringMLD
14.2.1 Overview
Brief Introduction
To participate in IPv6 multicasting, multicast hosts, routers, and multilayer
switches must have the MLD operating. This protocol defines the query and host
roles:
MLD packets are sent using these IPv6 multicast group addresses:
MLD general queries are destined to the address ff02::1 (all systems on a
subnet).
MLD group-specific queries are destined to the group IPv6 address for which
the switch is querying.
MLD group membership reports are destined to the group IPv6 address for
which the switch is reporting.
MLD Version 1 (MLDv1) leave messages are destined to the address ff02::2 (all-
multicast-routers on a subnet). In some old host IPv6 stacks, leave messages
might be destined to the group IPv6 address rather than to the all-routers
address.
Principle Description
The MLD module is based on the following RFC
RFC 2710
RFC 3810
14.3 ConfiguringPIMv6-SM
14.3.1 Overview
Brief Introduction
The Protocol Independent Multicasting-Sparse Mode for IPv6 (PIMv6-SM) is a
multicast routing protocol designed to operate efficiently across Wide Area
Networks (WANs) with sparsely distributed groups. It helps network nodes that are
geographically dispersed to conserve bandwidth, and reduces traffic by
simultaneously delivering a single stream of information to multiple locations.
Principle Description
The PIMv6-SM module is based on the following IETF standard: RFC 4601
Terminology:
Tree Information Base (TIB): The TIB is the collection of state at a PIM router
storing the state of all multicast distribution trees at that router. It is created
by receiving Join/Prune messages, Assert messages, and MLD information from
local hosts.
Upstream: Towards the root of the tree. The root of the tree might be either
the Source or the RP.
Downstream: Away from the root of the tree. The root of tree might be either
the Source or the RP.
Source-Based Trees: In the Source-Based Trees concept, the forwarding paths
are based on the shortest unicast path to the source. If the unicast routing
metric is hop counts, the branches of the multicast Source-Based Trees are
minimum hop. If the metric is delay, the branches are minimum delay. For
every multicast source, there is a corresponding multicast tree that directly
connects the source to all receivers. All traffic to the members of an
associated group passes along the tree made for their source. Source-Based
Trees have two entries with a list of outgoing interfaces– the source address
and the multicast group.
Shared Trees: Shared trees or RP trees (RPT) rely on a central router called
the Rendezvous Point (RP) that receives all traffic from the sources, and
forwards that traffic to the receivers. All hosts might not be receivers. There is
a single tree for each multicast group, regardless of the number of sources.
Only the routers on the tree know about the group, and information is sent
only to interested receivers. With an RP, receivers have a place to join, even if
no source exists. The shared tree is unidirectional, and information flows only
from the RP to the receivers. If a host other than the RP has to send data on
the tree, the data must first be tunneled to the RP, and then multicast to the
members. This means that even if a receiver is also a source, it can only use
the tree to receive packets from the RP, and not to send packets to the RP
(unless the source is located between the RP and the receivers).
Bootstrap Router (BSR): When a new multicast sender starts sending data
packets, or a new receiver starts sending the Join message towards the RP for
that multicast group, it needs to know the next-hop router towards the RP. The
BSR provides group-to-RP mapping information to all the PIMv6 routers in a
domain, allowing them to map to the correct RP address.
Sending out Hello Messages: PIMv6 routers periodically send Hello messages to
discover neighboring PIMv6 routers. Hello messages are multicast using the
address ff02::d (ALL-PIMv6-ROUTERS group). Routers do not send any
acknowledgement that a Hello message was received. A hold time value
determines the length of time for which the information is valid. In PIMv6-SM,
a downstream receiver must join a group before traffic is forwarded on the
interface.
Electing a Designated Router: In a multi-access network with multiple routers
connected, one of them is selected to act as a designated router (DR) for a
DR is deleted, and the interface is removed from the Source and Group lists of
the group.
Forwarding Multicast Packets: PIMv6-SM routers forward multicast traffic onto
all interfaces that lead to receivers that have explicitly joined a multicast
group. Messages are sent to a group address in the local subnetwork, and have
a Time to Live (TTL) of 1. The router performs an RPF check, and forwards the
packet. Traffic that arrives on the correct interface is sent onto all outgoing
interfaces that lead to downstream receivers if the downstream router has
sent a join to this router, or is a member of this group.
This section provides PIMv6-SM configuration examples for two relevant scenarios.
In this example, using the above topology, Switch1 is the Rendezvous Point (RP),
and all routers are statically configured with RP information. While configuring the
RP, make sure that:
Every router includes the ipv6 pim rp-address 2001:1::1 statement, even if it
does not have any source or group member attached to it.
There is only one RP address for a group scope in the PIMv6 domain.
All interfaces running PIMv6-SM must have sparse-mode enabled.
1. Topology
The graphic above displays the network topology used in these examples.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch2:
Configure all the routers with the same ipv6 pim rp-address 2001:1::1 command as
shown above. Use the following commands to verify the RP configuration, interface
details, and the multicast routing table.
RP Details
At Switch1, the show ip pim sparse-mode rp mapping command shows that 11.1.1.1
is the RP for all multicast groups ff00::/8, and is statically configured. All other
routers will have a similar output.
Interface Details
The show ipv6 pim sparse-mode interface command displays the interface details
for Switch1.
The show ipv6 pim sparse-mode mroute detail command displays the IPv6 multicast
routing table.
Upstream:
State: JOINED, SPT Switch: Enabled, JT: off
Macro state: Join Desired,
Downstream:
eth-0-1:
State: NO INFO, ET: off, PPT: off
Assert State: NO INFO, AT: off
Winner: ::, Metric: 4294967295, Pref: 4294967295, RPT bit: on
Macro state: Could Assert, Assert Track
Local Olist:
eth-0-1
and is responsible for sending group-to-RP mapping information to all other routers
in this PIMv6 domain.
The following output displays the complete configuration at Switch1 and Switch2.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
Configuring Switch2:
The highest priority router is chosen as the RP. If two or more routers have
the same priority, a hash function in the BSR mechanism is used to choose the RP,
to make sure that all routers in the PIMv6-domain have the same RP for the same
group.
Use the show ip pim sparse-mode rp mapping command to display the group-to-RP
mapping details. The output displays information about RP candidates. There are
two RP candidates for the group range ff00::/8. RP Candidate 2001:1::1 has a
default priority of 192, whereas, RP Candidate 2001:9::2 has been configured to
have a priority of 2. Since RP candidate 2001:1::1 has a higher priority, it is
selected as RP for the multicast group ff00::/8. Only permit filters would be cared
in group list.。
RP details
To display information about the RP router for a particular group, use the following
command. This output displays that 2001:9::2 has been chosen as the RP for the
multicast group ff02::1234.
After RP information reaches all PIMv6 routers in the domain, various state
machines maintain all routing states as the result of Join/Prune from group
membership. To display information on interface details and the multicast routing
table, refer to the Configuring RP Statically section above.
The Bootstrap Router (BSR) mechanism for the class of multicast routing protocols
in the PIMv6 domain use the concept of a Rendezvous Point as a means for
receivers to discover the sources that send to a particular multicast group. The BSR
mechanism is one way that a multicast router can learn the set of group-to-RP
mappings required in order to function.
Some of the PIMv6 routers within a PIMv6 domain are configured as Candidate-RPs
(C-RPs). A subset of the C-RPs will eventually be used as the actual RPs for the
domain. An RP configured with a lower value in the priority field has higher a
priority.
Some of the PIMv6 routers in the domain are configured to be Candidate-BSRs (C-
BSRs). One of these C-BSRs is elected to be the bootstrap router (BSR) for the
domain, and all PIMv6 routers in the domain learn the result of this election
through BSM (Bootstrap messages). The C-BSR with highest value in priority field is
Elected-BSR.
The C-RPs then reports their candidacy to the elected BSR, which chooses a subset
of the C-RPs and distributes corresponding group-to-RP mappings to all the routers
in the domain through Bootstrap messages.
1. Topology
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch2:
Configuring Switch2:
Verify the C-BSR state on rtr2. The initial state of C-BSR is P-BSR before
transitioning to C-BSR.
Layer 2 multicast groups learned through MLD snooping are dynamic. If you specify
group membership for a multicast group address statically, your setting supersedes
any automatic manipulation by MLD snooping. Multicast group membership lists can
consist of both user-defined and MLD snooping-learned settings.
VRRP, RIPng and OSPFv3 used multicast IPv6 address, so you need to avoid use such
multicast IPv6 addresses, which have same multicast MAC address with multicast
IPv6 address reserved by VRRP, RIPng and OSPFv3.
VRRP used multicast group address ff02::12, so when mld snooping and VRRP
are working, you need to avoid using multicast group address that matched
same mac address with group address ff02::12.
OSPFv3 used multicast group address ff02::5, so when mld snooping and
OSFPv3 are working, you need to avoid using multicast group address that
matched same mac address with group address ff02::5.
RIPng used multicast group address ff02::9, so when mld snooping and RIPng
are working, you need to avoid using multicast group address that matched
same mac address with group address ff02::9.
will remove the group. By default, mld snooping fast-leave is disabled globally and
per vlan.
Set mld snooping query interval and max query response time:
leaves received on this vlan will be forwarded to the mrouter port, directly or
aggregated, depending on the report-suppression configuration. In addition, all the
multicast traffic on this vlan will be forwarded to this mrouter port.
Enable mld snooping report suppression and Set mld snooping dynamic mrouter port
aging interval:
14.5 ConfiguringMVR6
14.5.1 Overview
Brief Introduction
Multicast VLAN Registration for IPv6 (MVR6) is designed for applications using wide-
scale deployment of IPv6 multicast traffic across an Ethernet ring-based service
provider network (for example, the broadcast of IPv6 multiple television channels
over a service-provider network). MVR6 allows a subscriber on a port to subscribe
and unsubscribe to an IPv6 multicast stream on the network-wide multicast VLAN.
It allows the single multicast VLAN to be shared in the network while subscribers
remain in separate VLANs. MVR6 provides the ability to continuously send IPv6
multicast streams in the multicast VLAN, but to isolate the streams from the
subscriber VLANs for bandwidth and security reasons.
MVR6 assumes that subscriber ports subscribe and unsubscribe (join and leave)
these multicast streams by sending out MLD join and leave messages. These
messages can originate from an MLD version-1-compatible host with an Ethernet
connection. Although MVR6 operates on the underlying mechanism of MLD snooping,
the two features operation affect with each other. One can be enabled or disabled
with affecting the behavior of the other feature. If MLD snooping and MVR6 are
both enabled, MVR6 reacts only to join and leave messages from IPv6 multicast
groups configured under MVR6. The switch CPU identifies the MVR6 IPv6 multicast
streams and their associated MAC addresses in the switch forwarding table,
intercepts the MLD messages, and modifies the forwarding table to include or
remove the subscriber as a receiver of the multicast stream, and the receivers
must be in a different VLAN from the source. This forwarding behavior selectively
allows traffic to cross between different VLANs.
2. Configuration Steps
Step 1 Enter the configure mode
Configuring Switch:
Configuring Router:
Configuring Switch:
Eanble MVR6 in the switch, it is required that only one copy of IPv6 multicast
traffic from the Router is sent to the switch, but the hosts can both receiver this
IPv6 multicast traffic.
15.1 ConfiguringVRF
15.1.1 Overview
Brief Introduction
VPN is defined as a collection of sites sharing a common routing table. A customer
site is connected to the service provider network by one or more interfaces, where
the service provider associates each interface with a VPN routing table. A VPN
routing table is called a VPN routing and forwarding (VRF) table. Beginning in
privileged EXEC mode, follow these steps to configure one or more VRFs.
Step 3 Enter the interface configure mode and set the attributes of the interface
Switch(config-vrf)# interface eth-0-1
Switch(config-if)# no shutdown
Switch(config-if)# no switch
Switch(config-if)# ip vrf forwarding vpn1
Switch(config-if)# ip add 1.1.1.1/24
Switch(config-if)# end
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Principle Description
When it is required to communicate with isolated IPv4 networks, you should create
a tunnel mechanism between them. The tunnel with transmit protocol of gre
connected with two isolated IPv4 island is called IPv4 gre tunnel, which is that IPv4
packets are encapsulated by gre protocol over outer IPv4 packets. Gre tunnel
would add gre head in encapsulated packets, including key, sequence, checksum
and so on. In order to make an implement of gre tunnel, both tunnel endpoints
must support the IPv4 protocol stacks.
A host in the IPv4 network sends an IPv4 packet to Switch1 at the tunnel
source.
After determining according to the routing table that the packet needs to be
forwarded through the tunnel, Switch1 encapsulates the IPv4 packet with an
IPv4 header and forwards it through the physical interface of the tunnel.
Upon receiving the packet, Switch2 de-encapsulates the packet.
Switch2 forwards the packet according to the destination address in the de-
encapsulated IPv4 packet. If the destination address is the device itself,
Switch2 forwards the IPv4 packet to the upper-layer protocol for processing. In
the process of de-encapsulation, it would check gre key, only the matched key
of packet can be processed, otherwise discarded.
The ip address of tunnel source and tunnel destination is manually assigned, and it
provides point-to-point connection. By using overlay tunnels, you can communicate
with isolated IPv4 networks without upgrading the IPv4 infrastructure between
them. Overlay tunnels can be configured between border routers or between
border routers and a host.
The primary use is for stable connections that require regular secure
communication between two edge routers or between an end system and an edge
router, or for connection to remote IPv4 networks, gre key is alternative
configuration.
As the topology shows, two IPv4 networks connect to the network via Switch1 and
Switch2. An Ipv4 gre tunnel is required between Switch1 and Switch2, in order to
connect two networks.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch2:
16.1 ConfiguringBHM
16.1.1 Overview
Brief Introduction
BHM is a module which is used to monitor other Processes. When a monitored
Process is uncontrolled, the BHM module will take measures, such as printing
warning on screen, shutting all ports, or restarting the system, to help or remind
users to recover the system.
The monitored Processes include RIP, RIPNG, OSPF, OSPF6, BGP, LDP, RSVP, PIM,
PIM6, 802.1X, LACP MSTP, DHCP-RELAY, DHCP-RELAY6, RMON, OAM, ONM, SSH, SNMP,
PTP, SSM. In addition, some system procedures are also monitored, including NSM,
IMI, CHSM, HSRVD. There are three activations of BHM, including “reload system”,
including “reload system”,“warning”, “shutdown port”.
The main functions of Ethernet to the First Mile - Operation Administration and
Maintenance (EFM-OAM) are link performance monitoring, fault detection, fault
signaling and loopback signaling. OAM information is conveyed in Slow Protocol
frames called OAM Protocol Data Units (OAMPDUs). OAMPDUs contain the
appropriate control and status information used to monitor, test and troubleshoot
OAM-enabled links.
Principle Description
Reference: IEEE 802.3ah (2004)
2. Configuration Steps
The following configurations are same on Switch1 and Switch2.
At least one switch among Switch1 and Switch2 should use mode active. Both
switch use active can also work normally.
The EFM Discovery Machine State should be “send any” in both machines. This is
the expected normal operating state for OAM on fully-operational links.
The various states of OAM discovery state machine are defined below.
2. Configuration Steps
OAM remote loopback can be used for fault localization and link performance
testing. In addition, an implementation may analyze loopback frames within the
OAM sublayer to determine additional information about the health of the link
(i.e. determine which frames are being dropped due to link errors).
The following configurations are same on Switch1 and Switch2 if there is no special
description.
Configure on Switch1:
We can configure high and low threshold for link-monitoring features. We can also
configure an error disable action if one of the high thresholds is exceeded.
2. Configuration Steps
The following configurations and validations are operated on Switch1:
When the error packets exceed the threshold configured in step 2, set the interface
status to error-disable
2. Configuration Steps
An error-disable action can be configured to occur on an interface so that if any of
the critical link events (link fault, dying gasp, etc.) occurs in the remote machine,
the interface is shut down.
16.3 ConfiguringCFM
16.3.1 Overview
Brief Introduction
CFM = Connectivity Fault Management
CFM provides the capability to detect, verify, isolate and notify connectivity
failures on a Virtual Bridged LAN based on the protocol standard specified in IEEE
802.1ag. It provides for discovery and verification of paths through 802.1 bridges
and LANs, and is part of the enhanced Operation, Administration and Management
(OAM) features. CFM is designed to be transparent to the customer data
transported by a network and to be capable of providing maximum fault coverage.
Principle Description
Reference: IEEE 802.1ag/D8.1
Loopback messages
Linktrace messages
A MEP sends DMM with ETH-DM request information to its peer MEP and receives
DMR with ETH-DM reply information from its peer MEP to carry out two-way frame
delay and delay variation measurements.
When a MEP receives 1DM frames, it will carry out one-way frame delay and delay
variation measurements.
The Ethernet client signal fail function (ETH-CSF) is used by a MEP to propagate to
a peer MEP the detection of a failure or defect event in an Ethernet client signal
when the client itself does not support appropriate fault or defect detection or
propagation mechanisms, such as ETH-CC or ETH-AIS. The ETH-CSF messages
propagate in the direction from the Ethernet source-adaptation function detecting
the failure or defect event to the Ethernet sink-adaptation function associated with
the peer MEP. ETH-CSF is only applicable to point-to-point Ethernet transport
applications.
ETH-LM is used to collect counter values applicable for ingress and egress service
frames where the counters maintain a count of transmitted and received data
frames between a pair of MEPs.
ETH-LM is performed by sending LMM with ETH-LM information to a peer MEP and
similarly receiving LMR with ETH-LM information from the peer MEP.
Configure CC/LB/LT/AIS/DM
1. Topology
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
The range of the cfm domain level should be 0-7. The larger number
indicates the higher priority. When different cfm domains have the same vlan, the
packets of the domain with higher priority can pass through the domains with lower
priority.
Step 5 Enter the interface configure mode and set the attributes of the interface
Configuring Switch1:
Switch(config)# ethernet cfm ais suppress alarm enable domain cust vlan 30
Step 8 Exit the configure mode
Switch(config)# end
Step 9 Validation
The following command gives the connectivity details of the local machine Switch1
and Switch2 for the configured domain.
Switch1:
------------------------------------------------------
###Remote MEP:
MPID LEVEL VLAN ACTIVE Remote Mac RDI FLAGS STATE
---------------------------------------------------------
99 5 30 Yes d036.4567.8009 True Learnt UP
Switch2:
Loopback checks
The following command is used to ping remote mep by remote mep unicast mac
address on Switch1.
Switch# ethernet cfm loopback mac d036.4567.8009 unicast mepid 66 domain cust vlan
30
Sending 1 Ethernet CFM loopback messages, timeout is 5 seconds:
(! Pass . Fail)
!
Loopback completed.
-----------------------------------
Success rate is 100 percent(1/1)
The following command is used to ping remote mep by multicast mac address on
Switch1.
The following command is used to ping remote mep by remote mep id on Switch1.
Switch# ethernet cfm loopback unicast rmepid 99 mepid 66 domain cust vlan 30
Sending 1 Ethernet CFM loopback messages, timeout is 5 seconds:
(! Pass . Fail)
!
Loopback completed.
-----------------------------------
Success rate is 100 percent(1/1)
The following command is used to ping mip by mip mac address on Switch1.
Switch# ethernet cfm loopback mac 0e1d.a7d7.fb09 unicast mepid 66 domain cust vlan
30
Sending 1 Ethernet CFM loopback messages, timeout is 5 seconds:
(! Pass . Fail)
!
Loopback completed.
-----------------------------------
Success rate is 100 percent(1/1)
RDI checks
Before clear local mep rdi, the rdi status on Switch1 is as follows:
ERROR checks
Before clear local mep errors, the errors on Switch1 are as follows:
After clear local mep errors, the errors on Switch1 are as follows:
AIS check
Switch# show ethernet cfm ais mep 666 domain cust vlan 30
AIS-Status: Enabled
AIS Period: 1
Level to transmit AIS: 7
AIS Condition: No
----------------------------------------------------
Configured defect condition detected(yes/no)
----------------------------------------------------
unexpected-period no
unexpected-MEG level no
unexpected-MEP no
Mismerge no
LOC yes
LinkTrace checks
The following command is used to link trace remote mep by remote mep unicast
mac address on Switch1.
Switch# ethernet cfm linktrace mac d036.4567.8009 mepid 66 domain cust vlan 30
Sending Ethernet CFM linktrace messages,TTL is 64.Per-Hop Timeout is 5 seconds:
Please wait a moment
-------------------------------
Received Hops: 1
-------------------------------
TTL : 63
Fowarded : True
Terminal MEP : False
Relay Action : Rly FDB
Ingress Action : IngOk
Ingress MAC address : 0e1d.a7d7.fb09
Ingress Port ID Type : ifName
Ingress Port ID : eth-0-9
-------------------------------
Received Hops: 2
-------------------------------
TTL : 62
Fowarded : True
Terminal MEP : False
Relay Action : Rly FDB
Egress Action : EgrOk
Egress MAC address : 6a08.051e.bd09
Egress Port ID Type : ifName
Egress Port ID : eth-0-9
-------------------------------
Received Hops: 3
-------------------------------
TTL : 61
Fowarded : False
The following command is used to link trace remote mep by remote mep id on
Switch1.
The following command is used to link trace remote mip by remote mip unicast
mac address on Switch1.
-------------------------------
TTL : 63
Fowarded : True
Terminal MEP : False
Relay Action : Rly FDB
Ingress Action : IngOk
Ingress MAC address : 0e1d.a7d7.fb09
Ingress Port ID Type : ifName
Ingress Port ID : eth-0-9
-------------------------------
Received Hops: 2
-------------------------------
TTL : 62
Fowarded : False
Terminal MEP : False
Relay Action : Rly Hit
Egress Action : EgrOk
Egress MAC address : 6a08.051e.bd09
Egress Port ID Type : ifName
Egress Port ID : eth-0-9
The following command is used to make two way delay and delay variation
measurement on Switch1.
Switch# ethernet cfm dmm rmepid 99 mepid 66 count 5 domain cust vlan 30
Delay measurement statistics:
DMM Packets transmitted : 5
Valid DMR packets received : 5
Index Two-way delay Two-way delay variation
1 4288 usec 0 usec
2 4312 usec 24 usec
3 4296 usec 16 usec
4 4320 usec 24 usec
5 4264 usec 56 usec
Average delay : 4296 usec
Average delay variation : 24 usec
Best case delay : 4264 usec
Worst case delay : 4320 usec
Before make one way delay measurement, clock timer should be synchronized. The
following command is used to start sending 1dm message in Switch1.
Configure LCK
1. Topology
2. Configuration Steps
Step 1 Configuration prepare
Configuring Switch2:
Configure CSF
1. Topology
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Switch(config)#interface eth-0-17
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 20
Switch(config-if)# ethernet cfm mep down mpid 666 domain provid vlan 20 interval 1
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)#interface eth-0-17
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 20
Switch(config-if)# ethernet cfm mep down mpid 999 domain provid vlan 20 interval 1
Switch(config-if)# no shutdown
Switch(config-if)# exit
Step 6 Enable continuity check
Switch(config)# ethernet cfm cc enable domain cust vlan 30
Step 7 Configure csf relation between client mep and server mep
Configuring Switch2:
Switch(config)# ethernet cfm csf client domain cust vlan 30 mepid 99 server domain
provid vlan 20 mepid 666 interval 1
Configuring Switch3:
Switch(config)# ethernet cfm csf client domain cust vlan 30 mepid 88 server domain
provid vlan 20 mepid 999 interval 1
Step 8 Validation
For Switch2, client MEP 99 will report loc error and trigger csf for reason los,
therefore server MEP 666 will send CSF packet in interval 1 second. The following
command is used to display csf status for Swtich2.
For Switch3, server MEP 999 receives CSF packet and informs client MEP 99, then
client MEP 88 will enter CSF condition. The following command is used to display
csf status for Switch3:
Configure Dual-Ended LM
1. Topology
2. Configuration Steps
Step 1 Configuration prepare
Configuring Switch1:
Switch(config)# ethernet cfm lm enable dual-ended domain cust vlan 30 mepid 66 all-
cos cache-size 10
Configuring Switch4:
Switch(config)# ethernet cfm lm enable dual-ended domain cust vlan 30 mepid 99 all-
cos cache-size 10
Step 3 Validation
Configure Single-Ended LM
1. Topology
2. Configuration Steps
Step 1 Configuration prepare
Configuring Switch1:
Configuring Switch4:
The following command is used to output lmm and display lm results for Switch1.
Switch# ethernet cfm lm single-ended domain cust vlan 30 rmepid 99 mepid 66 count
10
DOMAIN : cust
VLAN : 30
MEPID : 66
Start Time : 2013/07/16 1:39:38
End Time : 2013/07/16 1:39:38
Notes : 1. When the difference of Tx is less than the difference of Rx,
the node is invalid, loss and loss ratio should be "-";
2. When loc is reported for mep, the loss should be "-" and loss
ratio should be 100%;
3. When calculate average loss and loss ratio, invalid or loc nodes
will be excluded;
Latest single-ended loss statistics:
--------------------------------------------------------------------------------
Index Cos Local-loss Local-loss ratio Remote-loss Remote-loss ratio
--------------------------------------------------------------------------------
1 all 0 000.0000% 0 000.0000%
2 all 0 000.0000% 0 000.0000%
Configure Test
1. Topology
2. Configuration Steps
Step 1 Configuration prepare
Switch(config)# ethernet cfm tst transmission enable domain cust vlan 30 mep 66 tx-
mode continuous pattern-type random packet-size 6
Switch(config)# ethernet cfm tst reception enable domain cust vlan 30 mep 99
Step 3 Validation
VLAN : 30
MEPID : 66
Transmission : Enabled
Reception : Disabled
Status : Non-Running
Start Time : 06:32:48
Predict End Time : 06:33:18
Actual End Time : 06:33:18
Packet Type : TST
Rate : 1000 mbps
Packet Size : 64 bytes
Tx Number : 29
Tx Bytes : 1856
Rx Number : 0
Rx Bytes : 0
The low-level traffic limit is performed for each reason, which is realized by
queue shaping of each type of PDU.
The high-level traffic limit is performed for all reasons, which is realized by
channel shaping at CPU channel.
With this two-level protection, each PDU-to-CPU rate is limited and the overall
PDU-to-CPU rate is also limited.
:The word “reason”, means this type of packets will be sent to cpu for
further processing.
Reason Description
arp Address Resolution Protocol
bpdu Bridge Protocol Data Unit
dhcp Dynamic Host Configuration Protocol
eapol Extensible Authentication Protocol Over
Lan
erps Ethernet Ring Protection Switching
fwd-to-cpu Packets forwarding to cpu
icmp-redirect ICMP Redirect
igmp IGMP Snooping Protocol
ip-option Packets with IP Option
ipda IP Destination to Router-self
ssh SSH protocol packet
telnet Telnet protocol packet
mlag MLAG protocol packet
tcp TCP protocol packet
ldp Label Distribution Protocol
macsa-mismatch Port Security for source mac learned
mcast-rpf-fail Multicast with rpf fail or first multicast
packet
mpls-ttl-fail Mpls Packets with ttl fail
ip-mtu-fail IP packet with mtu fail
ospf Open Shortest Path First
pim Protocol Independent Multicast
port-security-discard Port Security for exceeding fdb maxnum
rip Routing Information Protocol
sflow-egress Sampled flow at egress direction
sflow-ingress Sampled flow at ingress direction
slow-protocol Slow Protocol (including EFM, LACP and
SYNCE)
smart-link Smart Link Protocol
ucast-ttl-fail Unicast Packets with ttl fail
udld Unidirectional Link Detection Protocol
The default rate and class configuration for all reason is as following.
sflow-ingress 128 0
slow-protocol 256 1
smart-link 128 2
ucast-ttl-fail 64 0
udld 128 3
vlan-security-discard 128 0
vrrp 512 1
bfd-learning 128 1
dot1x-mac-bypass 64 2
bgp 256 1
egress-ttl-fail 64 0
icmpv6 64 2
l2protocol-tunnel 1000 0
loopback-detection 64 3
mirror-to-cpu 1000 0
ndp 64 2
tunnel-gre-keepalive 64 0
Principle Description
Terminology
The default value of total rate is 2000, the unit is pps (packet-per-second)
The valid range of reason class is 0-3. The larger number indicates the
higher priority.
Switch(config)# end
Step 6 Validation
To display the CPU Traffic Limit configuration, use following privileged EXEC
commands.
To display the CPU Traffic statistics information, use following privileged EXEC
commands.
16.5 ConfiguringG.8031
16.5.1 Overview
Brief Introduction
This document describes the configuration of G.8031 Ethernet Linear Protection
Switching.
To guarantee the protection switching time, for a working transport entity, its
protection transport entity is always pre-configured before the failure occurs.
Normally, the normal traffic will be transmitted and received on the working
transport entity. The switching to protection transport entity is usually triggered by
link/node failure, external commands, etc. Note that external commands are often
used in transport network by operators, and they are very useful in cases of service
adjustment, path maintenance, etc.
Principle Description
Reference: ITU-T G.8031/Y.1342 (06/2006)
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Switch(config-if)# ethernet cfm mep down mpid 13 domain test vlan 11 interval 1
Switch(config-if)# ethernet cfm mep crosscheck mpid 11 domain test vlan 11 mac
bab3.08a4.c80a
Switch(config-if)# spanning-tree port disable
Switch(config-if)# exit
Step 6 Create G8031 group and bind the mstp instance
Switch(config)# g8031 eps-id 10 working-port eth-0-9 protection-port eth-0-10
Switch(g8031-config-switching)# domain test working-service test1 protection-
service test2
Switch(g8031-config-switching)# instance 10
Switch(config-if)# exit
Step 7 Exit the configure mode
Switch(config)# end
Step 8 Validation
16.6 ConfiguringG.8032
16.6.1 Overview
Brief Introduction
Ethernet rings can provide wide-area multipoint connectivity more economically
due to their reduced number of links. Each ring node is connected to adjacent
nodes participating in the same ring, using two independent links. A ring link is
bounded by two adjacent nodes and a port for a ring link is called a ring port. The
minimum number of nodes on a ring is two.
Loop avoidance in the ring is achieved by guaranteeing that, at any time, traffic
may flow on all but one of the ring links. This particular link is called the ring
protection link (RPL), and under normal conditions this link is blocked, i.e., not
used for traffic. One designated node, the RPL owner, is responsible to block traffic
over the RPL. Under a ring failure condition, the RPL owner is responsible to
unblock the RPL, allowing the RPL to be used for traffic.
The event of a ring failure results in protection switching of the traffic. This is
achieved under the control of the ETH_FF functions on all ring nodes.
An APS protocol is used to coordinate the protection actions over the ring.
Principle Description
Reference:
T-REC-G.8032-200806-I!!PDF-E.pdf
T-REC-G.8032-201003-I!!PDF-E.pdf
T-REC-G.8032-201708-I!Cor1!PDF-E.pdf
Switch(g8032-config-switch)# instance 1
Switch(g8032-config-switch)# control-vlan 100
Switch(g8032-config-switch)# ring enable
Step 2 Switch1 validation
Switch# show g8032
RingID MajorRing State East Status West Status
-------------------------------------------------------------------------------
1 N/A Pending eth-0-9 Blocked eth-0-20 Forward
-------------------------------------------------------------------------------
1 N/A Pending eth-0-9 Blocked eth-0-20 Forward
Protect Instance : 1
Wait-to-restore : 05:00
Hold-off Timer : 0 (msecs)
Guard Timer : 500 (msecs)
WTB Timer : 5500 (msecs)
RAPS MEL : 7
Is Forward-to-cpu : 1
-------------------------------------------------------------------------------
Step 7 Configuration of Switch4
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# vlan database
Switch(config-vlan)# vlan 10-100
Switch(config-vlan)# exit
Switch(config)# spanning-tree mode mstp
Switch(config)# spanning-tree mst configuration
Switch(config-mst)# instance 1 vlan 10-99
Switch(config-mst)# exit
Switch(config)# no ip igmp snooping vlan 100
Switch(config)# interface eth-0-9
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-100
Switch(config-if)# spanning-tree port disable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-20
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-100
Switch(config-if)# spanning-tree port disable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# g8032 ring-id 1 east-interface eth-0-9 west-interface eth-0-20
Switch(g8032-config-switch)# instance 1
Switch(g8032-config-switch)# control-vlan 100
Switch(g8032-config-switch)# ring enable
Step 8 Switch4 validation
Switch# show g8032
RingID MajorRing State East Status West Status
-------------------------------------------------------------------------------
1 N/A Pending eth-0-9 Blocked eth-0-20 Forward
Control Vlan : 20
Is Enabled : No
Mode : Revertive
Node Role : N/A
Is Sub_ring : Yes
Virtual-channel : Disable
Protect Instance : 2
Wait-to-restore : 05:00
Hold-off Timer : 0 (msecs)
Guard Timer : 500 (msecs)
WTB Timer : 5500 (msecs)
RAPS MEL : 7
Is Forward-to-cpu : 1
-------------------------------------------------------------------------------
Step 3 Configuration of Switch2
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# vlan database
Switch(config-vlan)# vlan 10-150
Switch(config-vlan)# exit
Switch(config)# spanning-tree mode mstp
Switch(config)# spanning-tree mst configuration
Switch(config-mst)# instance 1 vlan 10-99
Switch(config-mst)# instance 2 vlan 101-150
Switch(config-mst)# exit
Switch(config)# no ip igmp snooping vlan 100
Switch(config)# interface eth-0-9
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-150
Switch(config-if)# spanning-tree port disable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-20
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-150
Switch(config-if)# spanning-tree port disable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config-if-eth-0-20)# no shutdown
Switch(config-if-eth-0-20)# exit
Switch(config)# g8032 ring-id 1 east-interface eth-0-13 west-interface eth-0-20
Switch(g8032-config-switch)# instance 1
Switch(g8032-config-switch)# instance 2
Switch(g8032-config-switch)# control-vlan 100
Switch(g8032-config-switch)# ring enable
Switch(g8032-config-switch)# exit
Switch(config)# g8032 ring-id 2 interface eth-0-9 major-ring-id 1
Switch(g8032-config-switch)# instance 2
Switch(g8032-config-switch)# control-vlan 20
Switch(g8032-config-switch)# ring enable
Step 6 Switch3 validation
Switch# show g8032
RingID MajorRing State East Status West Status
-------------------------------------------------------------------------------
1 N/A Pending eth-0-13 Blocked eth-0-20 Forward
Control Vlan : 20
Is Enabled : No
Mode : Revertive
Node Role : N/A
Is Sub_ring : Yes
Virtual-channel : Disable
Protect Instance : 2
Wait-to-restore : 05:00
Hold-off Timer : 0 (msecs)
Guard Timer : 500 (msecs)
WTB Timer : 5500 (msecs)
RAPS MEL : 7
Is Forward-to-cpu : 1
-------------------------------------------------------------------------------
Step 7 Configuration of Switch4
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Control Vlan : 20
Is Enabled : Yes
Mode : Revertive
Node Role : Owner
Is Sub_ring : Yes
Protect Instance : 1-2
RPL : east-interface
Wait-to-restore : 05:00
Hold-off Timer : 0 (msecs)
Guard Timer : 500 (msecs)
WTB Timer : 5500 (msecs)
RAPS MEL : 7
Is Forward-to-cpu : 0
-------------------------------------------------------------------------------
Control Vlan : 20
Is Enabled : No
Mode : Revertive
Node Role : N/A
Is Sub_ring : Yes
Virtual-channel : Enable
Protect Instance : 2
Wait-to-restore : 05:00
Hold-off Timer : 0 (msecs)
Guard Timer : 500 (msecs)
WTB Timer : 5500 (msecs)
RAPS MEL : 7
Is Forward-to-cpu : 0
-------------------------------------------------------------------------------
Step 3 Configuration of Switch2
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# vlan database
Switch(config-vlan)# vlan 10-150
Switch(config-vlan)# exit
Switch(config)# spanning-tree mode mstp
Switch(config)# spanning-tree mst configuration
Switch(config-mst)# instance 1 vlan 10-99
Switch(config-mst)# instance 2 vlan 101-150
Switch(config-mst)# exit
Switch(config)# no ip igmp snooping vlan 100
Switch(config)# interface eth-0-9
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-150
Switch(config-if)# spanning-tree port disable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-20
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-150
Switch(config-if)# spanning-tree port disable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# g8032 ring-id 1 east-interface eth-0-9 west-interface eth-0-20
Switch(g8032-config-switch)# instance 1
Switch(g8032-config-switch)# instance 2
Switch(g8032-config-switch)# control-vlan 100
Switch(g8032-config-switch)# ring enable
Switch(g8032-config-switch)# instance 2
Switch(g8032-config-switch)# control-vlan 100
Switch(g8032-config-switch)# ring enable
Switch(g8032-config-switch)# exit
Switch(config)# g8032 ring-id 2 interface eth-0-9 major-ring-id 1
Switch(g8032-config-switch)# instance 2
Switch(g8032-config-switch)# control-vlan 20
Switch(g8032-config-switch)# virtual-channel enable
Switch(g8032-config-switch)# ring enable
Step 6 Switch3 validation
Switch# show g8032
RingID MajorRing State East Status West Status
-------------------------------------------------------------------------------
1 N/A Pending eth-0-13 Blocked eth-0-20 Forward
Control Vlan : 20
Is Enabled : No
Mode : Revertive
Node Role : N/A
Is Sub_ring : Yes
Virtual-channel : Enable
Protect Instance : 2
Wait-to-restore : 05:00
Hold-off Timer : 0 (msecs)
Guard Timer : 500 (msecs)
WTB Timer : 5500 (msecs)
RAPS MEL : 7
Is Forward-to-cpu : 0
-------------------------------------------------------------------------------
Step 7 Configuration of Switch4
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# vlan database
Control Vlan : 20
Is Enabled : Yes
Mode : Revertive
Node Role : Owner
Is Sub_ring : Yes
Virtual-channel : Enable
Protect Instance : 1-2
RPL : east-interface
Wait-to-restore : 05:00
Hold-off Timer : 0 (msecs)
Guard Timer : 500 (msecs)
WTB Timer : 5500 (msecs)
RAPS MEL : 7
Is Forward-to-cpu : 0
-------------------------------------------------------------------------------
######Remote MEP:
MPID LEVEL VLAN Remote Mac RDI FLAGS STATE
---------------------------------------------------------
201 5 5 e03e.b1e1.3309 False Mac_config Up
402 5 5 b2d0.60e4.c314 False Mac_config Up
Step 3 Configuration of Switch2
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# vlan database
Switch(config-vlan)# vlan 10-100
Switch(config-vlan)# vlan 5
Switch(config-vlan)# exit
Switch(config)# spanning-tree mode mstp
Switch(config)# spanning-tree mst configuration
Switch(config-mst)# instance 1 vlan 10-99
Switch(config-mst)# exit
Switch(config)# no ip igmp snooping vlan 100
Switch(config)# ethernet cfm enable
Switch(config)# ethernet cfm domain md1 level 5
Switch(config-ether-cfm)# service ma1 vlan 5
Switch(config-ether-cfm)# exit
Switch(config)# ethernet cfm cc enable domain md1 vlan 5
Switch(config)# interface eth-0-9
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-100
Switch(config-if)# spanning-tree port disable
Switch(config-if)# ethernet cfm mep down mpid 201 domain md1 vlan 5 interval 1
Switch(config-if)# ethernet cfm mep crosscheck mpid 101 domain md1 vlan 5 mac
104e.40d1.e309
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-20
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-100
######Remote MEP:
MPID LEVEL VLAN Remote Mac RDI FLAGS STATE
---------------------------------------------------------
101 5 5 104e.40d1.e309 False Mac_config Up
302 5 5 a0cd.ce44.5514 False Mac_config Up
Step 5 Configuration of Switch3
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# vlan database
Switch(config-vlan)# vlan 10-100
Switch(config-vlan)# vlan 5
Switch(config-vlan)# exit
######Remote MEP:
MPID LEVEL VLAN Remote Mac RDI FLAGS STATE
---------------------------------------------------------
401 5 11 b2d0.60e4.c309 False Mac_config Up
202 5 11 e03e.b1e1.3314 False Mac_config Up
Step 7 Configuration of Switch4
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# vlan database
Switch(config-vlan)# vlan 10-100
Switch(config-vlan)# vlan 5
Switch(config-vlan)# exit
Switch(config)# spanning-tree mode mstp
Switch(config)# spanning-tree mst configuration
Switch(config-mst)# instance 1 vlan 10-99
Switch(config-mst)# exit
Switch(config)# no ip igmp snooping vlan 100
Switch(config)# ethernet cfm enable
Switch(config)# ethernet cfm domain md1 level 5
Switch(config-ether-cfm)# service ma1 vlan 5
Switch(config-ether-cfm)# exit
Switch(config)# ethernet cfm cc enable domain md1 vlan 5
Switch(config)# interface eth-0-9
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-100
Switch(config-if)# spanning-tree port disable
Switch(config-if)# ethernet cfm mep down mpid 401 domain md1 vlan 5 interval 1
Switch(config-if)# ethernet cfm mep crosscheck mpid 301 domain md1 vlan 5 mac
a0cd.ce44.5509
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# interface eth-0-20
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk allowed vlan add 10-100
Switch(config-if)# spanning-tree port disable
Switch(config-if)# ethernet cfm mep down mpid 402 domain md1 vlan 5 interval 1
Switch(config-if)# ethernet cfm mep crosscheck mpid 102 domain md1 vlan 5 mac
104e.40d1.e314
Switch(config-if)# no shutdown
Switch(config-if)# exit
Switch(config)# g8032 ring-id 1 east-interface eth-0-9 west-interface eth-0-20
Switch(g8032-config-switch)# instance 1
Switch(g8032-config-switch)# control-vlan 100
Switch(g8032-config-switch)# domain md1 service ma1
Switch(g8032-config-switch)# ring enable
######Remote MEP:
MPID LEVEL VLAN Remote Mac RDI FLAGS STATE
---------------------------------------------------------
301 5 11 a0cd.ce44.5509 False Mac_config Up
102 5 11 104e.40d1.e314 False Mac_config Up
16.7 ConfiguringUDLD
16.7.1 Overview
Brief Introduction
The Unidirectional Link Detection protocol is a light-weight protocol that can be
used to detect and disable one-way connections before they create dangerous
situations such as Spanning Tree loops or other protocol malfunctions.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and enable udld
Switch(config)# interface eth-0-9
Switch(config-if)# no shutdown
Switch(config-if)# udld port
Switch(config-if)# exit
Step 3 Enable udld globally
Switch(config)# udld enable
Step 4 Set the message interval (optional)
16.8 ConfiguringERPS
16.8.1 Overview
Brief Introduction
ERPS technology increases the availability and robustness of Ethernet rings. In the
event that a fiber cut occurs, ERPS converges in less than one second, often in less
than 50 milliseconds.
The main idea is described as the following. ERPS operates by declaring an ERPS
domain on a single ring. On that ring domain, one switch, or node, is designated
the master node, while all other nodes are designated as transit nodes. One port of
the master node is designated as the master node’s primary port to the ring;
another port is designated as the master node’s secondary port to the ring. In
normal operation, the master node blocks the secondary port for all non-ERPS
traffic belonging to this ERPS domain, thereby avoiding a loop in the ring. Keep-
alive messages are sent by the master node in a pre-set time interval. Transit nodes
in the ring domain will forward the ERPS messages. Once a link failure event occurs,
the master node will detect this either by receiving the link-down message sent by
the node adjacent to the failed link or by the timeout of the keep-alive message.
After link failure is detected, master node will open the secondary port for data
traffic to re-route the traffic.
Principle Description
Reference: RFC 3619
This section provides ERPS configuration examples for their typical network
topologies.
Configure same ERPS domain and ring at Switch1, Switch2 and Switch3. Switch1 is
configured as ERPS master node and other two switches are configured as ERPS
transit nodes. Interface agg11, which has two members called eth-0-9 and eth-0-10,
is configured as primary interface at Switch1 and eth-0-13 is configured as
secondary interface.
The ports accessing an ERPS ring must be configured as the members of the
control VLAN, allowing the ERPS packets to be sent and received.
STP on ports accessing ERPS rings must be disabled.
Only one node can be configured as master node.
Control VLAN must not be configured as Layer 3 interface.
VLAN mapping must not be enabled on the ERPS ports.
Native VLAN of a port accessing an ERPS ring must not be set as the primary
control VLAN or the secondary control VLAN.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
As the topology shows,eth-0-9 and eth-0-10 of Switch1 and Switch2 join agg 11
and connect to each other directly. eth-0-13 of Switch1 and Switch3 connect to
each other directly. eth-0-17 of Switch2 and Switch3 connect to each other directly.
Switch(config)# erps 11
Switch(config)# erps 11 primary control vlan 15
Switch(config)# erps 11
Switch(config)# erps 11 primary control vlan 15
Switch(config)# erps 11 mstp instance 0
Switch(config)# erps 11 ring 1 level primary
Switch(config)# erps 11 ring 1 mode transit
Switch(config)# erps 11 ring 1 primary interface agg11
Switch(config)# erps 11 ring 1 secondary interface eth-0-17
Switch(config)# erps 11 ring 1 enable
Switch(config)# erps 11 enable
Switch(config)# erps 11
Switch(config)# erps 11 primary control vlan 15
Switch(config)# erps 11 mstp instance 0
Switch(config)# erps 11 ring 1 level primary
Switch(config)# erps 11 ring 1 mode transit
Switch(config)# erps 11 ring 1 primary interface eth-0-17
Switch(config)# erps 11 ring 1 secondary interface eth-0-13
Switch(config)# erps 11 ring 1 enable
Switch(config)# erps 11 enable
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
Sent:
total packets:0
hello packets:0 ring-up-flush-fdb packets:0
ring-down-flush-fdb packets:0 link-down packets:0
edge-hello packets:0 major-fault packets:0
Received:
total packets:130
hello packets:129 ring-up-flush-fdb packets:1
ring-down-flush-fdb packets:0 link-down packets:0
edge-hello packets:0 major-fault packets:0
Configure same ERPS domain at Switch1, Switch2, Switch3 and Switch4. Switch1,
Switch2 and Switch3 consist of ERPS primary ring 1 while Switch2, Switch3 and
Switch4 consist of ERPS sub ring 2. Switch1 is configured as ERPS ring 1 master node
and other two switches are configured as ERPS transit nodes while Switch4 is
configured as ERPS ring 2 master node. In addition Switch2 is configured as edge
node and Switch3 is configured as assistant-edge node.
The ports accessing an ERPS ring must be configured as trunk ports, permitting the
traffic of data VLANs to pass through.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Switch(config)# erps 1
Switch(config)# erps 1 primary control vlan 11
Switch(config)# erps 1 sub control vlan 12
Switch(config)# erps 1 mstp instance 0
Switch(config)# erps 1 ring 1 level primary
Switch(config)# erps 1 ring 1 mode master
Switch(config)# erps 1 ring 1 primary interface eth-0-9
Switch(config)# erps 1 ring 1 secondary interface eth-0-13
Switch(config)# erps 1 ring 1 enable
Switch(config)# erps 1 enable
Switch(config)# erps 1
Switch(config)# erps 1 primary control vlan 11
Switch(config)# erps 1 sub control vlan 12
Switch(config)# erps 1 mstp instance 0
Switch(config)# erps 1 ring 1 level primary
Switch(config)# erps 1 ring 1 mode transit
Switch(config)# erps 1 ring 1 primary interface eth-0-9
Switch(config)# erps 1 ring 1 secondary interface eth-0-20
Switch(config)# erps 1 ring 1 enable
Switch(config)# erps 1 ring 2 level sub
Switch(config)# erps 1 ring 2 edge-mode edge
Switch(config)# erps 1 ring 2 edge interface eth-0-13
Switch(config)# erps 1 ring 2 common interface eth-0-20
Switch(config)# erps 1 ring 2 srpt disable
Switch(config)# erps 1 ring 2 enable
Switch(config)# erps 1 enable
Switch(config)# erps 1
Switch(config)# erps 1 primary control vlan 11
Switch(config)# erps 1 sub control vlan 12
Switch(config)# erps 1 mstp instance 0
Switch(config)# erps 1 ring 1 level primary
Switch(config)# erps 1 ring 1 mode transit
Switch(config)# erps 1 ring 1 primary interface eth-0-13
Switch(config)# erps 1 ring 1 secondary interface eth-0-20
Switch(config)# erps 1 ring 1 enable
Switch(config)# erps 1 ring 2 level sub
Switch(config)# erps 1 ring 2 edge-mode assistant-edge
Switch(config)# erps 1 ring 2 edge interface eth-0-9
Switch(config)# erps 1 ring 2 common interface eth-0-20
Switch(config)# erps 1 ring 2 enable
Switch(config)# erps 1 enable
Switch(config)# erps 1
Switch(config)# erps 1 sub control vlan 12
Switch(config)# erps 1 mstp instance 0
Switch(config)# erps 1 ring 2 level sub
Switch(config)# erps 1 ring 2 mode master
Switch(config)# erps 1 ring 2 primary interface eth-0-9
Switch(config)# erps 1 ring 2 secondary interface eth-0-13
Switch(config)# erps 1 ring 2 enable
Switch(config)# erps 1 enable
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
16.9 ConfiguringSmart-Link
16.9.1 Overview
Brief Introduction
The Smart Link is a simple but practical technology of fast link protection. It is a
solution specific to dual uplink networking to fulfill redundancy and fast migration
of active and standby links.
Every smart-link group is included a pair of a layer 2 interfaces where one interface
is configured to act as a standby to the other. The feature provides an alternative
solution to the STP. Users can disable STP and still retain basic link redundancy. The
feature also support load-balancing so than both interfaces simultaneously forward
the traffic.
The figure above is a typical smart-link application. The Switch1 and Switch2 are
configured smart-link group. Switch3, Switch4 and Switch5 are configured smart-
link flush receiver.
2. Configuration Steps
To configure smart-link group, some configuration should be configured before it.
Configure on Switch5:
2 A B
3 B A
16.10 ConfiguringMulti-Link
16.10.1 Overview
Brief Introduction
The Multi-Link is a simple but practical technology of fast link protection. It is a
solution specific to multi-uplink networking to fulfill redundancy and fast migration
of between links.
The feature is like smart link, but links extend to four instead of two.
The figure above is a typical multi-link application. The Switch1 are configured
multi-link group. Switch2, Switch3, Switch4 and Switch5 are configured multi-link
flush receiver.
2. Configuration Steps
To configure Multi-link group, some configuration should be configured before it.
When 2 multi-link group on different switches backup for each other, multi-link
members on one switch is blocked and can not protect the traffic.
In this example:
In normal condition, link b/c/e are block, link a/d are active. As the following
figure shows:
When link d/e are break down, the only out going link for Access switch B is link c,
which is between Access switch A and Access switch B.
Because link c is blocked, the Access switch B is the state of islet. As the following
figure shows:
The figure above is a typical multi-link application. The Switch1, 2 are configured
multi-link group. Switch1 has the interface which receives the multilink-enhance
packets. And , Switch2 has the interface which sends the multilink-enhance packets.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
============================================================
Instance states in the member interfaces:
A-ACTIVE , B-BLOCK , A(E)-ENHANCE_ACTIVE D-The interface is link-down
Map-instance-ID P1(eth-0-13) P2(eth-0-17) P3(N/A) P4(N/A)
1 A B D D
2 A B D D
Switch# show multi-link
Relay multi-link flush packet is enabled
Multi-link received flush packet number : 0
Multi-link processed flush packet number: 0
Multi-link received enhance packet number : 0
Multi-link processed enhance packet number: 0
Multi-link tcn is disabled
Multi-link tcn query count : 2
16.11 ConfiguringMonitor-Link
16.11.1 Overview
Brief Introduction
Monitor Link is a port collaboration function. Monitor Link usually works together
with Layer 2 topology protocols. The idea is to monitor the states of uplink ports
and adapt the up/down state of downlink ports to the up/down state of uplink
ports, triggering link switchover on the downstream switch in time.
2. Configuration Steps
Step 1 Enter the configure mode
Switch# configure terminal
Step 2 Enter the interface configure mode and turn on the interface
Switch(config)# interface range eth-0-1 - 3
Switch(config-if-range)# no shutdown
Switch(config-if-range)# exit
Step 3 Create multi link group and set the attributes of the group
Switch(config)# monitor-link group 1
Switch(config-mtlk-group)# monitor-link uplink interface eth-0-1
Switch(config-mtlk-group)# monitor-link downlink interface eth-0-2
Switch(config-mtlk-group)# monitor-link downlink interface eth-0-3
Switch(config-mtlk-group)# exit
Step 4 Exit the configure mode
Switch(config)# end
Step 5 Validation
Switch# show monitor-link group
Group Id: 1
Monitor link status: UP
Role Member Last-up-time Last-down-time upcount downcount
UpLk 1 eth-0-1 2011/07/15,02:07:31 2011/07/15,02:07:31 2 1
DwLk 1 eth-0-2 2011/07/15,02:07:34 2011/07/15,02:07:31 1 1
DwLk 2 eth-0-3 N/A N/A 0 0
16.12 ConfiguringVRRP
16.12.1 Overview
Brief Introduction
This chapter provides an overview of Virtual Router Redundancy Protocol (VRRP)
and its implementation. VRRP eliminates the risk of a single point of failure
inherent in a static default routing environment. It specifies an election protocol
that dynamically assigns responsibility for a virtual router to one of the VRRP
routers on a LAN. One of the major advantages of VRRP is that it makes default
path available without requiring configuration of dynamic routing on every end-
host.
Principle Description
The VRRP module is based on: RFC 3768 (VRRP): Knight, S., et.al “Virtual Router
Redundancy Protocol (VRRP)”
Terminology
Virtual Router: A router managed by VRRP that acts as a default router for
hosts on a shared LAN. It consists of a Virtual Router Identifier and a set of
associated IP addresses across a common LAN. A VRRP Router might backup one
or more virtual routers.
VRRP Router: A router runs the Virtual Router Redundancy Protocol. It might
participate in one or more virtual routers.
Typically, end hosts are connected to the enterprise network through a single
router (first hop router) that is in the same Local Area Network (LAN) segment. The
most popular method of configuration for the end hosts is to statically configure
this router as their default gateway. This minimizes configuration and processing
overhead. The main problem with this configuration method is that it produces a
single point of failure if this first hop router fails.
At first glance, the configuration outlined in might not seem very useful, as it
doubles the cost and leaves one router idle at all times. This, however, can be
avoided by creating two virtual routers and splitting the traffic between them.
2. Configuration Steps
In this configuration the end-hosts install a default route to the IP address of
virtual router 1(VRID = 1) and both routers R1 and R2 run VRRP. R1 is configured to
be the Master for virtual router 1 (VRID = 1) and R2 as a Backup for virtual router 1.
If R1 fails, R2 will take over virtual router 1 and its IP addresses, and provide
uninterrupted service for the hosts. Configuring only one virtual router, doubles the
cost and leaves R2 idle at all times.
The following configuration should be operated on all devices if the device ID is not
specified.
Set the priority on R1. R1 use the default value if the priority is not configured.
VMAC : 0000.5e00.0101
VRF : Default
Uniform-mac : -
Advt timer : 5 second(s)
Preempt mode : TRUE
Conf pri : 100 Run pri : 100
Master router ip : 10.10.10.50
Master priority : 200
Master advt timer : 5 second(s)
Master down timer : 16 second(s)
Preempt delay : 0 second(s)
Learn master mode : FALSE
2. Configuration Steps
In the one virtual router example earlier, R2 is not backed up by R1. This example
illustrates how to backup R2 by configuring a second virtual router.
In this configuration, R1 and R2 are two virtual routers and the hosts split their
traffic between R1 and R2. R1 and R2 function as backups for each other.
The following configuration should be operated on all devices if the device ID is not
specified.
Configuring R1:
Configuring R2:
Interface : eth-0-9
VMAC : 0000.5e00.0101
VRF : Default
Uniform-mac : -
Advt timer : 5 second(s)
Preempt mode : TRUE
Conf pri : 100 Run pri : 255
Master router ip : 10.10.10.81
Master priority : 255
Master advt timer : 5 second(s)
Master down timer : 15 second(s)
Preempt delay : 0 second(s)
Learn master mode : FALSE
VRID <2>
State : Backup
Virtual IP : 10.10.10.82(Not IP owner)
Interface : eth-0-9
VMAC : 0000.5e00.0102
VRF : Default
Uniform-mac : -
Advt timer : 5 second(s)
Preempt mode : TRUE
Conf pri : 200 Run pri : 200
Master router ip : 10.10.10.82
Master priority : 255
Master advt timer : 5 second(s)
Master down timer : 15 second(s)
Preempt delay : 0 second(s)
Learn master mode : FALSE
VRF : Default
Uniform-mac : -
Advt timer : 5 second(s)
Preempt mode : TRUE
Conf pri : 100 Run pri : 255
Master router ip : 10.10.10.82
Master priority : 255
Master advt timer : 5 second(s)
Master down timer : 15 second(s)
Preempt delay : 0 second(s)
Learn master mode : FALSE
2. Configuration Steps
The need for VRRP Circuit Failover arose because VRRPv2 was unable to track the
gateway interface status. The VRRP Circuit Failover feature provides a dynamic
failover of an entire circuit in the event that one member of the group fails. It
introduces the concept of a circuit, where two or more Virtual Routers on a single
system can be grouped. In the event that a failure occurs and one of the Virtual
Routers performs the Master to Backup transition, the other Virtual Routers in the
group are notified and are forced into the Master to Backup transition, so that both
incoming and outgoing packets are routed through the same gateway router,
eliminating the problem for Firewall/NAT environments. The following scenario
explains this feature.
In this example, two routers R1 and R2 are configured as backup routers with
different priorities. The priority-delta value is configured to be greater than the
When this VR Backup (R1) is up again, it regains its original priority (100) and
becomes the VR Master again.
The following configuration should be operated on all devices if the device ID is not
specified.
Configuring R1:
To get more information about track, please reference to the “Configuring Track”
chapter.
Configuring R1:
Configuring R2:
VMAC : 0000.5e00.0101
VRF : Default
Uniform-mac : -
Advt timer : 5 second(s)
Preempt mode : TRUE
Conf pri : 90 Run pri : 90
Master router ip : 10.10.10.50
Master priority : 100
Master advt timer : 5 second(s)
Master down timer : 16 second(s)
Preempt delay : 0 second(s)
Learn master mode : FALSE
2. Configuration Steps
In this configuration the end-hosts install a default route to the IP address of
virtual router 1(VRID = 1) and both routers R1 and R2 run VRRP. R1 is configured to
be the Master for virtual router 1 (VRID = 1) and R2 as a Backup for virtual router 1.
If R1 fails, R2 will take over virtual router 1 and its IP addresses, and provide
uninterrupted service for the hosts. Configuring only one virtual router, doubles the
cost and leaves R2 idle at all times.
The following configuration should be operated on all devices if the device ID is not
specified.
Switch(config-if)# no shutdown
Switch(config-if)# exit
Set the priority on R1. R2 use the default value 100 if the priority is not configured.
2. Configuration Steps
In the one virtual router example earlier, R2 is not backed up by R1. This example
illustrates how to backup R2 by configuring a second virtual router.
In this configuration, R1 and R2 are two virtual routers and the hosts split their
traffic between R1 and R2. R1 and R2 function as backups for each other.
The following configuration should be operated on all devices if the device ID is not
specified.
Configuring R1:
Configuring R2:
2. Configuration Steps
The need for VRRP Circuit Failover arose because VRRPv2 was unable to track the
gateway interface status. The VRRP Circuit Failover feature provides a dynamic
failover of an entire circuit in the event that one member of the group fails. It
introduces the concept of a circuit, where two or more Virtual Routers on a single
system can be grouped. In the event that a failure occurs and one of the Virtual
Routers performs the Master to Backup transition, the other Virtual Routers in the
group are notified and are forced into the Master to Backup transition, so that both
incoming and outgoing packets are routed through the same gateway router,
eliminating the problem for Firewall/NAT environments. The following scenario
explains this feature.
In this example, two routers R1 and R2 are configured as backup routers with
different priorities. The priority-delta value is configured to be greater than the
difference of both the priorities. R1 is configured to have a priority of 100 and R2
has a priority of 90. R1 with a greater priority is the Virtual Router Master. The
priority-delta value is 20, greater than 10 (100 minus 90). On R1 when the external
interface eth1 fails, the priority of R1 becomes 80 (100 minus 20). Since R2 has a
greater priority (90) than R1, R2 becomes the VR Master and routing of packages
continues without interruption.
When this VR Backup (R1) is up again, it regains its original priority (100) and
becomes the VR Master again.
The following configuration should be operated on all devices if the device ID is not
specified.
Configuring R1:
To get more information about track, please reference to the “Configuring Track”
chapter.
Configuring R1:
Configuring R2:
Switch(config-if)# shutdown
Switch(config-if)# end
Step 8 Validation, R1 change to backup and R2 change to master
16.13 ConfiguringTrack
16.13.1 Overview
Brief Introduction
Track is used for link the functional modules and monitor modules. Track builds a
system structure with 3 levels: “functional modules – Track – monitor modules”.
Track can shield the difference of the monitor modules and provide an unitized API
for the functional modules.
IP SLA
interface states
bfd states
Static route
VRRP
Track makes a communication for the functional modules and monitor modules.
When link states or network performance is changed, the monitor modules can
detect the event and notify the track module; therefore track will change its owner
states and notify the related functional modules.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch1:
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch1:
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Switch(config-if)# no shutdown
Switch(config-if)# ip address 192.168.0.2/24
Switch(config-if)# exit
Configuring Switch1:
Configuring Switch1:
Switch#configure terminal
Switch(config)# ip route 1.1.1.1/32 192.168.0.1
Switch(config)# end
Before the introduction of track feature, the VRRP had a simple tracking
mechanism that allowed you to track the interface link state only. If the link state
of the interface went down, the VRRP priority of the router was reduced, allowing
another VRRP router with a higher priority to become active. The Track feature
separates the tracking mechanism from VRRP and creates a separate standalone
tracking process that can be used by other processes in future. This feature allows
tracking of other objects in addition to the interface link state. VRRP can now
register its interest in tracking objects and then be notified when the tracked
object changes state. TRACK is a separate standalone tracking process that can be
used by other processes as well as VRRP. This feature allows tracking of other
objects in addition to the interface link state.
2. Configuration Steps
Configuring Switch1:
delay up: After the interface states is up, the track will wait for a cycle before
restore the states. Valid range is 1-180 second. The default configuration is
restore without delay.
delay down: After the interface states is down, the track will wait for a cycle
before change the states. Valid range is 1-180 second. The default
configuration is change without delay.
If the track is using bfd or ip sla, the “delay up” and “delay down” is
similar as using interface states.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.:
Configuring Switch1:
Configuring Switch1:
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.:
Configuring Switch1:
Configuring Switch1:
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.:
Configuring Switch1:
Configuring Switch2:
2. Configuration Steps
Step 1 Check current configuration
interface eth-0-1
no switchport
ip address 10.10.10.50/24
!
router vrrp 1
interface eth-0-1
virtual-ip 10.10.10.60
advertisement-interval 5
enable
interface eth-0-1
no switchport
ip address 10.10.10.40/24
!
router vrrp 1
interface eth-0-1
priority 200
virtual-ip 10.10.10.60
advertisement-interval 5
enable
Step 2 Create track and set the attributes
Note: Use the following example to monitoring the RDI state in CCM packets
VRID <1>
State : Backup
Virtual IP : 10.10.10.60(Not IP owner)
Interface : eth-0-9
VMAC : 0000.5e00.0101
VRF : Default
Advt timer : 5 second(s)
Preempt mode : TRUE
Conf pri : Unset Run pri : 100
Increased pri : 0
Track Object : 1
Decre pri : 30
Master router ip : 10.10.10.40
Master priority : 200
Master advt timer : 5 second(s)
Master down timer : 16 second(s)
Preempt delay : 0 second(s)
Learn master mode : FALSE
BFD session state : UNSET
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Switch(config)#interface eth-0-1
Switch(config-if)# no switchport
Switch(config-if)# no shutdown
Switch(config-if)# ip address 192.168.1.10/24
Switch(config-if)# exit
Switch(config)#interface eth-0-1
Switch(config-if)# no switchport
Switch(config-if)# no shutdown
Switch(config-if)# ip address 192.168.1.11/24
Switch(config-if)# exit
Step 3 Create ip sla and enable it
Configuring Switch1:
Configuring Switch1:
Threshold : 5 seconds
Running Frequency : 8 seconds
Return code : Timeout
Switch# show track 1
Track 1
Type : Response Time Reporter(RTR) Reachability
RTR entry number : 1
State : down
Switch# show ip route static
Switch#
An additional goal is to provide a single mechanism that can be used for aliveness
detection over any media, at any protocol layer, with a wide range of Detection
Times and overhead, to avoid a proliferation of different methods.
Principle Description
Reference RFC 5880 Bidirectional Forwarding Detection (BFD)
This topology and configuration is for three BFD session ,one session based on static
configuration with static route,next session based on OSPF ,and last session relate
vrrp.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)#router vrrp 1
Switch(config-router)#virtual-ip 11.11.11.100
Switch(config-router)# priority 120
Switch(config-router)#interface eth-0-11
Switch(config-router)# enable
Switch(config-router)# exit
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Switch1(config)# bfd test peer-ip 2001::2 interface eth-0-11 source-ip 2001::1 auto
Configuring Switch2:
Switch2(config)# bfd test peer-ip 2001::1 interface eth-0-11 source-ip 2001::2 auto
Step 4 Exit configure mode
Switch(config)# end
Step 5 Validation
This topology and configuration is for one BFD session which is based on static
multiple bfd for static route,
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Switch(config)#interface eth-0-12
Switch(config-if)#no switchport
Switch(config-if)#no shutdown
Switch(config-if)#ip address 12.12.12.1/24
Switch(config-if)#exit
Configuring Switch1:
Configuring Switch2:
Switch(config)# end
Step 5 Validation
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch3:
16.15 ConfiguringVARP
16.15.1 Overview
Brief Introduction
Virtual ARP (VARP) allows multiple switches to simultaneously route packets with
the same destination MAC address. Each switch is configured with the same virtual
MAC address for the the L3 interfaces configured with a virtual IP address. In MLAG
configurations, VARP is preferred over VRRP because VARP working on active-active
mode without traffic traverse peer link.
For ARP and GARP requests to virtual IP address, VARP will use the virtual MAC
address to reply. The virtual MAC address is only used in the destination field of
inbound packets and never used in the source field of outbound packets.Topology
2. Configuration Steps
The following configuration should be operated on all devices if the device ID is not
specified.
Configuring Switch1:
Configuring Switch2:
After enabling the UDP helper function, the device will make a judgement on the
destination port number of the received broadcast UDP packet. If the packet whose
destination port number matches the port number configured by the UDP helper, it
will copy it and modify the the destination IP address of packet header and sent to
the designated server.
To display the UDP Helper configuration, use following privileged EXEC commands.
17.1 ConfiguringVXLAN
17.1.1 Overview
Brief Introduction
Virtual Extensible LAN (VXLAN) is a networking technology that encapsulates MAC-
based Layer 2 Ethernet frames within Layer 3 UDP packets to aggregate and tunnel
multiple layer 2 networks across a Layer 3 infrastructure. VXLAN scales up to 16
million logical networks and supports layer 2 adjacency across IP networks.
Multicast transmission architecture is used for broadcast/multicast/unknown
packets.
Background
Nowadays, Server virtualization gets more and more recognitions and deployments
since it reduces the cost of IT, improves the flexibilities of business deployment and
reduces the cost of maintenance and other advantages. One server can virtual into
multiple virtual machines; one virtual machine is equal to a host, the number of
hosts has a big change on its amount.
When virtual machine runs, it needs to move to new server because the resources
of server and other problems (such as CPU is too high, the storage is not enough
and so on). To make sure that business is not interrupted during the migration, it
needs to make sure that the IP address, MAC address and other parameters of
virtual machine are not changing. This is asking the business network as a Layer 2
network, and requires that the network itself has multiple paths of redundancy and
reliabilities.
The above requirements make traditional Layer 2 domain becomes larger and larger.
The traditional network becomes powerless to cope with larger Layer 2
requirements, it mainly reflected in the following aspects:
Direct at the above problems in large Layer 2 network, the raise of VXLAN (Virtual
eXtensible Local Area Network) solves the problems well.
Principle Description
1. Basic principle
Basic principle
VXLAN is a kind of technique of network virtualization. Figure 2-1 shows the packet
format of VXLAN, VXLAN packet adds a VXLAN header and UDP/IP header to the
packet, original packets which are sent by VM or physical server, and uses added
MAC/IP to forward on network devices that it passes through, then it restores the
Packet encapsulation
Flag: 8 bit, current protocol value is 00001000, the fifth bit indicates whether
the VXLAN packet is valid or not
VNID: VXLAN Network Identifier, VXLAN network id, 24 bit, is used for
distinguish VXLAN sections.
Reserved: 24 bit and 8 bit, current protocol regulates that should be 0 for all.
External IP header:
The source ip is the IP of VTEP where the transmit server or virtual machine
belongs to packet; the destination IP is the IP of VTEP server or virtual
machine belongs to.
Src MAC: the MAC of VTEP’s physical network interface that sending packets
Dst MAC: MAC of the next hop to destination VTEP IP.
VLAN: if the under layer physical network uses VLAN interface, then it can
take the corresponding VLAN TAG optionally.
As shown in the figure above, HOST A and HOST B are in the same network segment
but distributes in different VTEP, the detail networking process for HOST A and
HOST B is the following:
HOST A and HOST B are in the same network segment, HOST A sends ARP to
request the MAC address of HOST B
When ARP requested packet reaches to VTEP-1, switch finds that it is a
broadcast packet and need to flood in VLAN, and one copy of this packet is
sent to VXLAN tunnel (broadcast copies on the head VTEP, if there are several
tunnels, it will send one packet to each tunnel). VLAN maps to VNI with VXLAN
capsulate, it will add the external UDP IP encapsulation, according the
external IP searching routing table to make sure the next hop of this packet.
Switch will learn address MAC-A to interface eth-0-1 in corresponding VLAN at
the same time
Packet is forwarding depends on the external IP; it will reach to VTEP-2 at last.
After VTEP-2 receives this packet, it will find that the outer D-mac is the local
address, meanwhile, it will check whether local has configured corresponding
tunnel by packet’s Outer S-IP, Outer D-IP and VNI. If it has the tunnel, then it
will take decapsulated operation, cut the outer header and map VNI into
corresponding VLAN; it will broadcast in VLAN when it finds it is broadcast
packet. At the same time, it will learn Mac-A to relevant tunnel interface in
VLAN.
As shown in the figure above, HOST B replies the ARP request sent from HOST A;
this packet is unicast packet, the following example shows the process of unicast
packet forwarding:
By default, VTEP has tunnels that connect with each other; if it finds that
the exit of Dst-mac is tunnel after decapsulating, then the packet will be discard.
As shown in the figure above, HOST A and B are in different network section,
network between them need the help from network gateway. In this situation, it
can configure the network gateway onto VTEP-3 intensively, VTEP-1 and VTEP-2 will
create VXLAN tunnels to VTEP-3 separately, and then the administrators can make
managements intensively.
HOST A sends arp-request to request the mac address of gateway, VTEP-1 will
do vxlan encapsulation to this arp-requestand then forward to VTEP-3 as
unknown unicast traffic.
VTEP-3 will determine whether itself has the gateway address that the packet
requested after it receives the arp-request,if it does then it replies arp-reply
with vxlan encapsulation to HOST A and learn arp entry of HOST A, its
outbound interface is vxlan tunnel.
VTEP-1 will cut the header of vxlan after it receives this arp-reply; it will
forward the original arp-reply to HOST A and learn the mac address of gateway
and its outbound interface is vxlan tunnel.
When HOST A receives the arp-reply, it will learn the mac address of gateway
and starts sending data packet. The format of data packet is shown in Figure 2-
4.
Gateway will determine if it needs to do routing forward or not after it
receives this packet; however, there is no HOST B’s arp table items at this time.
Therefore, it will send arp-request to request the arp of HOST B, this arp-
request will add the vxlan header to VTEP-2.
After VTEP-2 receiving the arp-request, it decapsultes and forwards to HOST B
and learns the gateway’s mac address, its outbound interface is vxlan tunnel.
HOST B replys arp-reply, its destination mac is the mac of gateway; it will
search and forward on VTEP-2, and finds out the outbound interface is vxlan
tunnel, hence VTEP-2 will do vxlan encapsulation of this packet and send it to
gateway.
After gateway receives this packet, it learns the arp of HOST B, and then
forwards the data packet to HOST B through vxlan tunnel.
As shown in the figure above, network knows the IP-B is the host connects to VTEP-
2, and the VXLAN ID is VXLAN-2. According to the information above, we can
configure routing table on inbound VTEP (which is VTEP-1 in Figure 5), directly
encapsulate packets and sent to IP-B , to reduce the pressure of gateway and
reduce the delay time of forwarding at the same time. The detailed forwarding
process is:
HOST A sends packet Dst-ip as IP-B, since IP-B and this ip (IP-A) are not in the
same network sections, hence this Dst-mac is gateway’s mac (Mac-C)
When the packet gets to VTEP-1, VTEP-1 finds that the Dst-mac is the gateway
mac in the network of VLAN, and then it will search whether it has the routing
information of IP-B in routing table. If it exsits: then forwarding by the routing
table, this route entry includes the VTEP and VXLAN ID information where IP-B
is and the corresponding mac (Mac-B) information of IP-B. It will change the
original packet’s Dst-mac to Mac-B on VTEP-1 and add the relevant
encapsulation depends on outer packet information and then precede
forwarding; if it does not exsit: then discard this packet
Packet will forward according to outer packet in the network.
Packet decapsulates when it reaches to VETP-2, the process of decapsulation is
the same as Layer 2 forwarding.
Distributed gateway needs the help from BGP EVPN to synchronize the arp
table items on distributed gateway, or static configures DVR routing.
2. Surrounding Features
keep-vlan-tag
By default, it will cut the VLAN tag which the original packet carries when
encapsulation and map to outer VXLAN-VNI, and then encapsulated inner packet
will not have VLAN tag anymore. If the packet enters the VXLAN network with
multiple VLAN tags, it needs to keep the VLAN tag for original packet, the keep-
vlan-tag properties should be enabled. For configuration in details, please refer to
command line reference guide.
tunnel-aware
Packets that are encapsulated by VXLAN, traditional network devices can only
recognize the outer header information of packet s and it will forward by outer
header information. If congestions or other situations happen in the network, since
it cannot recognize the inner information of packet s, it will not locate which
virtual machine or server generates the congestion accurately. After enabling
tunnel-aware function, it will allow switches to analyze the inner packet
information of original packet, and then use this information on ACL, Flow tracing
and so on, which will analyze network traffic accurately.
Distributed-Gatway
In distributed network gateway network, users can configure the gateway of server
or virtual machine on to the VTEP which is directly connected. Networking between
each virtual machine in different network sections will not use concentrated
gateway anymore in the same VTEP. For example, cooperation with DVR routing
will not deploy concentrated gateway, the detailed configuration method can be
referred to the cases in chapter “Configuration Examples” of this document.
split-horizon
By default, we suggest that configure vxlan tunnels between vtep’s full mesh, the
traffic from one tunnel cannot enter into another tunnel; if it has requirements of
forwarding traffic with each other between tunnels, then disable the split-horizon
on tunnels.
DSCP strategy
When encapsulate, users can configure generate strategy of encapsulating packets’
DSCP, includes following options:fixed value, copy from original packet, map by
priority of packet. The default option is copy from original packet.
2. Configuration Steps
In the following example, switch1 and swith2 are connected via layer 3 route. The
traffic of vlan 20 are encapsulated in vni 20000, in order to pass through the layer 3
networks.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.2 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.2
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.1 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
2. Configuration Steps
In the following example, VM-1 & VM-3 are encapsulated in same vni to make up
the distributed route via vxlan; VM-2 & VM-4 are encapsulated in another vni to
make up the distributed route via vxlan.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.2 type vxlan
Switch(config-overlay)# remote-vtep 1 virtual-mac 22.22.22
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.2
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.1 type vxlan
Switch(config-overlay)# remote-vtep 1 virtual-mac 11.11.11
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Step 7 Create a static routes and vxlan routes
Configuring Switch1:
Configuring Switch2:
2. Configuration Steps
In the following example, VM-1 & VM-2 are encapsulated in same vni to make up
the distributed route via vxlan by EBGP EVPN for sending vxlan tunnel and host
information;
Switch(config)# overlay
Switch(config-overlay)# vlan 10 vni 10000
Switch(config-vlan)# exit
Configuring Switch1:
Configuring Switch2:
Step 6 Create the layer 3 interface , set the ip address and enable distributed gateway
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch1(config-router-af)# exit
Switch1(config-router)# exit
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
2.2.2.2 0 200 i
2. Configuration Steps
In the following example, VM-1 & VM-2 are encapsulated in same vni to make up
the distributed route via vxlan by IBGP EVPN for sending vxlan tunnel and host
information;EVPN route is exchanged by bgp route reflector.
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch1:
Switch1(config)# overlay
Switch1(config-overlay)# vlan 10 vni 10000
Switch1(config-vlan)# exit
Configuring Switch3:
Switch3(config)# overlay
Switch3(config-overlay)# vlan 10 vni 10000
Switch3(config-vlan)# exit
Configuring Switch1:
Switch1(config)# evpn
Switch1(config-evpn)# vni 10000
Switch1(config-evi)# rd 2:2
Switch1(config-evi)# route-target both 20:20
Switch1(config-evi)# exit
Configuring Switch2:
Switch2(config)# evpn
Configuring Switch3:
Switch3(config)# evpn
Switch3(config-evpn)# vni 10000
Switch3(config-evi)# rd 4:4
Switch3(config-evi)# route-target both 20:20
Switch3(config-evi)# exit
Step 5 Create a vrf instance, and enable EVPN
Configuring Switch1:
Configuring Switch3:
Step 6 Create the layer 3 interface , set the ip address and enable distributed gateway
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
*>i[2]:[0]:[48]:[988b.123a.4000]:[32]:[10.1.1.1]/136
2.2.2.2 100 0 i
*>i[3]:[0]:[32]:[2.2.2.2]/80
2.2.2.2 100 0 i
2. Configuration Steps
In the following example, switch1 and swith2 are connected via layer 3 route. The
traffic of vlan 20 are encapsulated in vni 20000, in order to pass through the layer 3
networks.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1111::1
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2222::2
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
2. Configuration Steps
In the following example, VM-1 & VM-3 are encapsulated in same vni to make up
the distributed route via vxlan; VM-2 & VM-4 are encapsulated in another vni to
make up the distributed route via vxlan.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1111::1
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2222::2
Switch(config-overlay)# remote-vtep 1 ipv6-address 1111::1 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Step 7 Create a static routes and vxlan routes
Configuring Switch1:
Configuring Switch2:
2. Requirement
Host 1 and Host 2 are in the same segment, they need to realize interflow by
VXLAN tunnels.
3. Configuration Steps
Step 1 Configure routing on SWITCH A/SWITCH B/SWITCH C, make sure that these three
switches can interflow with each other in Layer 3 network
configure SWITCH A
SWITCH_A(config-if)# no shutdown
SWITCH_A(config-if)# exit
SWITCH_A(config)# ip route 10.3.3.3/32 192.168.1.2
SWITCH_A(config)# end
configure SWITCH B
configure SWITCH C
configure SWITCH A
configure SWITCH C
configure SWITCH A
configure SWITCH C
SWITCH_A# ping
Protocol [ip]:
Target IP address: 10.3.3.3
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 10.1.1.1
Type of service [0]:
Set DF bit in IP header? [no]:
Data pattern [0xABCD]:
PATTERN: 0xabcd
PING 10.3.3.3 (10.3.3.3) from 10.1.1.1 : 100(128) bytes of data.
108 bytes from 10.3.3.3: icmp_seq=0 ttl=63 time=775 ms
108 bytes from 10.3.3.3: icmp_seq=1 ttl=63 time=904 ms
108 bytes from 10.3.3.3: icmp_seq=2 ttl=63 time=768 ms
108 bytes from 10.3.3.3: icmp_seq=3 ttl=63 time=668 ms
2. Requirement
As shown in the figure, HOST1/2/3 are all belong to tenement test, it has the same
segments and different segments, and they all need interflow with each other.
Between Switch A Switch B and Switch C is Layer 3 network, so it needs to create
tunnels by configuring VXLAN between HOST, and realizes networking between
HOST by concentrated network gateway.
3. Configuration Steps
Step 1 Configure routing on SWITCH A/SWITCH B/SWITCH C, make sure that these three
switches can interflow with each other in Layer 3 network
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH A
SWITCH_A(config-if)# exit
SWITCH_A(config)# overlay
SWITCH_A(config-overlay)# source 10.1.1.1
SWITCH_A(config-overlay)# remote-vtep 1 ip-address 10.2.2.2 type vxlan
SWITCH_A(config-overlay)# remote-vtep 2 ip-address 10.3.3.3 type vxlan
SWITCH_A(config-overlay)# vlan 10 vni 10000
SWITCH_A(config-overlay)# vlan 10 remote-vtep 1
SWITCH_A(config-overlay)# vlan 20 vni 20000
SWITCH_A(config-overlay)# vlan 20 remote-vtep 1
SWITCH_A(config-overlay)# vlan 20 remote-vtep 2
SWITCH_A(config-overlay)# end
configure SWITCH B
configure SWITCH C
configure SWITCH B
The configuration is done at this point; HOST 1/2/3/4 can interflow with each
other by ping.
In this case VRF is used to separate different tenants. The vrf configuration
can be removed if it is unnecessary.
Step 5 Validation
2. Requirement
From the diagram, Switch A/B/C are TOR switches, between them is Layer 3
network, the downlink HOST are tenement test, it requires to isolate with other
tenements. To make sure the reliabilities, part of the servers need active-active
connection, so it needs to configure MLAG and configure virtual ip as server’s
gateway on SWITCH A/B. At the same time, making sure the gateway address is not
changing after virtual machine migration, and then deploy distributed gateway on
SWITCH A/B/C.
3. Configuration Steps
Step 1 Configure MLAG on SWITCH A and B separately, is used for server active-active
connection, SWITCH C uses single downlink interface
configure peer-link
configure SWITCH A
configure SWITCH B
configure peer-address
configure SWITCH A
configure SWITCH B
configure downlink interface, SWITCH A and B use MLAG double downlink, SWITCH
C uses normal single downlink
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH D
configure SWITCH A
configure SWITCH B
configure SWITCH C
configure SWITCH A
configure SWITCH B
configure SWITCH C
17.2 ConfiguringNVGRE
17.2.1 Overview
Brief Introduction
Network Virtualization using Generic Routing Encapsulation (NVGRE) is an
encapsulation technique intended to allow virtual network overlays across the
physical network. NVGRE uses Generic Routing Encapsulation (GRE) as the
encapsulation method. It uses the lower 24 bits of the GRE header to represent the
Tenant Network Identifier (TNI.) Like VXLAN this 24 bit space allows for 16 million
virtual networks.
2. Configuration Steps
In the following example, switch1 and swith2 are connected via layer 3 route. The
traffic of vlan 20 are encapsulated in vni 20000, in order to pass through the layer 3
networks.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.2 type nvgre
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.2
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.1 type nvgre
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
2. Configuration Steps
In the following example, VM-1 & VM-3 are encapsulated in same vni to make up
the distributed route via NVGRE; VM-2 & VM-4 are encapsulated in another vni to
make up the distributed route via NVGRE.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.2 type nvgre
Switch(config-overlay)# remote-vtep 1 virtual-mac 22.22.22
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.2
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.1 type nvgre
Switch(config-overlay)# remote-vtep 1 virtual-mac 11.11.11
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Step 7 Create a static routes and NVGRE routes
Configuring Switch1:
Configuring Switch2:
2. Configuration Steps
In the following example, switch1 and swith2 are connected via layer 3 route. The
traffic of vlan 20 are encapsulated in vni 20000, in order to pass through the layer 3
networks.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1111::1
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type nvgre
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2222::2
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type nvgre
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
2. Configuration Steps
In the following example, VM-1 & VM-3 are encapsulated in same vni to make up
the distributed route via NVGRE; VM-2 & VM-4 are encapsulated in another vni to
make up the distributed route via NVGRE.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1111::1
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type nvgre
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2222::2
Switch(config-overlay)# remote-vtep 1 ipv6-address 1111::1 type nvgre
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Step 7 Create a static routes and NVGRE routes
Configuring Switch1:
Configuring Switch2:
17.3 ConfiguringGENEVE
17.3.1 Overview
Brief Introduction
Generic Network Virtualization Encapsulation (GENEVE) is a networking technology
that encapsulates MAC-based Layer 2 Ethernet frames within Layer 3 UDP packets
to aggregate and tunnel multiple layer 2 networks across a Layer 3 infrastructure.
2. Configuration Steps
In the following example, switch1 and swith2 are connected via layer 3 route. The
traffic of vlan 20 are encapsulated in vni 20000, in order to pass through the layer 3
networks.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.2 type geneve
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.2
2. Configuration Steps
In the following example, VM-1 & VM-3 are encapsulated in same vni to make up
the distributed route via GENEVE; VM-2 & VM-4 are encapsulated in another vni to
make up the distributed route via GENEVE.
Configuring Switch1:
Configuring Switch2:
Switch(config-if)# exit
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.2 type geneve
Switch(config-overlay)# remote-vtep 1 virtual-mac 22.22.22
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 1.0.1.2
Switch(config-overlay)# remote-vtep 1 ip-address 1.0.1.1 type geneve
Switch(config-overlay)# remote-vtep 1 virtual-mac 11.11.11
Switch(config-overlay)# vlan 20 vni 20000
Configuring Switch1:
Configuring Switch2:
2. Configuration Steps
In the following example, switch1 and swith2 are connected via layer 3 route. The
traffic of vlan 20 are encapsulated in vni 20000, in order to pass through the layer 3
networks.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1111::1
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type geneve
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2222::2
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type geneve
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
2. Configuration Steps
In the following example, VM-1 & VM-3 are encapsulated in same vni to make up
the distributed route via GENEVE; VM-2 & VM-4 are encapsulated in another vni to
make up the distributed route via GENEVE.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1111::1
Switch(config-overlay)# remote-vtep 1 ipv6-address 2222::2 type geneve
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 30 vni 30000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 30 remote-vtep 1
Switch(config-overlay)# vlan 20 gateway-mac a.a.a
Switch(config-overlay)# vlan 30 gateway-mac b.b.b
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2222::2
Switch(config-overlay)# remote-vtep 1 ipv6-address 1111::1 type geneve
Switch(config-overlay)# vlan 20 vni 20000
Configuring Switch1:
Configuring Switch2:
17.4 ConfiguringOverlay
17.4.1 Overview
Brief Introduction
Overlay function supports multiple source ip address of vtep, it can set different
source ip for different networks and improve the reliability of overlay.
Overlay function also supports tunnel without horizon split, it means that when
uplink port receiving tunnel packets and decapsulate them , and then send them
into another tunnel for encapsulation.
2. Configuration Steps
The following example uses vxlan for overlay configuration. NVGRE and GENEVE
configurations are similar with vxlan.
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Switch(config-if)# no shutdown
Switch(config-if)# exit
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.1.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 2.2.2.2 type vxlan
Switch(config-overlay)# remote-vtep 2 ip-address 4.4.4.4 type vxlan src-ip 3.3.3.3
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 10 vni 10000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 10 remote-vtep 2
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2.2.2.2
Switch(config-overlay)# remote-vtep 1 ip-address 1.1.1.1 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Configuring Switch3:
Switch(config)# overlay
Switch(config-overlay)# source 4.4.4.4
Switch(config-overlay)# remote-vtep 1 ip-address 3.3.3.3 type vxlan
Switch(config-overlay)# vlan 10 vni 10000
Switch(config-overlay)# vlan 10 remote-vtep 1
Switch(config-overlay)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
2. Configuration Steps
In the following example, there is a tunnel between switch1 and switch2, there is
another tunnel between switch2 and switch3. The horizon split is disable on
switch2, therefor packets from one tunnel can be forwarded to another tunnel.
The following example uses vxlan for overlay configuration. NVGRE and GENEVE
configurations are similar with vxlan.
Switch(config-if)# no switchport
Switch(config-if)# ip address 9.9.9.1/24
Switch(config-if)# overlay uplink enable
Switch(config-if)# no shutdown
Switch(config-if)# exit
Configuring Switch1:
Configuring Switch2:
Configuring Switch3:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.1.1.1
Switch(config-overlay)# remote-vtep 1 ip-address 2.2.2.2 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2.2.2.2
Switch(config-overlay)# remote-vtep 1 ip-address 1.1.1.1 type vxlan horizon-split-
disable
Switch(config-overlay)# remote-vtep 2 ip-address 3.3.3.3 type vxlan horizon-split-
disable
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# vlan 20 remote-vtep 2
Switch(config-overlay)# exit
Configuring Switch3:
Switch(config)# overlay
Switch(config-overlay)# source 3.3.3.3
Switch(config-overlay)# remote-vtep 1 ip-address 2.2.2.2 type vxlan
Switch(config-overlay)# vlan 20 vni 20000
Switch(config-overlay)# vlan 20 remote-vtep 1
Switch(config-overlay)# exit
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
17.5 ConfiguringOVSDB
17.5.1 Overview
Brief Introduction
OVSDB (Open vSwitch Database) is the database for saving configuration on switch.
The OVSDB system comprises OVSDB server and OVSDB client. Controller, working as
OVSDB client, will configure and query to the OVSDB on switch by OVSDB
management protocol. Then all hardware VTEP in the network will be configured
and deployed.
After OVSDB function enabled, the switch configured as hardware VTEP, will create
and manage OVSDB database. Controller will connect to the OVSDB server on the
switch and operate the data in the OVSDB. Then the data in the OVSDB will be
translate to VXLAN configuration by the switch.
2. Configuration Steps
The following configuration should be operated on all switches if the switch ID is
not specified.
Configuring Switch1:
Configuring Switch2:
Configuring Switch1:
Switch(config)# overlay
Switch(config-overlay)# source 1.1.1.1
Switch(config-overlay)# exit
Configuring Switch2:
Switch(config)# overlay
Switch(config-overlay)# source 2.2.2.2
Switch(config-overlay)# exit
Step 5 Enable ovsdb globally
Switch(config)# ovsdb enable
Step 6 Exit the configure mode
Switch(config)# end
Step 7 Validation
interface eth-0-1
ovsdb port enable
interface eth-0-9
no switchport
overlay uplink enable
ip address 9.9.9.1/24
interface loopback0
ip address 1.1.1.1/32
!
ovsdb enable
For applications that cannot build reliability on upper layers, the addition of flow
control functions at Layer 2 can offer a solution. Flow control enables feedback
from a receiver to its sender to communicate buffer availability. Its first
implementation in IEEE 802.3 Ethernet uses the IEEE 802.3x PAUSE control frames.
IEEE 802.3x PAUSE is defined in Annex 31B of the IEEE 802.3 specification. Simply
put, a receiver can generate a MAC control frame and send a PAUSE request to a
sender when it predicts the potential for buffer overflow. Upon receiving a PAUSE
frame, the sender responds by stopping transmission of any new packets until the
receiver is ready to accept them again.
IEEE 802.3x PAUSE works as designed, but it suffers a basic disadvantage that limits
its field of applicability: after a link is paused, a sender cannot generate any more
packets. As obvious as that seems, the consequence is that the application of IEEE
802.3x PAUSE makes an Ethernet segment unsuitable for carrying multiple traffic
flows that might require different quality of service (QoS). Thus, enabling IEEE
802.3x PAUSE for one application can affect the performance of other network
applications. IEEE 802.1Qbb PFC extends the basic IEEE 802.3x PAUSE semantics to
multiple CoSs, enabling applications that require flow control to coexist on the
same wire with applications that perform better without it. PFC uses the IEEE
802.1p CoS values in the IEEE 802.1Q VLAN tag to differentiate up to eight CoSs
that can be subject to flow control independently.
2. Configuration Steps
In the following example, interface eth-0-1 of switch1 and switch2 are connected,
interface eth-0-2 of switch1 and switch2 are connected, all interface enable PFC
for priority 2/3/4.
18.2 ConfiguringEFD
18.2.1 Overview
Brief Introduction
Elephant Flow Detect (EFD). According to the academic institutions of the actual
network of the study found that more than 80% of the bandwidth is occupied by
elephant flow, the bandwidth and transmission cache of these flow is large, but not
sensitive to delay, which is sensitive to delay The flow caused a great impact. If
elephant flow is recognized and some forwarding policies are implemented (such as
reducing the forwarding priority of elephant flow appropriately, let mice flow be
forwarded first), it can improve the transmission efficiency of network.
EFD function can be used to detect some abnormal traffic in the network (such as
large bandwidth flow). After detecting, you can encapsulate the characteristics in
the protocol packets and sent it to the specified server for further analysis.
Principle Description
terminology:
2. Configuration Steps
In the following example, it specifies the characteristics field and threshold of the
traffic. When the flow rate exceed the specified threshold, the characteristics of
the packets will be encapsulated into the user-defined UDP packets and sent to the
server.
Configure the speed threshold of EFD. The flows which has the rate large than
1000Mbps will be marked as Elephant Flow. The default value is 50Mbps.
Enable EFD notify feature, and specify the ipda and UDP port of notification packet
When the flow received from eth-0-1 exceed 1000Mb, we can find this flow has
been learned as EFD flow via the CLI below:
EFD packet head description. The red part above is part of EFD packet
information, specific analysis is as follows:
19.1 ConfiguringLDP
19.1.1 Overview
Brief Introduction
This chapter describes how to configure LDP.
A fundamental concept in MPLS is that two Label Switching Routers (LSRs) must
agree on the meaning of the labels used to forward traffic between and through
them. This common understanding is achieved by using a set of procedures, called
label distribution protocol -LDP. The OS software supports these features:
This configuration guide will describe the basic configuration of LDP in our system
and give some examples for it.
2. Configuration Steps
The following example will describe how to use LDP to set up a label switching path
(LSP) from lsr-a to lsr-c.
Interface configuration for Lsr-a, interface need enable ldp and enable label switch:
Interface configuration for Lsr-b, interface need enable ldp and enable label switch:
Interface configuration for Lsr-c, interface need enable ldp and enable label switch:
2. Configuration Steps
The following example shows how to enable LDP OSPF SYNC. The red is main line
and the blue is backup line. LDP OSPF SYNC works when the main line recovering
from accident and the traffics switching from the backup to the main.
Interface configuration for Switch1, interface need enable ldp and enable label
switch:
Interface configuration for Switch2, interface need enable ldp and enable label
switch:
Interface configuration for Switch3, interface need enable ldp and enable label
switch:
Interface configuration for Switch4, interface need enable ldp and enable label
switch:
19.2 ConfiguringMPLS
19.2.1 Overview
Brief Introduction
MPLS stands for “Multiprotocol Label Switching”, multiprotocol, because its
techniques are applicable to ANY network layer protocol. In this document,
however, we focus on the use of IP as the network layer protocol.
In MPLS, the assignment of a particular packet to a particular FEC is done just once,
as the packet enters the network. The FEC to which the packet is assigned is
encoded as a short fixed length value known as a “label”. When a packet is
forwarded to its next hop, the label is sent along with it; that is, the packets are
“labeled” before they are forwarded. At subsequent hops, there is no further
analysis of the packet’s network layer header. Rather, the label is used as an index
into a table which specifies the next hop, and a new label. The old label is
replaced with the new label, and the packet is forwarded to its next hop.
2. Configuration Steps
The following example will describe how to configure MPLS LSP.
U - unknown ILM
19.3 ConfiguringVPLS
19.3.1 Overview
Brief Introduction
This chapter describes how to configure VPLS. Virtual Private LAN Service (VPLS)
provides a way to enable transparent Layer-2 Ethernet LAN services to
geographically dispersed customer sites connected by a Wide Area Network (WAN)
by providing support for traditional Layer-2 broadcast and multicast services.
Interface configuration for PE1, eth-0-9 need enable ldp and enable label switch:
Interface configuration for PE2, eth-0-13 need enable ldp and enable label switch:
Interface configuration for PE3, eth-0-17 need enable ldp and enable label switch:
Interface configuration for P, interface need enable ldp and enable label switch:
Config PE1, PE2 and PE3 VPLS PW raw mode, and assign their vpls peers.
Use the show ldp session and the show mpls vpls mesh commands respectively to
display complete information about theVPLS. Show ldp session command can get
LDP peer’s state. Show mpls vpls mesh command can get vpls peer’s state and the
inner labels vpls using.The following are the sample outputs for the show
commands displaying VPLS.
Interface configuration for P, eth-0-9, eth-0-13 and eth-0-17 need enable label
switch:
Config PE1, PE2 and PE3 VPLS PW raw mode, and assign their vpls peers.
Switch(config)#interface eth-0-1
Switch(config-if)# switchport mode trunk
Switch(config-if)# mpls-vpls vpls1 vlan 100
Switch(config-if)# exit
Step 6 Configure VPLS FIB
Show mpls vpls mesh command can get vpls peer’s state and the inner labels vpls
using.
The following example will display how to tunnel STP protocol packets by vpls.
Users can configure other L2 protocol packets like that. The following configuration
is also based on Figure VPLS model topology.
Interface configuration for PE1, eth-0-9 need enable ldp and enable label switch:
Interface configuration for PE2, eth-0-13 need enable ldp and enable label switch:
Interface configuration for PE3, eth-0-17 need enable ldp and enable label switch:
Interface configuration for P, interface need enable ldp and enable label switch:
Switch(config-if)# no switchport
Switch(config-if)# ip address 11.11.17.2/24
Switch(config-if)# enable-ldp
Switch(config-if)# label-switching
Switch(config-if)# exit
Switch(config)# interface loopback 0
Switch(config-if)# ip address 11.11.2.2/32
Switch(config-if)# exit
Step 4 Enable router ldp
Config PE1, PE2 and PE3 VPLS PW raw mode, and assign their vpls peers.
Interface configuration for PE1, eth-0-9 need enable ldp and enable label switch:
Interface configuration for PE2, eth-0-13 need enable ldp and enable label switch:
Interface configuration for PE3, eth-0-17 need enable ldp and enable label switch:
Interface configuration for P, interface need enable ldp and enable label switch:
Switch(config-if)# label-switching
Switch(config-if)# exit
Switch(config)# interface eth-0-17
Switch(config-if)# no switchport
Switch(config-if)# ip address 11.11.17.2/24
Switch(config-if)# enable-ldp
Switch(config-if)# label-switching
Switch(config-if)# exit
Switch(config)# interface loopback 0
Switch(config-if)# ip address 11.11.2.2/32
Switch(config-if)# exit
Step 3 Enable router ldp
Config PE1, PE2 and PE3 VPLS PW raw mode, and assign their vpls peers.
Use the show mac address-table vpls to display complete information about the
VPLS MAC entries. The following are the sample outputs for the show command.
19.4 ConfiguringVPWS
19.4.1 Overview
Brief Introduction
This chapter describes how to configure VPWS. The MPLS L2CIRCUIT is a point-to-
point Layer 2 connection transported by means of Multiprotocol Label Switching
(MPLS) on the service provider’s network. The Layer 2 circuit is transported over a
single Label Switched Path (LSP) tunnel between two Provider Edge (PE) routers.
Use the show mpls l2-circuit and the show mpls vc-table commands respectively to
display complete information about the Layer-2 Virtual Circuit. The following are
the sample outputs for the show commands displaying Layer-2 virtual circuit
information.
Switch(config)# end
Step 7 Validation
Use the show mpls l2circuitand the show mpls vc-table commands respectively to
display complete information about the Layer-2 Virtual Circuit. The following are
the sample outputs for the show commands displaying Layer-2 virtual circuit
information.
Switch#configure terminal
Switch(config)# l2protocol enable
Switch(config)# interface eth-0-2
Switch(config-if)# mpls-l2-circuit t1 ethernet
Switch(config-if)# l2protocol stp tunnel
Switch(config-if)# exit
Switch(config)# interface loopback 0
Switch(config-if)# ip address 192.168.11.10/32
Switch(config-if)# exit
Switch(config)# interface eth-0-9
Switch(config-if)# no switchport
Switch(config-if)# ip address 8.8.8.2/24
Switch(config-if)# enable-ldp
Switch(config-if)# label-switching
Switch(config-if)# exit
Step 4 Enable router ldp
MPLS use labels to take the place of routes, which is powerful, flexible and can
satisfy all kinds of requirements.
Principle Description
MPLS LSP modelcontain three models:Uniform、Pipe、Short Pipe。
Uniform model: The packets on IP network and MPLS network have the same
priority, which means the priority is take effect golbally. On the ingress device, the
packets will be added labels and the exp will be mapped from dscp. On the egress
device, the dscp of the packets will be mapped from exp.
Pipe model: On the ingress device, the packets will be added labels and the exp
will be assigned by the users. On the egress device, the phb will be mapped from
exp and the output packetswill carry the original dscp.
Pipe model: On the ingress device, the packets will be added labels and the exp
will be assigned by the users. On the egress device, the phb will be mapped from
dscp and the output packetswill carry the original dscp.
Step 3 Enter the interface configure mode and set the attributes of the interface
Codes: > - selected ILM, * - LSP ILM, p - stale ILM, B - BGP ILM, K - CLI ILM,
L - LDP ILM, R - RSVP-TE ILM, S - SNMP ILM, I - IGP-Shortcut
U - unknown ILM
19.6 ConfiguringL3VPN
19.6.1 Overview
Brief Introduction
This chapter describes how to configure L3VPN. It uses Route Target’s community to
control route sending and receiving. RD is used to distinguish which VPN the route
from. The inner label is uesd to map the different vrf, then through the vrf to guide
packet forwarding.
2. Configuration Steps
The following example will describe how to configure L3VPN:
Interface configuration for PE1, eth-0-9 need enable ldp and join vrf:
Interface configuration for PE2, eth-0-9 need enable ldp and join vrf:
Switch(config)#router ospf
Switch(config-router)# redistribute connected
Use show ip route command and ping CE2 loopback address to validate the l3vpn is
worked.
19.7 ConfiguringMPLS SR
19.7.1 Overview
Brief Introduction
Segment Routing uses the source path selection mechanism to encapsulate the SID
to be allocated by the node at the source node in advance. When the message
passes through the SR node, the node forwards the message according to the SID of
the message. Except the source node, other nodes do not need to maintain the
path state. MPLS SR referes to the use of SR in the MPLS network to forward
message as SID.
Principle Description
In order to forward message through SR LSP, the following tasks need to be
completed:
Assign labels. In order to plan label information for each node and link in the
message forwarding path, static segment configuration or dynamic SID
allocation can be used.
Create a label forwarding table entry. Device in the segment routing domain
composed of devices running MPLS SR form local label forwarding table entries
according to be allocated label information.
Establish SR LSP. SR LSP can be configured manually or created dynamically
through the controller.
SR tunnel is associated with SR LSP so that SR LSP can be used for message
forwarding.
After the above steps are completed, when the source node receives the user
network message, it will encapsulate the label information on the pass through
which the message passes, and forward the message to the tail node through SR LSP.
After receiving the message from SR LSP, the tail node will strip the label in the
message and forward the message according to the destination address lookup
routing table of the original table.
2. Configuration Steps
The following example will describe how to configure static MPLS SR.
Switch(config-if)# label-switching
Switch(config-if)# exit
Dynamic SR Configuration
1. Topology
2. Configuration Steps
The following example will describe how to configure dynamic ISIS SR.
Configure on Switch1
Configure on Switch2
Configure on Switch3
Area (null):
Destination Metric Next-Hop Interface Tag
Sid Nflag Eflag Chg
C 1.1.1.1/32 10 -- loopback0 0
10 Y N N
L1 2.2.2.2/32 20 12.1.1.2 eth-0-9 0
20 Y N N
L1 3.3.3.3/32 30 12.1.1.2 eth-0-9 0
30 Y N N
C 12.1.1.0/24 10 -- eth-0-9 0
-- -- -- --
L1 23.1.1.0/24 20 12.1.1.2 eth-0-9 0
-- -- -- --
Area (null):
Destination Metric Next-Hop Interface Tag
Sid Nflag Eflag Chg
L1 1.1.1.1/32 20 12.1.1.1 eth-0-9 0
10 Y N N
C 2.2.2.2/32 10 -- loopback0 0
20 Y N N
L1 3.3.3.3/32 20 23.1.1.3 eth-0-17 0
30 Y N N
C 12.1.1.0/24 10 -- eth-0-9 0
-- -- -- --
C 23.1.1.0/24 10 -- eth-0-17 0
-- -- -- --
Area (null):
Destination Metric Next-Hop Interface Tag
Sid Nflag Eflag Chg
L1 1.1.1.1/32 30 23.1.1.2 eth-0-17 0
10 Y N N
L1 2.2.2.2/32 20 23.1.1.2 eth-0-17 0
20 Y N N
C 3.3.3.3/32 10 -- loopback0 0
30 Y N Y
L1 12.1.1.0/24 20 23.1.1.2 eth-0-17 0
-- -- -- --
C 23.1.1.0/24 10 -- eth-0-17 0
-- -- -- --
Role
Master: stacking only have one main switch to manager the entire stacking.
Standby: standby is the backup switch of the main switch, when the main
switch fails, the standby switch will take over all the services of the original
main switch.
SlotID
Used to identify and manage member switches, the slot ids of all switches in the
stacking are unique.
Priority
Stacking physical member port or physical ports configured in stack mode are used
to connect between stacking member switches.
Stacking port
Stacking port is a kind of logical port dedicated to stack, which needs to be bound
with stacking physical member port. A stack port can be bound with one or more
stack physical ports to improve the broadband and reliability of links. Each device
supports two stack port.
2. Configuration Steps
The following example will describe the configuration process of stacking starts,
take the stacking system composed of two switchs A and B as an example.
configuration on switch A
configuration on switch B
configuration on switch A
configuration on switch B
Step 8 Validation
Switch# show stack
SlotID Role Board SwVersion MAC State
Description
===================================================================================
======
*+1 MASTER VPX6896M16_V2 7.0.3.55 001E.0822.FC83 RUNNING --
2 STANDBY VPX6896M16_V2 7.0.3.55 001E.0800.4574 RUNNING --
-----------------------------------------------------------------------------------
------
* indicates the device is the master.
+ indicates the device through which the user logs in.
When the master and standby’s state are all RUNNING mean that the
stacking is ready to service.
The following points should be noted when remove the line card.
If the stacking have been already enabled, then it can only be configured in
maste role else can not be configured in any role.
The slotid must exit and can’t be the same as its own or it will return errors.
Removing the line card will also remove the port from which the line card was
created. if the line card is online a message will be sent to line card to reboot
it.
After using the stack release slot 3 command to delete the line card, if the
stacking port is not disconnected, slot 3 will still join the stack after reboot. If the
stacking system needs to be restored to a standalone environment, you can
perform a split stacking operation. To split the stack, you first need to disable the
stacking function of the device, then configure the management IP of each device
and save the configuration. After disconnecting the cables, manually reboot the
devices to split the stack. After booting up, the devices will retain non-port-related
configurations from the stacking system, the port-related configuration will be
cleared.
2. Configuration Steps
The following example will describe the configuration process of direct DAD, take
the stacking system composed of two switchs A and B as an example.
Switch(config-if)# no shutdown
Switch(config-if)# stack dual-active detect mode direct
Warning: The interface will block common data packets, except BPDU packets.
Continue? [no]y
Step 4 Configure backup management ip address
Switch(config)# stack dual-active backup ip address 12.1.1.2/24 slot 1
Switch(config)# stack dual-active backup ip address 12.1.1.2/24 slot 2
Step 5 Exit the configure mode
Switch(config)# end
Step 6 Validation
Switch# show stack dual-active
Stack domainID: 4
Dual-active conflict state: No
Excluded Ports(configurable):
--
Excluded Ports(can not be configured):
eth-1-9
eth-2-9
Dual-active direct detect mode: Enable
Dual-active direct detect interfaces configured:
eth-1-12 up (Physical) up (Protocol) 4 (PeerDoamain)
eth-2-12 up (Physical) up (Protocol) 4 (PeerDoamain)
Dual-active lacp detect mode: Disable
2. Configuration Steps
The following example will describe the configuration process of lacp DAD, take the
stacking system composed of two switchs A and B as an example.