Cisco Switching Black Book
Cisco Switching Black Book
Cisco Switching Black Book ...............................................................................................................................1 Introduction.........................................................................................................................................................4 Overview..................................................................................................................................................4 Is This Book for You? ..............................................................................................................................4 How to Use This Book .............................................................................................................................4 The Black Book Philosophy....................................................................................................................5 Chapter 1: Network Switching Fundamentals.................................................................................................6 In Depth...................................................................................................................................................6 Physical Media and Switching Types......................................................................................................6 A Bit of History.......................................................................................................................................7 Networking Architectures.................................................................................................................7 The Pieces of Technology ........................................................................................................................9 Repeaters.........................................................................................................................................10 Hubs .................................................................................................................................................10 Bridges .............................................................................................................................................11 Routers .............................................................................................................................................13 Switches ...........................................................................................................................................13 Network Design.....................................................................................................................................14 Collision Domains...........................................................................................................................15 Broadcast Domains ..........................................................................................................................16 Why Upgrade to Switches?.............................................................................................................16 Switched Forwarding......................................................................................................................19 Switched Network Bottlenecks.......................................................................................................20 The Rule of the Network Road ........................................................................................................22 Switched Ethernet Innovations..............................................................................................................23 FullDuplex Ethernet......................................................................................................................23 Fast Ethernet....................................................................................................................................23 Gigabit Ethernet..............................................................................................................................24 The Cisco IOS........................................................................................................................................24 Connecting to the Switch................................................................................................................25 Powering Up the Switch..................................................................................................................25 The Challenges .......................................................................................................................................27 Todays Trend........................................................................................................................................27 Entering and Exiting Privileged EXEC Mode.......................................................................................28 Entering and Exiting Global Configuration Mode .................................................................................28 Entering and Exiting Interface Configuration Mode.............................................................................28 Entering and Exiting Subinterface Configuration Mode.......................................................................28 Saving Configuration Changes..............................................................................................................29 Chapter 2: Basic Switch Configuration..........................................................................................................30 In Depth.................................................................................................................................................30 CommandLine Interfaces....................................................................................................................30 Campus Hierarchical Switching Model.................................................................................................31 Access Layer...................................................................................................................................32 Distribution Layer...........................................................................................................................32 Core Layer.......................................................................................................................................33 Remote Network Monitoring.................................................................................................................33 Connecting to the Console Port.............................................................................................................34 Console Cable Pinouts .....................................................................................................................35 Console Connectors .........................................................................................................................36 i
Table of Contents
Chapter 2: Basic Switch Configuration The RJ45toAUX Port Console Connector Pinouts ...................................................................36 Switch IOSs...........................................................................................................................................38 The IOS Configuration Modes........................................................................................................38 Limiting Telnet Access..........................................................................................................................39 Implementing Privilege Levels..............................................................................................................39 Configuring an IOSBased CLI Switch................................................................................................39 Setting the Login Passwords...........................................................................................................40 Setting Privilege Levels ...................................................................................................................40 Assigning Allowable Commands....................................................................................................40 Setting the Console Port Timeout Value .......................................................................................40 Configuring the Telnet Timeout Value.........................................................................................41 Configuring the Hostname..............................................................................................................41 Configuring the Date and Time.......................................................................................................41 Configuring an IP Address and Netmask........................................................................................41 Configuring a Default Route and Gateway.....................................................................................41 Configuring Port Speed and Duplex...............................................................................................42 Enabling SNMP Contact.................................................................................................................42 Configuring a Set/ClearBased CLI Switch ..........................................................................................42 Logging On to a Switch ...................................................................................................................42 Setting the Login and Enable Passwords........................................................................................43 Changing the Console Prompt........................................................................................................43 . Entering a Contact Name and Location Information......................................................................44 Configuring System and Time Information....................................................................................44 Configuring an IP Address and Netmask........................................................................................44 Configuring a Default Route and Gateway.....................................................................................45 Viewing the Default Routes............................................................................................................45 Configuring Port Speed and Duplex...............................................................................................45 Enabling SNMP ...............................................................................................................................46 Configuring Trap Message Targets.................................................................................................46 Configuring a MenuDriven IOS..........................................................................................................47 Configuring the Console Port..........................................................................................................48 Configuring Telnet..........................................................................................................................48 Configuring the Password...............................................................................................................48 Configuring an IP Address and Default Gateway...........................................................................48 Configuring SNMP ..........................................................................................................................49 Configuring ROM..................................................................................................................................50 Entering ROM Configuration Mode...............................................................................................50 Booting ROM Mode from a Flash Device......................................................................................50 Configuring SNMP ..........................................................................................................................51 Configuring RMON........................................................................................................................51 Configuring RMON on a Set/ClearBased Interface.....................................................................51 Using Set/Clear Command Set Recall Key Sequences ..........................................................................52 Using IOSBased Command Editing Keys and Functions...................................................................52 Chapter 3: WAN Switching.............................................................................................................................54 In Depth.................................................................................................................................................54 WAN Transmission Media....................................................................................................................55 Synchronous Transport Signal (STS)..............................................................................................56 Cisco WAN Switches............................................................................................................................57 MGX 8200 Series............................................................................................................................57 IGX 8400 Series..............................................................................................................................58 ii
Table of Contents
Chapter 3: WAN Switching BPX 8600 Series WideArea Switches..........................................................................................58 MGX 8800 Series WideArea Edge Switches...............................................................................59 WAN Switch Hardware Overview........................................................................................................59 Cisco WAN Switch Network Topologies..............................................................................................60 Network Management ...........................................................................................................................61 . The CLI...........................................................................................................................................61 WAN Manager................................................................................................................................61 Accessing and Setting Up IGX and BPX Switches...............................................................................62 Adding New Users..........................................................................................................................62 Displaying a Users Password.........................................................................................................62 Changing a Users Password...........................................................................................................62 Using the History Command...........................................................................................................63 Displaying a Summary of All Card Modules..................................................................................63 Displaying Detailed Information for a Card Module......................................................................63 Displaying the Power and Temperature of a Switch.......................................................................63 Displaying the ASM Statistics for BPX..........................................................................................63 Configuring the ASM Setting for BPX...........................................................................................63 Logging Out....................................................................................................................................63 Resetting the Switch........................................................................................................................63 Displaying Other Switches..............................................................................................................64 Setting the Switch Name.................................................................................................................64 Setting the Time Zone.....................................................................................................................64 Configuring the Time and Date.......................................................................................................64 Configuring the Control and Auxiliary Ports..................................................................................64 Modifying the Functions of the Control and Auxiliary Ports.........................................................64 Configuring the Printing Function..................................................................................................64 Configuring the LAN Interface.......................................................................................................64 Accessing the MGX 8850 and 8220......................................................................................................65 Adding New Users..........................................................................................................................65 Changing Passwords ........................................................................................................................65 Assigning a Switch Hostname .........................................................................................................65 Displaying a Summary of All Modules ...........................................................................................66 Displaying Detailed Information for the Current Card...................................................................66 Changing the Time and Date...........................................................................................................66 Displaying the Configuration of the Maintenance and Control Ports.............................................66 Displaying the IP Address...............................................................................................................66 Configuring the IP Interface............................................................................................................67 Displaying the Alarm Level of the Switch......................................................................................67 Chapter 4: LAN Switch Architectures............................................................................................................68 In Depth.................................................................................................................................................68 The Catalyst Crescendo Architecture....................................................................................................68 BUS.................................................................................................................................................68 ASICs..............................................................................................................................................69 The Crescendo Processors...............................................................................................................71 Crescendo Logic Units....................................................................................................................71 Other Cisco Switch Processors, Buses, ASICs, and Logic Units..........................................................72 CAM................................................................................................................................................72 AXIS Bus........................................................................................................................................72 CEF ASIC ........................................................................................................................................73 Phoenix ASIC..................................................................................................................................75 iii
Table of Contents
Chapter 4: LAN Switch Architectures LCP ..................................................................................................................................................75 SAGE ASIC....................................................................................................................................75 QTP ASIC.......................................................................................................................................75 QMAC.............................................................................................................................................76 Bridging Types......................................................................................................................................76 Source Route Bridging....................................................................................................................76 Source Route Transparent Bridging................................................................................................77 Source Route Translational Bridging..............................................................................................77 Transparent Bridging .......................................................................................................................77 Source Route Switching..................................................................................................................77 Switching Paths ......................................................................................................................................78 Process Switching ............................................................................................................................78 Fast Switching.................................................................................................................................78 Autonomous Switching...................................................................................................................79 Silicon Switching............................................................................................................................79 Optimum Switching........................................................................................................................79 Distributed Switching......................................................................................................................79 NetFlow Switching..........................................................................................................................79 System Message Logging......................................................................................................................80 Loading an Image on the Supervisor Engine III....................................................................................80 Booting the Supervisor Engine III from Flash .......................................................................................81 Setting the Boot Configuration Register................................................................................................81 Configuring Cisco Express Forwarding .................................................................................................81 Enabling CEF..................................................................................................................................81 Disabling CEF.................................................................................................................................81 Enabling dCEF................................................................................................................................82 Disabling dCEF...............................................................................................................................82 Disabling CEF on an Individual Interface .......................................................................................82 Configuring CEF Load Balancing ...................................................................................................82 Disabling CEF Load Balancing .......................................................................................................82 Enabling Network Accounting for CEF..........................................................................................82 Setting Network Accounting for CEF to Collect Packet Numbers.................................................82 Viewing Network Accounting for CEF Statistics...........................................................................82 Viewing CEF PacketDropped Statistics.......................................................................................83 Viewing NonCEF Path Packets....................................................................................................83 Disabling PerDestination Load Sharing..............................................................................................83 Viewing the Adjacency Table on the 8500 GSR...................................................................................83 Clearing the Adjacency Table on the 8500 GSR...................................................................................83 Enabling Console Session Logging on a Set/Clear CommandBased IOS..........................................83 Enabling Telnet Session Logging on a Set/Clear CommandBased IOS.............................................84 Disabling Console Session Logging on a Set/Clear CommandBased IOS.........................................84 Disabling Telnet Session Logging on a Set/Clear CommandBased IOS............................................84 Setting the System Message Severity Levels on a Set/Clear CommandBased IOS ............................84 Enabling the Logging Time Stamp on a Set/Clear CommandBased Switch......................................84 Disabling the Logging Time Stamp on a Set/Clear CommandBased Switch.....................................85 Configuring the Logging Buffer Size on a Set/Clear CommandBased Switch ...................................85 Clearing the Server Logging Table........................................................................................................85 Disabling Server Logging......................................................................................................................85 Displaying the Logging Configuration..................................................................................................86 Displaying System Logging Messages..................................................................................................86
iv
Table of Contents
Chapter 5: Virtual Local Area Networks.......................................................................................................88 In Depth.................................................................................................................................................88 The Flat Network of Yesterday ..............................................................................................................88 Why Use VLANs?.................................................................................................................................89 VLAN Basics..................................................................................................................................90 A Properly Switched Network........................................................................................................90 Switched Internetwork Security......................................................................................................91 Scaling with VLANs..............................................................................................................................92 VLAN Boundaries ...........................................................................................................................92 VLAN Membership Types..............................................................................................................93 Traffic Patterns Flowing through the Network...............................................................................93 Ciscos VLAN Recommendations..................................................................................................93 VLAN Trunking .....................................................................................................................................94 Trunk Types....................................................................................................................................94 LAN Emulation (LANE).................................................................................................................97 VLAN Trunking Protocol (VTP)...........................................................................................................97 VTP Versions..................................................................................................................................98 VTP Advertisements.......................................................................................................................98 VTP Switch Modes.......................................................................................................................100 Methods for VLAN Identification .................................................................................................101 Dynamic Trunking Protocol..........................................................................................................101 InterVLAN Routing.............................................................................................................................101 Internal Route Processors..............................................................................................................102 How InterVLAN Routing Works..................................................................................................102 Configuring a Static VLAN on a Catalyst 5000 Series Switch...........................................................103 Configuring Multiple VLANs on a Catalyst 5000 Series Switch........................................................103 Creating VLANs on a Catalyst 1900EN Series...................................................................................103 Assigning a Static VLAN to an Interface on a 1900EN Series...........................................................104 Viewing the VLAN Configuration on a 1900 Series...........................................................................105 Viewing an Individual VLAN Configuration on a 1900 Series..........................................................105 Configuring a Trunk Port on a Cisco 5000 Series...............................................................................105 Mapping VLANs to a Trunk Port........................................................................................................107 Configuring a Trunk Port on a Cisco 1900EN Series..........................................................................107 Clearing VLANs from Trunk Links on a Cisco 5000 Series...............................................................107 Clearing VLANs from Trunk Links on a Cisco 1900EN Series.........................................................107 Verifying a Trunk Link Configuration on a 5000 Series.....................................................................108 Verifying a Trunk Link Configuration on a 1900EN Series ................................................................108 Configuring the VTP Version on a Catalyst 5000 Switch...................................................................108 Configuring a VTP Domain on a Catalyst 1900 Switch......................................................................109 Setting a VTP Domain Password on a Catalyst Switch .......................................................................109 Configuring a Catalyst 1900 Switch as a VTP Server.........................................................................109 Configuring a Catalyst 1900 Switch as a VTP Client.........................................................................109 Configuring a Catalyst 1900 Switch for Transparent Mode................................................................109 Configuring VTP Pruning on a Catalyst 1900 Switch.........................................................................110 Configuring VTP on a Set/Clear CLI Switch......................................................................................110 Configuring VTP on a 1900 Cisco IOS CLI Switch...........................................................................110 Verifying the VTP Configuration on a Set/Clear CLI.........................................................................111 Displaying VTP Statistics....................................................................................................................111 Configuring VTP Pruning on a Set/Clear CLI Switch........................................................................112 Disabling Pruning for Unwanted VLANs ............................................................................................112 Configuring IP InterVLAN Routing on an External Cisco Router.....................................................112 . Configuring IPX InterVLAN Routing on an External Router.............................................................113 v
Table of Contents
Chapter 6: InterVLAN and Basic Module Configuration..........................................................................114 In Depth...............................................................................................................................................114 Internal Route Processors....................................................................................................................114 Available Route Processors...........................................................................................................116 Routing Protocol Assignment.......................................................................................................120 Supervisor Engine Modules.................................................................................................................120 Supervisor Engines I and II...........................................................................................................120 Supervisor Engine III....................................................................................................................121 Using the Supervisor Engine.........................................................................................................122 Etherport Modules...............................................................................................................................122 Port Security..................................................................................................................................123 Manually Configured MAC Addresses.........................................................................................123 Determining the Slot Number in Which a Module Resides................................................................123 Accessing the Internal Route Processor from the Switch....................................................................124 Configuring a Hostname on the RSM ..................................................................................................124 Assigning an IP Address and Encapsulation Type to an Ethernet Interface ........................................125 Setting the Port Speed and Port Name on an Ethernet Interface.........................................................125 Configuring a Default Gateway on a Catalyst 5000............................................................................126 Verifying the IP Configuration on a Catalyst 5000.............................................................................126 Enabling RIP on an RSM .....................................................................................................................126 Viewing the RSMs Running Configuration.......................................................................................127 Configuring InterVLAN Routing on an RSM.....................................................................................127 Configuring IPX InterVLAN Routing on the RSM .............................................................................128 Configuring AppleTalk InterVLAN Routing on an RSM...................................................................128 Viewing the RSM Configuration.........................................................................................................129 Assigning a MAC Address to a VLAN...............................................................................................129 Viewing the MAC Addresses..............................................................................................................129 Configuring Filtering on an Ethernet Interface ....................................................................................130 Configuring Port Security on an Ethernet Module..............................................................................130 Clearing MAC Addresses....................................................................................................................131 Configuring the Catalyst 5000 Supervisor Engine Module.................................................................131 Setting the boot configregister on the Supervisor Engine Module ....................................................132 Changing the Management VLAN on a Supervisor Engine ................................................................133 Viewing the Supervisor Engine Configuration....................................................................................133 Configuring the Cisco 2621 External Router for ISL Trunking..........................................................134 Configuring Redundancy Using HSRP...............................................................................................135 Chapter 7: IP Multicast..................................................................................................................................137 In Depth...............................................................................................................................................137 IP Multicasting Overview....................................................................................................................137 Broadcast.......................................................................................................................................138 Unicast...........................................................................................................................................138 Multicast........................................................................................................................................139 IP Multicasting Addresses...................................................................................................................140 The Multicast IP Structure............................................................................................................140 Delivery of Multicast Datagrams..................................................................................................142 Multicast Distribution Tree...........................................................................................................142 Multicast Forwarding....................................................................................................................143 IGMP Protocols.............................................................................................................................143 Internet Group Management Protocol (IGMP)....................................................................................145 IGMPv1.........................................................................................................................................145 IGMPv2.........................................................................................................................................146 vi
Table of Contents
Chapter 7: IP Multicast Time to Live..................................................................................................................................147 Multicast at Layer 2.............................................................................................................................147 IGMP Snooping .............................................................................................................................147 Cisco Group Management Protocol..............................................................................................148 Router Group Management Protocol............................................................................................148 GARP Multicast Registration Protocol.........................................................................................149 Configuring IP Multicast Routing.......................................................................................................149 Disabling IP Multicast Routing.....................................................................................................149 Enabling PIM on an Interface.......................................................................................................149 Disabling PIM on an Interface......................................................................................................149 Configuring the Rendezvous Point...............................................................................................150 . Adding a Router to a Multicast Group .................................................................................................150 Configuring a Router to Be a Static Multicast Group Member....................................................150 Restricting Access to a Multicast Group.......................................................................................150 Changing the IGMP Version...............................................................................................................150 Changing the IGMP HostQuery Message Interval............................................................................151 Configuring Multicast Groups.............................................................................................................151 Removing Multicast Groups................................................................................................................151 Configuring Multicast Router Ports.....................................................................................................151 Displaying Multicast Routers........................................................................................................151 Removing the Multicast Router....................................................................................................152 Configuring IGMP Snooping ...............................................................................................................152 Disabling IGMP Snooping............................................................................................................152 Configuring IGMP FastLeave Processing.........................................................................................152 Disabling IGMP FastLeave Processing......................................................................................152 Displaying IGMP Statistics.................................................................................................................153 Displaying Multicast Routers Learned from IGMP .............................................................................153 Displaying IGMP Multicast Groups....................................................................................................153 Configuring CGMP ..............................................................................................................................154 Disabling CGMP...........................................................................................................................154 Enabling CGMP FastLeave Processing......................................................................................154 Disabling CGMP FastLeave Processing.....................................................................................154 Displaying CGMP Statistics ..........................................................................................................154 Configuring RGMP on the Switch .......................................................................................................155 Disabling RGMP on the Switch....................................................................................................155 Configuring RGMP on the Router.......................................................................................................155 Disabling RGMP on the Router....................................................................................................155 Displaying RGMP Groups...................................................................................................................155 Displaying RGMPCapable Router Ports...........................................................................................156 Displaying RGMP VLAN Statistics....................................................................................................156 Configuring GMRP ..............................................................................................................................156 Disabling GMRP...........................................................................................................................157 Enabling GMRP on Individual Ports .............................................................................................157 Disabling GMRP on Individual Ports...........................................................................................157 Enabling GMRP ForwardAll......................................................................................................157 Disabling GMRP ForwardAll.....................................................................................................157 Configuring GMRP Registration ...................................................................................................157 Displaying the GMRP Configuration............................................................................................158 Setting GMRP Timers...................................................................................................................158 Displaying GMRP Timers.............................................................................................................158 Configuring BandwidthBased Suppression.......................................................................................159 vii
Table of Contents
Chapter 7: IP Multicast Configuring PacketBased Suppression ..............................................................................................159 Disabling Multicast Suppression.........................................................................................................159 Chapter 8: WAN Cell Switching...................................................................................................................160 In Depth...............................................................................................................................................160 ATM Overview....................................................................................................................................160 LANE............................................................................................................................................161 ATM Protocols..............................................................................................................................162 ATM Circuit Switching.................................................................................................................162 ATM Cells.....................................................................................................................................162 The ATM Switch and ATM Endpoints.........................................................................................164 The ATM Reference Model..........................................................................................................164 Specifying ATM Connections.......................................................................................................166 ATM Addressing...........................................................................................................................167 Local Area Network Emulation (LANE) .............................................................................................167 LANE Components.......................................................................................................................168 Integrated Local Management Interface (ILMI)...........................................................................172 LANE Communication ..................................................................................................................172 LANE Configuration Guidelines ...................................................................................................174 How LANE Works........................................................................................................................174 Implementing LANE.....................................................................................................................175 Configuring ATM on the 5000 Switch ..........................................................................................175 Connecting in an ATM Network...................................................................................................177 Monitoring and Maintaining LANE....................................................................................................178 Accessing the ATM LANE Module....................................................................................................178 Displaying the Selector Field...............................................................................................................178 Configuring the LES/BUS...................................................................................................................179 Verifying the LES/BUS Configuration.........................................................................................179 Configuring a LEC for an ELAN .........................................................................................................179 Verifying a LEC Configuration on an ELAN...............................................................................180 Configuring the LECS...................................................................................................................181 Viewing the LANE Database........................................................................................................181 Binding the LECS Address to an Interface...................................................................................181 Verifying the LECS Configuration...............................................................................................182 Chapter 9: LightStream Switches.................................................................................................................183 In Depth...............................................................................................................................................183 LightStream 100..................................................................................................................................183 LightStream 1010................................................................................................................................184 LightStream 2020................................................................................................................................185 Neighborhood Discovery Function...............................................................................................186 Virtual Path Connections.....................................................................................................................186 LightStream Troubleshooting Tools....................................................................................................187 LightStream Boot Process.............................................................................................................187 Supported Troubleshooting Protocols...........................................................................................188 Snooping Mechanisms..................................................................................................................188 Multiprotocol Over ATM..............................................................................................................188 Configuring the Hostname...................................................................................................................189 Configuring an Enable Password.........................................................................................................189 Configuring the Processor Card Ethernet Interface.............................................................................189 Configuring Virtual Private Tunnels...................................................................................................190 viii
Table of Contents
Chapter 9: LightStream Switches Verifying an ATM Interface Connection Status..................................................................................190 Viewing the Configured Virtual Connections.....................................................................................191 Configuring the LECS ATM Address on a LightStream 1010 Switch...............................................191 Configuring the Advertised LECS Address .........................................................................................191 Viewing the LANE Configuration.......................................................................................................191 Viewing the Installed Modules............................................................................................................192 Configuring the MPC ...........................................................................................................................193 Configuring the MPS...........................................................................................................................193 Changing the MPS Variables........................................................................................................193 Monitoring the MPS......................................................................................................................194 Enabling ILMI Autoconfiguration.......................................................................................................194 Configuring LANE on a LightStream 1010 .........................................................................................194 Powering on the LightStream 100 ATM Switch.................................................................................195 Configuring the LS100 Switch............................................................................................................195 Recovering a Lost Password................................................................................................................196 Chapter 10: Layer 2 Redundant Links.........................................................................................................199 In Depth...............................................................................................................................................199 Layer 2 Switching Overview...............................................................................................................199 Frames..................................................................................................................................................199 Broadcast and Multicast Frames...................................................................................................200 Unknown Unicasts........................................................................................................................200 Layer 2 Network Loops.......................................................................................................................200 Danger! Data Loops!.....................................................................................................................201 Edsger Dijkstras Graph Theory ....................................................................................................201 STP Root Bridges..........................................................................................................................202 Bridge Protocol Data Units...........................................................................................................203 Root Bridge Selection...................................................................................................................205 Spanning Tree Convergence Time................................................................................................207 STP Port States..............................................................................................................................208 PerVLAN Spanning Tree............................................................................................................209 EtherChannel.......................................................................................................................................209 . Link Failure...................................................................................................................................210 Port Aggregation Protocol.............................................................................................................210 Fast Convergence Components of STP...............................................................................................211 PortFast.........................................................................................................................................211 . UplinkFast.....................................................................................................................................211 BackboneFast................................................................................................................................212 Enabling STP on a Set/Clear CommandBased Switch ......................................................................212 Enabling STP on a Set/Clear CommandBased Switch for All VLANs............................................213 Disabling STP on a Set/Clear CommandBased Switch .....................................................................213 Disabling STP on a Set/Clear CommandBased Switch by VLAN...................................................213 Viewing the STP Configuration on a Set/Clear CommandBased Switch.........................................213 Configuring STP on an IOS CommandBased Switch.......................................................................214 Disabling STP on an IOS CommandBased Switch...........................................................................214 Viewing the STP Configuration on a Command Line Switch .............................................................215 Configuring the STP Root Switch.......................................................................................................215 Configuring the STP Secondary Root Switch.....................................................................................215 Setting the Root Bridge for More than One VLAN on a Set/Clear CommandBased Switch...........216 Assigning a Port Cost to a Port Using the Set/Clear CommandBased IOS......................................216 Assigning a Port Cost to a Port Using a CLIBased Switch...............................................................216 ix
Table of Contents
Chapter 10: Layer 2 Redundant Links Verifying the Port Cost Configuration on Both a Set/Clear Command and CLIBased Interface...217 Configuring the Port Priority on a Set/Clear CommandBased IOS..................................................217 Configuring the Port Priority on a CLIBased IOS............................................................................217 Verifying the STP Port Priority on a Set/Clear CommandBased Switch..........................................218 Verifying the VLAN Priority Settings.................................................................................................218 Adjusting the FwdDelay Timer on a Set/Clear CommandBased IOS ...............................................218 Adjusting the Hello Timer on a Set/Clear CommandBased IOS......................................................218 Adjusting the MaxAge Timer on a Set/Clear CommandBased IOS.................................................219 Preparing to Enable EtherChannel.......................................................................................................219 Viewing the Port Setting for EtherChannel on a Set/Clear CommandBased Switch ........................219 Creating an EtherChannel on a Set/Clear CommandBased Switch..................................................220 Verifying the EtherChannel Configuration ..........................................................................................221 Defining an EtherChannel Administrative Group...............................................................................221 Viewing an EtherChannel Administrative Group................................................................................221 Configuring EtherChannel on an IOSBased Switch ..........................................................................222 Identifying the Template Port..............................................................................................................222 Verifying the EtherChannel Configuration on a Command Line Interface IOS.................................222 Enabling PortFast on a Set/Clear CommandBased Switch...............................................................223 Disabling PortFast on a Set/Clear CommandBased Switch..............................................................223 Enabling PortFast on a CLIBased IOS Switch..................................................................................223 Disabling PortFast on a CLIBased IOS Switch.................................................................................224 Verifying the PortFast Configuration..................................................................................................224 Enabling UplinkFast on a Set/Clear CommandBased Switch...........................................................224 Disabling UplinkFast on a Set/Clear CommandBased Switch ..........................................................224 Verifying the UplinkFast Configuration..............................................................................................225 Enabling UplinkFast on a Cisco IOS CommandBased Switch.........................................................225 Disabling UplinkFast on a Cisco IOS CommandBased Switch........................................................225 Viewing the UplinkFast Configuration on an IOSBased Switch......................................................226 Viewing UplinkFast Statistics on an IOSBased Switch....................................................................226 Enabling BackboneFast on a Set/Clear CommandBased Switch......................................................226 Disabling BackboneFast on a Set/Clear CommandBased Switch.....................................................226 Viewing the BackboneFast Configuration...........................................................................................226 Chapter 11: Multilayer Switching.................................................................................................................227 In Depth...............................................................................................................................................227 How MLS Works.................................................................................................................................227 MLS Components ..........................................................................................................................228 MLS Flows....................................................................................................................................230 Access List Flow Masks................................................................................................................231 MLS Troubleshooting Notes...............................................................................................................232 Configuring MLS.................................................................................................................................233 MLS Cache....................................................................................................................................234 Aging Timers .................................................................................................................................234 VLAN ID .......................................................................................................................................235 VTP Domain ..................................................................................................................................235 Management Interfaces.................................................................................................................235 Configuring an External MLS Route Processor..................................................................................235 Enabling MLSP on an MLSRP for IP .........................................................................................236 Disabling MLSP on an MLSRP for IP ........................................................................................236 Enabling MLSP on an MLSRP for IPX......................................................................................236 Disabling MLSP on an MLSRP for IPX .....................................................................................236 x
Table of Contents
Chapter 11: Multilayer Switching Assigning a VLAN ID ...................................................................................................................236 Adding an MLS Interface to a VTP Domain................................................................................236 Enabling MLS on an Individual Interface.....................................................................................237 Disabling MLS on an External Router Interface...........................................................................237 Configuring the MLS Switch Engine..................................................................................................237 Reenabling MLS on a Catalyst 6000..........................................................................................237 Reenabling MLS on a Catalyst 5000..........................................................................................238 Disabling MLS on a Catalyst 6000...............................................................................................238 Disabling MLS on a Catalyst 5000...............................................................................................238 Configuring the MLS Cache on the Catalyst 5000.......................................................................238 Configuring Fast Aging on a Catalyst 5000..................................................................................238 Configuring Fast Aging on a Catalyst 6000..................................................................................238 Disabling Fast Aging on a Catalyst 6000......................................................................................238 Configuring Long Aging on the Catalyst 6000.............................................................................239 Disabling Long Aging on the Catalyst 6000.................................................................................239 Configuring Normal Aging on the Catalyst 6000.........................................................................239 Disabling Normal Aging on the Catalyst 6000.............................................................................239 Assigning MLS Management to an Interface on the Catalyst 5000 ..............................................239 Disabling MLS Management on an Interface on the Catalyst 5000.............................................239 Monitoring and Viewing the MLS Configuration...............................................................................240 Viewing the MLS Aging Configuration on a Catalyst 6000.........................................................240 Displaying the IP MLS Configuration..........................................................................................240 Viewing MLSRPs.......................................................................................................................240 Viewing MLSRP Specifics.........................................................................................................240 Displaying MLS VTP Domain Information ..................................................................................241 Viewing the MLS VLAN Interface Information ...........................................................................241 Viewing MLS Statistics on the Catalyst 5000 ...............................................................................241 Viewing MLS Statistics on the Catalyst 6000 ...............................................................................242 Viewing MLS Entries ....................................................................................................................242 Chapter 12: Hot Standby Routing Protocol.................................................................................................243 In Depth...............................................................................................................................................243 Routing Problems................................................................................................................................243 Routing Information Protocol.......................................................................................................244 Proxy ARP .....................................................................................................................................244 ICMP Router Discovery Protocol.................................................................................................244 The Solution.........................................................................................................................................245 HSRP Message Format.................................................................................................................247 The HSRP States...........................................................................................................................247 HSRP Configuration............................................................................................................................248 HSRP Interface Tracking.....................................................................................................................248 Opening a Session on an Internal Route Processor.............................................................................249 Entering Configuration Mode on an RSM...........................................................................................249 Enabling HSRP and Assigning an IP Address to a Standby Group....................................................249 Assigning an HSRP Interface Priority.................................................................................................250 Assigning a Preempt Delay to a Standby Group.................................................................................250 Removing a Preempt Delay from a Standby Group............................................................................250 Setting the HSRP Hello and Hold Timers...........................................................................................250 Removing the HSRP Hello and Hold Timers......................................................................................251 Configuring a ClearText Password for HSRP Authentication..........................................................251 Configuring Two RSFC Interfaces as One HSRP Group....................................................................251 xi
Table of Contents
Chapter 12: Hot Standby Routing Protocol Enabling Interface Tracking................................................................................................................252 Using the show standby Command.....................................................................................................252 Using the debug Command ..................................................................................................................253 Chapter 13: Policy Networking.....................................................................................................................254 In Depth...............................................................................................................................................254 Access Security Policies......................................................................................................................254 Core Layer Policies.......................................................................................................................255 Distribution Layer Policies ............................................................................................................255 Security at the Access Layer................................................................................................................261 Configuring Passwords ..................................................................................................................261 Limiting Telnet Access.................................................................................................................261 Implementing Privilege Levels.....................................................................................................261 Configuring Banner Messages......................................................................................................262 Physical Device Security...............................................................................................................262 Port Security..................................................................................................................................262 VLAN Management......................................................................................................................263 Creating a Standard Access List..........................................................................................................263 Creating an Extended Access List.......................................................................................................264 Applying Access Lists Using accessclass.........................................................................................266 Applying Access Lists Using distributelist.......................................................................................266 Configuring a Telnet Session TimeOut Value..................................................................................267 Implementing Privilege Levels on a 1900EN......................................................................................267 Configuring Line Console TimeOut Values ......................................................................................267 Configuring Banner Messages.............................................................................................................268 Enabling HTTP Access........................................................................................................................268 Enabling Port Security.........................................................................................................................269 Displaying the MAC Address Table....................................................................................................270 Chapter 14: Web Management ......................................................................................................................272 In Depth...............................................................................................................................................272 Standard and Enterprise Edition CVSM..............................................................................................272 CVSM Client Requirements................................................................................................................272 CVSM Access Levels..........................................................................................................................273 CVSM Default Home Page ..................................................................................................................273 The Switch Image ..........................................................................................................................274 Configuring the Switch with an IP Address and Setting the Default Web Administration Port.........275 Connecting to the Web Management Console .....................................................................................276 Configuring the Switch Port Analyzer .................................................................................................281 Chapter 15: The Standard Edition IOS........................................................................................................283 In Depth...............................................................................................................................................283 The 1900 and 2820 Series Switches....................................................................................................283 Main Menu Choices......................................................................................................................283 [C] Console Settings ......................................................................................................................284 [S] System Menu...........................................................................................................................285 [N] Network Management............................................................................................................286 . [P] Port Configuration...................................................................................................................289 [A] Port Addressing .......................................................................................................................292 [D] Port Statistics Detail...............................................................................................................293 . [M] Monitor ...................................................................................................................................293 xii
Table of Contents
Chapter 15: The Standard Edition IOS [V] Virtual LAN............................................................................................................................293 [R] Multicast Registration.............................................................................................................294 [F] Firmware ..................................................................................................................................294 [I] RS232 Interface ......................................................................................................................295 [U] Usage Summaries...................................................................................................................296 Configuring Network Settings on the 1900 and 2820 Series ...............................................................298 Configuring Broadcast Storm Control on Switch Ports .......................................................................299 Configuring SNMP on the 1900 Series...............................................................................................300 Configuring Port Monitoring on the Standard Edition IOS.................................................................303 Configuring VLANs on the Standard Edition IOS..............................................................................304 Configuring Spanning Tree Protocol...................................................................................................307 Chapter 16: Switch Troubleshooting............................................................................................................309 In Depth...............................................................................................................................................309 Hardware Troubleshooting..................................................................................................................309 No Power.......................................................................................................................................309 POST.............................................................................................................................................309 Indicator Lights.............................................................................................................................310 Switch Cabling.....................................................................................................................................311 Cable Problems ..............................................................................................................................312 CrossOver Cables........................................................................................................................312 Switch Troubleshooting Tools.............................................................................................................312 CiscoWorks for Switched Internetworks......................................................................................312 IOS Software Troubleshooting Commands..................................................................................313 Viewing the Set/Clear IOS Configuration...........................................................................................316 Viewing the CLIBased IOS Configuration.......................................................................................320 Viewing the Software Version on a Set/Clear CommandBased IOS Module..................................321 Viewing the IOS Version Information on a CLIBased IOS..............................................................321 Using the show flash Command on a Set/Clear CommandBased IOS.............................................321 Testing the Supervisor Engine Hardware on a Set/Clear CommandBased Switch...........................322 Testing External Module Hardware on a Set/Clear CommandBased Switch...................................323 Viewing the System Configuration on a Set/Clear CommandBased Switch....................................323 Viewing the VTP Domain Configuration on a Set/Clear IOS.............................................................324 Viewing the VTP Domain Configuration on a CLIBased IOS.........................................................324 Viewing the VLAN Configuration on a Set/Clear CommandBased Switch.....................................324 Viewing the VLAN Configuration on a CLIBased IOS ....................................................................325 Viewing the Spanning Tree Configuration on a Set/Clear CommandBased IOS.............................325 Viewing the Spanning Tree Configuration on a CLIBased IOS.......................................................326 Viewing the CAM (MAC Address) Table on a Set/Clear CommandBased IOS..............................328 Viewing the CAM (MAC Address) Table on a CLIBased IOS........................................................328 Viewing the CDP Neighbors on a Set/Clear CommandBased IOS ...................................................329 Viewing the CDP Neighbors on a CLIBased IOS .............................................................................329 Viewing Individual Port CAM Tables on a CLIBased IOS..............................................................330 Viewing Port Statistics on a Set/Clear IOS.........................................................................................330 Viewing Port Statistics on a CLIBased IOS......................................................................................332 Using the Port Configuration on a Set/Clear CommandBased IOS..................................................333 Using the show port Command on a CLIBased IOS.........................................................................333 Using the show vlan Command on a Set/Clear CommandBased IOS..............................................334 Using the show vlan Command on a CLIBased IOS........................................................................334 Using the show interface Command on a Set/Clear CommandBased IOS.......................................335 Using the show interface Command on a CLIBased IOS.................................................................335 xiii
Table of Contents
Chapter 16: Switch Troubleshooting Using the show log Command on a Set/Clear CommandBased IOS................................................336 Configuring SPAN for Port Monitoring on a Set/Clear CommandBased IOS.................................337 Configuring SPAN for VLAN Monitoring on a Set/Clear CommandBased IOS.............................337 Launching the Diagnostic Console on a Cisco 1900 or 2820 Series Switch.......................................337 Using the Diagnostic Console to Upgrade the Firmware on a Cisco 1900 or 2820 Series Switch.....338 Using the Diagnostic Console for Debugging the Firmware and Hardware.......................................339 Appendix A: Study Resources.......................................................................................................................341 Books...................................................................................................................................................341 Cisco Group Study and Users Groups.................................................................................................341 Live Cisco Training/InternetBased Labs/Study Resources...............................................................341 Online Resources.................................................................................................................................342 Asynchronous Transfer Mode.......................................................................................................342 Cisco IOS......................................................................................................................................342 Hot Standby Router Protocol........................................................................................................342 InterSwitch Link.........................................................................................................................342 IP Multicast...................................................................................................................................342 Multilayer Switching.....................................................................................................................342 Quality of Service ..........................................................................................................................343 Spanning Tree Protocol.................................................................................................................343 TACACS+.....................................................................................................................................343 VLANs..........................................................................................................................................343 Standards Organizations......................................................................................................................343 Cisco Job Search Sites.........................................................................................................................344 Appendix B: Basic IOS CLItoSet/Clear Commands..............................................................................345 Overview..............................................................................................................................................345 Appendix C: The Cisco Consultant...............................................................................................................347 Overview..............................................................................................................................................347 Establishing Credibility.......................................................................................................................347 Come Off As an Expert.................................................................................................................348 Designing a Solution............................................................................................................................348 Estimating the Cost.......................................................................................................................349 Presenting the Final Proposal and Creating Expectations.............................................................349 Contracting ...........................................................................................................................................350 Document, Document, Document.......................................................................................................350 . The Way to Fail...................................................................................................................................350 Failing to Be There When Promised, or Rushing through the Job ................................................350 Failing to Manage Your Time.......................................................................................................351 Assuming You Know What the Customer Needs.........................................................................351 Failing to Take Responsibility......................................................................................................352 Conclusion...........................................................................................................................................352 Appendix D: Cisco 1912EN and Catalyst 5000 Configuration Practice Lab............................................353 Required Equipment............................................................................................................................353 Lab Objectives.....................................................................................................................................354 Possible Solution ..................................................................................................................................355 The 1912 Basic Configuration......................................................................................................355 The Catalyst 5000 Basic Configuration........................................................................................357 Configuring the Cisco 2621 Interface for ISL Trunking ...............................................................358 xiv
Table of Contents
Appendix E: Switch Features........................................................................................................................359 Access Layer Switches........................................................................................................................359 Cisco Catalyst 1900.......................................................................................................................359 Cisco Catalyst 2820.......................................................................................................................360 Cisco Catalyst 2900.......................................................................................................................360 Cisco Catalyst 3000.......................................................................................................................362 Cisco Catalyst 3500 Series XL ......................................................................................................362 Cisco Catalyst 3900 Series............................................................................................................363 Distribution Layer Switches................................................................................................................364 Cisco Catalyst 4000 Series............................................................................................................365 Catalyst 5000 Series......................................................................................................................365 Catalyst 6000 Series......................................................................................................................366 Core Layer/WAN Switches.................................................................................................................367 Cisco Catalyst 8400 Series............................................................................................................368 Cisco Catalyst 8500 Series............................................................................................................369 BPX 8600 Series...........................................................................................................................370 MGX 8800 Series..........................................................................................................................371 12000 Series Gigabit Switch Routers ............................................................................................372 A....................................................................................................................................................373 B....................................................................................................................................................375 C....................................................................................................................................................376 D....................................................................................................................................................378 EF................................................................................................................................................380 GI................................................................................................................................................382 KL...............................................................................................................................................385 MN..............................................................................................................................................386 OP ................................................................................................................................................388 QR...............................................................................................................................................390 S.....................................................................................................................................................391 T .....................................................................................................................................................393 UX...............................................................................................................................................395
xv
Steve Sayre Acquisitions Editor Charlotte Carpentier Product Marketing Manager Tracy Rooney Project Editor Toni Zuccarini Ackley Technical Reviewer Deniss Suhanovs Production Coordinator Carla J. Schuder Cover Designer Jody Winkler Layout Designer April Nielsen Dear Reader: Coriolis Technology Press was founded to create a very elite group of books: the ones you keep closest to your machine. Sure, everyone would like to have the Library of Congress at arms reach, but in the real world, you have to choose the books you rely on every day very carefully. To win a place for our books on that coveted shelf beside your PC, we guarantee several important qualities in every book we publish. These qualities are: Technical accuracyIts no good if it doesnt work. Every Coriolis Technology Press book is reviewed by technical experts in the topic field, and is sent through several editing and proofreading passes in order to create the piece of work you now hold in your hands. Innovative editorial designWeve put years of research and refinement into the ways we present information in our books. Our books editorial approach is uniquely designed to reflect the way people learn new technologies and search for solutions to technology problems. Practical focusWe put only pertinent information into our books and avoid any fluff. Every fact included between these two covers must serve the mission of the book as a whole. AccessibilityThe information in a book is worthless unless you can find it quickly when you need it. We put a lot of effort into our indexes, and heavily crossreference our chapters, to make it easy for you to move right to the information you need. Here at The Coriolis Group we have been publishing and packaging books, technical journals, and training materials since 1989. Were programmers and authors ourselves, and we take an ongoing active role in defining what we publish and how we publish it. We have put a lot of thought into our books; please write to us at [email protected] and let us know what you think. We hope that youre happy with the book in your hands, and that in the future, when you reach for software development and networking information, youll turn to one of our books first. Keith Weiskamp President and CEO
Jeff Duntemann VP and Editorial Director This book is dedicated to all those who endeavor to turn dreams into realities. Sean Odom To my wife, Sonia, and my daughter, Sabrina. Hanson Nottingham About the Authors Sean Odom is a CCNP, MCSE, and CNXEthernet. He has been in the computer networking field for over 12 years and can be found instructing a number of Cisco courses, including the Switching and Remote Access courses for Globalnet Training Solutions, Inc. (http://www.globalnettraining.com/). Sean is a former president and currently on the board of the Sacramento Placer County Cisco Users Group (SPCCUG). In addition, Sean has been a consultant for many companies including Advanced Computer Systems, American Licorice, CH2M Hill, The Money Store, NCR, Wells Fargo Bank, and Intel. Sean has authored and coauthored many industry books, labs, and white papers. You can reach Sean by email at ([email protected]) or see his Web site at http://www.thequestforcertification.com/. Hanson Nottingham is a CCNA, MCSE, and MCP+I. He is an experienced Windows NT Systems Engineer with over eight years experience in the Information Systems industry. Hanson is currently working as a systems manager on the E:Services NT Team at HewlettPackard Company. Prior to HP, Hanson helped manage Vision Service Plans Web farm as an Internet systems engineer. He specializes in Web farm management and integration, SOHO network designs, and ecommerce solutions. Hanson is currently working to further his Cisco Certified Networking Professional certification. Acknowledgments Its always exciting when you get to the acknowledgments because that means the book is almost done. First off, I must thank Erin for putting up with me during the writing of this book. She is a wonderful person who is as smart as she is good looking and puts up with a lot of extra responsibility while I am working on books. I also need to thank Albert Ip and Hanson Nottingham for their defined knowledge of the Cisco switches. Thanks to my favorite English teacher, Mr. Strange, for being the one who originally thought I would be a great writer some day, and I guess it shows here in my third book. Coriolis deserves many thanks. A few people in particular at Coriolis need to be thanked: Steve Sayre, for believing in my idea of a Cisco Switching Black Book; my project editor for the second time, Toni Zuccarini Ackley; Tiffany Taylor for finding all my mistakes; Charlotte Carpentier and Shari Jo Hehr for handling the many contract issues for this book; Jody Winkler for making the cover; Carla Schuder for making the inside of the book look good; and Paul LoPresto for all his help in acquisitions. Sean Odom Sean, thank you for giving me the opportunity and the privilege to become a coauthor on this bookI appreciate all your help, assistance, and encouragement! To my wonderful wife, Sonia, and my beautiful daughter, Sabrina, thank you for giving me the timedealing with my complicated and difficult schedules I know has not been easy and your support does not go unnoticed! To Toni and the rest of the Coriolis team, thank you for this opportunity and your undying patience throughout my process development learning curveI owe you guys mochas! Hanson Nottingham
Introduction
Overview
For many years I have been a consultant for different companies and have written books on switch and router configurations and troubleshooting. During my years as a consultant I have had to either install, administer, or troubleshoot switching problems and configurations for switches without a good handbook. I have constantly gone through bookstores looking for a book on Cisco switch troubleshooting and configurations that didnt deal with a Cisco curriculum. Guess what? I couldnt find one! I have written books related to the CCDP and CCNP curricula and always thought about writing a book that concentrated on Cisco switches. One day I was walking through a bookstore and noticed a book from The Coriolis Group called Cisco Routers for IP Routing Little Black Book. I immediately thought to myself that a Cisco Switching Little Black Book would be a great configuration handbook for many people. After contacting Coriolis and pitching them the idea for the book, I received a call from Steve Sayre, the publisher at Coriolis, who was excited about publishing a book of this nature. As I pondered and started putting my idea into an outline, I realized that I could not place everything that an administrator needed in a Little Black Book. To make a long story short, a few months later, with a great big outline and help from Albert Ip and Hanson Nottingham, the book became this Black Bookthe most featurepacked handbook for Cisco switching an administrator can buy. Not only do we cover the Cisco Catalyst switching line but we also cover the LightStream ATM switch series, Gigabit Switch Router Series (GSR), and the IGX and MGX WAN switch series. Thanks for buying the Cisco Switching Black Book.
Words in brackets that are separated by bars are used when indicating that there are multiple choices of commands. For example, when configuring VTP you can enable the trunk port to choose one mode: on, off, desirable, or auto mode. This will be shown like this: [on|off|desirable|auto]. Knowledge of what configuration mode you are in and how to enter each configuration mode on the Cisco Command Line Interface is important. Knowing what each mode configures will aid you in using the proper configuration mode. The Set/Clear commandbased IOS CLI uses similar command modes as the Cisco CLI used on Cisco routers and switches, but uses mainly the enable, set, show, and clear commands. Chapter 1 will cover the different CLI command modes.
Port switchingTakes place in the backplane of a shared hub. For instance, ports 1, 2, and 3 could be connected to backplane 1, whereas ports 4, 5, and 6 could be connected to backplane 2. This method is typically used to form a collapsed backbone and to provide some improvements in the network. Cell switchingUses Asynchronous Transfer Mode (ATM) as the underlying technology. Switch paths can be either permanent virtual circuits (PVCs) that never go away, or switched virtual circuits (SVCs) that are built up, used, and torn down when youre finished.
A Bit of History
The first local area networks (LANs) began as a result of the introduction of personal computers into the workplace environment. As computers became more common, the need arose to share resources, such as printers or files. These early networks were pretty simple, with a handful of computers sharing a few printers and not much more. As more items such as servers, applications, and peripherals came along, the increasing numbers of interfacesalong with application designs that could take advantage of the networkcreated a weakness in the current network design. The limitations of traditional Ethernet technology brought forth a number of innovations that soon became standard in the Ethernet protocol. Innovations such as full duplexing, Fast Ethernet, and Gigabit Ethernet began to appearinnovations that have also made possible a transition to switches from shared hubs. Other limitations to the way networks operated in a shared environment created a need for alternative methods to permit the use of bandwidthintensive applications such as video and voice. Switches are one of these alternative methods. In many respects, switches are relatively simple devices. A switchs design and selflearning features require very little manual configuration to get it up and running. To properly use these devices in your network, you must have an indepth knowledge of the issues involved in implementing switching. Knowing the basics of Ethernet technology can help you effectively troubleshoot and install switches in the network. You also need a good grasp of the different technologies and how switches work, as well as the constraints of each type of device you may use in the network. As you read the following sections, make sure you get a clear understanding of the fundamentals and basics of Ethernet technology. The types of devices you use in the network have important implications for network performance. For example, bridges and routers are both devices that network administrators use to extend the capabilities of their networks. Both of them have advantages and disadvantages. Bridges, for example, can easily solve distance limitations and increase the number of stations you can have on a network, but they can have real problems with broadcast traffic. Routers can be used to prevent this problem, but they increase the time it takes to forward the traffic. This has been the pattern throughout the history of networking. When a new product is introduced, problems or bottlenecks are soon found that limit the products usefulness. Then, innovations are invented or implemented to aid the product and allow it to perform better. To see this occurrence in action, lets take a look at some of the traditional network architectures. As you will see in upcoming sections, the pattern of new innovation after new innovation started in the earliest days of networking and continues in todays networks.
Networking Architectures
Network designers from the beginnings of networking were faced with the limitations of the LAN topologies. In modern corporate networks, LAN topologies such as Ethernet, Token Ring, and FDDI are used to provide network connectivity. Network designers often try to deploy a design that uses the fastest functionality that can be applied to the physical cabling.
Many different types of physical cable media have been introduced over the years, such as Token Ring, FDDI, and Ethernet. At one time, Token Ring was seen as a technically superior product and a viable alternative to Ethernet. Many networks still contain Token Ring, but very few new Token Ring installations are being implemented. One reason is that Token Ring is an IBM product with very little support from other vendors. Also, the prices of Token Ring networks are substantially higher than those of Ethernet networks. FDDI networks share some of the limitations of Token Ring. Like Token Ring, FDDI offers excellent benefits in the area of highspeed performance and redundancy. Unfortunately, however, it has the same high equipment and installation costs. More vendors are beginning to recognize FDDI and are offering support, services, and installation for itespecially for network backbones. Network backbones are generally highspeed links running between segments of the network. Normally, backbone cable links run between two routers; but they can also be found between two switches or a switch and a router. Ethernet has by far overwhelmed the market and obtained the highest market share. Ethernet networks are openstandards based, more costeffective than other types of physical media, and have a large base of vendors that supply the different Ethernet products. The biggest benefit that makes Ethernet so popular is the large number of technical professionals who understand how to implement and support it. Early networks were modeled on the peertopeer networking model. These worked well for the small number of nodes, but as networks grew they evolved into the client/server network model of today. Lets take a look at these two models in more depth. PeertoPeer Networking Model A small, flat network or LAN often contains multiple segments connected with hubs, bridges, and repeaters. This is an Open Systems Interconnection (OSI) Reference Model Layer 2 network that can actually be connected to a router for access to a WAN connection. In this topology, every network node sees the conversations of every other network node. In terms of scalability, the peertopeer networking model has some major limitationsespecially with the technologies that companies must utilize to stay ahead in their particular fields. No quality of service, prioritizing of data, redundant links, or data security can be implemented here, other than encryption. Every node sees every packet on the network. The hub merely forwards the data it receives out of every port, as shown in Figure 1.1.
Figure 1.1: A flat network topology. Early networks consisted of a single LAN with a number of workstations running peertopeer networks and sharing files, printers, and other resources. Peertopeer networks share data with one another in a noncentralized fashion and can span only a very limited area, such as a room or building. 8
Client/Server Network Model Peertopeer model networks evolved into the client/server model, in which the server shares applications and data storage with the clients in a somewhat more centralized network. This setup includes a little more security, provided by the operating system, and ease of administration for the multiple users trying to access data. A LAN in this environment consists of a physical wire connecting the devices. In this model, LANs enable multiple users in a relatively small geographical area to exchange files and messages, as well as to access shared resources such as file servers and printers. The isolation of these LANs makes communication between different offices or departments difficult, if not impossible. Duplication of resources means that the same hardware and software have to be supplied to each office or department, along with separate support staff for each individual LAN. WANs soon developed to overcome the limitations of LANs. WANs can connect LANs across normal telephone lines or other digital media (including satellites), thereby ignoring geographical limitations in dispersing resources to network clients. In a traditional LAN, many limitations directly impact network users. Almost anyone who has ever used a shared network has had to contend with the other users of that network and experienced the impacts. These effects include such things as slow network response times, making for poor network performance. They are due to the nature of shared environments. When collision rates increase, the usefulness of the bandwidth decreases. As applications begin having to resend data due to excessive collisions, the amount of bandwidth used increases and the response time for users increases. As the number of users increases, the number of requests for network resources rises, as well. This increase boosts the amount of traffic on the physical network media and raises the number of data collisions in the network. This is when you begin to receive more complaints from the networks users regarding response times and timeouts. These are all telltale signs that you need a switched Ethernet network. Later in this chapter, we will talk more about monitoring networks and solutions to these problems. But before we cover how to monitor, design, and upgrade your network, lets look at the devices you will find in the network.
After each frame transmission, all stations on the network contend equally for the next frame transmission. This competition allows access to the network channel in a fair manner. It also ensures that no single station can lock out the other stations from accessing the network. Access to the shared channel is determined by the Media Access Control (MAC) mechanism on each Network Interface Card (NIC) located in each network node. The MAC address uses a physical address which, in terms of the OSI Reference Model, contains the lowest level address. This is the address used by a switch. The router at Layer 3 uses a protocol address, which is referred as a logical address. CSMA/CD is the tool that allows collisions to be detected. Each collision of frames on the network reduces the amount of network bandwidth that can be used to send information across the physical wire. CSMA/CD also forces every device on the network to analyze each individual frame and determine if the device was the intended recipient of the packet. The process of decoding and analyzing each individual packet generates additional CPU usage on each machine, which degrades each machines performance. As networks grew in popularity, they also began to grow in size and complexity. For the most part, networks began as small isolated islands of computers. In many of the early environments, the network was installed over a weekendwhen you came in on Monday, a fat orange cable was threaded throughout the organization, connecting all the devices. A method of connecting these segments had to be derived. In the next few sections, we will look at a number of approaches by which networks can be connected. We will look at repeaters, hubs, bridges, and routers, and demonstrate the benefits and drawbacks to each approach.
Repeaters
The first LANs were designed using thick coaxial cables, with each station physically tapping into the cable. In order to extend the distance and overcome other limitations on this type of installation, a device known as a repeater is used. Essentially, a repeater consists of a pair of backtoback transceivers. The transmit wire on one transceiver is hooked to the receive wire on the other, so that bits received by one transceiver are immediately retransmitted by the other. Repeaters work by regenerating the signals from one segment to another, and they allow networks to overcome distance limitations and other factors. Repeaters amplify the signal to further transmit it on the segment because there is a loss in signal energy caused by the length of the cabling. When data travels through the physical cable it loses strength the further it travels. This loss of the signal strength is referred to as attenuation. These devices do not create separate networks; instead, they simply extend an existing one. A standard rule of thumb is that no more than three repeaters may be located between any two stations. This is often referred to as the 543 rule, which states that no more than 5 segments may be attached by no more than 4 repeaters, with no more than 3 segments populated with workstations. This limitation prevents propagation delay, which is the time it takes for the packet to go from the beginning of the link to the opposite end. As you can imagine, in the early LANs this method resulted in a host of performance and faultisolation problems. As LANs multiplied, a more structured approach called 10BaseT was introduced. This method consists of attaching all the devices to a hub in the wiring closet. All stations are connected in a pointtopoint configuration between the interface and the hub.
Hubs
A hub, also known as a concentrator, is a device containing a grouping of repeaters. Similar to repeaters, hubs are found at the Physical layer of the OSI Model. These devices simply collect and retransmit bits. Hubs are used to connect multiple cable runs in a starwired network topology into a single network. This design is similar to the spokes of a wheel converging on the center of the wheel. Many benefits derive from this type of setup, such as allowing interdepartmental connections between hubs, extending the maximum distance between any pair of nodes on the network, and improving the ability to isolate problems from the rest of the network. 10
Six types of hubs are found in the network: Active hubsAct as repeaters and eliminate attenuation by amplifying the signals they replicate to all the attached ports. Backbone hubsCollect other hubs into a single collection point. This type of design is also known as a multitiered design. In a typical setup, servers and other critical devices are on highspeed Fast Ethernet or Gigabit uplinks. This setup creates a very fast connection to the servers that the lowerspeed networks can use to prevent the server or the path to the server from being a bottleneck in the network. Intelligent hubsContain logic circuits that shut down a port if the traffic indicates that malformed frames are the rule rather than the exception. Managed hubsHave Application layer software installed so that they can be remotely managed. Network management software is very popular in organizations that have staff responsible for a network spread over multiple buildings. Passive hubsAid in producing attenuation. They do not amplify the signals they replicate to all the attached ports. These are the opposite of active hubs. Stackable hubsHave a cable to connect hubs that are in the same location without requiring the data to pass through multiple hubs. This setup is commonly referred to as daisy chaining. In all of these types of hub configurations, one crucial problem exists: All stations share the bandwidth, and they all remain in the same collision domain. As a result, whenever two or more stations transmit simultaneously on any hub, there is a strong likelihood that a collision will occur. These collisions lead to congestion during hightraffic loads. As the number of stations increases, each station gets a smaller portion of the LAN bandwidth. Hubs do not provide microsegmentation and leave only one collision domain.
Bridges
A bridge is a relatively simple device consisting of a pair of interfaces with some packet buffering and simple logic. The bridge receives a packet on one interface, stores it in a buffer, and immediately queues it for transmission by the other interface. The two cables each experience collisions, but collisions on one cable do not cause collisions on the other. The cables are in separate collision domains. Note Some bridges are capable of connecting dissimilar topologies. The term bridging refers to a technology in which a device known as a bridge connects two or more LAN segments. Bridges are OSI Data Link layer, or Layer 2, devices that were originally designed to connect two network segments. Multiport bridges were introduced later to connect more than two network segments, and they are still in use in many networks today. These devices analyze the frames as they come in and make forwarding decisions based on information in the frames themselves. To do its job effectively, a bridge provides three separate functions: Filtering the frames that the bridge receives to determine if the frame should be forwarded Forwarding the frames that need to be forwarded to the proper interface Eliminating attenuation by amplifying received data signals Bridges learn the location of the network stations without any intervention from a network administrator or any manual configuration of the bridge software. This process is commonly referred to as selflearning. When a bridge is turned on and begins to operate, it examines the MAC addresses located in the headers of frames passed through the network. As the traffic passes through the bridge, the bridge builds a table of known source addresses, assuming the port from which the bridge received the frame is the port to which the device is a sending device is attached. In this table, an entry exists that contains the MAC address of each node along with the bridge interface and port on which it resides. If the bridge knows that the destination is on the same segment as the source, it drops the packet because there is no need to transmit it. If the bridge knows that the destination is on another 11
segment, it transmits the packet on that segment or port to that segment only. If the bridge does not know the destination segment, the bridge transmits a copy of the frame to all the interface ports in the source segment using a technique known as flooding. For each packet an interface receives, the bridge stores in its table the following information: The frames source address The interface the frame arrived on The time at which the switch port received the source address and entered it into the switching table Note Bridges and switches are logically equivalent. There are four kinds of bridges: Transparent bridgePrimarily used in Ethernet environments. They are called transparent bridges because their presence and operation are transparent to network hosts. Transparent bridges learn and forward packets in the manner described earlier. Sourceroute bridgePrimarily used in Token Ring environments. They are called sourceroute bridges because they assume that the complete sourcetodestination route is placed in frames sent by the source. Translational bridgeTranslators between different media types, such as Token Ring and Ethernet. Sourceroute transparent bridgeA combination of transparent bridging and sourceroute bridging that enables communication in mixed Ethernet and Token Ring environments. Broadcasts are the biggest problem with bridges. Some bridges help reduce network traffic by filtering packets and allowing them to be forwarded only if needed. Bridges also forward broadcasts to devices on all segments of the network. As networks grow, so does broadcast traffic. Instead of frames being broadcast through a limited number of devices, bridges often allow hundreds of devices on multiple segments to broadcast data to all the devices. As a result, all devices on all segments of the network are now processing data intended for one device. Excessive broadcasts reduce the amount of bandwidth available to end users. This situation causes bandwidth problems called network broadcast storms. Broadcast storms occur when broadcasts throughout the LAN use up all available bandwidth, thus grinding the network to a halt. Network performance is most often affected by three types of broadcast traffic: inquiries about the availability of a device, advertisements for a components status on the network, and inquiries from one device trying to locate another device. The following are the typical types of network broadcasts: Address Resolution Protocol (ARP) Internetwork Packet Exchange (IPX) Get Nearest Server (GNS) requests IPX Service Advertising Protocol (SAP) Multicast traffic broadcasts NetBIOS name requests These broadcasts are built into the network protocols and are essential to the operation of the network devices using these protocols. Due to the overhead involved in forwarding packets, bridges also introduce a delay in forwarding traffic. This delay is known as latency. Latency delay is measured from the moment a packet enters the input port on the switch until the time the bridge forwards the packet out the exit port. Bridges can introduce 20 to 30 percent loss of throughput for some applications. Latency is a big problem with some timingdependent technologies, such as mainframe connectivity, video, or voice. High levels of latency can result in loss of connections and noticeable video and voice degradation. The inherent problems of bridging over multiple segments including those of different LAN types with Layer 2 devices became a problem to network administrators. To overcome these issues, a device called a router, operating at OSI Layer 3, was introduced.
12
Routers
Routers are devices that operate at Layer 3 of the OSI Model. Routers can be used to connect more than one Ethernet segment with or without bridging. Routers perform the same basic functions as bridges and also forward information and filter broadcasts between multiple segments. Figure 1.2 shows routers segmenting multiple network segments. Using an OSI network Layer 3 solution, routers logically segment traffic into subnets.
Figure 1.2: Routers connecting multiple segments. Routers were originally introduced to connect dissimilar network media types as well as to provide a means to route traffic, filter broadcasts across multiple segments, and improve overall performance. This approach eliminated broadcasts over multiple segments by filtering broadcasts. However, routers became a bottleneck in some networks and also resulted in a loss of throughput for some types of traffic. When you are connecting large networks, or when you are connecting networks to a WAN, routers are very important. Routers will perform media conversion, adjusting the data link protocol as necessary. With a router, as well as with some bridges, you can connect an Ethernet network and a Token Ring network. Routers do have some disadvantages. The cost of routers is very high, so they are an expensive way to segment networks. If protocol routing is necessary, you must pay this cost. Routers are also difficult to configure and maintain, meaning that you will have a difficult time keeping the network up and running. Knowledgeable workers who understand routing can be expensive. Routers are also somewhat limited in their performance, especially in the areas of latency and forwarding rates. Routers add about 40 percent additional latency from the time packets arrive at the router to the time they exit the router. Higher latency is primarily due to the fact that routing requires more packet assembly and disassembly. These disadvantages force network administrators to look elsewhere when designing many large network installations.
Switches
A new option had to be developed to overcome the problems associated with bridges and routers. These new devices were called switches. The term switching was originally applied to packetswitch technologies, such as Link Access Procedure, Balanced (LAPB); Frame Relay; Switched Multimegabit Data Service (SMDS); and X.25. Today, switching is more commonly associated with LAN switching and refers to a technology that is similar to a bridge in many ways. Switches allow fast data transfers without introducing the latency typically associated with bridging. They create a onetoone dedicated network segment for each device on the network and interconnect these segments by using an extremely fast, highcapacity infrastructure that provides optimal transport of data on a LAN; this structure is commonly referred to as a backplane. This setup reduces competition for bandwidth on the network, allows maximum utilization of the network, and increases flexibility for network designers and implementers. Ethernet switches provide a number of enhancements over shared networks. Among the most important is microsegmentation, which is the ability to divide networks into smaller and faster segments that can operate at the maximum possible speed of the wire (also known as wirespeed). 13
To improving network performance, switches must address three issues: They must stop unneeded traffic from crossing network segments. They must allow multiple communication paths between segments. They cannot introduce performance degradation. Routers are also used to improve performance. Routers are typically attached to switches to connect multiple LAN segments. A switch forwards the traffic to the port on the switch to which the destination device is connected, which in turn reduces the traffic to the other devices on the network. Information from the sending device is routed directly to the receiving device. No device other than the router, switch, and end nodes sees or processes the information. The network now becomes less saturated, more secure, and more efficient at processing information, and precious processor time is freed on the local devices. Routers today are typically placed at the edge of the network and are used to connect WANs, filter traffic, and provide security. See Figure 1.3.
Figure 1.3: Routers and switches Like bridges, switches perform at OSI Layer 2 by examining the packets and building a forwarding table based on what they hear. Switches differ from bridges by helping to meet the following needs for network designers and administrators: Provide deterministic paths Relieve network bottlenecks Provide deterministic failover for redundancy Allow scalable network growth Provide fast convergence Act as a means to centralize applications and servers Have the capacity to reduce latency
Network Design
When designing or upgrading your network, you need to keep some basic rules of segmenting in mind. You segment your network primarily to relieve network congestion and route data as quickly and efficiently as possible. Segmentation is often necessary to satisfy the bandwidth requirements of a new application or type of information that the network needs to support. Other times, it may be needed due to the increased traffic on the segment or subnet. You should also plan for increased levels of network usage or unplanned increases in network population. Some areas you need to consider are the types of nodes, user groups, security needs, population of the network, applications used, and the network needs for all the interfaces on the network. When designing your network, you should create it in a hierarchical manner. Doing so provides you with the ability to easily make additions to your network. Another important consideration should be how your data flows through the network. For example, lets say your users are intermingled with your servers in the same geographical location. If you create a switched network in which the users data must be switched through a number of links to another geographical area and then back again to create a connection between the users and file servers, you have not 14
designed the most efficient path to the destination. Single points of failure need to be analyzed, as well. As we stated earlier, every largenetwork user has suffered through his or her share of network outages and downtime. By analyzing all the possible points of failure, you can implement redundancy in the network and avoid many network outages. Redundancy is the addition of an alternate path through the network. In the event of a network failure, the alternate paths can be used to continue forwarding data throughout the network. The last principle that you should consider when designing your network is the behavior of the different protocols. The actual switching point for data does not have to be the physical wire level. Your data can be rerouted at the Data Link and Network layers, as well. Some protocols introduce more network traffic than others. Those operating at Layer 2 can be encapsulated or tagged to create a Layer3like environment. This environment allows the implementation of switching, and thereby provides security, protocol priority, and Quality of Service (QoS) features through the use of ApplicationSpecific Integrated Circuits (ASICs) instead of the CPU on the switch. ASICs are much faster than CPUs. ASICs are silicon chips that provide only one or two specific tasks faster than a CPU. Because they process data in silicon and are assigned to a certain task, less processing time is needed, and data is forwarded with less latency and more efficiency to the end destinations. In order to understand how switches work, we need to understand how collision domains and broadcast domains differ.
Collision Domains
A switch can be considered a highspeed multiport bridge that allows almost maximum wirespeed transfers. Dividing the local geographical network into smaller segments reduces the number of interfaces in each segment. Doing so will increase the amount of bandwidth available to all the interfaces. Each smaller segment is considered a collision domain. In the case of switching, each port on the switch is its own collision domain. The most optimal switching configuration places only one interface on each port of a switch, making the collision domain two nodes: the switch port interface and the interface of the end machine. Lets look at a small collision domain consisting of two PCs and a server, shown in Figure 1.4. Notice that if both PCs in the network transmit data at the same time, the data will collide in the network because all three computers are in their own collision domain. If each PC and server was on its own port on the switch, each would be in its own collision domain.
Figure 1.4: A small collision domain consisting of two PCs sending data simultaneously to a server. Switch ports are assigned to virtual LANs (VLANs) to segment the network into smaller broadcast domains. If you are using a node attached to a switch port assigned to a VLAN, broadcasts will only be received from members of your assigned VLAN. When the switch is set up and each port is assigned to a VLAN, a broadcast sent in VLAN 1 is seen by those ports assigned to VLAN 1 even if they are on other switches attached by trunk links. A switch port can be a member of only one VLAN and requires a Layer 3 device such as an internal route processor or router to route data from one VLAN to another. 15
Although the nodes on each port are in their own collision domain, the broadcast domain consists of all of the ports assigned to a particular VLAN. Therefore, when a broadcast is sent from a node in VLAN 1, all the devices attached to ports assigned to VLAN 1 will receive that broadcast. The switch segments the users connected to other ports, thereby preventing data collisions. For this reason, when traffic remains local to each segment or workgroup, each user has more bandwidth available than if all the nodes are in one segment. On a physical link between the port on the switch and a workstation in a VLAN with very few nodes, data can be sent at almost 100 percent of the physical wire speed. The reason? Virtually no data collisions. If the VLAN contains many nodes, the broadcast domain is larger and more broadcasts must be processed by all ports on the switch belonging to each VLAN. The number of ports assigned to a VLAN make up the broadcast domain, which is discussed in the following section.
Broadcast Domains
In switched environments, broadcast domains consist of all the ports or collision domains belonging to a VLAN. In a flat network topology, your collision domain and your broadcast domain are all the interfaces in your segment or subnet. If no devices (such as a switch or a router) divide your network, you have only one broadcast domain. On some switches, the number of broadcast domains or VLANs that can be configured is almost limitless. VLANs allow a switch to divide the network segment into multiple broadcast domains. Each port becomes its own collision domain. Figure 1.5 shows an example of a properly switched network.
Figure 1.5: An example of a properly switched network. Note Switching technology complements routing technology, and each has its place in the network. The value of routing technology is most noticeable when you get to larger networks that utilize WAN solutions in the network environment.
bridged networks. To resolve the issue, your network administrator may even upgrade your PC to a faster CPU or more RAM. This allows your PC to generate more input/output (I/O), increasing the saturation on the network. In this type of environment, every data packet is sent to every machine, and each station has to process every frame on the network. The processors in the PCs handle this task, taking away from the processing power needed for other tasks. Every day, I visit users and networks with this problem. When I upgrade them to a switched network, it is typically a weekend job. The users leave on Friday with their highpowered Pentiums stacked with RAM acting like 486s. When they come back Monday morning, we hear that their computers boot up quickly and run faster, and that Internet pages come up instantly. In many cases, slow Internet access times were blamed on the users WAN connections. The whole time, the problem wasnt their WAN connectionsit was their LAN saturated to a grinding halt with frames from every interface on the network. When network performance gets this bad, its time to call in a Cisco consultant or learn how to implement switching. Either way, you are reading this book because you are very interested in switching or in becoming Cisco certified. Consider yourself a network hero of this generation in training. To fix the immediate problems on your 10BaseT network with Category 3 or Category 4 cabling, you might need to upgrade to Category 5 cabling and implement a Fast Ethernet network. Then you need to ask yourself, is this only a temporary solution for my network? What types of new technologies are we considering? Are we going to upgrade to Windows 2000? Will we be using Web services or implementing Voice Over IP? Do we have any requirements for using multicast, unicast, video conferencing, or CAD applications? The list of questions goes on. Primarily, you need to ask yourself if this is a temporary solution or one that will stand the test of time.
Unshielded TwistedPair Cable Category 3 unshielded twistedpair (UTP) is cable certified for bandwidths of up to 10Mbps with signaling rates of up to 16MHz. Category 4 UTP cable is cable certified for bandwidths of up to 16Mbps with signaling rates up to 20MHz. Category 4 cable is classified as voice and data grade cabling. Category 5 cabling is cable certified for bandwidths of up to 100Mbps and signaling rates of up to 100MHz. New cabling standards for Category 5e and Category 6 cable support bandwidths of up to 1Gbps.
In many cases, network administrators dont realize that implementing a switched network will allow your network to run at almost wire speed. Upgrading the backbone (not the wiring), eliminating the data collisions, making the network segments smaller, and getting those users off hubs and bridges is the answer. In terms of perport costs, this is usually a much cheaper solution. Its also a solution you can grow with. Of course, a 100Mbps network never hurts; but even a switched 10BaseT network that has been correctly implemented can have almost the same effect of providing your network with increased performance. Network performance is usually measured by throughput. Throughput is the overall amount of data traffic that can be carried by the physical lines through the network. It is measured by the maximum amount of data that can pass through any point in your network without suffering packet loss or collisions. Packet loss is the total number of packets transmitted at the speed of the physical wire minus the number that arrive correctly at their destination. When you have a large percentage of packet losses, your network is functioning less efficiently than it would if the multiple collisions of the transmitted data were eliminated. The forwarding rate is another consideration in network throughput. The forwarding rate is the number of packets per second that can be transmitted on the physical wire. For example, if you are sending 64byte packets on a 10BaseT Ethernet network, you can transmit a maximum of about 14,880 packets per second. 17
Poorly designed and implemented switched networks can have awful effects. Lets take a look at the effects of a flat area topology and how we can design, modify, and upgrade Ethernet networks to perform as efficiently as possible. Properly Switched Networks Properly switched networks use the Cisco hierarchical switching model to place switches in the proper location in the network and apply the most efficient functions to each. In the model you will find switches in three layers: Access layer Distribution layer Core layer Note Chapter 2 will introduce the layers at which each switch can be found and the basic configuration steps for both of the command line interfaces. The Access layers primary function is to connect to the endusers interface. It routes traffic between ports and broadcasts collision domain traffic to its membership broadcast domain. It is the access point into the network for the end users. It can utilize lowerend switches such as the Catalyst 1900, 2800, 2900, 3500, 4000, and 5000 series switches. The Access layer switch blocks meet at the Distribution layer. It uses mediumend switches with a little more processing power and stronger ASICs. The function of this layer is to apply filters, queuing, security, and routing in some networks. It is the main processor of frames and packets flowing through the network. Switches found at this layer belong to the 5500, 6000, and 6500 series. The Core layers only function is to route data between segments and switch blocks as quickly as possible. No filtering or queuing functions should be applied at this layer. The highestend Cisco Catalyst switches are typically found at this layer, such as the 5500, 6500, 8500, 8600 GSR, and 12000 GSR series switches. How you configure your broadcast and collision domainswhether in a switched network or a flat network topologycan have quite an impact on the efficiency of your network. Lets take a look at how utilization is measured and the different effects bandwidth can have on different media types and networks. Network Utilization Network administrators vary on the utilization percentage values for normal usage of the network. Table 1.1 shows the average utilization that should be seen on the physical wire. Going above these averages of network utilization on the physical wire is a sign that a problem exists in the network, that you need to make changes to the network configuration, or that you need to upgrade the network.
Table 1.1: The average limits in terms of physical wire utilization. Exceeding these values indicates a network problem. Utilization (%) Medium Type 100 Full duplex 90 to 100 FDDI 90 to 100 Switched LAN segments 60 to 65 WAN links 35 to 45 Nonswitched Ethernet segments or subnets 5 to 7 Collisions You can use a network monitor such as a sniffer to monitor your utilization and the type of traffic flowing through your network. Devices such as WAN probes let you monitor the traffic on the WAN.
18
Switched Forwarding
Switches route data based on the destination MAC address contained in the frames header. This approach allows switches to replace Layer 2 devices such as hubs and bridges. After a frame is received and the MAC address is read, the switch forwards data based on the switching mode the switch is using. This strategy tends to create very low latency times and very high forwarding rates. Switches use three switching modes to forward information through the switching fabric: Storeandforward Cutthrough FragmentFree Switching fabric is the route data takes to get from the input port on the switch to the output port on the switch. The data may pass through wires, processors, buffers, ASICs, and many other components. StoreandForward Switching Pulls the entire packet received into its onboard buffers, reads the entire packet, and calculates its cyclic redundancy check (CRC). It then determines if the packet is good or bad. If the CRC calculated on the packet matches the CRC calculated by the switch, the destination address is read and the packet is forwarded out the correct port on the switch. If the CRC does not match the packet, the packet is discarded. Because this type of switching waits for the entire packet before forwarding, latency times can become quite high, which can result in some delay of network traffic. CutThrough Switching Sometimes referred to as realtime switching or FastForward switching, cutthrough switching was developed to reduce the latency involved in processing frames as they arrive at the switch and are forwarded on to the destination port. The switch begins by pulling the frame header into its network interface card buffer. As soon as the destination MAC address is known (usually within the first 13 bytes), the switch forwards the frame out the correct port. This type of switching reduces latency inside the switch; however, if the frame is corrupt because of a late collision or wire interference, the switch will still forward the bad frame. The destination receives the bad frame, checks its CRC, and discards it, forcing the source to resend the frame. This process will certainly waste bandwidth; and if it occurs too often, major impacts can occur on the network. In addition, cutthrough switching is limited by its inability to bridge different media speeds. In particular, some network protocols (including NetWare 4.1 and some Internet Protocol [IP] networks) use windowing technology, in which multiple frames may be sent without a response. In this situation, the latency across a switch is much less noticeable, so the onthefly switch loses its main competitive edge. In addition, the lack of error checking poses a problem for large networks. That said, there is still a place for the fast cutthrough switch for smaller parts of large networks. FragmentFree Switching Also known as runtless switching, FragmentFree switching was developed to solve the latecollision problem. These switches perform a modified version of cutthrough switching. Because most corruption in a packet occurs within the first 64 bytes, the switch looks at the entire first 64 bytes to get the destination MAC address, instead of just reading the first 13 bytes. The minimum valid size for an Ethernet frame is 64 bytes. By verifying the first 64 bytes of the frame, the switch then determines if the frame is good or if a collision occurred during transit. Tip
19
Combining Switching Methods To resolve the problems associated with the switching methods discussed so far, a new method was developed. Some switches, such as the Cisco Catalyst 1900, 2820, and 3000 series, begin with either cutthrough or FragmentFree switching. Then, as frames are received and forwarded, the switch also checks the frames CRC. Although the CRC may not match the frame itself, the frame is still forwarded before the CRC check and after the MAC address is reached. The switch performs this task so that if too many bad frames are forwarded, the switch can take a proactive role, changing from cutthrough mode to storeandforward mode. This method, in addition to the development of highspeed processors, has reduced many of the problems associated with switching. Only the Catalyst 1900, 2820, and 3000 series switches support cutthrough and FragmentFree switching. You might ponder the reasoning behind the faster Catalyst series switches not supporting this seemingly faster method of switching. Well, storeandforward switching is not necessarily slower than cutthrough switchingwhen switches were first introduced, the two modes were quite different. With better processors and integratedcircuit technology, storeandforward switching can perform at the physical wire limitations. This method allows the end user to see no difference in the switching methods.
Figure 1.6: A switched network with only two servers. Notice that the sheer number of clients sending data to the servers can overwhelm the cable and slow the data traffic.
20
Many types of physical media topologies can be applied to this concept. In this demonstration, we will utilize Ethernet 100BaseT. Ethernet 10BaseT and 100BaseT are most commonly found in the networks of today. Well make an upgrade to the network and alleviate our bottleneck on the physical link from the switch to each resource node or server. By upgrading this particular link to a Gigabit Ethernet link, as shown in Figure 1.7, you can successfully eliminate this bottleneck.
Figure 1.7: The addition of a Gigabit Ethernet link on the physical link between the switch and the server. It would be nice if all network bottleneck problems were so easy to solve. Lets take a look at a more complex model. In this situation, the demand nodes are connected to one switch and the resource nodes are connected to another switch. As you add additional users to switch A, youll find out where our bottleneck is. As you can see from Figure 1.8, the bottleneck is now on the trunk link between the two switches. Even if all the switches have a VLAN assigned to each port, a trunk link without VTP pruning enabled will send all the VLANs to the next switch.
Figure 1.8: : A new bottleneck on the trunk link between the two switches. To resolve this issue, you could implement the same solution as the previous example and upgrade the trunk between the two switches to a Gigabit Ethernet. Doing so would eliminate the bottleneck. You want to put switches in place whose throughput is never blocked by the number of ports. This solution is referred to as using nonblocking switches.
21
We call a switch a blocking switch when the switch bus or components cannot handle the theoretical maximum throughput of all the input ports combined. There is a lot of debate over whether every switch should be designed as a nonblocking switch; but for now this situation is only a dream, considering the current pricing of nonblocking switches.
Lets get even more complicated and introduce another solution by implementing two physical links between the two switches and using fullduplexing technology. Full duplex essentially means that you have two physical wires from each portdata is sent on one link and received on another. This setup not only virtually guarantees a collisionfree connection, but also can increase your network traffic to almost 100 percent on each link. You now have 200 percent throughput by utilizing both links. If you had 10Mbps on the wire at half duplex, by implementing full duplex you now have 20Mbps flowing through the wires. The same thing goes with a 100BaseT network: Instead of 100Mbps, you now have a 200Mbps link. Tip If the interfaces on your resource nodes can implement full duplex, it can also be a secondary solution for your servers. Almost every Cisco switch has an acceptable throughput level and will work well in its own layer of the Cisco hierarchical switching model or its designed specification. Implementing VLANs has become a popular solution for breaking down a segment into smaller collision domains. Internal Route Processor vs. External Route Processor Routing between VLANs has been a challenging problem to overcome. In order to route between VLANs, you must use a Layer 3 route processor or router. There are two different types of route processors: an external route processor and an internal route processor. An external route processor uses an external router to route data from one VLAN to another VLAN. An internal route processor uses internal modules and cards located on the same device to implement the routing between VLANs. Now that you have a pretty good idea how a network should be designed and how to monitor and control bottlenecks, lets take a look at the general traffic rule and how it has changed over time.
22
FullDuplex Ethernet
Prior to the introduction of fullduplex (FDX) Ethernet, Ethernet stations could either transmit or receive data; they could not do both at the same time, because there was no way to ensure a collisionfree environment. This was known as halfduplex (HDX) operation. FDX has been a feature of WANs for years, but only the advent of advances in LAN switching technology made it practical to now consider FDX on the LAN. In FDX operation, both the transmission and reception paths can be used simultaneously. Because FDX operation uses a dedicated link, there are no collisions, which greatly simplifies the MAC protocol. Some slight modifications in the way the packet header is formatted enable FDX to maintain compatibility with HDX Ethernet. You dont need to replace the wiring in a 10BaseT network, because FDX operation runs on the same twopair wiring used by 10BaseT. It simultaneously uses one pair for transmission and another pair for reception. A switched connection has only two stations: the station itself and the switch port. This setup makes simultaneous transmission possible and has the net effect of doubling a 10Mbps LAN. This last point is an important one. In theory, FDX operation can provide double the bandwidth of HDX operation, giving 10Mbps speeds in each direction. However, achieving this speed would require that the two stations have a constant flow of data and that the applications themselves would benefit from a twoway data flow. FDX links are extremely beneficial in connecting switches to each other. If there were servers on both sides of the link between switches, the traffic between switches would tend to be more symmetrical.
Fast Ethernet
Another early innovation in the switching industry was the development of Fast Ethernet. Ethernet as a technology has been around since the early 1970s, but by the early 1990s its popularity began to wane. Competing technologies such as FDDI running at 100Mbps showed signs of overtaking Ethernet as a de facto standard, especially for highspeed backbones. Grand Junction, a company founded by many of the early Ethernet pioneers, proposed a new Ethernet technology that would run at 10 times the 10Mbps speed of Ethernet. They were joined by most of the top networking companieswith the exception of HewlettPackard (HP), which had a competing product. HPs product, known as 100Mbps VG/AnyLAN, was in most respects far superior to the product proposed by Grand Junction. It had a fatal flaw, though: It was incompatible with existing Ethernet standards and was not 23
backward compatible to most of the equipment in use at the time. Although the standards bodies debated the merits of each of the camps, the marketplace decided for them. Fast Ethernet is the overwhelming winner, so much so that even HP sells Fast Ethernet on almost all its products. Note In 1995, Cisco purchased both Kalpana and Grand Junction and incorporated their innovations into its hardware. These devices became the Catalyst line of Cisco products.
Gigabit Ethernet
In order to implement Gigabit Ethernet (GE), the CSMA/CD method was changed slightly to maintain a 200meter collision diameter at gigabitpersecond data rates. This slight modification prevented Ethernet packets from completing transmission before the transmitting station sensed a collision, which would violate the CSMA/CD rule. GE maintains a packet length of 64 bytes, but provides additional modifications to the Ethernet specification. The minimum CSMA/CD carrier time and the Ethernet slot time have been extended from 64 bytes to 512 bytes. Also, packets smaller than 512 bytes have an extra carrier extension added to them. These changes, which can impact the performance of small packets, have been offset by implementing a feature called packet bursting, which allows servers, switches, and other devices to deliver bursts of small packets in order to utilize the available bandwidth. Because it follows the same form, fit, and function as its 10 and 100Mbps predecessors, GE can be integrated seamlessly into existing Ethernet and Fast Ethernet networks using LAN switches or routers to adapt between the different physical line speeds. Because GE is Ethernet, only faster, network managers will find the migration from Fast Ethernet to Gigabit Ethernet to be as smooth as the migration from Ethernet to Fast Ethernet.
Avoiding ForkLift Upgrades Although dedicated switch connections provide the maximum benefits for network users, you dont want to get stuck with forklift upgrades. In a forklift upgrade, you pay more to upgrade your computer or networking equipment than it would cost to buy the equipment already installed. The vendor knows that you are not going to buy all new equipment, so the vendor sells you the upgrade at an enormous price. In order to exchange it for the bigger, better, faster equipment It may sometimes be necessary to support legacy equipment. Fortunately for Ethernet switches you can provide connectivity in a number of ways. You can attach shared hubs to any port on the switch in the same manner that you connect end stations. Doing so makes for a larger collision domain, but you avoid paying the high costs of upgrades. Typically, your goal would be to migrate toward singlestation segments as bandwidth demands increase. This migration will provide you with the increased bandwidth you need without wholesale replacement of existing equipment or cabling. In this lower cost setup, a backbone switch is created in which each port is attached to the nowlarger collision domain or segment. This switch replaces existing connections to routers or bridges and provides communication between each of the shared segments.
devices run the same IOS. Some use a graphical interface, some use a Set/Clear commandline interface, and some use a Cisco Command Line Interface (CLI). Cisco has acquired more devices than they have designed and built themselves. Therefore, Cisco has adapted the operating systems designed for each device they have acquired to use the protocols and standards of the company. Almost all Cisco routers run the same IOS, but only about half of the switches currently run the Cisco CLI IOS. Knowing what configuration mode you are in and how to enter each configuration mode on the Cisco CLI is important. Recognizing what each mode configures will aid you in using the proper configuration mode. The Set/Clear commandbased IOS is similar in modes, but uses the enable, set, show, and clear commands (covered in the next chapter).
25
Lets take a look at the commands available in the User EXEC mode of a Cisco Catalyst 1912 EN switch:
SeansSwitch>? Exec commands: enable Turn on privileged commands exit Exit from the EXEC help Description of the interactive help system ping Send echo messages session Tunnel to module show Show running system information terminal Set terminal line parameters SeansSwitch>
Reset functions Enter configuration mode Copy configuration or firmware Reset configuration Turn off privileged commands Turn on privileged commands Exit from the EXEC Description of the interactive help system Enter menu interface Send echo messages Halt and perform warm start Tunnel to module Show running system information Set terminal line parameters VLAN membership configuration
Set address violation action Enable back pressure Configure port grouping using bridge groups Global CDP configuration subcommands Enable CGMP Enable enhanced congestion control Modify enable password parameters Exit from configure mode Exit from configure mode Description of the interactive help system Set the systems network name Select an interface to configure Global IP configuration subcommands Configure a terminal line Configure options for logging in Configure the mac address table Set port monitoring Enables multicast store and forward Set the network port Negate a command or set its defaults Configure Fast EtherChannel Routing information protocol configuration Configuration Command
26
snmpserver spantree spantreetemplate stormcontrol switchingmode tacacsserver tftp uplinkfast vlan vlanmembership vtp SeansSwitch(config)#
Modify SNMP parameters Spanning tree subsystem Set bridge template parameter Configure broadcast storm control parameters Sets the switching mode Modify TACACS query parameters Configure TFTP Enable Uplink fast VLAN configuration VLAN membership server configuration Global VTP configuration commands
Notice that as you progress through the modes on the Cisco IOS, more and more commands become available. Tip If your switch does not boot correctly, it may mean that you are in ROM Configuration mode, which is covered in Chapter 2.
The Challenges
Sending data effectively through the network is a challenge for network designers and administrators regardless of the LAN topology. The first dataprocessing environments consisted mostly of timesharing networks that used mainframes and attached terminals. Communications between devices were proprietary and dependent on your equipment vendor. Both IBMs System Network Architecture (SNA) and Digitals network architecture implemented such environments. In todays networks, highspeed LANs and switched internetworks are universally used, owing largely to the fact that they operate at very high speeds and support such highbandwidth applications as voice and video conferencing. Internetworking evolved as a solution to three key problems: isolated LANs, duplication of resources, and a lack of network management. Implementing a functional internetwork is no simple task. You will face many challenges, especially in the areas of connectivity, reliability, network management, and flexibility. Each area is important in establishing an efficient and effective internetwork. The challenge when connecting various systems is to support communication between disparate technologies. Different sites, for example, may use different types of media, or they may operate at varying speeds. Reliable service is an essential consideration and must be maintained in any internetwork. The entire organization sometimes depends on consistent, reliable access to network resources to function and to prosper. Network management must provide centralized support and troubleshooting capabilities. Configuration, security, performance, and other issues must be adequately addressed for the internetwork to function smoothly. Flexibility, the final concern, is necessary for network expansion and new applications and services, among other factors.
Todays Trend
In todays networks, the trend is to replace hubs and bridges with switches. This approach reduces the number of routers connecting the LAN segments while speeding the flow of data in the network. A smart network administrator uses switches to inexpensively increase network bandwidth and ease network administration. A switch is a lowcost solution to provide more bandwidth, reduce collisions, filter traffic, and contain broadcasts. But, switches dont solve all network routing problems. Routers provide a means of connecting 27
multiple physical topologies, restricting broadcasts, and providing network security. Using switches and routers together, you can integrate large networks and provide a high level of performance without sacrificing the benefits of either technology.
To enter Privileged EXEC mode, use the following command. You will notice that the prompt changes to indicate that you are in Privileged EXEC mode:
Switch>enable Switch>(enable)
To exit Privileged Exec mode and return to User EXEC mode, use the disable command.
To exit Global Configuration mode and return to Privileged Exec mode, you can use the end or exit command, or press Ctrl+Z.
To exit to Global Configuration mode, use the exit command or press Ctrl+Z.
28
Tip You can abbreviate any command as much as you want, as long as it remains unique (no other command exists that matches your abbreviation). For instance, the command interface e0.1 can be abbreviated as int e0.1. To exit to Global Configuration mode, use the exit command or press Ctrl+Z. Tip Entering a question mark (?) in any mode will display the list of commands available for that particular mode. Typing any command followed by a question marksuch as clock ?will list the arguments associated with that command. You can also type the first few letters of a command immediately followed by a question mark. This will list all the commands starting with the entered letters.
29
CommandLine Interfaces
The most common interface found on the Cisco Catalyst line of switches is the original Crescendo interface (named for the vendor Cisco purchased). This interface is often termed the Set/Clear commandbased switch, because these switches are limited to set, clear, and show commands. The Crescendo interface can be found in the following switches: Catalyst 2900G series Catalyst 2926 Catalyst 4000 series Catalyst 5000 series Catalyst 5500 series Catalyst 6000 series Catalyst 6500 series A second type of interface is found on more recent models. It is called the CommandLine Interface (CLI). The Enterprise Edition Software of these switches uses the standard Cisco Internetwork Operating System (IOS), which is virtually identical to the IOS found on Ciscos line of routers. The CLI can be found on the following switches: Catalyst 1900 series Catalyst 2820 series Catalyst 2900 XL series Catalyst 8500 GSR series Catalyst 12000 GSR series A third type of interface is found on Ciscos legacy switches. These devices have a menudriven interface that you use to enter commands. The menu selections are fairly intuitive, so you dont have to memorize a lot of commands to get around the switches. The interface is found on these switches: Catalyst 1900 series Catalyst 2820 series Catalyst 3000 series On each of the three different interfaces of Cisco Catalyst switch IOSs, you will need to perform certain common configuration tasks in order to configure the switch initially. Unless your switch was preconfigured, in most cases you will need to connect to the console port to begin the initial configuration of the device. After the switch has been powered on and has completed its power on self test (POST) sequence, its a good idea to assign the switch a hostname to help to identify the switch. Doing so is particularly useful if you have multiple switches at multiple layers of the network. You should choose a name that identifies the switch type and its placement in the network. For example, if two Cisco Catalyst 5000 switches are on the third floor of your building, you might want to name the second switch 50002FL3. So long as you use the same naming convention on all the switches in your network, they will be easy to identify when youre configuring them remotely. 30
For security reasons, you should change the default password and add an enable password on the Crescendo and IOS CLIbased interface switches. In the next stage of the configuration, you should assign an IP address, subnet mask, and default route to the route processor for routing and management purposes. Once you have finished the preceding basic steps, you can connect the switch to the rest of the local network. You can use many different types of physical media, such as Ethernet, Fast Ethernet, and Gigabit Ethernet. Switches have two types of connections: the connection to the switch console where you can initially configure the switch or monitor the network, and the connection to an Ethernet port on the switch. Different classifications of switches permit the switches to be placed in different layers of the network architecture. Cisco prefers to use a hierarchal campus model for switches, to break down the complexity of the network.
Queuing Queuing is a way of withholding bandwidth from one data process to provide a guarantee of bandwidth for another. You can define queuing priorities for different traffic types; these priorities can be used in many networking environments that require multiple highpriority queues, including Internet Protocol (IP), Internetwork Packet Exchange (IPX), and System Network Architecture (SNA) environments. Queues are provided dynamically, which means that traffic can filter through the switch or router without congestionbandwidth is not withheld from use by queues. Queuing offers a number of different types of configurations and ways to base traffic to be queued: Cisco comes out with new solutions frequently. Here are a few of the most frequently used and recommended ways to control traffic: First in, first out (FIFO)The queuing method most network administrators are familiar with. It allows for buffering control, storing data traffic in buffers and then releasing it slowly when congestion occurs on the network. This type of queuing works well on LANs where a switch or router is the demarcation point for a highspeed link and a slower link. Priority queuing (PQ)Provides absolute preferential treatment, giving an identified type of data traffic higher priority than other traffic. This method ensures that critical data traffic traversing various links gets priority treatment over other types of data traffic. PQ also provides a faster response time than other methods of queuing. Although you can enable priority output queuing for any interface, it is best used for lowbandwidth, congested serial interfaces. Remember that PQ introduces extra overhead, which is acceptable for slow interfaces but may not be acceptable for highspeed interfaces. Custom queuing (CQ)Based on a packet or application identifier. This type of queuing is different from PQ in that it assigns a varying window of bandwidth to each source of incoming bandwidth, assigning each window to a queue. The switch then services each queue in a roundrobin fashion. 31
Weighted fair queuing (WFQ)Allows for multiple queues so that no one queue can starve another of all its bandwidth. WFQ is enabled by default on all serial interfaces that run at or below 2Mbps, except for those interfaces with Link Access Procedure, Balanced (LAPB), X.25, or Synchronous Data Link Control (SDLC) encapsulations. Most networks fail when their design creates unstable network links, hardware failures, or routing loops. When a failure occurs in such a network, and then the network does not converge in time to prevent a major problem for network processes or users, redundancy must be built in.
When designing a network using the Cisco campus hierarchical switching model, you create redundancy; doing so aids in the case of a network failure by providing logical points to aggregate and summarize network traffic. This setup prevents a failure in one part of the network from affecting the entire enterprise network. This model divides the network into three distinct layers: Access layerThe first layer, which is the first point of access for the end user interface. This layer passes traffic from the end user interface to the rest of the network. Security at this layer is portbased and provides verification of an authentic MAC address, local device security, and access lists. Distribution layerThe second layer, which serves to combine the traffic of the Access layer, summarize traffic, and combine routes. This layer also processes data traffic and applies security and queuing policies, allowing data traffic to be filtered and providing a guarantee of bandwidth availability for certain traffic. Core layerReads headers and forwards traffic as quickly as possible through the network. This is its only function. This layer needs to have high reliability and availability because any losses at this layer can greatly affect the rest of the network. The Cisco campus hierarchical switching model is depicted in Figure 2.1.
Access Layer
The Access layer provides some important functionality, such as shared bandwidth, switched bandwidth, Media Access Control (MAC) layer filtering, and microsegmentation. Two goals of this layer are to pass traffic to the network for valid network users and to filter traffic that is passed along. The Access layer switch connects the physical wire from the end user interface, thereby providing the means to connect to the devices located on the Distribution layer. It provides connections to both the local LAN and remote devices. The Access layer is the entry point to the network. This layer makes security and policy decisions and becomes the logical termination point for virtual private networks (VPNs).
Distribution Layer
The Distribution layer is the demarcation point between the Access and Core layers. This layer terminates network traffic that originates in the Access layer and then summarizes the traffic before passing it along to the highest Core layer. The Distribution layer also provides policybased network connectivity, such as queuing and data termination.
32
The Distribution layer defines the boundaries for the network and provides packet manipulation of the network traffic. It aids in providing isolation from topology changes such as media translations, defining broadcast domains, QoS, security, managing the size of the routing table, aggregating network addresses, static route distribution, dynamic route redistribution, remote site connectivity, and interdomain traffic redistribution.
Core Layer
The Core layer is designed to do one thing and one thing only: It switches packets at the fastest possible speed, providing the final aggregation point for the entire network. The devices at this layer must be fast and reliable. They should contain the fastest processors in the network. Connections at the Core layer must be of the highest possible bandwidth. The Core layer makes no decisions about packet filtering or policy routing for two basic reasons. First, any filtering or policy decisions at this layer will add to the processing requirements of the system, thereby introducing latency in forwarding packets. Second, any forwarding mistakes at this level will severely impact the rest of the network. Devices placed in the Core layer should be able to reach any device in the network. This doesnt mean that they have to have a physical link directly to each device, but all devices must be reachable in the routing table. To prevent Core layer devices from having a path to every device in their routing tables, you should use network route summarization, which means defining the available routes for data traffic. If the Core layer is poorly designed, network instability can easily develop due to the demands placed on the network at this layer. A good tool in your toolbox to determine some of the problems in your network is Remote Monitoring.
RMON provides support for the following groups of Token Ring extensions: MACLayer Statistics GroupA collection of statistics from the MAC sublayer of the Data Link layer, kept for each Token Ring interface. This group collects information such as the total number of MAC layer packets received and the number of times the port entered a beaconing error state. Promiscuous Statistics GroupA collection of promiscuous statistics kept for nonMAC packets on each Token Ring interface. This group collects information such as the total number of good nonMAC frames received that were directed to a Logical Link Control (LLC) broadcast address. Ring Station GroupA collection of statistics and status information associated with each Token Ring station on the local ring. This group also provides status information for each ring being monitored. Ring Station Order GroupA list of the order of stations on the monitored Token Ring networks rings. To see a list of available commands, use the ? command. Table 2.1 provides a list of the ROM commandline interface commands and a brief description of each.
Table 2.1: ROM commandline interface commands. Command alias boot confreg dev dir history meminfo repeat reset set sync unalias unset=varname varname=value Description Configures and displays aliases Boots up an external process Configures the configuration register utility Shows device IDs available on a platform Shows files of the named device Shows the last 16 commands Shows switch memory information Repeats a specified command Performs a switch reboot/reset Shows monitor variable names with their values Saves the ROM monitor configuration Deletes the alias name and associated value from the alias list Deletes a variable name from the variable list Assigns a value to a variable
34
Figure 2.2: The different types of console ports on the switches. The console port must be accessed through a PC or another device (such as a dumb terminal) to view the initial configuration. From the console port, you can configure other points of entrysuch as the VTY line portsto allow you to use Telnet to configure the switch from other points in your network. On switches where the console port is an RJ45 port, you must plug a rolled RJ45 cable straight into the port. If it is a DB25 port, you must use an RJ45toDB25 connector to connect. If the switch uses a DB9 port, you will need a DB9toRJ45 connector. Fortunately, these connectors come with every switchyou only need to know which connector and cables to use. Whatever the type of console port in use on the switch, you will need to connect an RJ45 cable from the console port or connector to the dumb terminal or PC. On a PC, you can use a thirdparty program to gain access, such as HyperTerminal (included with most Microsoft Windows operating systems). Note The HyperTerminal version included with Microsoft Windows is very limited. One of its most notable limitations is its failure to perform the break command, which does not allow you to obtain a lost password from some switches and routers. You can download an upgrade to HyperTerminal from the Hilgraeve Web site, http://www.hilgraeve.com;/ the upgrade will allow you to use this feature.
7 8
RJ45 8 7 6 5 4 3 2 1
Console Connectors
Different console adapters connect different interfaces in order to connect to the console port. The following are the types of console connectors for each switch: Catalyst 1900, 2820, and 2900 XL series switches each have an RJ45 console port. You can connect to the console port using a straightthrough Category 5 cable. The Catalyst 3000 uses a DB9 connector to access the console port. The Catalyst 5000 line uses a Supervisor Engine. To connect a console to a Supervisor Engine I or II, use a DB25 connection. If the switch uses a Supervisor Engine III, use the RJ45toRJ45 rollover cable. The Catalyst 6000 family also uses a Supervisor Engine with an RJ45 style connector and an RJ45toRJ45 straightthrough cable. The Catalyst 6500 uses a rolled cable from the console port. You can use a number of connectors when connecting different devices using your rolled or straightthrough cable: To connect a PC to any console cable, attach the RJ45toDB9 female Data Terminal Equipment (DTE) adapter to one of the ninepin serial ports on the PC. To attach to a Unix workstation, use the RJ45toDB25 Data Communications Equipment (DCE) adapter (female). To connect a modem to the console port, use the RJ45toDB25 (male) adapter. Console port settings by default are 9600 baud, 8 data bits, 1 stop bit, and no parity. Normally, all three connectors will come with your switch. You will need to use the appropriate adapter for the device with which you are configuring your switch. Cisco uses two types of RJ45toDB25 connectors: the DCE style (used for modem connections) and the DTE style (used to connect to terminals or PCs). Note
Table 2.4: The RJ45toAUX port DB9 connector signal appointments for each pin. 36
Pin Signal 1 RTS 2 DTR 3 TXD 4 GND 5 GND 6 RXD 7 DSR 8 CTS Table 2.5: The RJ45toDB9 AUX port pinouts by color.
Color RJ45 DB9 Brown 1 6 Blue 2 7 Yellow 3 2 Green 4 5 Red 5 5 Black 6 3 Orange 7 4 White 8 8 Table 2.6 shows the connectors most often used for modem connections. Table 2.7 shows the connectors most often used with Unix workstation connections to the console port.
Table 2.6: DCE connector pinouts for an RJ45 to a DB25 male. RJ45 DCE 1 5 2 8 3 3 4 7 5 7 6 2 7 20 8 4 Table 2.7: DTE connectors for an RJ45 to a DB25 female. RJ45 DTE 1 4 2 20 3 2 4 7 5 7 6 3 7 6 8 5 In the event that you need a DB25toDB9 connector, Table 2.8 shows the pinouts.
37
Table 2.8: DB25toDB9 connector pinouts. DB25 2 3 4 5 6 7 8 20 Signal TXD RXD RTS CTS DSR GND DCD DTR DB9 3 2 7 8 6 5 1 4
Switch IOSs
Three types of Cisco operating systems are in use: Set/Clear command interfaceFound on models of the Catalyst 2926, 2926G, 2948G, 2980G, 4000, 5000, 5500, 6000, and 6500 series of switches. They are called Set/Clear because most commands on the switches start with set, clear, or show. Cisco IOSbased Command Line InterfaceMost closely resembles a Cisco routers IOS Command Line Interface. This interface is found on Catalyst 1900EN, 2820, 2900 XL, 8500, and 12000 series models. MenudrivenFound exclusively on the Catalyst 1900SE, 2820SE, 3000, 3100, and 3200 series switches. You have to do very little in order to get a Cisco switch to work. By default, the Set/Clear command set switches and the Cisco CLI IOS interface switches have the following default attributes: The prompt name is set to Console>. No hostname is configured. No passwords are set. All ports default to VLAN1. The console port has no IP information. No contact name or location information is defined. RMON is disabled. SNMP traps are disabled. SNMP community strings are set Public for readonly, Private for readwrite, and Secret for readwriteall access. VLAN Trunking Protocol (VTP) mode is set to Server. No VTP domain or password is configured. All VLANs are eligible for trunking. InterSwitch Link (ISL) defaults to Auto.
Privileged EXEC modeThe Privileged command set includes those commands contained in User EXEC mode, as well as the configure command, through which you can access the remaining command modes. Privileged EXEC mode also includes highlevel testing commands, such as debug. Global Configuration modeGlobal Configuration mode commands apply to features that affect the system as a whole. Use the configure privileged EXEC command to enter Global Configuration mode. Interface Configuration modeMany features are enabled on a perinterface basis. Interface Configuration commands modify the operation of an interface such as an Ethernet port or a VLAN.
Configuring Passwords Passwords can be configured on every access method to a Cisco Catalyst switch. Passwords can be applied to the console port, auxiliary (AUX) port, and VTY lines.
Related solutions: Creating a Standard Access List Creating an Extended Access List Enabling Port Security
2. You should assign an enable password for each configured privilege level. To assign the password a privilege level of 3, use the following command:
5000RSM(config)# enable secret level 3 sean1
3. To get into the switch, I will now use the following command:
5000RSM(config)# username seano password sean1
To allow users with privilege level 3 a specific command syntax for debug, such as debug ip, use the following command:
5000RSM1(config)# privilege exec level 3 debug ip 5000RSM1(config)#
Note Privilege level 0 includes five commands: disable, enable, exit, help, and logout.
40
The timeout value is now set to five minutes, using seconds. Tip You can use the lock command to lock an unused Telnet session. After you issue the lock command, the system will ask you to enter and verify an unlocking password.
To configure a Set/Clear commandbased switch to five minutes, use the following command:
CAT5009(enable) set logout 5
To configure the timeout value to five minutes on the console port of an IOSbased route processor or router, use the following command:
5000RSM(config)# line console 0 5000RSM(configline)# exectimeout 5
Tip To configure seconds beyond a minute, you can add an additional value to the command. For example, if you want the exectimeout to be 5 minutes and 10 seconds, the command is exectimeout 5 10.
41
The auto command can be used when the port on the other side is manually set. Links should not be configured with the auto setting on both devices connecting the links because both sides will try to determine the speed on the other side of the link and neither will agree. You can change the port duplex from full duplex to half duplex, as shown in the following commands:
CORIOLIS8500(config) interface fastethernet 0/1 CORIOLIS8500(configint) speed auto CORIOLIS8500(configint) duplex half
Logging On to a Switch
To begin configuring your switch, do the following: 1. Connect the console cable and connector to a terminal or PC and power on the switch. The switch will then go through its initial POST, which runs diagnostics and checks for the reliability of the switch components. 2. Once the POST has completed successfully, the initial prompt should show a User EXEC mode prompt:
Enter Password:
3. No password has been configured at this point, so just press the Enter key to continue. 4. Cisco switches have two levels of access by default: User EXEC mode and Privileged EXEC mode. User EXEC mode will allow you to do some basic tasks, such as show the port or VLAN information. To get more advanced configuration options, you will need to enter Privileged EXEC mode. Use the following command to enter Privileged EXEC mode: 42
5. Because you have not yet set a Privileged EXEC mode password, pressing Enter will put you into Privileged EXEC mode. The console will show the following prompt:
Console> (enable)
You are now in Privileged EXEC mode. Warning Starting here, all configuration changes are executed and saved to memory immediately.
2. Now add an additional layer of security by changing the password to enter Privileged EXEC mode on your switch. It looks similar to the User EXEC mode change. For security purposes, the password will be masked. To change the Privileged EXEC mode password, enter the following (set the password as noone):
Console> (enable) set enablepass Enter old password: <press enter> Enter new password: noone Retype new password: noone Password changed.
At any time, you can type ? or help to access the CLI help facility. For help on specific commands, you can enter the command followed by a question mark; for example, set ? or set help. Related solutions: Found on page: Creating a Standard Access List 402 Creating an Extended Access List 403 Enabling Port Security 411
Tip
Remember, you are still in Privileged EXEC mode, and the change will take place immediately.
43
For example, to set up a console with the IP address 68.187.127.1 and a netmask of 255.255.255.0 in VLAN2, you would enter the following command:
Console (enable) set interface sc0 2 68.187.127.1 255.255.255.0 Interface sc0 vlan set, IP address and netmask set.
Note It is only necessary to enter the broadcast address if the address entered is something other than a Class A, B, or C address. Serial Line Internet Protocol (SLIP) access can also be set up for the console port. SLIP is an older method of connecting to network devices. When you configure the SLIP (sl0) interface, you can open a pointtopoint connection to the switch through the console port from a workstation. The command syntax for configuring a SLIP interface is:
set interface sl0 slip_addr dest_addr
The console port must be used for the SLIP connections. If you use the console port to access the switch when you enter the slip attach command, you will lose the console port connection. When the SLIP connection is enabled and SLIP is attached on the console port, an Electronic Industries Association/Telecommunications Industry Association232 (EIA/TIA232) or dumb terminal cannot connect through the console port. To see the interface IP information that has been configured, use the following command:
Console> (enable) show interface sl0: flags=51<UP,POINTOPOINT,RUNNING> slip 68.187.127.1 dest 68.187.127.2
44
sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 68.187.127.1 netmask 255.255.255.0 broadcast 68.187.127.1 Console> (enable)
The primary gateway: 68.187.127.1 Destination Gateway RouteMask default 68.187.127.1 0x0 default 68.187.127.2 0x0
Flags UG G
Use 100 0
You can also enter multiple ports consecutive port numbers. The following example configures ports 1 through 8 on the same line card used in the previous example to 100Mbps:
45
SeansSwitch (enable) set <mod/port> SeansSwitch (enable) set auto <port_speed> SeansSwitch (enable) set Ports 2/18 transmission SeansSwitch (enable)
port speed ? Module number and Port number(s) port speed 2/1 ? Set speed to auto Port speed (4, 10, 16, 100 or 1000) port speed 2/18 100 speed set to 100Mbps.
To manually configure a line card port to full duplex, use the following command:
SeansSwitch <mod/port> SeansSwitch full half SeansSwitch Port(s) 2/1 SeansSwitch (enable) set port duplex ? Module number and Port number(s) (enable) set port duplex 2/1 ? Full duplex Half duplex (enable) set port duplex 2/1 full set to fullduplex. (enable)
Note The possible syntaxes are full or half, representing full duplex or half duplex.
Enabling SNMP
SNMP is used by SNMP management stations to monitor network devices such as switches. By configuring operating thresholds, you can configure SNMP to generate trap messages when changes or problems occur on a switch. There are three levels of access for configuring SNMP. The levels of access are defined by the information configured on the switch; the accessing management station must abide by those given sets of rights. The levels can be defined with community string configuration or by trap receivers, as follows: ReadonlyAllows management stations to read the SNMP information but make no configuration changes. ReadwriteAllows management stations to set SNMP parameters on the switch with the exception of community strings. ReadwriteallAllows complete access to the switch. The SNMP management stations can alter all information and community strings. The following commands are examples of how to configure all three types of access and set the functions of the SNMP management stations:
Console> (enable) set snmp community readonly public SNMP readonly community string set to public. Console> (enable) set snmp community readwrite public2 SNMP readwrite community string set to public2. Console> (enable) set snmp community readwriteall public3 SNMP readwriteall community string set to public3.
46
Figure 2.3: : The main menu of the menudriven IOS. 2. Because you are going to configure the switch, choose the Configuration option. You are presented with two options. You can choose either Serial Link Configuration to configure the console port, or Telnet Configuration to configure Telnet. When you enter the Configuration menu, you will notice that you are given the option to configure your switch for options that are not available without certain addon or module cards for your switch. This is more evident if you have the Enhanced Feature Set, which is now the standard for the Cisco 3000 series. Without the Enhanced Feature Set, you will not have VLAN and EtherChannel menu options. In this example youll be configuring a Cisco 3000 series switch with the Enhanced Feature Set, as depicted in Figure 2.4.
Figure 2.4: The Configuration menu of the menudriven IOS. If you make a mistake in your configuration, you can use Ctrl+P to exit the switch without saving changes. Use the Exit Console or Return To Previous Menu option to save your changes and exit the switch configuration mode. 3. You have the option of choosing a timeout value for the console session. If you would like to disable timeouts, enter a zero. Otherwise, enter a time in minutes from 1 to 1,440. 47 Tip
Configuring Telnet
To configure Telnet, do the following: 1. Using a Telnet emulator supporting VT100 or VT200, use Telnet to access your switch configuration. 2. Choose Configuration|Console Configuration. The Telnet Configuration screen appears. This screen allows you to configure three options: The number of Telnet sessions allowed simultaneously, from 0 to 5 The switch to disallow new Telnet sessions The ability to terminate all Telnet sessions Tip Disallowing new Telnet sessions is a great feature to invoke when you are configuring or upgrading the switch. That way, another administrator cant come in and try to change the configuration while you are working on the switch.
48
Figure 2.6: The menudriven VLAN IP configuration screen. Related solutions: Found on page: Creating a Standard Access List 402 Creating an Extended Access List 403 Enabling Port Security 411
Configuring SNMP
You can configure up to 10 community strings on the menudriven switch IOS by following these steps: 1. Enter the appropriate IP configurations as shown in Configuring an IP Address and Default Gateway. 2. Select Configuration|SNMP Configuration. You are then presented with three configuration options: Send Authentication Traps, Community Strings, or Trap Receivers. As with the SNMP configurations on the other two IOS configurations, we will concern ourselves with the configuration necessary to receive information to our SNMP management station. 3. Choose the option Community Strings. The screen shown in Figure 2.7 will appear.
Figure 2.7: The Community Strings configuration screen. You have five options at the bottom of the screen: ReturnAutomatically saves the configuration and returns to the Main menu. Add EntryAllows you to add an SNMP entry and the mode. Note The Mode option allows you to configure two modes. R (for read access) allows a management station to receive messages but make no configuration changes. W (for write access) allows the SNMP management station to receive messages and make configuration changes.
Delete EntryDeletes the highlighted community string. Change EntryAllows you to modify a community string entry. Clear TableDeletes all community string entries.
49
Configuring ROM
ROM monitor is a ROMbased program that can be configured to execute upon the following conditions: Upon bootup Upon recycling the switch power When a fatal exception error occurs When the switch fails to find a valid system image If the nonvolatile RAM (NVRAM) configuration is corrupt If the configuration register is set to enter ROM monitor mode The ROM monitor CLI is present only on the Supervisor Engine III, Catalyst 4000, and the 2948G series switch Supervisor Engine modules. When the switch is in the ROM monitor mode, the switch will allow you to load a system image manually from Flash memory, from a Trivial File Transfer Protocol (TFTP) file, or from the bootflash.
Table 2.9 : The boot command syntaxes. Syntax Meaning x Identifies the image to load but not execute v Identifies a need to use verbose mode device Identifies the device imagename Identifies the image to use The image name is optional. If no image name is presented, the system defaults to the first valid file in the device. Remember that file names are case sensitive. Lets look at an example of using this command:
rommon> boot x bootflash:cat5000sup2.22.bin CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Uncompressing file: ####################################################################### ####################################################################### #######################################################################
50
Configuring SNMP
RMON works in conjunction with SNMP and requires a protocol analyzer or probe to use its full features. To use SNMPbased monitoring, you need to verify that SNMP is running on your IOSbased switch. 1. Verify that SNMP is running, using the following command in User or EXEC mode:
show snmp
2. Enable SNMP and allow readonly access to hosts using the public SNMP string by using this command in Configuration mode:
snmpserver community public
3. After enabling SNMP, you need to define a host IP address to send SNMP trap messages. Here is an example:
snmp server host 130.77.40.05 public
Configuring RMON
To configure RMON, use the following steps: 1. To show RMON statistics on a certain interface, use the following command:
show rmon statistics
This command shows statistics for the number of packets, octets, broadcast packets, and multicast packets received, as well as errors detected and packet lengths received. 2. Configure the SNMP community using this command:
set snmp community <readonly|readwrite|readwriteall> <community string>
3. Assign the SNMP log server responsible for receiving traps with this command:
set snmp trap <hostaddress> <communitystring>
2. Assign the SNMP log server responsible for receiving traps with the following command:
set snmp trap <hostaddress> <communitystring> Enable snmp with "set snmp enable" Console> (enable) set snmp rmon enable SNMP RMON support enabled. Console> (enable) show snmp RMON: Enabled Extended RMON: Extended RMON module is not present Traps Enabled: Port,Module,Chassis,Bridge,Repeater,Vtp,Auth,ippermit,Vmps,config, entity,stpx Port Traps Enabled: 1/12,3/18 CommunityAccess CommunityString readonly Everyone
51
readwrite Administrators readwriteall Root TrapRecAddress TrapRecCommunity 168.187.127.4 readwrite 168.187.127.6 readwriteall Console> (enable)
3. To verify that RMON is running, use the following command in EXEC mode:
show rmon
Table 2.10 : Command recall key sequences. Command !! !nn !n !zzz !?zzz ^yyy^zzz !!zzz !n zzz !yyy zzz !?yyy zzz Action Repeats the last command Repeats the nnth number of commands Repeats command n in the list Repeats the command that starts with the zzz string Repeats the command containing the zzz string Replaces the string yyy with zzz in the previous command Adds the string zzz to the previous command Adds the string zzz to command n Adds the string zzz to the end of the command that begins with yyy Adds the string zzz to the end of the command containing yyy
Table 2.11: Cisco IOS basic command editing keys and functions. Key Tab Delete Return Space Left arrow Right arrow Function Completes a partial command name Erases the character to the left of the cursor Performs a command Scrolls down a page Moves a character to the left Moves a character to the right
52
Up arrow Down arrow Ctrl+A Ctrl+B Ctrl+D Ctrl+E Ctrl+F Ctrl+K Ctrl+L Ctrl+T Ctrl+U Ctrl+V Ctrl+W Ctrl+Y Ctrl+Z
Recalls commands in the history buffer Returns to more recent commands Moves to the beginning of a line Moves back one character Deletes a character Moves to the end of the command line Moves forward one character Deletes all characters to the end of the line Redisplays the system prompt and command line Transposes the character to the left of the cursor with the character at the cursor Deletes all characters to the beginning Indicates that the next keystroke is a command Deletes to the left of the cursor Recalls the most recently deleted command Ends the configuration mode and returns you to EXEC mode
53
54
Figure 3.1: A packets journey from a host to a WAN device. The WAN transmission is continuous and does not have to wait for acknowledgement or permission. Lets take a look at how this process would work in a T1 line. T1 has 24 slots in each frame; each slot is 8 bits, and there is 1 framing bit: 24 slots x 8 bits + 1 framing bit = 193 bits T1 frames are transmitted 8,000 frames per second, or one frame every 125 microseconds: 193 bits x 8,000 = 1,544,000 bits per second (bps) When you have a higher bandwidth, the frame is bigger and contains more slots (for example, E1 has 32 slots). As you can see, this is a great increase in the effective use of the bandwidth. Another asynchronous serial transmission method is Asynchronous Transfer Mode (ATM). ATM is a cellbased switching technology. It has a fixed size of 53 octets: 5 octets of overhead and 48 octets of payload. Bandwidth in ATM is available on demand. It is even more efficient relative to the serial transmission method because it does not have to wait for assigned slots in the frame. One Ethernet frame can consist of multiple consecutive cells. ATM also enables Quality of Service (QoS). Cells can be assigned different levels of priority. If there is any point of congestion, cells with higher priority will have preference to the bandwidth. ATM is the most widely used WAN serial transmission method. Note ATM is covered in more detail in Chapter 8.
Table 3.1: Narrowband transmission types. Region North America Africa, Asia (not including Japan), Europe, Australia, South America J1 32 2.048Mbps Japan Narrowband is most commonly used by businesses as their WAN medium because of its low cost. If more bandwidth is needed than narrowband can provide, most businesses use multiple narrowband connections. 55 Transmission Type T1 E1 Number of Slots 24 32 Bit Rate 1.544Mbps 2.048Mbps
The capability of broadband to carry multiple signals enables it to have a higher transmission speed. Table 3.2 displays the various broadband transmissions, which require more expensive and specialized transmitters and receivers.
Table 3.2: The different broadband transmission types and their bandwidth. Transmission Type Bit Rate DS2 6.312Mbps E2 8.448Mbps E3 34.368Mbps DS3 44.736Mbps OC/STS1 51.840Mbps OC/STS3 155.520Mbps OC/STS9 466.560Mbps OC/STS12 622.080Mbps OC/STS18 922.120Mbps OC/STS24 1.244Gbps OC/STS36 1.866Gbps OC/STS768 39.820Gbps Digital signal 2 (DS2), E2, E3, and DS3 describe digital transmission across copper or fiber cables. OC/STS resides almost exclusively on fiberoptic cables. The OC designator specifies an optical transmission, whereas the STS designator specifies the characteristics of the transmission (except the optical interface). There are two types of fiberoptic media: Singlemode fiberHas a core of 8.3 microns and a cladding of 125 microns. A single light wave powered by a laser is used to generate the transmission. Singlemode can be used for distances up to 45 kilometers; it has no known speed limitation. Figure 3.2 shows an example of a singlemode fiber.
Figure 3.2: Single mode fiber. Multimode fiberHas a core of 62.5 microns and a cladding of 125 microns. Multiple light waves powered by a lightemitting diode (LED) are used to power the transmission. Multimode has a distance limit of two kilometers; it has a maximum data transfer rate of 155Mbps in WAN applications. (It has recently been approved for use for Gigabit Ethernet.) Figure 3.3 shows an example of a multimode fiber. The core and cladding boundary work as a mirror to reflect the light waves down the fiber.
STSn is an interleaving of multiple (n) STS1s. The size of the payload and the overhead are multiplied by n. Figure 3.4 displays an STS diagram.
Figure 3.4: The STS1 framing and STSn framing. The overhead and payload are proportionate to the n value, with the STS1 frame as the base. You may wonder why were talking about synchronous transmission when we said it is only used over short distances. Where did the asynchronous transmission go? Well, the asynchronous traffic is encapsulated in the STS payload. The asynchronous serial transmission eliminates the need for the synchronization of the end transmitting equipment. In SONET, most WAN links are a pointtopoint connection utilizing light as the signaling source. The time required for the signal to travel the link does not distort the synchronization. The OCn signal itself is used for the synchronization between equipment. This combination of asynchronous and synchronous serial transmission enables signals to reach across long distances with minimal overhead.
ATM frame usernetwork interface (UNI), or System Network Architecture (SNA). The MGX 8240 Private Line Service Gateway is designed to terminate private lease lines (T1, T3, or DS0). It has 16 slots with 1 reserved for a redundant control card. It can support up to 1,260 channelized T1s. It is designed for large Internet service providers (ISPs) to aggregate dialin traffic, which is delivered by the local central offices Class 4 or Class 5 switch in a T1 or T3 interface. The combined traffic is delivered to the broadband network via OC3 trunk ports. The MGX 8260 Media Gateway is a highdensity, carrierclass gateway for voice and data traffic. It is designed to move data traffic from voice line to packet network. It can also function as a Voice over IP (VoIP) gateway. The chassis has 14 slots for interface modules and 2 slots for switch control cards. A fully configured system has over 16,000 VoIP ports. The gateway has advanced voice features: echo cancellation, dynamic dejitter, Voice Activity Detection (VAD), Comfort Noise Generation (CNG), and announcement playouts (AU or WAV files). It can connect to the broadband network via six broadband service cards (BSCs). Each BSC has six channelized DS3 interfaces.
The BPX 8620 is a pure ATM broadband switch. It has a nonblocking 9.6Gbps architecture. The interface modules range from T3 to OC12. Each trunk port can buffer up to 32,000 cells. The OC12 interface module has two OC12 ports. The OC3 interface module has eight OC3 ports. The BPX is commonly used in conjunction with multiple MGX switches. The MGX concentrator terminates narrowband traffic to an OC3 trunk to the BPX 8620, which aggregates it to multiple OC12s to the WAN ATM network. With the popularity and the increase of TCP/IP traffic on the WAN, Cisco introduced the BPX 8650 to enhance the functionality of the BPX series. The BPX 8650 adds a Label Switch Controller (LSC) to the BPX 8620. The LSC provides Layer 3 functionality to the ATM traffic. It enables the use of Multiprotocol Label Switching (MPLS) and virtual private networks (VPNs). Currently, the LSC is a Cisco 7200 series router with an ATM interface. The plan is to have native LSC modules for the BPX series (similar to a Route Switch Module [RSM] for the Catalyst LAN switches). The BPX 8650 also introduced a new control and switch module to increase the throughput to 19.2Gbps. The BPX 8680 is the newest member of the series. This addition is a combination of the BPX 8650 and the MGX 8850 edge switch. It incorporates a modular design. Up to 16 MGX 8850s can be added to the BPX 8680 as feeders to a BPX 8620, creating a port density of up to 16,000 DS1s (T1). The 16 MGX 8850s and the BPX 8680 are managed as a single node; this design enables the use of MPLS for all the ports on every connected MGX. A service provider can install a BPX 8680 with a single MGX 8850 connected at a new location. Then, when the traffic warrants, the service provider can simply add MGX 8850s to the cabinet.
59
The system bus backplane contains multiple buses for connecting the modules. It has no active component. Different buses provide power to the modules, transfer of data, timing control, system commands, and other functionality.
Figure 3.5: : A flat WAN network. In a tiered network, the core WAN switches have to route traffic for other nodes. This design utilizes edge switches as feeders to the network. The feeders aggregate multiple narrowband transmissions into broadband trunk connections to the core switches. The edge switches can be right next to the core switch, or they can be miles apart. The IGX series and the MGX 8800 series can be configured as core switches or feeders. The BPX can only be configured as a core switch, whereas the MGX 8200 series can only be a feeder node. Figure 3.6 displays how a tiered network combines different equipment.
Figure 3.6: A tiered WAN network. The structured network design is a combination of flat networks and tiered networks. Each of these networks is considered a domain. All domains have a unique number. Each domain is attached to others through switches called junction nodes that are responsible for routing across domains. Switches other than junction 60
nodes in the domain have limited contact with switches outside the domain. You will rarely see this design today, because the current switching software no longer supports it.
Network Management
In managing a wide area network, you have to understand the basic network management technology common to both LANs and WANs. You must understand IP addressing, Simple Network Management Protocol (SNMP), outofband management/inband management, Management Information Bases (MIBs), network management tools, configuration of systems, and so on. Lets look at some WAN specifics.
The CLI
Everyone who has worked with Cisco equipment is familiar with the Command Line Interface (CLI). The WAN interface is very different from the interfaces in other Cisco equipment. To gain access to the CLI, you will have to use the serial port on the control module, the Ethernet connection, or a virtual terminal. Figure 3.7 displays an initial login screen. You are provided with this display when you first Telnet into the equipment.
Figure 3.7: An initial login screen. The login screen is divided into three parts: system information, display, and input. The system information appears at the top of the screen. It contains the name of the unit, method of accessing the CLI, current user ID and privilege level, chassis model, system software version, and date/time/time zone. The display portion shows the result and the last command given. The input portion has a prompt for your next command. You can enter commands on the CLI in three ways: Via a menuPressing the Esc key opens a menu; you highlight a command using the arrow keys and press Enter to issue the command. In response to promptsA prompt will request the required parameters. Using the prompt method, you enter the desired command, and the switch asks you for all the required parameters. Using direct entryDirect entry is the only way to issue optional parameters in the CLI; all the parameters must follow the command in exact order, separated by spaces. Every command falls into a privilege level. The levels are superuser, service, StrataCom, and 1 to 6. A level is assigned when the user account is created. The user can issue commands only at his or her level or lower. The superuser, service, and StrataCom levels rank above level 1 (the highest numerical level).
WAN Manager
The Cisco WAN Manager software manages an entire WAN infrastructure. It operates on Sun Solaris and IBM AIX systems. The softwares components are as follows: Topology ManagementProvides an automatically generated topology map. The map can be formatted as a standalone or for HP Open View, CiscoWorks, or IBM NetView. A multicolor map can be generated thats updated in real time. It can provide the network manager with a global view of 61
the network while highlighting any local problems. Connection ManagementProvides a graphic interface to configure WAN switches. It provides templates to minimize the work in setting up many connections. All interface modules are supported, including VoIP/VoATM setups. Performance and Accounting Data ManagementControls the collection of SNMP information from the network. The statistics collected are stored in an Informix database. Reports can be generated by the builtin report generator or by SQL. Element ManagementProvides a reactive response to events on the network. It can forward information to HP Open View and IBM NetView (CiscoWorks is an integrated part of Cisco WAN Manager). External action is also supported; a page or an email can be sent when a specific event happens on the network.
Logging Out
To log out of the CLI session, use the bye command; it has a privilege level of 6. If you are using Telnet, your session will be disconnected. On the control port or auxiliary port, you will see the logon screen.
64
The user must have a lower privilege level than the user creating the account. The privilege level for this command is 6.
Changing Passwords
The MGX 8220 and MGX 8850 use different commands for changing user passwords. You can change the password of the user account you are logged in to. The password must be 6 to 15 characters. The privilege level for this command is 6. To change the password on an MGX 8220, use cnfpwd followed by the old password and the new password twice:
MGX.1.3.ASC.a > cnfpwd oldpassword newpassword newpassword The password for user is newpassword This screen will selfdestruct in ten seconds
To change the password on an MGX 8850, use the command passwd. The new password follows the command twice:
MGX.1.3.ASC.a > passwd newpassword newpassword
The name is case sensitive and must be unique on the network. The command has a privilege level of 1.
65
To change the date on the switch, use the command cnfdate followed by the date in monthfirst format:
MGX2.1.3.ASC.a > cnfdate cnfdate "mm/dd/yyyy" Date = mm/dd/yyyy MGX2.1.3.ASC.a > cnfdate 09/24/2000
67
Figure 4.1: The architecture of the Cisco Catalyst 5000 series switch. First, we need to look at the components involved: the ASICs, Catalyst processors, bus, and other units of logic. Lets begin by examining each of the BUSs; then we will define the ASICs shown in Figure 4.1.
BUS
Every switch must have at least two interfaces. But what fun would just two be? Todays switches can have hundreds of ports. The BUS connects all these interfacesit moves frames from one interface to the other. All these frames require an arbitration process using processors, ASICs, and logic units to make sure data doesnt slip out the wrong port or ports.
68
Single BUS vs. Crossbar Matrix A singleBUS architecture is pretty simple: One BUS connects all the ports together. This setup creates a bandwidth problem called a blocking architecture, or what the networking industry likes to call oversubscription. Oversubscription is characterized as a condition in which the total bandwidth of all the ports on the switch is greater than the capacity of the switching fabric or backplane. As a result, data is held up at the port because the tunnelthrough switch is too small. Examples of Cisco switches with a singleBUS architecture are the Cisco Catalyst 1900, 2820, 3000, and 5000 series. A crossbar matrix is used to solve the problems of a single BUS architecture by creating a multiple BUS architecture in which more than one BUS services the switch ports. In this architecture, the BUS can handle all the data the ports can possibly sendand more. It is sometimes referred to as a nonblocking architecture, and it requires a very sophisticated arbitration scheme. Tip The switching fabric is the highway the data takes from the point of entry to the port or ports from which the data exits.
Each switch employs some kind of queuing method in order to solve blocking problems. An Ethernet interface may receive data when the port does not have access to the BUS. In this situation, the port has a buffer in which it stores the frame it receives until the BUS can process it. The frame uses queuing to determine which frame will be processed next. Lets look at the three queuing components: input queuing, output queuing, and shared buffering. Input Queuing Input queuing is the simpler of the two forms of queuing. The frame is buffered into the ports buffer until it becomes its turn to enter the bus. When the frame enters the bus, the exit port must be free to allow the frame to exit. If another frame is exiting the port, a condition called headofline blocking occurs: The frame is dropped because it was blocked by other data. Output Queuing Output queuing can be used with input queuing; it allows the frame to be buffered on the outbound port if other data is in the way. This is a way to resolve headofline blocking, but if a large burst of frames occurs, headofline blocking still can occur. The problem of large bursts can be resolved by using shared buffering. All the Cisco Catalyst switches (with the exception of the 1900 and 2820 series) use both input and output queuing. Shared Buffering Although there is no sure way to stop headofline blocking, shared buffering can be used in a switch as a safeguard. Shared buffering is a derivative of output queuing and provides each port with access to one large buffer instead of smaller, individual buffering spaces. If a frame is placed in this buffer, the frame is extracted from the shared memory buffer and forwarded. This method is used on the 1900 and 2820 series of Cisco Catalyst switches.
ASICs
The ASICs shown in Figure 4.1 are used in the Catalyst 5000 series Supervisor Engine and an Ethernet Module. Lets take a look at each: Encoded Address Recognition Logic (EARL) ASIC Encoded Address Recognition Logic Plus (EARL+) ASIC Synergy Advanced Interface and Network Termination (SAINT) ASIC 69
Synergy Advanced Multipurpose Bus Arbiter (SAMBA) ASIC EARL ASIC The Encoded Address Recognition Logic (EARL) ASIC performs functions that are very similar to those of the Content Addressable Memory (CAM) table. Switches use this CAM to make filtering and forwarding decisions. The EARL ASIC connects directly to the data switching bus, allowing the ASIC access to all the frames that cross the switching fabric. The switch makes forwarding decisions based on the destination Media Access Control (MAC) address. Note The CAM table contains the MAC address of the interfaces connected to the port and the time the switch last read a frame from that source port and address. The CAM table receives updated information by examining frames it receives from a segment; it then updates the table with the source MAC address from the frame. The EARL ASIC aids in building a table containing all the information the switch has extracted from incoming frames. This information includes the source MAC address, the port of arrival, the virtual LAN (VLAN) membership of the port of arrival, and the time the frame was received. This table can contain up to 128,000 entries. Entries in the table are removed after the time to live (TTL) has expired. The default TTL at which entries are removed is 300 seconds; this time can be set from 1 to 20 minutes. The EARL ASIC tags each frame as it arrives at the switch before the frame is buffered. This tagging includes the source ports identity, the VLAN, and a checksum. This tagging should not be confused with the tagging used in trunking for InterSwitch Link (ISL) or 802.1Q, discussed in Chapter 5. The tagging the EARL places in the frame is removed before the frame exits the switch. The EARL ASICs placement is shown in Figure 4.2.
Figure 4.2: EARL ASIC placement on the Crescendo architecture. EARL+ ASIC The Encoded Address Recognition Logic Plus (EARL+) ASIC allows the EARL to support Token Ring line modules. The EARL+ ASIC is an enhancement to the EARL ASIC and is used on the Supervisor Engine III Module. SAINT ASIC The Synergy Advanced Interface and Network Termination (SAINT) ASIC allows a switch interface to support both halfduplex and fullduplex Ethernet. This ASIC has a second responsibility to handle frame encapsulation and deencapsulation, and gathering statistics for trunked ports. SAMBA ASIC The Synergy Advanced Multipurpose Bus Arbiter (SAMBA) ASIC and the EARL ASIC work in tandem to let ports access the bus, thus allowing frames to be forwarded correctly. Both the Supervisor Engine and the installed line modules utilize this ASIC; it can support up to 13 separate line modules. 70
This ASIC operates in either master or slave mode. In master mode, the ASIC allows ports access to the bus based on a priority level of normal, high, or critical. In slave mode, each port must post a request to each SAMBA ASIC, negotiate local port decisions, and arbitrate requests with the Supervisor Engines SAMBA ASIC.
71
ARB The Arbiter (ARB) is located on each line module. It uses a twotiered method of arbitration to assign queuing priorities and control data traffic through the switch. The arbiter controls the traffic coming to and from the line modules. In addition, a Central Bus Arbiter located on the Supervisor Engine module obtains permission to transmit frames to the switching engine. The Central Bus Arbiter provides special handling of highpriority frames by using a roundrobin approach. Frames with other priority levels can be set to handle support of timesensitive traffic, such as multimedia. LTL The Local Target Logic (LTL) works in conjunction with the EARL ASIC to determine if a frame is switched to one individual port or sent to multiple ports. The LTL also helps identify the port or ports on the switch to which the frame needs to be forwarded, and it can look at the frame to determine if the frame is a unicast or a multicast frame for broadcast forwarding. This process is handled using index values provided by the EARL ASIC table. The LTL then uses this information to select the port or ports to forward the frame to. CBL The Color Block Logic (CBL) blocks data frames from entering a port that does not belong to the same VLAN as the port of arrival. This ASIC aids STP in deciding which ports to block and which ports to place in the learning, listening, or forwarding modes.
CAM
The CAM table is used by a bridge to make forwarding and filtering decisions. The CAM table contains MAC addresses with port addresses leading to the physical interfaces. It uses a specialized interface that is faster than RAM to make forwarding and filtering decisions. The CAM table updates information by examining frames it receives from a segment and then updating the table with the source MAC address from the frame.
AXIS Bus
The architecture of the Catalyst 3900 centers around the AXIS bus, which uses a 520Mbps switching fabric 72
through which all switched ports communicate. The AXIS bus is a partially asynchronous time division multiplexed bus used for switching packets between heterogeneous LAN modules.
CEF ASIC
The Cisco Express Forwarding (CEF) ASIC and Distributed Cisco Express Forwarding (dCEF) ASIC are Ciscos newest ASICs, found in Ciscos lines of routers and switches. In Ciscos switching line, you will find this ASIC available in the 8500 GSR and 12000 GSR series.
dCEF The dCEF ASIC is a mode that can be enabled on line cards; this mode uses interprocess communication (IPC) to synchronize a copy of the Forwarding Information Base (FIB). This synchronization enables identical copies of the FIB and adjacency tables to be stored on the Versatile Interface Processor (VIP), GSR, or other line card. The line cards can then express forward between port adapters. This process relieves the Route Switch Processor (RSP) of its involvement. The Cisco 12000 series routers have dCEF enabled by default. This is valuable troubleshooting information, because when you view the router configuration, it does not indicate that dCEF is enabled.
The CEF ASIC (CEFA) is a small CPUtype silicon chip that makes sure Layer 3 packets have fair access to the switchs internal memory. An internal CEFA search engine performs fast lookups using arbitration to make sure lookups have metered access to the ASIC. CEFs features include optimized scalability and exceptional performance. Cisco has made an excellent component that fits well into large networks, particularly those using Webbased applications that like to eat up the available bandwidth in slower processed networks. Such applications include Voice over IP, multimedia, large graphics, and other critical applications. The CEFA microcontroller is local to four ports on the Catalyst 8500 GSR series line module; it uses a roundrobin approach for equal access to data traffic on each port. The CEF microprocessor also has the responsibility to forward system messages back to the centralized CPU. These messages can include such data as Bridge Protocol Data Units (BPDUs), routing protocol advertisements, Internet Protocol (IP) Address Resolution Protocol (ARP) frames, Cisco Discovery Protocol (CDP) packets, and controltype messages. CEF is a very complex ASIC that is less CPUintensive than fastswitching route caching (discussed later in this chapter). It allows more processing ability for other Layer 3 services such as Quality of Service (QoS) queuing, policy networking (including access lists), and higher data encryption and decryption. As a result, CEF offers a higher level of consistency and stability in very large networks. The FIB, which contains all the known routes to a destination, allows the switch to eliminate the route cache maintenance and fast switching or process switching that doesnt scale well to large network routing changes. The Routing Information Base (RIB) table is created first, and information from the routing table is forwarded to the FIB. The FIB is a highly optimized routing lookup algorithm. Through the use of prefix matching of the destination address, the FIB makes the process of looking up the destination in a large routing table occur much more quickly than the linebyline lookup of the RIB. The FIB maintains a copy of the forwarding information contained in the IP routing table based on the nexthop address. An adjacency table is then used to determine the next hop. The IP table is updated if routing or topology changes occur. Those changes are then recorded in the FIB, and the next hop is then recomputed by the adjacency table based on those changes. This process eliminates the need for fast or optimum switching (discussed later in this chapter) in previous versions of the IOS. CEF allows you to optimize the resources on your switch by using multiple paths to loadbalance traffic. You can configure perdestination or perpacket load balancing on the outbound interface of the switch: 73
Perdestination load balancingEnabled by default when you enable CEF. It allows multiple paths to be used for load sharing. Packets destined for a given destination or source host are guaranteed to take the same path, although multiple destinations are available. Perpacket load balancingUses a roundrobin approach to determine what path individual packets will take over the network. Perpacket load balancing ensures balancing when multiple paths are available to a given destination. This method allows packets for a given destination to take different paths. However, perpacket load balancing does not work well with data such as Voice over IP and video; these types of data packets need a guarantee that they will arrive at the destination in the same sequence they were sent. The Adjacency Table The adjacency table maintains a onetoone correspondence to the FIB. All entries in the FIB are maintained in the adjacency table. A node is said to be adjacent if the node can be reached in one hop. CEF uses the adjacency table to apply Layer 2 address information determined by such protocols as Address Resolution Protocol (ARP) when the next hop must use the physical hardware address of the interface. The adjacency table provides the Layer 2 information necessary to switch the packet to its next point destination; the table is updated as adjacencies are discovered. The adjacency table contains the MAC address for routers that map to Layer 2 to Layer 3 addresses. It uses the IP ARP to populate neighbors gleaned from IP and Internetwork Packet Exchange (IPX) updates, indexed by interface and address. For each computed path, a pointer is added for the adjacency corresponding to the next hop. This mechanism is used for load balancing where more than one path exists to a destination. Using hosttoroute adjacencies, a few other types of adjacencies are used to expedite switching in certain instances. Lets look at these instances and the conditions in which other adjacencies are used: Null adjacencyPackets destined for a Null0. The Null0 address is referred to as the bit bucket. Packets sent to the bit bucket are discarded. This is an effective form of access filtering. Glean adjacencyA node connected directly to more than one host, such as a multihomed PC. In this situation, the router or switch maintains a prefix for the subnet instead of the individual host. If a packet needs to reach a specific host, the adjacency table is gleaned for the information specific to that node. Punt adjacencyPackets that need to be sent to another switching layer for handling. This is done when a packet needs special handling, or when the packets need to be forwarded to a higher switching layer. Discard adjacencyPackets that are sent to the bit bucket and whose prefix is checked. The Cisco 12000 GSR is the only Cisco device using this type of adjacency. CEF Search Engine The CEF search engine can make either Layer 2based or Layer 3based switching decisions. The FIB places incoming packets into the internal memory. From there, the first 64 bytes of the frame are read. If a Layer 2 adjacency resolution needs to be made, the microcode sends the search engine the relevant source MAC address, destination MAC address, or the Layer 3 network destination. The search engine then conducts a lookup of the CAM table for the corresponding information. CEF uses the search engine to find the MAC address or the longest match on the destination network address. It does this very quickly and responds with the corresponding rewrite information; it then stores this information in the CAM table. The CEFA now knows the portofexit for the packet, based either on its MAC address or on the Layer 3 IP or IPX network numbers. The packet is now transferred across the switching fabric to its point of destination to be sent to its next hop. The destination interface prepares the packet prior to exiting the switch. Figure 4.3 shows the CEFA components.
74
Figure 4.3: Cisco Express Forwarding ASIC components. Note CEF supports Ethernet, Fiber Distributed Data Interface (FDDI), PointtoPoint Protocol (PPP), HighLevel Data Link Control (HDLC), Asynchronous Transfer Mode (ATM)/AAL5snap, ATM/AAL5mux, ATM/AAL5nlpid, and tunnels.
Phoenix ASIC
The Phoenix ASIC is another ASIC used to handle highspeed data traffic on the Supervisor Engine III. This ASIC provides a gigabit bridge between each of the buses located on the module. The Phoenix ASIC has a 384K buffer used to handle traffic between buses located on the module. From the perspective of the EARL and the SAMBA, the Phoenix ASIC appears as another port on the box. Figure 4.4 depicts the Phoenix ASIC.
Figure 4.4: The Phoenix ASIC used on the Supervisor Engine III. It is important to note that some line modules do not have access to all three buses. In the case of the Catalyst 5500 13slot chassis, slots 1 through 5 are connected to bus A, slots 1 through 9 are connected to bus B, and slots 1 through 5 and 10 through 12 are connected to bus C. The placement of line modules in the chassis becomes important. You will learn more about this topic in Chapter 6.
LCP
The LCP is located on each line module. It is the responsibility of the LCP to provide communications for the MCP located on the Supervisor Engine.
SAGE ASIC
The Synergy Advanced GateArray Engine (SAGE) ASIC performs the same functions as the SAINT. This ASIC also has some additional functions, such as gaining access to the token in FDDI or Token Ring networks. Processing performed by SAGE takes place in the hardware ASICs, requires no CPU cycles, and adds no additional latency to the switching process.
QTP ASIC
The architecture of the Catalyst 3900 is centered around the AXIS bus (discussed earlier), using the Quad Token Ring Port (QTP) ASIC. Cisco uses the 3900 series line of switches as its primary switch dedicated to Token Ring topology networks. This line of switches uses a 520Mbps switching fabric through which all switched interfaces communicate. The ASIC interfaces directly with the Quad Media Access Controller (QMAC) ASIC and provides the necessary functions for switching directly between the four Token Ring ports 75
QMAC
The QMAC uses four protocol handlers to support four Token Ring physical interfaces directly connected to the QTP ASIC. Together, these two ASICs provide support for early token release (ETR) and Token Ring Full Duplex (FDX) concentrator and adapter modes for dedicated Token Ring.
Bridging Types
In the early 1980s, IBM developed a nonroutable protocol called NetBIOS as part of its implementation strategy. NetBIOS joined other nonroutable protocols that came into wide use, such as System Network Architecture (SNA) and Local Area Transport (LAT). IBM also developed a physical network topology called Token Ring. With Token Ring came a bridging technology called Source Route Bridging (SRB). The SRB algorithm for TokenRing LAN bridging became the IEEE 802.5 Token Ring LAN specification. SRB has various combinations, which will be discussed in more detail in the next chapter: Source Route Bridging (SRB) Source Route Transparent Bridging (SRT) Source Route Translational Bridging (SR/TLB) Transparent Bridging (TB) is another bridging technology that was developed later by DEC, and which is now used in Ethernet networks. Although it was developed for DEC, it is the primary bridging algorithm for todays switches and routers. It maintains a routing table, building tables composed of destination addresses. It has the ability to switch network packets based upon a match of the destination address, such as those used with IP, IPX, and AppleTalk. TB tables are built differently than routing tables. Whereas routing tables rely heavily on routing protocols to learn about foreign networks, TB tables learn the location of each MAC address by logging the port from which the frame arrived. Thus, assuming that the network the frame arrived from is attached to the port of entry, TB logs the information along with a maximum age or TTL. When this maximum is reached, TB removes the entry from the table. Lets take a look at each bridging type.
76
Transparent Bridging
Transparent bridges get their name because they are invisible to all the network nodes for which they provide services. Transparent bridges and switches acquire knowledge of the network by looking at the source address of all frames coming into their interfaces. The bridge then creates a table based on the information from the frames it received. If a host sends a frame to a single host on another port, then if the bridge or switch has learned the port the destination resides on and it is on the local switch, the switch forwards the frame out the destination interface. If the bridge or switch does not know the port the destination host resides on, it will flood the frame received out all the ports except for the port the frame was received on. Broadcasts and multicasts are also flooded in the same way out all the ports.
77
Switching Paths
The switch is commonly referred to in marketing terms as a Layer 2 device. If you keep thinking that way, this section will confuse you. By definition, switching paths are logical paths that Layer 3 packets follow when they are switched through a Layer 3 device such as a router or internal route processor. These switching types allow the device to push packets from the incoming interface to the interface where the packet must exit using switching paths or table lookups. By using switching paths, unnecessary table lookups can be avoided, and the processor can be freed to do other processing. Youre probably wondering, Sean, this is a switching book. Why am I learning about switching paths in Layer 3 devices? Well, inside switches are Layer 3 devices such as the Route Switch Module (RSM), Multilayer Switching Module (MSM), Multilayer Switch Feature Card (MSFC), and NetFlow Feature Card (NFFC). Later in this book, I will cover trunk links, which are links that carry more than one VLAN. Doesnt it seem logical that if you need to have a router on a stick, which is an external router used for interVLAN routing, it might help to know if the router you are using can handle the traffic for all of your VLANs? Better yet, you should learn the internal working paths and types of switching paths through the route processor. Lets take a look at all the switching paths used on Layer 3 devices. In this section, we will focus on the following switching path types and the functions of each: Process switching Fast switching Autonomous switching Silicon switching Optimum switching Distributed switching NetFlow switching
Process Switching
Process switching uses the processor to determine the exit port for every packet. As a packet that needs to be forwarded arrives on an interface, it is copied to the routers process buffer, where the router performs a lookup based on the Layer 3 destination address and calculates the Cyclic Redundancy Check (CRC). Subsequent packets bound for the same destination interfaces follow the same path as the first packet. This type of switching can overload the processor. Making Layer 3 lookups the responsibility of the processor used to determine which interface the packet should exit takes away from more essential tasks the processor needs to handle. It is recommended that you use other types of switching whenever possible.
Fast Switching
Consider fast switching an enhancement to process switching. This switching type uses a fast switching cache found on the route processor board. The first received packet of a data flow or session is copied to the interfaces processor buffer. The packet is copied to the Cisco Extended Bus (CxBus) and then sent to the switch processor. If a silicon or autonomous switching cache does not contain an entry for the destination address, fast switching is used because no entries for the destination address are in any other more efficient caches. Fast switching copies the header and then sends the packet to the route processor that contains the fast switching cache. If an entry exists in the cache, the packet is encapsulated for fast switching, sent back to the switch processor, and then buffered on the outgoing interface processor. Note Fast switching is used on the 2500 and the 4000 series of Cisco routers by default.
78
Autonomous Switching
With autonomous switching, when a packet arrives on an interface, it is forwarded to the interface processor. The interface processor checks the siliconswitching cache; if the destination address is not contained in that cache, the autonomous cache is checked. The packet is encapsulated for autonomous switching and sent back to the interface processor. The header is not sent to the route processor with this type of switching. Note Autonomous switching is available only on AGS+ and Cisco 7000 series routers that have highspeed controller interface cards.
Silicon Switching
Siliconswitched packets use a siliconswitching cache on the Silicon Switching Engine (SSE) found on the Silicon Switch Processor (SSP). This is a dedicated switch processor used to offload the switching process from the route processor. Packets must use the routers backplane to get to and from the SSP. Note Silicon switching is used only on the Cisco 7000 series router with an SSP.
Optimum Switching
Optimum switching is similar to all the other switching methods in many ways. As the first packet for a flow arrives on an interface, it is compared to the optimum switching cache, appended, and sent to the destination exit interface. Other packets associated with the same session then follow the same path. Just as with process switching, all the processing is carried out on the interface processor. Unlike process switching, optimum switching is faster than both fast switching or NetFlow switching when the route processor is not using policy networking such as access lists. Optimum switching is used on higherend route processors as a replacement for fast switching.
Distributed Switching
Distributed switching is used on the VIP cards, which use a very efficient switching processor. Processing is done right on the VIP cards processor, which maintains a copy of the routers own route cache. This is another switching type in which the route processor is never copied with the packet header. All the processing is offloaded to the VIP cards processor. The router or internal route processors efficiency is dramatically increased with a VIP card added.
NetFlow Switching
NetFlow switching is usually thought of as utilizing the NetFlow Feature Card (NFFC) or NFFC II inside the Catalyst 5000 or 6000 family of switches. These switches use the NFFCs to let a router or internal route processor make a routing decision based on the first packet of a flow. The NFFCs then determine the forwarding interface decision made by the router or internal route processor and send all subsequent packets in the same data flow to that same interface. This method offloads work that the router used to do on to the switchs NFFC card. However, NetFlow switching is not just a switching type; it can be used as an administrative tool to gather statistics in an ATM, LAN, and VLANimplemented network. This type of switching actually creates some added processing for the router or an internal route processor by collecting data for use with circuit accounting and applicationutilization information. NetFlow switching packets are processed using either the fast or optimum switching methods, and all the information obtained by this switching type is stored in the NetFlow switching cache; this cache includes the destination address, source address, protocol, source port, destination port, and routers active interfaces. This data can be sent to a network management station for analysis. 79
The first packet thats copied to the NetFlow cache contains all security and routing information. If policy networking (such as an access list) is applied to an interface, the first packet is matched to the list criteria. If there is a match, the cache is flagged so that any other packets arriving with the flow can be switched without being compared to the list. Note NetFlow switching can be configured on most 7000 series router interfaces and can be used in a switched environment. NetFlow switching can also be configured on VIP interfaces.
System logging messages are sent to console and Telnet sessions based on the default logging facility and severity values. You can disable logging to the console or logging to a given Telnet session. When you disable or enable logging to console sessions, the enable state is applied to all future console sessions. In contrast, when you disable or enable logging to a Telnet session, the enable state is applied only to that session. Most enterprise network configurations include a Unixbased or Windowsbased system log server to log all messages from the devices in the network. This server provides a central location from which you can extract information about all the devices in the event of a network failure or other issue. You can use several set logging commands. Lets take a look at those that will not be covered in the Immediate Solutions section and what each will do: set logging serverSpecifies the IP address of one or more syslog servers. You can identify up to three servers. set logging server facilitySets the facility levels for syslog server messages. set logging server severitySets the severity levels for syslog server messages. set logging server enableEnables system message logging to configured syslog servers.
80
If you do not specify an image file name, the system defaults to the first valid file in the device. Remember that file names are case sensitive. Use the show flash command to view the Flash files. The device can be the local Supervisor Engines Flash memory or a TFTP server. Related solution: Found on page: Using the show flash Command on a Set/Clear 493 CommandBased IOS
Note
Enabling CEF
To enable standard CEF, use the following command:
ip cef
Disabling CEF
To disable standard CEF, use the following command:
no ip cef
81
Enabling dCEF
To enable dCEF operation, use the following command:
ip cef distributed
Disabling dCEF
To disable dCEF operation, use the following command:
no ip cef distributed
82
show ip cef
The following command will allow you to get a more detailed look at the Layer 2 information adjacencies learned by the CEF ASIC:
show adjacency detail
83
You can use the logging timestamps in your system logging to help you keep track of when events happen. To enable the logging time stamp, use the following command in Privileged mode:
Catalyst5000> (enable) set logging timestamp enable System logging messages timestamp will be enabled. Catalyst5000> (enable)
85
Facility Default Severity acl 2 cdp 4 cops 2 dtp 5 dvlan 2 earl 2 filesys 2 gvrp 2 ip 2 kernel 2 ld 2 mcast 2 mgmt 5 mls 5 pagp 5 protfilt 2 pruning 2 privatevlan 2 qos 2 radius 2 rsvp 2 security 2 snmp 2 spantree 2 sys 5 tac 2 tcp 2 telnet 2 tftp 2 udld 4 vtp 2 0(emergencies) 3(errors) 6(information) 1(alerts) 4(warnings) 7(debugging)
Catalyst5000> (enable)
do not specify the number of messages, the default is to display the last 20 messages in the buffer (20). To display the first five messages in the buffer, use the following code:
Catalyst5000> (enable) show logging buffer 5 2000 Aug 21 09:41:12 %SYS5MOD_OK:Module 1 is online 2000 Aug 21 09:41:14 %SYS5MOD_OK:Module 3 is online 2000 Aug 21 09:41:14 %SYS5MOD_OK:Module 2 is online 2000 Aug 21 09:42:16 %PAGP5PORTTOSTP:Port 2/1 joined bridge port 2/1 2000 Aug 21 09:42:16 %PAGP5PORTTOSTP:Port 2/2 joined bridge port 2/2 Catalyst5000> (enable)
To display the last five messages in the buffer, use this code:
Catalyst5000> (enable) show logging buffer 5 %PAGP5PORTFROMSTP:Port 3/1 left bridge port 3/1 %SPANTREE5PORTDEL_SUCCESS:3/2 deleted from vlan 1 (PAgP_Group_Rx) %PAGP5PORTFROMSTP:Port 3/2 left bridge port 3/2 %PAGP5PORTTOSTP:Port 3/1 joined bridge port 3/12 %PAGP5PORTTOSTP:Port 3/2 joined bridge port 3/12 Catalyst5000> (enable)
87
the network. The processors in each node handle this task, which takes away from the processing power needed for other tasks and applicationthus causing a slowdown that the users discover and complain about. Most network administrators pass off this slowness as a problem with the PCs, and the most vital PCs are rebuilt or replaced. When the companies finally decide to upgrade to a switched network, they can typically do so over a weekend. When the network users leave on Friday, their highpowered Pentiums stacked with RAM have the speed of 386s. When they return Monday morning, nothing is more exciting than hearing comments all over the office about how their computers boot up more quickly and run so much faster, and how they like the faster network. But did the users get a faster network? In one sense, the network did get an upgrade; but this upgrade merely eliminated the problems of a flat topology network by segmenting the network into smaller collision and broadcast domains. How did they do this? By replacing the hubs (which send data they receive out every single port, forcing every node attached to them to process the data whether the node is meant to receive the data or not) with switches. In terms of perport costs, replacing your hubs with switches is a solution at a quarter of the cost of upgrading the network cabling. So, what segments the network? VLANs. Note Sometimes, if you have a 10BaseT network with Category 3 or 4 cabling, the best solution is to fix the immediate problems by upgrading to Category 5 cabling and implementing a Fast Ethernet network in conjunction with installing switches. However, most network users do not need more than true 10Mbps from the Access layer switches to their desktops even if they are using highbandwidth applications. After all, before they had switches, the users were getting along with only 3Mbps or 4Mbps on their 10Mbps link, due to broadcasts, collisions, and network utilization.
89
VLAN Basics
InterSwitch Link (ISL) protocol was designed to allow VLAN traffic to flow from one Cisco device to another. The protocol adds a header that uniquely identifies the source and destinations of the data as well as the VLAN the data is a member of. If data from one VLAN needs to be forwarded to another VLAN, it requires some type of Layer 3 routing. Layer 3 routing can be provided by any number of modules known as internal route processors. The internal route processors available from Cisco for Cisco switches are the Route Switch Feature Card (RSFC), NetFlow Feature Card (NFFC), Multilayer Switch Feature Card (MSFC), Multilayer Switching Module (MSM), and Route Switch Module (RSM). Layer 3 routing for VLANs can also be provided by some Cisco routers that support ISL, such as the Cisco 4000 series and the Cisco 7000 series. Spanning Tree Protocol (STP), which can be applied to each individual VLAN, keeps the network from forming bridging loops when a packet can reach a given destination multiple ways. This means you can provide multiple ways to get data from point A in your network to point B, thereby providing redundancy in case one link fails. STP blocks the redundant ports so only one path exists for data in the network. VLANs allow you to use these links to load balance data. By assigning different VLANs to each link, data from one VLAN can use one link and another VLAN can use the second, redundant link. A VLAN would use the other link only during a link failure in the network; in this case the VLANs assigned to the lost link would converge and use the link that was still available.
Figure 5.1: An example of a properly switched network. Note Switching technology complements routing technology, and both have their place in the networks of today. Using Layer 2 switches to create individual collision domain segments for each node residing on a switch port increases the number of nodes that can reside on an Ethernet segment. This increase means that larger networks can be built, and the number of users and devices will not overload the network with more broadcasts and packets than each device on the network can handle (and still maintain a consistent level of 90
processing). Broadcasts are used in each and every networking protocol. How often they occur depends upon the protocol, the applications running on the network, and how these network services are used. To avoid the older, chatty protocols, older applications have been rewritten to reduce their bandwidth needs even though bandwidth availability to desktops has increased since the applications were written. Newgeneration applications utilizing multimediasuch as video conferencing, Voice Over IP, Web applications, multicast, and unicastare bandwidthgreedy and like to consume all the bandwidth they can find. When your company or organization tries to keep up with technology, youll find that faulty equipment, inadequate segmentation, nonswitched networks, and poorly designed networks each contribute to the problems of broadcastintensive applications. To add insult to injury, protocol designers have found ways to propagate application data through the switched internetwork. Not only that, but by using applications from the Web that utilize unicast and multicast, you continue to receive constant broadcasts even between routers. The old rulethat a router stops broadcasts deaddoesnt work. As an administrator, you must make sure the network is properly segmented, to keep problems on one segment from propagating through the internetwork; you must also create ways of killing the unwanted traffic. You can do so most effectively through a combination of switching and routing. Switches have become more cost effective, allowing many companies to replace their flat network hubs and bridges with a pure switched network utilizing VLANs. As mentioned earlier, all devices in a VLAN are members of the same broadcast domain and receive all broadcasts from members of the same VLAN. The broadcasts, by default, are filtered from all ports on a switch that are not members of the same VLAN. Routers and switches that utilize internal route processors (such as RSMs) are used in conjunction with Access layer switches and provide connections between network segments or VLANs. If one VLAN wants to talk to another, the process must be routed at Layer 3. This arrangement effectively stops broadcasts from propagating through the entire internetwork. Security is also a benefit of VLANs and switches. A flat Layer 2 network has almost no security. Users on every network device can see the conversations that take place between all users and devices on the network. Using certain software, not only can they see the network conversations, the users can alter the data and send it on to its destination; this action is referred to as a man in the middle attack. In a flat area network, you cannot stop devices from broadcasting and other devices from trying to respond to broadcasts. Your only security lies in the passwords assigned to your workstation or other devices on the network. Unfortunately, the passwords can only be used on the local machine, not on data traversing the network. Lets take a better look at how switches improve security in the network.
This setup allows for a more secure network. In addition, network administrators now have more control over each port as well as the ability to deny the user based on the Layer 2 or Layer 3 address the user is using to access the port. Users no longer have the ability to just plug their workstation into any network port in the office and access network resources. The administrator controls each port and the resources the user may access. The best way to design a switched network and implement VLANs is to either assign VLANs to ports based on the network resources a user requires or group them according to departments such as Engineering and Accounting. Switches can also be configured to inform a network management station of any unauthorized access to the network resources. If interVLAN communication needs to take place, a Layer 3 device such as a router is required, but it allows for restrictions to be placed on ports based on the hardware addresses, protocols, or applications.
VLAN Boundaries
VLANs can be broken into two different types of boundaries: local and endtoend. A local VLAN is configured in one local geographical location. This type of VLAN is the most common and the least difficult to maintain in corporations with centralized server and mainframe blocks. Local VLANs are designed around the fact that the business or corporation is using centralized resources, like a server farm. Users will spend most of their time utilizing these centralized resources, which are local to the users and not located on the other side of the router that connects their network to the outside world or other parts of the company. Networks are becoming faster. Because this is the case, the Layer 3 devices in your network must be able to keep up with the number of packets being switched through the local network and out to the rest of the world. As the administrator, you must take into account the number of packets your networks Layer 3 devices must handle or implement multiple Layer 3 devices to handle load balancing. An endtoend VLAN spans the entire switch fabric from one end of the network to the other. With this type of VLAN boundary, all the switches in the network know about all the configured VLANs in the network. Endtoend VLANs are configured to allow membership based on a project, a department, or many other groupings. One of the best features of endtoend VLANs is that users can be placed in a VLAN regardless of their physical location. The VLAN the port becomes a member of is defined by an administrator and assigned by a 92
VLAN Membership Policy Server (VMPS, discussed in the next section). In this situation, the administrator must have very defined goals, and network planning must be more detailed so as to not create bottlenecks in the WAN. Your goal in defining an endtoend VLAN solution must be centered around the 20/80 Rule: Maintain 20 percent of the network traffic as local, or within the VLAN, and design the WAN network to support speeds that will accommodate this use. (Just a few years ago, this rule was reversedthe administrators goal was to keep all the servers local and to allow only 20 percent or less of the network traffic to extend outside the local network.) Note The ISL protocol, IEEE 802.10, IEEE 802.1, and LAN Emulation (LANE) all provide ways of sending multiple VLAN data traffic over certain physical media types, adding tagging information to frames to send data through the network, and creating trunk ports that carry VLAN data. ATM and LANE are covered in Chapter 8. Virtual Trunking Protocol (VTP) is used to let switches know about the VLANs that have been configured in the network. We will cover all of these topics in the rest of this chapter.
93
Cisco also recommends a onetoone ratio between VLANs and subnets. This means that you must understand how users are broken up by subnets. If you have 1,000 users in a building and 100 users are in each subnet, then you should have 10 VLANs.
VLAN Trunking
There are two types of VLAN links: a trunk link and an access link. An access link is part of only one VLAN, referred to as the native VLAN of the port. All the devices are attached to an access link, which connects your physical workstation to the network. Access link devices are totally unaware of a VLAN membership, or that a switched network exists at all. The devices only know that they are part of a broadcast domain. They have no understanding of the network they are attached to and dont need to know this information. Tip Remember, an access link device cannot communicate with devices outside of its VLAN or subnet without the use of a router or internal route processor. Trunk links, on the other hand, can carry multiple VLANs. A trunk link is a link that carries all the VLANs in a network and tags each frame as it enters the trunk link and spans the network. You probably have heard this term used in telephone systems. The trunk link of a telephone system carries multiple telephone conversation and lines on a single cable. Trunk links that connect switches and carry VLANs to other switches, routers, or servers use the same theory. When an administrator assigns a port to a VLAN, that port can be a member of only one VLAN. In order for VLANs to span multiple connected switches, a trunk link must be used. This link cannot be used to connect to the average Network Interface Card (NIC) found on the back of the PC. Frame tagging is used when a frame travels between two devices that support a trunked link. Each switch that the frame reaches must be able to identify the VLAN the frame is a member of based on the tagging information, in order to determine what to do with the frame and how to apply it to the filtering table. Because the trunk link uses frame tagging to identify which VLAN a frame belongs to, each device connecting to the trunk link must be able to interpret and read this VLAN tag. Intel has created some NICs for servers that understand the frame tagging involved with a trunk link. However, in most situations, this trunk link tagging is removed at the Access layer switch, and the destination address never knows that the frame it received was tagged with information to allow it to span the switch fabric. What happens if the frame reaches a switch or router that has another trunk link? The device will simply forward the frame out of the proper trunk link port. Once the frame reaches a switch at the Access layer, the switch will remove the frame tagging. It does this because the end device needs to receive the frames without having to understand the VLAN tagging. Remember, the end device (such as a workstation) does not understand this frame tagging identification. If you are using NetFlow switching hardware (discussed in Chapter 6) on your Cisco switches, it will allow devices on different VLANs to communicate after taking just the first packet through the router. The router will then send the correct routing information back to the NetFlow device. This process allows the router to be contacted only once to let VLAN frames be routed from port to port on a switch, rather than from port to router and back to the port for each frame.
Trunk Types
Trunk links are pointtopoint, highspeed links from 100 to 1000Mbps. These trunked links between two switches, a switch and a router, or a switch and a server carry the traffic of up to 1,005 VLANs at any given time. Four different methods or protocols allow you to track VLAN frames as they traverse the switch fabric: 94
IEEE 802.10 IEEE 802.1Q InterSwitch Link (ISL) LAN Emulation (LANE) IEEE 802.10 The IEEE 802.10 standard is used to send VLAN information over a Fiber Distributed Data Interface (FDDI) physical link. In this situation, ISL is disabled and IEEE 802.10 is used to forward the VLAN frames. The Clear Header on a FDDI frame contains a Security Association Identifier (SAID), a Link Service Access Point (LSAP), and the Management Defined Field (MDF). The SAID field in the frame header is used to identify the VLAN. The 802.10 protocol is used primarily to transport VLAN information over FDDI, and you will only find it used on this type of physical media, primarily in FDDI backbones to transport VLAN information and data.
Cisco Standards A standard is a basis that participating vendors use to maintain functionality and compatibility between different vendors products on a network. For example, when you get a 100BaseT NIC from one vendor and you purchase a second card from another vendor, standards ensure that they will work with each other in your network. With so many ideas for the implementation of virtual LANs, Cisco found it essential to set certain standards. Cisco chose to submit its standardization to the IEEE Internetworking Subcommittee. Other standards have been created for VLANs by the Internet Engineering Task Force (IETF). Standards related to the use of Asynchronous Transfer Mode (ATM) and LANE have been designated by the ATM forum. This section will concentrate on the standards created by the IEEE, IETF, and ATM forum. The main focus will be on those standards created and submitted for standardization by Cisco to enhance VLANs in their route processors and other switching products. Organizations install highspeed switched networks in order to create a network that can efficiently handle the growing demands of software and hardware applications. These installations can cause some unexpected problems in the network. Some of the standards discussed in this section relate to monitoring and managing VLAN networks and resources. This management enables organizations to reduce problems in their networks and to increase functionality and compatibility of different vendor products on the networks.
IEEE 802.1Q IEEE 802.1Q is called the Standard for Virtual Bridged Local Area Networks; it was created by the IEEE as a standard method of frame tagging. It actually inserts a field into the frame to identify the VLAN, and it creates a method used for identifying VLANs over a trunk link. The IEEE 802.1Q standard calls for a frame tag identifier to identify VLANs in the frame header. This protocol calls for no encapsulation of the data, and is used in only Ethernet physical media. As a frame enters the switch fabric, it is tagged with additional information regarding the VLAN properties. Just as in ISL (discussed next), the tag remains in the frame while it is forwarded from switch to switch; the tag is removed prior to exiting the access link to the destination interface. Unlike ISL, which uses an external tagging process, 802.1Q uses an internal tagging process by modifying the existing Ethernet frame itself. To both access links and trunk links, the frame looks like a standard Ethernet frame. This process remains completely transparent to the source interface and the destination interface.
95
Unlike ISL, IEEE 802.1Q is not a Cisco proprietary protocol. It can be used to carry the traffic of more than one subnet down a single cable, and it is compatible with devices that are not running the Cisco IOS. 802.1Q changes the frame header with a standard VLAN format, which allows multiplevendor VLAN implementations. For example, a Bay Networks switch or a 3COM switch can work with a Cisco switch to pass VLAN information on a trunk link. InterSwitch Link (ISL) Protocol Cisco created the ISL protocol, and therefore ISL is proprietary to Cisco devices. Several NIC cards from Intel and other companies support ISL trunking. If you need a nonproprietary VLAN protocol over Ethernet, you will need to use the 802.1Q protocol. Along with being proprietary to Cisco switches, ISL is used for Fast Ethernet and Gigabit Ethernet trunk links only. ISL is a way of explicitly tagging VLAN information onto an Ethernet frame traversing the network through trunk links. This tagging information allows VLANs to be multiplexed over a trunk link through an external encapsulation method. By running ISL, you can interconnect multiple switches and still maintain VLAN information as traffic travels between switches on trunk links. Along with switches, you can also use ISL to create trunk links between two Cisco routers that support ISL, a switch and a router, and a switch and a server that has a NIC that supports ISL. On a trunk port, each frame is tagged as it enters the switch. Once the frame is tagged with the appropriate VLAN information, it can go though multiple routers or switches without retagging the frame, which reduces latency. It is important to understand that ISL VLAN information is added to a frame only if the frame is forwarded out a port configured as a trunk link. The ISL encapsulation is removed from the frame if the frame is forwarded out an access link. ISL is an external tagging process. The original frame is not altered; it is encapsulated within a new 26byte ISL header. This tagging adds a new 4byte frame check sequence (FCS) at the end of the frame, as shown in Figure 5.2.
Figure 5.2: A typical ISL frame. Remember, only a Cisco device or an ISLaware NIC is capable of interpreting frames with an ISL frame tag. By using ISL, the frame encapsulation means that the frame can violate the normal Ethernet maximum transmission unit size of 1,518 bytes. The ISL header, shown in Figure 5.3, is entered into the frame. The ISL header contains the following:
Figure 5.3: The ISL header inserted into an ISL encapsulated packet. Destination address (DA)A 40bit multicast address set to 01000c0000. This address signals the receiver that this packet is in ISL format. Frame type fieldIndicates the media type the frame is supporting. The possible options are 0000 for Ethernet, 0001 for Token Ring, 0010 for FDDI, and 0011 for ATM. 4bit User fieldIdentifies one of four possible priorities of the frame: XX00 for normal, XX01 for priority 1, XX02 for priority 2, and XX11 for the highest priority. Source MAC address (SA)Set to the sending switch ports IEEE 802.3 MAC address. Some receiving devices ignore the SA field. 16bit LEN fieldShows the length of the packet in bytes minus the excluded fields. The excluded fields are the CRC, DA, Type, User, Source Address, and LEN field itself. The total of the excluded fields is 18 bytes. Therefore, the LEN field contains the total packet size minus 18 bytes from the excluded fields. 802.2 LLC headerFor ISL frames, this field is always set to AAAA03. 96
High bit of source address (HSA)The 3byte manufacturers portion of the SA field or vendor field of the source ports MAC address. 15bit descriptorUsed to distinguish the frame from other VLANs or colors. 10 bits are used to indicate the source port. Bridge Protocol Data Units (BPDU) bitUsed to indicate Spanning Tree Protocol (STP) or Cisco Discovery Protocol (CDP) topology information. 16bit index valueUsed to indicate the port address. This index can be set to any value and may be used for diagnostic purposes only. Reserved fieldUsed only by FDDI and Token Ring. In Token Ring, the Frame Control (FC) and Token Ring AC bits (AC) fields are placed in the header. For FDDI, the FC is placed in the field. For Ethernet, the field includes all zeros.
VTP Versions
VTP comes in two versions: version 1 and version 2. The primary differences between the two version are few, but they are significant enough to render the two versions incompatible. The two versions will not work together in the same network. Version 1 is the default on Cisco Catalyst switches and supports Ethernet media. Version 2 provides the following additional features beyond support for Ethernet: Consistency checks Token Ring support Transparent mode change support Unrecognized Type Length Value support If all the switches in the network support VTP version 2, then only one switch needs to have version 2 enabled to enable version 2 on all other switches. Consistency Checks Consistency checks are performed when new information is entered by an administrator through the command line interface (CLI) or through Simple Network Management Protocol (SNMP). Normally, no consistency checks are performed when information for each switch is obtained through a VTP advertising message or read from nonvolatile RAM (NVRAM). If information is received by an advertisement or read from NVRAM, a switch will check the MD5 digest on a VTP message; only if it is incorrect will a consistency check be made. Token Ring Support TokenRing support is provided only in VTP version 2. This support includes Token Ring LAN switching and VLANs. Transparent Mode Change Support In transparent mode, switches will only forward messages and advertisements; the switches will not add any new information received to its own database. Version 1 allows switches to check the domain name and version before forwarding. Version 2 allows switches to forward VTP messages and advertisements without checking the version number. Unrecognized Type Length Value If a VTP advertisement is received and has an unrecognized type length value (TLV), the version 2 VTP switches will still propagate the changes through their trunk links. A VTP server or client propagates its configuration changes to the configured trunk links, even for TLVs it is not able to parse. The unrecognized TLV is then saved in NVRAM.
VTP Advertisements
Switches in a VTP management domain share VLAN information through VTP advertisement messages. There are three types of advertisement messages: Advertisement requestOccurs when clients request VLAN information for the current network. A VTP sends these types of advertisements in response to requests with the appropriate summary and subset advertisements. The advertisement frame includes a version field, code field, reserved field, management domain name field (up to 32 bytes), and start value field. Summary advertisementSent automatically every 5 minutes (300 seconds) to all the switches on the network. A summary advertisement can also be sent when a topology change occurs on the network, such as a switch drop or addition. The summary advertisement frame contains the version field, the code field, a followers field, a management domain name field, a configuration revision number field, 98
the updaters identity, the updaters timestamp, and the MD5 digest field. Subset advertisementContains very detailed information about the network, including the version, code, sequence number, management domain name, configuration revision number, and VLAN information fields. VTP advertisements can contain the following information: 802.10 SAID valuesFor FDDI physical media. Configuration revision numberThe higher the number, the more updated the information. Emulated LAN namesUsed for ATM LANE. Frame formatInformation about the format and content of the frame. Management domain nameThe name of the VTP management domain. If the switch is configured for one name and receives a frame with another name, the information is ignored. MD5 digestUsed when a password is used throughout the domain. The key must match the key on the given destination or the update information is ignored. Updater identityThe identity of the switch that forwarded the summary advertisement to the switch. VLAN configurationIncludes known VLAN information, specific parameters, and a maximum transmission unit (MTU) size for each VLAN in the VTP management domain. VLAN identificationThe ISL or 802.1Q information. The advertisement frames are sent to a multicast address so all the VTP devices in the same management domain can receive the frames. The frames are not forwarded using normal bridging controls. All VTP management domain clients and servers update their databases on all deletions and additions on the network. Therefore, only the VTP client operating in server mode needs to be updated with the deleted or additional VLAN to allow all the members of the VTP management domain to update their databases. There are two types of VTP management domain advertisements: Server originating advertisements Request advertisements from clients needing VLAN information upon power cycling or bootup Each advertisement has a revision number. The revision number is one of the most important parts of the VTP advertisement. As a VTP database is modified, the VTP server increments the revision number by one. The VTP server then advertises this information from its own database to other switches with the newly updated revision number. When VTP switches receive an advertisement that has a higher revision number, the switches will overwrite the current database information stored in NVRAM with the new database information being advertised. If it receives a lower revision number, the switch believes it has newer information and disregards the received advertisement.
Can the VTP Revision Number on a New VTP Server Be a Problem? When a new VTP revision number is sent throughout the VTP domain, the switches believe the highest revision number has the most uptodate information about all the VLANs. So, when switches detect the additional VLANs within a VTP advertisement, they process the information received as authentic information. What happens when a new switch is configured as a server and the revision number is higher than the current revision number used in the domain? Oops! If the rest of the domain gets that information, it reconfigures every single member with the configuration on that new switch. This event could create a disaster on your network. Unfortunately, any time a switch sees a higher revision number, it takes the information it just received, considers it more current, and overwrites the existing database with the new configuration information, even if this clears the VLAN information.
99
Many network administrators make the mistake of using the clear config all command, believing that it will erase the current revision number. Doing so is a bad mistake on the network administrators part. This command doesnt do what it says it doesit doesnt really clear all. VTP has its own NVRAM, so the VTP information as well as the revision number will still be present if you perform the clear config all command. You can take care of this problem two ways. The easiest way is to cycle the power on the switch after placing the switch in client mode. The switch must be in client mode because the switch will store VTP information in special NVRAM when the server is in server mode. As a result, merely powering down the switch will not reset the revision number or cause the switch to lose its VTP database. The other way is to make the switch a client, connect it to the network to get new revisions, and then configure the switch as a VTP server.
Each time a server sends out an updated advertisement, it increases the revision number by one. If a client switch receives two advertisements simultaneously, it knows which one to use by selecting the advertisement with the highest revision number.
VTP Pruning VLAN Trunk Protocol pruning is used to increase network bandwidth by reducing VLAN traffic across switch trunk links. VTP pruning filters network traffic such as broadcasts, multicasts, and unicasts on trunk links that connect switches that contain no VLAN ports in the particular VLAN the data is destined for. When VTP pruning is enabled on a VTP server, the information is propagated to all other client and server mode switches in the VTP management domain. This step automatically enables VTP pruning on these switches. By default, VLANs 2 through 1,000 are eligible for VTP pruning, and VLAN 1 is always ineligible. VTP pruning usually takes several seconds to propagate to the other VTP management domain clients after it is enabled or the switch power is cycled.
100
Server Mode Server mode, which is configured by default, allows you to create, modify, and delete VLANs for the management domain. Configuration changes are then sent to all other participating members of the VTP domain. At least one VTP server should exist in the VTP management domain. Two or more switches can be configured as servers for redundancy. When a servers power is cycled, the switch configured as a server maintains its global VLAN information. Transparent Mode Transparent mode allows VTP switches to be configured to not accept VTP information and to merely forward advertisements the switch receives to other switches participating in the VTP domain. Even though switches configured for transparent mode will still send VTP information and advertisements, they will not update their databases or send out information on VLAN or topology changes. In this mode, switches do not participate in any VTP functions, such as sending VTP advertisements or synchronizing VLAN information. VTP version 2 does allow a switch operating in transparent mode to forward the advertisements it receives out any configured trunk ports, thus allowing other switches participating in VTP to obtain the advertisements.
InterVLAN Routing
Access layer switches occupy the same place in the network as hubs. However, unlike hubs operating at Layer 1, switches examine the frames at Layer 2 and try to process the frames. A hub simply repeats the data to every single port, whereas a switch filters the data and forwards it directly to the destination port if the destination does not require routing. If data arrives on a port assigned to a VLAN and the destination is unknown, the switch repeats the signal only to the port or ports assigned to the VLAN, except for the port of arrival. The switch also has the ability to regenerate packets, enabling the data to be forwarded even greater distances 101
than a simple hub can achieve. This ability enables a switch to take the place of another device, called a repeater. A repeater is a device dedicated only to data regeneration. Repeaters allow data to be forwarded over greater distances, allowing the data to overcome regular data distance limitations for the type of physical media being used. By filtering frames and regenerating forwarded frames and packets, the switch can split the network into many separate collision domains. This splitting allows for greater distances, dramatically lower collision rates, and higher numbers of nodes on the network. Each VLAN in the network is its own broadcast domain, and each port is its own collision domain. In a shared or flat network, every node is part of the same collision and broadcast domain. Switches do not have the ability to forward frames based on Layer 3 addresses or the ability to forward data from one VLAN to another. A switch must forward these frames to a Layer 3 device for a routing decision. This device can be an external or internal route processor. An external route processor is your typical router. An internal router processor is considered a router on a stick; it is a module inside of the switch, but the switch must access it remotely to make forwarding decisions. Lets take a look at an internal route processor.
By default, all VLANs are in VLAN 1. Lets place the module in slot 2 with a port number of 3 in VLAN 2:
Catalyst5002> (enable) set vlan 2 2/3 VLAN 3 modified. VLAN 1 modified. VLAN Mod/Ports 2 2/3
You should notice that although only one port was placed in VLAN 3, the port was in VLAN 1 to begin with, so both VLANs are updated.
Tip
The set vlan command allows you create both the VLAN and the ports assigned to the VLAN at the same time.
103
User Interface Menu [M] Menus [K] Command Line [I] IP Configuration Enter Selection: K
Once a CLI session on the switch is open, you must create a VLAN number and name. The command used to do this is as follows:
vlan [vlan#] name [vlan name] command
To use this command, you must be in Global Configuration mode on the switch. To enter Global Configuration mode and create VLANs, take a look at the following example:
>enable #config terminal Enter configuration commands, one per line. End with CNTL/Z 1912EN(config)#vlan 2 name sales 1912EN(config)#vlan 3 name marketing 1912EN(config)#exit
Warning A created VLAN is unused until it is assigned to a switch port or ports. By default, all ports remain in VLAN 1 until the port is assigned to another VLAN.
2. Next, you need to issue the vlanmembership command. There are two options for this command: dynamicAllows the port to be set to a specific MAC address based on the MAC address of the end user. staticThe port number you as the administrator selects will remain the same regardless of the MAC address used by the end user of that port. 3. In the following examples we will be using static VLANs. To see how many VLANs are available to assign to an interface, use the following command:
1912EN(configif)#vlanmembership static ? <11005> ISL VLAN index
4. Next, take the VLANs created in the previous two steps and assign them to Ethernet ports 4 and 5. You can only assign one VLAN per port, as shown here:
1912EN(configif)#vlanmembership static 2 1912EN(configif)#interface e0/4 1912EN(configif)#vlanmembership static 3 1912EN(configif)#interface e0/5
104
105
The different port negotiation types are described in Table 5.1, and the different trunk encapsulation types are described in Table 5.2.
Table 5.1: Port negotiation syntaxes for configuring VLAN trunks. Description This trunking mode is used if the port uses DISL to initiate trunking. This is the default mode for Fast Ethernet and mimics plugandplay. You cannot configure a trunk when both ends switch ports are configured for auto mode. One switch must be set to on or desirable mode. desirable This trunking mode, if using DISL, actively tries to configure itself as a trunk link. The other end of the trunk link must be configured to on or desirable to complete the trunk initiation. off This option disables the port from becoming a trunk. It is typically used when the device on the other end does not support ISL or IEEE 802.1Q. The port on the other end might be a 10Mbps Ether port or FDDI interface. on This option basically makes the port a trunk port, whether the other end is configured to be or cannot become a trunk. Use this option when the port on the other end does not understand DTP, such as a thirdparty adapter. nonegotiate Use this option when DISL negotiation that takes place on ISL trunks is not supported. When using dot1q as the final parameter, this option tells the switch that ISL will not be used for trunking the ports. Table 5.2: Encapsulation type syntaxes that can be used when configuring VLAN trunk links. Description Applies the ISL protocol encapsulation to an Ethernet trunk. dot1q Used for Ethernet trunks using the IEEE 802.1Q standard. dot10 Used when assigning a FDDI trunk link to the port. lane Used when applying ATM to a trunk link port. negotiate Puts the port into permanent trunking mode. This option disallows the port from generating DTP frames. Typically, this command is used with switchtorouter trunks. Lets set port 2/1 as a trunk link using ISL with the following command:
5000> (enable) set trunk 2/1 on isl Port(s) 2/1 trunk mode set to on. Port(s) 2/1 trunk type set to isl. 5000> (enable) 2000 Dec 21 05:12:01 %DTP5TRUNKPORTON:Port 2/1 has become trunked.
Variable auto
Variable isl
106
to to to to to
trunk is the only command needed to trunk a port once you are in Interface Configuration mode for the port that needs to be trunked. You can set the trunked port to always be a trunk link, using the following command:
1900EN(configif)#trunk on
107
Note No command is available to clear more then one VLAN at a time on the 1900.
Port Vlans in spanning tree forwarding state and not pruned 2/1 1 Console> (enable)
2. Now, look at the syntaxes available for the Fast Ethernet port 26, which is identified by an a:
1912#sh trunk a allowedvlans joinedvlans joiningvlans pruneeligible ? Display Display Display Display allowed vlans joined vlans joining vlans pruning eligible vlans
5000> (enable) set vtp v2 enable This command will enable the version 2 function in the entire management domain. All devices in the management domain should be version2capable before enabling. Do you want to continue (y/n) [n]? y VTP domain modified 5000> (enable)
109
2. If you set the mode to client or server, then you need to set the VTP domain name and password on the first switch. The VTP name can be up to 32 characters long. The password is a minimum of 8 characters with a maximum of 64. For our example, we set the mode to server. The following shows the available syntaxes for the set vtp domain option:
5002> (enable) set vtp domain ? Usage: set vtp [domain <name>] [mode <mode>] [passwd <passwd>] [pruning <enable|disable>] [v2 <enable|disable> (mode = client|server|transparent Use passwd 0 to clear vtp password) Usage: set vtp pruneeligible <vlans> (vlans = 2..1000 An example of vlans is 210,1000)
You must configure a VTP domain name if you choose to configure the switch as a VTP client or server. To do so, use the set vtp domain name command, as follows:
5002> (enable) set vtp domain Coriolis VTP domain Coriolis modified
3. Set the password to pass1 for the VTP domain with the following command:
5002> (Enable) set vtp passwd pass1
To set a VTP domain password on a 1900EN to pass1 use the following command:
1900EN(config)# vtp password pass1 1900EN(config)#
Warning
You cannot use the show vtp domain command on a 1900. You should use the show vtp statistics command instead.
111
Digest Errors 0 VTP Pruning Statistics: Port Join Received Join Transmitted A 0 B 0 1912# 0 0
Now, lets set VLAN 2 to become eligible for VTP pruning so switches that do not use VLAN 2 will not receive VLAN 2s broadcast traffic on their trunk links:
5002> (enable) set vtp pruneeligible 2 Vlans 21000 eligible for pruning on this device. VTP domain Coriolis modified.
112
2. Specify an IP routing protocol such as Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Internet Gateway Routing Protocol (IGRP), or Enhanced IGRP (EIGRP) and identify the network:
Cisco7505(config)#router rip Cisco7505(configrouter)#network 192.1.0.0
3. Create a subinterface on a physical interface in Interface Configuration mode for the port connected to the switch:
7505(configrouter)#interface fastethernet2/0.100
4. Specify the encapsulation type and VLAN number to use on the subinterface:
7505(configsubif)#encapsulation isl 100
6. To configure any other interfaces, repeat Steps 3 through 5 for each VLAN between the switches that you want to route traffic:
7505(configrouter)#interface fastethernet2/0.200 7505(configsubif)#encapsulation isl 200 7505(configsubif)#ip address 192.1.2.3 255.255.255.0
2. Specify an IPX routing protocol, such as RIP, and identify all the networks:
Cisco7505(config)#ipx router rip Cisco7505(configrouter)#network all
3. Create a subinterface on a physical interface in Interface Configuration mode for the port connected to the switch:
7505(configrouter)#interface fastethernet2/0.1
4. You must specify the encapsulation type and VLAN number to use on the subinterface:
7505 (configsubif)#ipx encapsulation isl 1
5. Assign a network number to the subinterface and identify an encapsulation type for IPX, such as snap, novellether, arpa or sap:
7505(configsubif)# ipx network 1 encapsulation sap
6. To configure any other interfaces, repeat Steps 3 through 5 for each VLAN between the switches you want to route traffic:
7505(configsubif)#interface fastethernet2/0.2 7505(configsubif)#encapsulation isl 2 7505(configsubif)#ipx network 2 encapsulation sap
113
114
The FIB maintains a copy of the forwarding information contained in the IP routing table based on the nexthop address. The routing table is updated if routing or topology changes are detected in the network. Those changes are then forwarded to the FIB, and the nexthop information is recomputed based on those changes.
Cisco Express Forwarding ASIC The CEF ASIC and Distributed Cisco Express Forwarding (dCEF) ASIC are Ciscos newest ASICs; the company uses them in highend devices. These are the most functional and efficient ASICs in Ciscos product line, including the internal route processors. The CEF ASIC is used to ensure that all packets have equal access to the switchs internal memory. It performs lookups via the CEF ASIC (CEFA) search engine. CEFA uses a roundrobin approach, giving fair access to data traffic on each port as well as cycling data between ports and processing requests as needed. The CEFA search engine is used to make IP prefixbased switching decisions using an adjacency table. The CEFA operates at Layer 2 and Layer 3 and uses Address Resolution Protocol (ARP) to resolve nexthop adjacencies at Layer 2. (A network interface is said to be adjacent if it can be reached in a single hop.) CEFA looks at the first 64 bytes of an incoming frame, obtains information such as the destination for the frame, and then uses information contained in the switchs Content Addressable Memory (CAM) table to rewrite the relevant source Media Access Control (MAC) address, destination MAC address, or destination network address to the frames or packets header. Because of the efficiency and speed of the CEF ASIC, this ASIC makes more processing available for other Layer 3 services performed within the main processor, such as queuing, higher encryption levels, and higherlevel decryption.
When using process switching, the RIB and FIB have almost identical data structures. In fast switching, however, the FIB remains in the Random Access Memory (RAM), and the forwarding is done by the CPU rather than an ASIC. This process is slower than having ASICs handle the task. Note Autonomous switching and silicon switching are used on the AGS, AGS+, and 7000 routers. The FIB has its own separate memory, and the bus controller on an AGS(+) or a Silicon Switch Processor on the Cisco 7000 series handles the forwarding process. The FIB is on the same board as the forwarding engine. FIB memory is quite small, so if a particular route or destination address has not been learned or recently used, cache misses can occur. Cache misses take place when the FIB is invalidated and must be rebuilt from the knowledge gained by the RIB. Optimum switching uses both an FIB and RIB. The Route Switch Processor (RSP) card uses them but also has its own separate physical memory allotted for these processes. With this type of switching, one processor and one memory set handle the path determination and forwarding. Distributed switching (either in the CEF ASIC or NetFlow routing) uses only one RIB but copies the FIB to multiple Versatile Interface Processor (VIP) cards. Each VIP card runs a separate instance of the forwarding process. The VIP cards have large memories; as a result, in a CEF ASIC the FIB and RIB have a onetoone correspondence with each other, so there are no cache misses. Only the first packet to a destination goes through the RIB to be resolved to a destination. Subsequent packets relating to the same data flow are forwarded the same as the first packet. Cisco switches such as the Catalyst 5000 family use distributed Layer 3 switching. This type of switching uses only one routedetermination engine. Although this is a Layer 2 switch, the physical chassis can contain a separate module such as an RSM, RSFC, or (in the 6000 series) an MSM. Routing can also be handled with one of the processes described earlier in an external route processor known as an external router. A Cisco 115
proprietary protocol transfers the FIB information to a NetFlow Feature Card (NFFC or NFFC II) on a Cisco Catalyst 5000 series, or to another forwarding board or module on the higherspeed Cisco distributed switches. There is little difference between using an external router and an internal route processor as your source of the FIB to route Layer 3 protocol data traffic or to perform interVLAN routing; it is basically a design choice. If you need to route using an external router, keep cost and speed in mind as you decide which router is best. In the Immediate Solutions sections, we will walk through configuring a Cisco 2600 for trunking, which allows for interVLAN routing. Lets look at how to decide whether to use an internal or external route processor: Cisco 2600 seriesA good choice if you just need to do interVLAN routing. Cisco 3600 seriesA good choice if you need to do interVLAN routing a little more quickly. You can use the 3600 as a path determination engine and use an NFFC or equivalent on the switch. Route Switch ModuleIf you need to handle routing very quickly, use an RSM with an NFFC or equivalent, such as the RSFC, MSM, or Multilayer Switch Feature Card (MSFC). Cisco 10000 or 12000A good choice if you need to route huge amounts of data very quickly, especially if you have multiple WAN interfaces. If you need to use an external route processor because of a lack of open slots on your switch, a Cisco 7200 or 7500 might be a good alternative. You can configure one or more Hot Standby Routing Protocol (HSRP) groups on an external route processor or on internal route processor interfaces such as the RSM or the RSFC VLAN interfaces. This protocol (discussed in more detail in Chapter 12) provides a way to transparently create redundant Layer 3 routing devices in the network. Interfaces in an HSRP group share the same virtual IP and MAC addresses. You configure all the devices default gateway addresses to the virtual IP address assigned to the HSRPenabled routers interface. In the event of a failure of a link to one device or a failure of one router interface, the other takes over so service is not interrupted.
Multimodule vs. Fixed Configuration Switches So far, we have talked about the internal route processors and their features. Several Cisco switches, such as the Catalyst 4000, 5000, 6000, 8500, and 12000 families of switches, are considered multimodule switches. Many Layer 3 switches, such as the Cisco Catalyst 2926GL3, 2948GL3, and 4912G, do not have internal cards. Instead, these switches have builtin modules and are considered logically modular switches or fixed configuration switches. The Catalyst 2926G has 24 ports of 10/100 Fast Ethernet and 2 ports of Gigabit Ethernet built in. The ports are considered to be located on module 2 logically, although the module cannot be removed from the switch like an addon card.
On an internal or external route processor, each interface can be divided into many subinterfaces. Doing so creates a flexible solution for routing streams of multiple data types through one interface. On each switch interface connected to a route processors interface, you need to identify the VLAN encapsulation method and assign an IP address and subnet mask to the interface. Now, lets look at the features of the internal route processors.
segments, networks, or the Internet. A few types of route processors are available for Catalyst switches. They include: NetFlow Feature Card and NetFlow Feature Card II Route Switch Module Route Switch Feature Card Multilayer Switch Module NetFlow Feature Card and NetFlow Feature Card II The NFFC and NFFC II are feature cards that work primarily with an RSM or other highend router. Both are daughter cards of the Supervisor Engine III Module on the Catalyst 5000 family of switches running version 11.3.4 or higher of the Cisco IOS. This Cisco solution provides frame and packet filtering at wire speeds, utilizing ASICs instead of processors and allowing the switch to scale forwarding rates from millions of packets per second to gigabit wire speeds. Both cards provide protocolfiltering support for Ethernet VLANs and on nontrunked Ethernet, Fast Ethernet, and Gigabit Ethernet ports. By default, the protocol filtering feature is disabled on all Ethernet VLANs. In addition to assigning a VLAN to a port, you can configure the port to be a member of one or more groups based on a common protocol. Tip Trunk ports and links are members of all VLANs; no filtering can be done on trunk links. Dynamic ports and ports that have port security enabled are members of all protocol groups. The NFFCs primary functions are to enable multilayer switching, NetFlow accounting, NetFlow data exporting, filtering by protocol, enhanced multicast packet replication, filtering by application, and Internet Group Management Protocol (IGMP) snooping. It is also a Quality of Service (QoS) enhancement for Ciscos CiscoAssure endtoend solutions. NFFCs can filter based not only on Layer 3 IPs or VLANs but by Transport layer (Layer 4) application port addresses, as well. This ability adds a layer of security by preventing unauthorized applications on the network. This feature is critical in todays networks, especially those needing the ability to forward Voice Over IP traffic or video conferencing. The RSM or another switch running Multilayer Switch Protocol (MLSP) must still provide the routing functionality for the NFFC. Routers that can run MLSP and utilize the features of the NFFCs are the 4500, 4700, 7200, and 7500 series routers. MLSP is also used to flush cache entries when a topology change occurs and to make modifications to the access lists used for filtering. NFFCs populate their Layer 3 and 4 switching cache dynamically by observing and learning from the flow of data. They parse data using NetFlow Data Export to collect and export detailed information about data flows. This parsing is accomplished without introducing any additional latency into the switching or routing process. NetFlow Data Export provides a look into all Layer 2 port traffic, as well as Layer 3 statistics. It records the statistics into User Datagram Protocol (UDP) and exports them to any Remote Monitoring 2 (RMON2)compliant network analysis package, such as CWSI TrafficDirector. Some of the information that NetFlow Data Export provides is as follows: Source address Destination address Traffic type Byte count Packet count Timestamp
117
NFFC also provides protocol filtering to allow segmentation by VLANs. It can provide perport filtering of data in four different groups: Internet Protocol (IP) Internetwork Packet Exchange (IPX) AppleTalk, DECnet, and Banyan Vines Other group Tip By default, the IP group is on, but it can be turned off for the other groups listed. Remember, the NFFC and NFFC II do not process Token Ring packets. A port where a server resides and that is configured for IP can be turned off for other protocols such as IPX and AppleTalk. No broadcasts from these protocols will reach the server or enduser interface, because the NFFC will filter them. IGMP snooping is another feature of the NFFC II. Spawned by multicast applications such as video conferencing, it provides advanced features that help keep multicast traffic from flooding all the ports and degrading network performance. Using this feature, Catalyst 5500 switches are able to intelligently forward multicast to the correct destination. IGMP snooping reads IGMP messages from the endusers interface and learns their port location. This process allows the NFFC II card to forward multicast data streams out the port attached to the destination interface. Both cards also provide broadcast and unicast traffic filtering based on the ports membership in the different protocol groups in addition to the ports assigned VLAN. The NFFC II also has the ability to become a multicast forwarder. The ASICs on the NFFC II replicate multicast packets to allow wirespeed multicast forwarding. Route Switch Module The RSM enhances the Catalyst 5000 switch family by letting the switch provide some of the same Layer 3 switching capabilities as a router. As a result, a switch that normally forwards only Layer 2 command broadcasts and VLAN traffic and that relies on a router to forward traffic to other segments or VLANs can now route the traffic itself without relying on a router. The RSM contains a MultiChannel Interface Processor (MIPS) R47000, 32MB Dynamic RAM (DRAM) expandable to 128MB, a 16MB Flash card expandable to 40MB, 1.5MB highspeed RAM for the backplane interface, and 8MB of Flash memory. It connects directly into the backplane of the switch. The RSM adds to the Cisco IOS such features as multiprotocol routing for the Ethernet interfaces, security control, multicast control, interVLAN routing, and some basic QoS features. The routing protocols supported by the RSM are as follows: AppleTalk Enhanced Interior Gateway Routing Protocol (EIGRP) Hot Standby Routing Protocol (HSRP) Interior Gateway Routing Protocol (IGRP) Internet Protocol (IP) Internetwork Packet Exchange (IPX) NetWare Link Services Protocol (NLSP) Open Shortest Path First (OSPF) Routing Information Protocol (RIP) Routing Table Maintenance Protocol (RTMP) for AppleTalk A Catalyst 5500 has 13 slots available for additional modules. Slots 1 and 2 are reserved for the Supervisor Engine and a redundant Supervisor Engine. If there is no redundant Supervisor Engine card, up to seven RSMs can be installed in the switch in slots 2 through 12. The RSM interface to the Catalyst 5000 series backplane is through VLAN 0 mapped to channel 0 and VLAN 1 mapped to channel 1. The switch uses VLAN 0 to communicate with the RSM; the user cannot access VLAN 0. VLAN 1 is the switch default, but this default can be changed and mapped to a specific channel to 118
loadbalance the channels. VLAN 0s MAC address is the address assigned to the programmable ROM (PROM) on the line communication processor (LCP) located on the RSM. This MAC address can be used for diagnostic purposes and to identify the RSMs slot number. All the other VLANs are assigned the base MAC address from the RSM PROM, which is preprogrammed with 512 MAC addresses. The RSM can route up to 256 VLANs. Route Switch Feature Card The RSFC is another daughter card of the Supervisor Engine IIG or the Supervisor Engine IIIG. This card basically transforms your switch into a Level 3 router with lots of ports. Two great features of this card are Web browser support, which provides a graphical navigation tool through the Command Line Interface (CLI), and the integration of NetFlow switching services, which include those services built into the NetFlow Feature Card. Included in these features are security services, QoS, Cisco Group Management Protocol (CGMP), ProtocolIndependent Multicast (PIM), and queuing. This card builds on the RSP found in the Cisco 7200 series router and provides exceptional performance in the routing process for the Catalyst 5000 family of switches. It uses a R4700 150MHz processor, 128MB of DRAM memory, 32MB of flash memory, 2MB of highspeed packet memory, and 6MB of highspeed RAM for the Catalyst switching bus interface. This feature card, like the others, uses a Cisco IOS that supports a wide array of routed protocols and services. The following protocols are supported by the RSFCs IOS: AppleTalk Banyan Vines DECnet IP IPX Xerox Network Systems (XNS) Multilayer Switch Module The MSM is for the internal route processor used on the Catalyst 6000 family using the Supervisor Engine software version 5.2(1)CSX or later. This module uses the Cisco IOS which plugs directly into an interfaces switch backplane to provide Layer 3 switching. This module connects directly to the switch with four fullduplex Gigabit Ethernet interfaces. The Catalyst switch sees the MSM as an external route processor not connected to the switch itself. You can group the four Gigabit interfaces into a single Gigabit EtherChannel or configure them as independent interface links. The MSM supports channeling trunks for use with 802.1Q or InterSwitch Link (ISL). The portchannel interface on the MSM must be configured with one subinterface for every VLAN on the switch, providing interVLAN routing with EtherChannel and trunk ports. Each of the four Gigabit interfaces must be independently configured as a separate VLAN trunk port or nontrunked routed interface. The MSM supports the following routing protocols: Interior Gateway Routing ProtocolIGRP is a Ciscodeveloped distance vector routing protocol. A distance vector routing protocol sends all or a portion of its routing table in the form of routing update messages at regular intervals to each neighboring router. As routing information proliferates through the network, routers can calculate the distance to all the nodes in the network. IGRP uses a combination of metrics such as internetwork delay, bandwidth, reliability, and load factors to make routing decisions. Enhanced Interior Gateway Routing ProtocolEIGRP is an enhanced version of IGRP that combines the advantages of the linkstate routing protocols with distance vector protocols. EIGRP uses the Diffusing Update Algorithm (DUAL) and includes features such as variablelength subnet masks, fast convergence, and multiple network layer support. When a network topology change occurs, 119
EIGRP checks its topology table for a suitable new route to the destination. If a route exists in the table, EIGRP updates the routing table with the new route and purges the old route from the table. Unlike other routing protocols, EIGRP saves WANlink bandwidth by sending routing updates only when routing information changes. It also takes into account the available bandwidth between the paths to determine the rate at which it transmits updates. Open Shortest Path FirstOSPF is an IPbased linkstate routing protocol designed to overcome the limitations of RIP. It sends linkstate advertisements (LSAs) to all other routers within the network. Information is included in the LSAs about the interfaces on which OSPF is running and the metrics used. As routers collect the linkstate information, they use the Shortest Path First (SPF) algorithm to calculate the shortest path to each node. Routing Information ProtocolRIP is another distancevector routing protocol that works well in small networks. However, in larger, more complex internetworks, RIP has many limitations, such as a maximum hop count of 15, lack of support for variablelength subnet masks (VLSMs), slow convergence, and inefficient use of bandwidth.
120
Figure 6.1: The Catalyst Supervisor Engine I and II. Media Access Control Addressing and VLANsSupport for 16,000 active MAC addresses for up to 1,024 VLANs allocated dynamically between active ports. ManagementSupport for Simple Network Management Protocol (SNMP) for statistical management. The SE also supports access and management through the console and Telnet interface. The SE II includes a few upgraded features, such as: Support for redundant supervisor engines Support for redundant clock modules Support for coreswitching logic The Supervisor Engine II G supports additional features, such as: An optional NetFlow Feature Card II (NFFC II) chipset built in Route Switch Feature Card (RSFC) Modular uplink ports
Figure 6.2: The Supervisor Engine III. 150MHz RISC 4700 processor Three switching buses that can simultaneously provide 1.2GB of throughput, resulting in a 3.6Gbps throughput engine Two Flash PC card slots that can be used for memory upgrades or to serve as additional I/O devices The Supervisor Engine III G shown in Figure 6.3 provides the following additional features:
121
Figure 6.3: The Catalyst Supervisor Engine III G. Gigabit Interface Converter (GBIC) for use with multimode fiber (MMF) or singlemode fiber (SMF) interfaces using SC connectors An MCF5102 processor
Etherport Modules
One of the most common interfaces found on switches is the Ethernet port. Leaving an Ethernet interface to autonegotiate the speed and duplex of a port should allow any device to connect to it. Many times, however, you must adjust the speed and duplex configuration so the device can talk on the network. A good example of a switch using Ethernet ports is shown in Figure 6.4.
Figure 6.4: The 5000/5500 and the 5002 chassis with installed Ethernet modules. There are three types of Ethernet interfaces: Ethernet, Fast Ethernet, and Gigabit Ethernet. The same port speed and duplex must be used on both interfaces participating in the pointtopoint link. Ethernet and Fast Ethernet ports can autonegotiate the duplex mode, using either half or full duplex. Fast Ethernet interfaces can be set to autonegotiate the port speed. Gigabit Ethernet ports are always full duplex. To set the port speed on a Fast Ethernet port on a Set/Clear commandbased switch, use the following command:
set port speed mod_num/port_num {10|100|auto}
122
The auto syntax allows the port to autonegotiate the port speed. On an Ethernet or Fast Ethernet interface, use the command
set port duplex mod_num/port_num {full|half|auto}
to set the port duplex mode. Again, the auto syntax can be used to allow the port to autonegotiate the duplex mode.
Port Security
You can use port security to block a NIC on an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different than the MAC addresses specified to access that port. There must be at least one default MAC address per port for the port to be secured. The total number of MAC addresses on any port cannot exceed 1,025. You must also follow other guidelines when configuring port security: You cannot configure port security on a trunk port. Port security is not supported on the threeport Gigabit Ethernet module. You cannot enable port security on a Switched Port Analyzer (SPAN) destination or source port. You cannot configure dynamic, static, or permanent CAM entries for a secure port. When port security on a port is enabled, any static or dynamic CAM entries associated with the port are cleared. Any currently configured permanent CAM entries are treated as secure.
2. Enter the show module command to determine what cards are present:
Coriolis5000>(enable) show module Mod ModuleName Ports ModuleType 1 0 Supervisor III 2 24 10/10ObaseTX Ethernet 3 1 Route Switch Mod MACAddress(es) Hw Model WSX5530 WSX5225R MX5302 Fw SerialNum 010854649 012453433 007673460 Sw Status ok ok ok
123
1 00400b805400 to 00400b8057fi 2 00400b035d58 to 00400b035d6f 3 00430d914566 to 00430d91dc67 Mod SubType SubModel SubSerial SubHw 1 NFFC II WSF5531 0036457641
Lets take a look at this process from the initial User EXEC mode prompt: 1. On the switch console, enter the enable command and the password to enter Privileged mode:
Coriolis5000# enable Password: ******** Coriolis5000>(enable)
2. To open a session from the console port for the RSM, use the following command:
Coriolis5000> session 3
2. To open a session from the console port for the RSM, use the following command:
Coriolis5000> session 3
124
Router>
Warning When you make changes in this mode, they must be saved to NVRAM. Otherwise, the next time you recycle the switch, the changes will be lost. The command to save changes is copy runningconfig startupconfig. 4. Assign the RSM a unique hostname with the following command. Call it RSM1:
Router>(config)# hostname RSM1 RSM1>(config)#
Tip
The hostname can be up to 255 characters, using alphanumeric characters only. Although in this example we use uppercase to identify the hostname, in some instances when you connect to the switch with different software, the hostname may appear in lowercase.
In this example, 3 indicates the module number/slot number, 1 indicates the port number, and 2 indicates the number of the subinterface to be configured. Note No changes take effect until the no shutdown command is issued. 2. Once in Interface Configuration mode, you can configure the port for the encapsulation type and identify the VLAN number that will be carried by the port. The most common encapsulation type is ISL; this will be the encapsulation type configured in our example. Configure the interface for VLAN 2. Each VLAN packet destined for a nonlocal network is tagged with a VLAN ID within the packet header, to help identify the VLAN to the subinterface:
Coriolis5000(configif)#encapsulation isl 2
3. Assign the subinterface its own unique IP address and subnet mask. To do this, use the following commands followed by a no shutdown command to apply the changes and exit:
Coriolis5000(configif)#ip address 130.77.20.18 255.255.254.0 Coriolis5000(configif)#no shutdown Coriolis5000(configif)#exit
125
2. Assign a network number to the route processor on the RSM by using the network command followed by the network number just as you would use with an external Cisco routers interface:
RSM1(configrouter)#network 172.16.0.0
126
Note The commands for configuring the RSM, RSFC, and MSM are the same.
Warning
In order to keep new changes when the switch is cycled, dont forget to save the configuration to the NVRAM.
2. Create one VLAN interface for each VLAN configured on the switch: 127
RSM1>enable RSM1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. RSM1(config)#interface vlan 2 RSM1(configif)# %LINEPROTO5UPDOWN: Line protocol on Interface Vlan2, changed state to down
Repeat these steps for each VLAN. After you successfully configure the network, all end stations should be able to communicate with one another. Communication between hosts in the same VLAN is handled only by the switches. All interVLAN traffic must be routed by the RSM.
4. Assign a network number to the VLAN and an encapsulation method; then exit:
RSM1(configif)#ipx network 50 encapsulation snap RSM1(configif)#^Z RSM1#
2. Specify a VLAN interface number on the RSM and assign a cable range to the VLAN:
RSM1(config)#interface vlan100 RSM1(configif)#appletalk cablerange 200200
128
Router#
129
006015be5580
2/1
130
Port SingleCol MultiColl LateColl ExcessCol CarriSen Runts Giants 2/3 0 0 0 0 0 0 0 LastTimeCleared Fri Nov 24 2000, 21:53:38
3. Configure a password for the switch. Press Enter for the old password if none has ever been configured:
Catalyst5000> (enable) set password Enter old password: Enter new password: coriolis1 Retype new password: coriolis1 Password changed.
131
4. Configure the password for Enable mode. Press Enter for the old password if none has ever been configured:
Catalyst5000> (enable) set enablepass Enter old password: Enter new password: coriolis2 Retype new password: coriolis2 Password changed. Catalyst5000(enable)
5. Enter the IP address and the default gateway (router) for the switch on the Supervisor Engine module SC0:
Catalyst5000> (enable) set interface sc0 63.78.39.174 255.255.255.0 Interface sc0 IP address and netmask set. Catalyst5000>(enable) set ip route default 38.68.127.254 Route added.
6. Enable trunking on interface 2/2 to complete your trunk link to the 1912EN switch and on interface 2/24 to the router for interVLAN routing:
Catalyst5000> (enable) set trunk 2/2 mode on isl Port(s) 2/2 trunk mode set to on. Port(s) 2/2 trunk type set to isl. 2000 Nov 19 12:31:54 %DTP5TRUNKPORTON:Port 2/2 Catalyst5000> (enable) set trunk 2/24 mode on isl Port(s) 2/24 trunk mode set to on. Port(s) 2/24 trunk type set to isl. 2000 Nov 19 12:32:46 %DTP5TRUNKPORTON:Port 2/24
7. Enable the switch to be a VTP client for the Coriolis VTP domain. Doing so will propagate the VLAN information from the 1912EN switch:
Catalyst5000> (enable) set vtp domain ? Usage: set vtp [domain <name>] [mode <mode>] [passwd <passwd>] [pruning <enable|disable>] [v2 <enable|disable> (mode = client|server|transparent Use passwd 0 to clear vtp password) Usage: set vtp pruneeligible <vlans> (vlans = 2..1000 An example of vlans is 210,1000) Catalyst5000> (enable) set vtp domain Coriolis mode client VTP domain Coriolis modified.
Related solution: Testing the Supervisor Engine Hardware on a Set/Clear CommandBased Switch
132
Several other commands can be used to configure the Supervisor Engine. The following list shows some of them: set boot configregister ignoreconfig enableSets the switch to ignore the contents of the configuration on NVRAM at startup set boot configregister 0xvalue [module number]Sets the configuration register value set boot system flash device:[filename] [prepend] [module number]Sets the system image to add to the BOOT environment variable clear boot system flash device:[filename] [module number]Clears a specific image from the BOOT environment variable clear boot system all [module number]Clears the entire BOOT environment variable show boot [module number]Shows the current configuration register, BOOT environment variable, and configuration file (CONFIG_FILE) environment variable settings
System Bootstrap Version: 3.1.2 Hardware Version: 2.0 Model: WSC5000 Serial #: 011454261 Mod Port Model 1 0 WSX5530 Serial # Versions 011454261 Hw : 2.0 Fw : 3.1.2 Fw1: 4.2(1) Sw : 5.5(2) WSF5521 011455134 Hw : 1.1 WSX5225R 013405523 Hw : 3.1
24
133
Fw : 4.3(1) Sw : 5.5(2) DRAM FLASH NVRAM Module Total Used Free Total Used Free Total Used Free 1 32640K 20331K 12309K 8192K 5548K 2644K 512K 185K 327K Uptime is 2 days, 19 hours, 3 minutes Catalyst5000> (enable)
You can also use the show module command, as shown in the following output:
Catalyst5000> (enable) show module Mod 1 2 Slot 1 2 Ports 0 24 ModuleType Supervisor III 10/100BaseTX Ethernet SerialNum 00011454261 00013405523 Hw 2.0 3.1 Fw 3.1.2 4.3(1) Sw 5.5(2) 5.5(2) Model WSX5530 WSX5225R Sub yes no Status ok ok
MACAddress(es) 0050bda0b000 to 0050bda0b3ff 00500fb7ff50 to 00500fb7ff67 SubType SubModel SubSerial SubHw NFFC WSF5521 0011455134 1.1
Catalyst5000> (enable)
2. Create a subinterface for each VLAN and assign a description (optional), an IP address for the VLAN, an encapsulation type, and the VLAN number:
Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# interface fastethernet 0/2.2 description vlan2 ip address 63.78.39.2 255.255.255.0 encapsulation isl 2 interface fastethernet 0/2.3 description vlan3 ip address 63.78.39.3 255.255.255.0 encapsulation isl 3
Tip Dont forget to save your configuration. Use the show config command on each device to verify the configuration. 134
2. Identify the priority for the HSRP interface. The interface with the highest priority becomes active for that HSRP group; the default is 100:
standby [groupnumber] priority priority
3. You can optionally configure the interface to preempt the current active HSRP interface and become active if the interface priority is higher than the priority of the current active interface:
standby [groupnumber] preempt [delay delay]
4. You can also optionally set the HSRP Hello timer and holdtime timer for the interface. The default values are 3 (Hello) and 10 (holdtime). All the interfaces in the HSRP group should use the same timer values:
standby [groupnumber] timers hellotime holdtime
5. You can optionally identify a cleartext HSRP authentication string for the interface. Again, all HSRP member interfaces in the HSRP group should use the same authentication string:
standby [groupnumber] authentication string
Now that you have seen the steps to configure HSRP on an interface, lets take a look at an example of configuring HSRP on two different interfaces connected to the same network segment:
RSM1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. RSM1(config)#ip routing RSM1(config)#router rip RSM1(configrouter)#network 172.16.0.0 RSM1(configrouter)#interface vlan10 RSM1(configif)#ip address 172.16.10.1 255.255.255.0 RSM1(configif)#no shutdown RSM1(configif)#standby 10 ip 172.16.10.10 RSM1(configif)#standby 10 priority 110 RSM1(configif)#standby 10 preempt RSM1(configif)#standby 10 timers 5 15 RSM1(configif)#standby 10 authentication Secret RSM1(configif)#interface vlan200 RSM1(configif)#ip address 172.16.20.1 255.255.255.0 RSM1(configif)#no shutdown RSM1(configif)#standby 20 ip 172.16.20.10 RSM1(configif)#standby 20 priority 110 RSM1(configif)#standby 20 preempt RSM1(configif)#standby 20 timers 5 15 RSM1(configif)#standby 20 authentication Covert RSM1(configif)#^Z RSM1# RSM2#configure terminal Enter configuration commands, one per line. End with CNTL/Z. RSM2(config)#ip routing RSM2(config)#router rip RSM2(configrouter)#network 172.16.0.0 RSM2(configrouter)#interface vlan10 RSM2(configif)#ip address 172.16.10.2 255.255.255.0 RSM2(configif)#no shutdown RSM2(configif)#standby 10 ip 172.16.10.10 RSM2(configif)#standby 10 preempt RSM2(configif)#standby 10 timers 5 15
135
RSM2(configif)#standby 10 authentication Secret RSM2(configif)#interface vlan20 RSM2(configif)#ip address 172.16.20.2 255.255.255.0 RSM2(configif)#no shutdown RSM2(configif)#standby 20 ip 172.16.20.10 RSM2(configif)#standby 20 preempt RSM2(configif)#standby 20 timers 5 15 RSM2(configif)#standby 20 authentication Covert RSM2(configif)#^Z RSM2#
136
Chapter 7: IP Multicast
In Depth
Over time, our use of computers has moved from the local desktop to the local network. Most of this network traffic consists of using local network sources, such as printing and file transfers. As our personal computers become more powerful, the applications that we use now contain more audio and video components. Weve now started to move this traffic onto the network. Today, it is still the norm for network traffic to be between one sender and one recipient. That is slowly changing. As different network resources become available, new resources such as messaging, multimedia, distance learning, and Internet access are causing a large increase in data traffic. This type of traffic usually involves one server sending a data stream to multiple users; a good example of this would be video conferencing and software updates in the intranet. This type of traffic can be very demanding in terms of data usage. For example, if 100 people want a 1.5MB file, the result is a demand for more than 150MB of datalink usage. Even on a T3, thats a lot of simultaneous use. Whats more, this calculation doesnt take into account the rest of the users applications and data requirements. One way to provide users with this highbandwidth information and at the same time minimize the traffic on the network is to utilize IP multicast. IP multicast enables data to be sent once and received by all the recipients that requested it. The concept behind IP multicasting is that end recipients join a multicast group. The information that is requested is then delivered to all members of that group by the network infrastructure. The sender of the data doesnt need to know anything about the recipients. In this manner, only one copy of a multicast message will pass over any link in the network, and copies of the message will be made only where the paths diverge. This is a much more effective method of delivering traffic destined for multiple locations, and it provides significant performance improvements for the network. In this chapter, we will explain the concepts behind IP multicasting. We will cover the types of multicast traffic and introduce you to the way multimedia traffic types are routed on the network. Finally, we will look at the methods to configure IP routing on your Catalyst switches and how to manage the resulting multicast traffic. We will begin with a discussion of the different types of multicast traffic.
IP Multicasting Overview
IP multicasting is an extension of the standard IP protocol and is described in RFC 1112, Host Extensions for IP Multicasting. IP multicasting is the transmission of an IP datagram to a group identified by a single IP destination address. A multicast datagram is delivered to all members of its destination host group using User Datagram Protocol (UDP). Membership in these groups is unrestrictedhosts can be members of multiple groups, and they may join or leave at any time. IP multicast datagrams are handled by multicast routers. A host transmits an IP multicast datagram as a local network multicast that reaches a multicast router. The router examines the packet and begins to provide the host with the requested multicast traffic. If the router is not receiving the requested multicast traffic, it will pass the request to other multicast routers. IP traffic can travel the network in one of three ways: Broadcast 137
Unicast Multicast
Broadcast
In its simplest form, broadcast traffic consists of packets that reach every point of the network. In a typical network, broadcasts are stopped at the router. You can set the router to forward broadcasts, but doing so is not very efficientit creates a lot of traffic on the network and slows the end users machines. Every host on the network must process the packet to see if it is destined for that host. Data broadcasts are typically small frames used in the local networkso, the performance effect is negligible, unless there is a broadcast storm. Note In a broadcast storm, an incorrect packet is broadcast on the network. This causes most hosts to respond with incorrect answers, which in turn causes even more hosts to respond again. This process continues until the network can no longer carry any other traffic. A broadcast storm can also occur when there is more than one path through the network, allowing broadcasts to circle the network until there are so many that the network comes to a stop. Multimedia broadcasts, in contrast, can be huge packets. Processing these types of broadcasts can quickly use up all the available bandwidth on the network and bring the end station to a crawlparticularly if you are in a shared 10BaseT environment. Figure 7.1 illustrates broadcast traffic in the network.
Unicast
In unicast, a single packet is sent from the source to the destination. It is a onetoone relationship: For every packet that reaches the destination, one packet was sent by the source. This process is fine if the source is having different conversations with only a few hosts. Now, imagine that same source talking to hundreds of hosts on the same conversationeach identical packet must be generated by the source and must travel on the network. Audio and video transmissions are so large that a highbandwidth link is consumed very quickly. A 100Mbps link can support about 60 to 70 fullscreen, fullmotion video streams if each stream uses approximately 1.5Mbps of servertoclient bandwidth. You will need gigabitpersecond (Gbps) links between the server and the network in order to provide one audio/video broadcast to a couple hundred hosts. Unicast multimedia applications do not scale very well. Figure 7.2 illustrates unicast traffic flow.
138
Multicast
Multicast is a combination of broadcast and unicast. It sends one copy of the packet to many hosts that requested it, thereby using less bandwidth. It also saves bandwidth by not sending the packet to the portion of the network whose hosts didnt request the transmission. Multicast accomplishes this task by transmitting to an identified group, called a multicast group, rather than to an individual host. Each interface/host can be a member of multiple multicast groups. The membership is dynamic; a host can leave and join any time it wants. The traffic is also not limited by any boundary; it can reach the farthest point of the Internet. Figure 7.3 illustrates multicast traffic flow.
Figure 7.3: Multicast traffic flow. The characteristics of multicast enable it to take three different forms: OnetomanyOnetomany is the most common form of multicast traffic. Examples include database updates, live concerts, news, music/audio broadcasts, announcements, lectures, and many more. ManytooneManytoone multicasts are less common; they include data collection, auctions, and polling. ManytomanyManytomany multicasts are rare, but they are gaining popularity as programmers begin to utilize multicast in some imaginative ways. Chat groups, multimedia conferencing, concurrent processing, interactive music sessions, and collaboration are examples of manytomany multicasts. But dont forget the rising star (and my favorite): interactive multiplayer games.
Want to Join the Military? The U.S. military has one of the largest interactive multicastbased wargame simulations Ive heard of. The battlefield is divided into map grids, and each grid square is a multicast group. Individuals communicate with 139
each other and with the server by multicast. When an individual driving a tank or a fighter enters a grid square, it joins the multicast group to receive that squares simulation traffic. As the individual moves from square to square, the individuals multicast group membership changes.
IP multicasting uses Class D network addresses to route data to different groups and hosts. Most basic networking classes cover Classes A, B, and C, but usually dont go into depth about Classes D and E. Maybe you were told that they are used for experimental purposes and not to worry about them. Well, as you will see in the next few sections, things have changed.
IP Multicasting Addresses
IP multicasting uses a variation of a Class D network address space assigned by the Internet Assigned Number Authority (IANA). A Class D address is denoted with a binary 1110 prefix in the first octet. The range spans from 224.0.0.0 to 239.255.255.255. Applications use one of the addresses in this range as the multicast group address on the Internet. Note A permanent IP multicast address is rarely assigned to an application. Instead, the address is assigned to a specific network protocol or network application. Applications on the Internet must dynamically request a multicast address when needed and release the address when it is no longer being used. Due to the nature of multicast addresses, they are frequently referred to as multicast groups. In addition, certain wellknown groups have been identified by the IANA. These are detailed in RFC 2365 and are known as administrative scopes. We will discuss this topic later in this section.
Figure 7.4: The IP multicast address structure. Lets take a quick look at how this process works. Consider the multicast address 224.138.8.5:
1110 0000 1000 1010 0000 1000 0000 0101 XXXX XXXX X000 1010 0000 1000 0000 0101
140
give you 0a:08:05. Put that result together with 01:00:5e: and you get 01:00:5e:0a:08:05. Here is another example, using the multicast address 224.127.15.10:
1110 0000 0111 1111 0000 1111 0000 1010 XXXX XXXX X111 1111 0000 1111 0000 1010
yields 7f:0f:0a. Again, you put this result together with 01:00:5e to get 01:00:5e:7f:0f:0a. This process creates an ambiguity when a Layer 3 IP address is mapped to the Layer 2 MAC address. A 32to1 relationship (2^5) exists, meaning that for every multicast MAC address, there are 32 corresponding IP addresses. Figure 7.5 shows the MAC address ambiguities.
Figure 7.5: The 32to1 relationship of IP addresses to MAC address. A host that is set up to receive multicast group 224.127.15.10 will have the network interface card interrupt the CPU when a frame with the destination MAC address 01:00:5e:7f:0f:0a arrives. This MAC address is also used by 31 other multicast groups. If any of these groups are active on the LAN, the CPU will have to examine the frames for both multicast groups to decide if the frame that interrupted the CPU belongs to the desired multicast group. This process could degrade the performance of the host PC if many multicast groups are on the network. You must consider this fact when assigning multicast groups to applications. Special Multicast Addresses The range from 224.0.0.0 to 224.0.0.255 is reserved for use on the network by network protocols. Cisco routers by default do not forward IP multicast frames that arrive for this range. Routers that forward these packets are known as broken routers. Routing protocols use this range to communicate with each other (see Table 7.1).
Destination All systems in this subnet All routers in this subnet Distance Vector Multicast Routing Protocol Open Shortest Path First (OSPF) routers Open Shortest Path First (OSPF) designated routers Routing Information Protocol 2 (RIP2) routers Internet Gateway Routing Protocol (IGRP) routers Dynamic Host Configuration Protocol (DHCP) server/relay agent .10 All ProtocolIndependent Multicast (PIM) routers The range from 224.0.1.0 to 224.1.255.255 is assigned by IANA to network protocols and network applications on a permanent basis. To obtain one of these addresses, you must have a really good technical justification. The range from 239.0.0.0 to 239.255.255.255 contains administratively scoped addresses for use in private networks, similar to the use of 10.x.x.x for IP addresses. The network administrator must ensure that this kind of multicast traffic does not leave the private network. The range from 224.2.0.0 to 233.255.255.255 is dynamically assigned to applications that require a multicast address. This process is similar to the way Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts. The multicast address is allocated or leased when its needed and released to be used by others when its not needed. The Session Directory (SDR) program currently is the most widely used method of dynamically allocating IP multicast addresses. The Internet Engineering Task Force (IETF) is considering modifying SDR to enable it to scale well or to define and develop a new form of dynamic multicast address allocation. Note IANA has started to assign blocks of multicast addresses from this range. To review a current list of multicast addresses, visit www.isi.edu/innotes/iana/assignments/multicastaddresses.
Address .1 224.0.0.2 .4 .5 .6 .7 .8 .9
shortest path tree (SPT) because it uses the shortest path to reach the destination. This design functions very well in a onetomany model, but it has drawbacks when used in a manytomany model. For example, a live concert has only one source, so there will be only one distribution tree in the router for the multicast group. But in a video conference with 20 participants, you will have 20 different trees for the same multicast group. In a shared tree design, the entire multicast group utilizes the same distribution path. The root is placed at a selected point in the network. Protocol Independent Multicast (PIM) refers to this router/point as the rendezvous point; CoreBased Tree (CBT) multicast routing protocol refers to this router as the core. All multicast traffic for that group is first sent to the root/rendezvous point. It then flows out the branches to the destination. Only one distribution tree exists for the multicast group, which in turn means each router only has to keep track of one path for that multicast group. Note CBT is a rarely implemented multicast routing protocol. It is in a constant state of development. The newest version (version 3) is already in draft form, even though the current version 2 is not yet widely used. Unfortunately, there is no backward compatibility from version 3 to version 2. It will be a while before you see mainstream hardware support for this protocol. PIM, which is more commonly used, will be discussed later in this chapter.
The only difference between the source tree and the shared tree in a onetomany multicast is that the root moves from the first router to some other point in the network. In a manytomany multicast, the differences and advantages become more significant. The shared tree is subdivided into unidirectional and bidirectional trees. In the unidirectional shared tree, the multicast traffic can first be unicast to the root for distribution to the rest of the multicast group; it can also be sent as a multicast using the source tree model with the source as the root and the shared tree root as the branch. A bidirectional shared tree takes advantage of the existing routing table to distribute multicast traffic to the multicast group. Multicast traffic can go back the same path by which it came to the rendezvous point and be distributed from the root. Before the traffic reaches the root, it follows the multicast routing table to the other destinations. This way, the multicast traffic flows only one time on any path on the network.
Multicast Forwarding
Lets look at how the routers make the distribution tree. In unicast traffic, the router makes a forwarding decision based on the destination address. It looks up the address in the routing table and forwards the packet to the next hop via the associated interface. In multicast traffic, rather than a single IP address, a multicast address is associated with multiple hosts; this addressing makes the forwarding decision more complex. The router utilizes Reverse Path Forwarding (RPF) to make the forwarding decision. Instead of using the destination address, the router uses the source address. It checks the source address and determines whether the packet comes from an interface that leads back to the source address. If the packet did not arrive on an interface that leads back to the source, the RPF check fails and the packet is discarded. If the packet comes from the interface that leads back to the source, the packet is forwarded out the other interfaces on the router. The router determines which interface is on the reverse path back to the source using either the unicast routing table or a separate multicast routing table. This routing decision is based on the multicast routing protocol.
IGMP Protocols
In order to build multicast routes for each multicast group, routers communicate with each other via one of the following protocols: DVMRPDistance Vector Multicast Routing Protocol PIMProtocol Independent Multicast MOSPFMulticast Open Shortest Path First
143
Distance Vector Multicast Routing Protocol DVMRP is based on RIP and is widely used. Just like RIP, it uses a distance vector (hops) and sends out periodic route updates. Its different from RIP in that it is classless and has a hop limit of 32 rather than 16. When DVMRP is first implemented on a router, it sends a probe packet with its IP address out all the interfaces. Another DVMRP router receives the probe and adds the IP address to its list of DVMRP neighbors on that interface. It then sends back a probe with its IP address and the first routers IP address. When the first router receives a probe with its own IP address, it knows that it has a twoway adjacency between itself and the other router. The two routers will then begin to exchange routing information. As stated earlier, the router uses RPF to ensure that a packet arrives on the correct interface. If the packet fails the RPF check, it is discarded. When it passes the RPF check, the packet is forward out all other interfaces. As the multicast traffic is sent out, it reaches every point in the network. Thats great if every host on the network wants the multicastbut if part of the network does not need the multicast, the traffic is just taking up bandwidth. To overcome this problem, the multicast routers use a process called pruning. If the router is not connected to a recipient (multicast destination), it sends a prune message to the upstream router to stop the flow of unnecessary multicast traffic. The upstream router responds by pruning the connection to the router. If the interface on the upstream router is connected to another router, it also must send a prune message before the upstream router will prune traffic from that interface. As the prune message traffic flows from one router to another, the multicast traffic is only sent to the portion of the network that wants it. If the router wants to receive multicast traffic after being pruned, it must send a graft message to the upstream router. When the upstream router receives the graft message, it sends out a graftack message. If that router is not receiving the multicast traffic, it will also send a graft message to its upstream router. The graft message will be sent until it reaches a router that is receiving the multicast traffic. DVMRP sends out periodic updates. It cannot be used in a network with a diameter greater than 31 hops, and it does not consider the bandwidth of the link. It was the first multicast routing protocol, so, despite its limitations, it is deployed in the Internet Multicast Backbone (MBONE). The MBONE is used primarily to transmit desktop video conferencing anddue to the use of DVMRP as its protocolit has been responsible for several Internet meltdowns when the volume of traffic has become overwhelming. Protocol Independent Multicast Protocol Independent Multicast (PIM) is an IP multicast routing protocol that is independent of the unicast routing protocol on the router. It does not maintain a multicast routing table, but instead uses the unicast routing table. The routing table can be populated in many ways: OSPF, static routes, Enhanced IGRP (EIGRP), Border Gateway Protocol (BGP), and so on. By using the existing routing table to perform reverse path forwarding checks, PIM sends out no updates and the overhead on the router is significantly reduced. PIM operates in two modes: Dense mode (DM)Utilizes the source tree distribution model. It is designed to operate in an environment where bandwidth is plentiful and the multicast traffic is destined for all LANs. DM is suitable for environments with a small number of senders and many recipients. DM is also a good choice in hightraffic networks with a constant stream of multicast traffic. PIMDM enabled routers that have no local members of a multicast group will prune themselves from that group with prune messages sent to neighboring IP multicast routers. The neighbors that receive the prune messages stop sending multicast messages and start a timer. When this timer expires, they begin sending multicast messages to the pruned group again. This process is known as the broadcast and prune cycle. Sparse mode (SM)Uses the unidirectional shared tree design. It is designed to operate in environments where group members are distributed across many regions of the Internet and bandwidth may not be widely available. SM does not imply that the group has few members, just that they are widely dispersed across the Internet. The objective of SM is to prevent situations in which a relatively small number of devices want to participate in a multicast environment and cause the multicast traffic to overwhelm the network. SM is designed to limit multicast traffic so that only those routers interested in receiving traffic for a particular group participate in it. Each router that wishes to 144
receive the multicast traffic sends a PIM join message toward the root node (rendezvous point). As this join message travels up the tree, the multicast routers along the way forward the requested traffic back down the tree to the destination. To put it in a simple form, PIMDM will send the multicast traffic everywhere until it is told not to. PIMSM will not send any multicast traffic until it is asked to. Note Cisco routers use PIMSM. They can receive and forward messages to DVMRP neighbors, but they do not actually implement DVMRP in their networks. Multicast Open Shortest Path First Multicast Open Shortest Path First (MOSPF) is an extension of the Open Shortest Path First (OSPFv2) unicast routing protocol. OSPF must be running on the network for MOSPF to work. OSPF is a linkstate routing protocol that allows a network to be split into multiple areas. The OSPF linkstate database provides the complete map of an area at each router. MOSPFs extension is a new linkstate advertisement (LSA) to distribute multicast group membership throughout the OSPF area. The group membership LSA includes the multicast group address, the router ID, and the interfaces on the router that have members in the multicast group. This information reaches all the MOSPF routers in the area, so each router will have a complete database of all the multicast group members. Each router will then construct a source tree from the linkstate information. MOSPF is a very bandwidthefficient multicast routing protocol, but it does have a downside: It is very CPU intensive. If the network topology is not stable, the router will have to recalculate the routing tabling. Multicast increases the problem, because each membership change will cause a new computation. In a manytomany multicast environment, by utilizing the source tree model, a new SPT is created for each source. Because of this, MOSPF is most suitable in a stable environment where the location of sources, number of sources, number of groups, and group membership are under tight control.
IGMPv1
You may wonder why were explaining version 1, when version 2 is the standard. Well, there are PCs that still use IGMPv1. Windows 95 (the OS that never goes away) supports IP multicast utilizing IGMPv1, unless you download an upgrade version of Microsofts Winsock dynamic link library (DLL). (Windows 98 and Windows 2000 have native support for IGMPv2.) The same situation applies to the different versions of Unix. Unless all of the computers on your network are running the latest version of an OS or youve installed a patch, youre going to have computers using IGMPv1. IGMP uses a query and response format. The router sends a host membership query message to the allhosts multicast address, 244.0.0.1. (If multiple routers are on the network, one will be designated to send the message.) When a host receives the query message, it responds with a membership report to the multicast group of which the host is a member. If more than one host on the subnet belongs to the same multicast group, it will see the membership report and not respond to the membership query. As the router receives the 145
responses, it will build a list of all the multicast groups for that interface. Any other router on the same subnet will also receive the responses and will have the same information. Note A host does not have to wait for a host membership query to send out a membership report. It could send an unsolicited membership report, a process sometimes mistakenly referred to as sending out an IGMP join to the router. To minimize the traffic, IGMP utilizes a report suppression mechanism. The host starts a countdown with a random value between zero and the maximum response interval for each multicast group to which it belongs. When the value reaches zero, the host sends a membership report. All members of the same multicast group receive this message and reset their own countdown values. As long as the router receives a membership response, it will not send out a host membership query. To leave a multicast group, a host simply stops sending membership responses. If no group members send member responses, the router begins its own timer (usually one minute). It will then send a membership query and reset its timer. If the router sends a membership query three times and does not get a reply, it will stop sending the multicast groups traffic out that interface. The time interval from when the last host leaves the multicast group until the router stops transmitting traffic can create network problems. Assume that a user is trying to find a channel (multicast group) on a multimedia application. As the user surfs the different channels to locate the one he wants, he will join multiple multicast groups. If he goes through six channels before finding the one he wants, the router will transmit all six multicast groups traffic until the timer runs out. This process may not affect the user much, but if the traffic is coming across a WAN link, the unnecessary highbandwidth multimedia traffic will bog down the link. IGMPv2 was developed with this situation in mind.
IGMPv2
IGMPv2 functions the same as version 1, with the following enhancements: Querier election processAllows the routers on the local subnet to elect the designated IGMP querier utilizing IGMP rather than using an upperlayer protocol, as in version 1. The router with the lowest IP address is elected and is responsible for sending out the multicast query for that subnet. Maximum response timeAllows the router to set an upper limit for the value the host will use to determine when to send a membership report. This limit enables you to finetune your IGMP traffic. Multicast groupspecific query messageAn enhancement to the original allhost membership query. Rather that being sent to everyone, a multicast query will be sent only to the specific multicast group. Leave group messageThe biggest improvement in IGMPv2. In version 2, a host joins a multicast group the same way as in version 1. However, the process of leaving is completely different. Instead of just keeping quiet, the host sends a leave group message to the allrouters (224.0.0.2) multicast group. When a router receives this message, it sends out a multicast groupspecific query. (The router must send this query because it only keeps a list of multicast groups associated with each interface. It doesnt know if any other multicast group members exist.) When another host on the same subnet receives the query, it responds with a membership report. The router will then maintain that multicast groups association to that interface. Just as in version 1, other members of the same multicast group will see the reply and not respond to the query. If the host is the last member of the multicast group and no other host responds to the query, the router will wait a last member query interval (default value one second) and send out another groupspecific query. If it doesnt receive any reply to this second query, the router will stop transmitting multicast traffic out that interface. This process results in a much faster response time than in version 1 when a host leaves the multicast group. Tip By default, Cisco routers utilize version 2. If any host on the subnet does not support version 2, you must change the router to version 1.
146
Time to Live
Using the IP time to live (TTL) field is an important IGMP topic. The TTL field is a value in an IP packet that tells a network router whether the packet has been in the network too long and should be discarded. A multicast datagram with a TTL of 0 is allowed only on the same host. A TTL of 1 (the default value) is allowed only on the local subnet. If a higher TTL is set, the router is allowed to forward the packet. By increasing the TTL value, a multicast application can look further from its origin for a server. This process works in the following manner: The host first sends a multicast message with a TTL of 1. If it doesnt receive a response, it sends a multicast message with a TTL of 2, then 3, and so on, until it reaches its limit. In this manner, the application can locate the nearest server that can be reached. You can also change the multicast TTL value on a routers interface to prevent multicast traffic from leaving your network. If you set the TTL value higher than the multicast applications TTL value, the traffic will never leave the network.
Multicast at Layer 2
You must be wondering by now why we keep talking about routers when this books title is Cisco Switching Black Book. Lets get down to how multicast behaves in a switch environment. As you are well aware, the difference between a hub and a switch is how the device forwards the frames out the ports: A hub will forward a frame out every port except the receiving port, whereas a switch will forward the frame to the ports based on the destination MAC address. A switch accomplishes this task by comparing the destination MAC address with a forwarding table. This forwarding table is populated by looking at the source MAC addresses of frames sent between every port and keeping track of the port from which the frame arrived. This information creates a forwarding table that is usually kept in Content Addressable Memory (the table is commonly referred to as a CAM table). When the switch receives a frame with a destination MAC address that is not in the forwarding table, it has no choice but to send it out every port in hopes that it will reach its destination. This usually happens in two situations: when the destination MAC address has not been seen before, or when the destination MAC address is a broadcast/multicast address. If the MAC address has never been seen before, the switch will eventually receive a frame with that MAC address as the source; the address will then be put into the forwarding table. This process takes a little time. If the MAC address is a broadcast/multicast address, the switch will never see a frame with that MAC address as the source address. If you have multicast traffic, this situation will turn your Catalyst 5000 into a very expensive hub. To overcome this problem, Cisco has the following solutions: IGMP snooping Cisco Group Management Protocol (CGMP) Router Group Management Protocol (RGMP) GARP Multicast Registration Protocol (GMRP)
IGMP Snooping
IGMP snooping works as its name implies: The switch snoops on the traffic between the host and the multicast router. When the switch sees an IGMP report from a host for a multicast group, it associates that port with the multicast MAC address in the CAM table. When the switch sees an IGMP leave group message, it removes the port from the association. Note The source port must also be added to the association for that multicast group in the CAM table.
147
This process looks simple. As a host joins the multicast group, its port number is added to the CAM table; as the host leaves, its port is removed from the CAM table. However, this entire process forgets about the switchs processor. The switch must also receive the multicasts in order to receive the join and leave messages. If a steady stream of multicast traffic is received by the switch, the processor will be so busy checking the multicast traffic that it will have no time to process any other traffic. To overcome this problem, Cisco redesigned its switch to enable the ports to examine frames for Layer 3 information. When the port sees an IGMP frame, the frame will only be forwarded to the processor. This way, the processor will see all the IGMP traffic but will not receive any nonIGMP multicast traffic. Lets look at the entire process. When a host broadcasts an IGMP report, the report is processed by the switch and sent out to every port. The router will begin to send multicast traffic to the switch. The switch will add the source port to the CAM table along with the first port. As more hosts send IGMP reports, their ports are added to the forwarding table. When the router sends a general query to the switch, the switch will send the multicast to every port. All the multicast group members will send a reply to the router (all IGMP replies are sent to the processor). The processor will send one IGMP report to the router so that it will continue to receive the multicast traffic. When a host sends a leave group message, the switch sends a general query out the same port to ensure that no other host wishes to receive the multicast (if the port is connected to another switch/hub). It will remove the port from the CAM table if it does not get a reply. IGMP snooping is very efficient and is vendor independent. Unfortunately, it is only available for the enterprise class Catalyst switches.
148
Note The hostname Router indicates that this must be configured on an external router or an internal route processor, such as the RSM, RSFC, MSM, or MSFC. The hostname Coriolis indicates that the configuration is taking place on a Set/Clearbased IOS switch, such as the 2900G, 5000, or 6000 family of switches.
You can also let the multicast group decide which mode the interface will be in:
Router(configif)# ip pim sparsedensemode
149
You can use any interface on the router, including the loopback interface, as the IP address of the administrative group (just make sure all the routers know the route to that IP address).
Note
One of the side effects to this is that the router will no longer use fast switching.
150
This multicast group exists only until you reset the switch. To store the entry in the NVRAM, replace static with permanent:
Coriolis> (enable) set cam permanent 01005e0c85 2/112 Permanent multicast entry added to CAM table.
This command will remove the entire multicast group from the switch. When you want to remove only one port from the multicast group, you will have to remove the entire group and reenter the desired port back into the switch.
You can use this command even if you are using IGMP snooping, CGMP, or GMRP.
151
2/14 3/1 * 1 3
The asterisk between the port and the VLAN number means the multicast router port was manually configured.
Note The switch will not let you enable IGMP snooping if CGMP or GMRP is enabled.
152
This is a good way to verify that IGMP is set up correctly. If you have more than one VLAN on the switch and want to display only the specific VLAN, use the command show igmp multicast statistics [vlan].
If you only want to display the number of multicast groups that were learned from IGMP, use the following command:
Coriolis> (enable) show multicast group count igmp [vlan] CGMP disable IGMP enable
153
To get more detail about the multicast groups, use this command:
Coriolis> (enable) show multicast group [vlan] CGMP disable IGMP enable VLAN Dest MAC/Route Des 1 018875880857* 1 118796542211* Destination Ports or VCs / [Protocol Type] 2/112 2/112
Again, if you only want to see the entries that were learned from IGMP, you can use the command show multicast group igmp [vlan].
Configuring CGMP
CGMP is disabled by default. Use the following command to enable CGMP:
Coriolis> (enable) set cgmp enable CGMP support for IP multicast enabled.
Disabling CGMP
To disable CGMP, use the following command:
Coriolis> (enable) set cgmp disable CGMP support for IP multicast disabled.
154
valid igmp leaves received valid igmp queries received igmp gs queries transmitted igmp leaves transmitted failures to add GDA to EARL topology notifications received number of CGMP packets dropped
0 568 0 0 0 10 2456875
Note Here are some related commands that you can try on the router:
debug ip rgmp [group_name | group_address] show ip rgmp interface [interface_unit_name] show ip rgmp groups [group_name | group_address]
155
To display the total number of RGMP groups, use the following command:
Coriolis> (enable) show rgmp group count [vlan] Total Number of Entries = 2
You can reset the statistics with the command clear rgmp statistics.
Configuring GMRP
To enable GMRP globally, use the following command:
Coriolis> (enable) set gmrp enable GMRP enabled.
156
Disabling GMRP
To disable GMRP globally, use the following command:
Coriolis> (enable) set gmrp disable GMRP disabled.
But dont be fooledthe switch will let you configure GMRP on a perport basis, but it will not work unless you enable it globally.
157
Tip 158
GMRP and GARP are interchangeable for the set and show commands. GMRP is considered an alias of GARP.
Tip Bandwidthbased suppression is preferable to packetbased suppression. Packet sizes vary, and it is difficult to determine the right number of packets to specify for packetbased suppression. For example, you could have 500 small broadcast packets that used only 10 percent of the bandwidthbut a packetbased suppression value of 500 would still shut down the port.
159
ATM Overview
ATM is a cellbased networking technology designed to be a highspeed, efficient method of supporting multiple types of traffic, including voice, data, and video. ATMs characteristics allow it to effectively support todays networking requirements. Some of the major benefits of ATM are: Efficient bandwidthATM efficiently supports most transmission requirements of the network and allocates bandwidth as necessary. One of the primary reasons ATM is such a great protocol is its ability to accomplish this task without any manual intervention.
160
ScalabilityATM is highly flexible, accommodating a wide range of traffic types, traffic rates, and communications applications. An ATM network includes two types of devices: ATM switches and ATM endpoints. One type of ATM interface, called a usernetwork interface (UNI), connects an ATM device to a switch; a second type, called a networktonetwork interface (NNI), connects an ATM switch to another ATM switch. ATM has builtin support for Quality of Service (QoS), which is used to guarantee a level of service for networks that use ATM. This guarantee includes bandwidth utilization and data throughput. This type of service is critical when dealing with newer multimedia technologies.
LANE
LANE is a method used to provide backward compatibility to legacy Ethernet and Token Ring networks. LANE makes an ATM interface look like an Ethernet or Token Ring network interface, so no modifications to existing network drivers or applications need to be made to support ATM environments. LANE allows ATM networks to emulate Media Access Control (MAC) broadcast networks. Before the implementation of LANE, a proprietary emulation device was needed to connect ATM to a LAN topology. ATM LANE works with a client/server architecture to create an emulated LAN (ELAN). An ELAN is very similar to a VLAN, in that it limits local broadcasts and multicast traffic to the ELAN. LANE devices can be either clients or servers. The LANE Emulation service (LE service) consists of several different components: LAN Emulation Client (LEC)Resides in every ATM device and provides a LAN interface to higher layer protocols. LAN Emulation Server (LES)The centerpiece of the LANE architecture. A single LES is responsible for address registry and resolution for an ELAN. Broadcast and Unknown Server (BUS)The means by which ATM provides broadcasting support for an ELAN. LAN Emulation Configuration Server (LECS)Contains the database of LES/BUS pairs for all the configured ELANs. LANE is discussed in much more detail later in this chapter.
ATMEasy to Learn? Nothing in ATM makes it easy to comprehend and learn. It defies a lot of what todays network administrators have learned. Telling you that ATM is used as a backbone protocol in the network makes you think that you do not need to worry about packetbased broadcast LANs trying to communicate with cellbased ATM networks (which will be discussed in the following sections). In this chapter, I discuss how to connect ATMwhich is a connectionoriented, pointtopoint protocolto the Layer 2 addresses of the broadcast domains in the LAN. ATM is a difficult subject for most people, because they rarely are exposed to it on a daytoday basis like Ethernet or Token Ring. In todays networking environment, however, increased emphasis is being put on integrating data, voice, and video in networks, and ATM is a driving force. No other protocol today has ATMs ability to ensure timely delivery of packets based on their type. In addition, ATM can be used on both LANs and WANs on almost any types of media, with speeds that can scale up to gigabits per second.
161
ATM Protocols
The protocols used in ATM have been specifically designed to support highspeed networks at speeds ranging up to gigabits per second (Gbps). Other physical LAN topologies, such as Gigabit Ethernet, provide highspeed networking and work very well in LANs. ATM, on the other hand, can handle network Gbps traffic in both LAN and WAN environments and could care less about the type of physical media being used. ATM works on the theory that it is possible to expect upperlayer protocols to use a connectionless service to communicate with the lower layers. LANE is used to allow an upperlayer protocol to make connections to lowerlayer ATM connectionoriented services. Thus, LANE provides a switching service that is transparent to the 802.x networks. Traditional methods of transporting data use one of two ways to send data: characterbased or framebased. ATM is a cellbased switching technology that uses both circuit switching and frame switching to move packets through the network. Lets take a closer look at ATMs method of cellbased circuit switching.
ATM Cells
ATM transports network data in fixedsized units commonly called cells. Each cell is 53 bytes in length and is divided into a 5byte header and 48 bytes of data. The 53byte size of the cell, illustrated in Figure 8.1, is a compromise between the voice, data, and video advocatesone side wanted small cells (32 bytes) and another wanted larger packets (64 bytes). The final decision was to add the defaults (32 + 64 = 96) and divide 162
the result by 2and thus the data portion of the ATM cell contains 48 bytes.
Figure 8.1: The ATM cell. The fixed size of the ATM cells provides some the following benefits: Efficient bandwidth use of the physical medium Ability of applications to share the network more fairly Accommodation for bursty applications Effective recovery of data loss on the physical wire Note ATM is based on the switching and multiplexing techniques proposed by the ITU for Broadband Integrated Services Digital Network (BISDN) access. Time Division Multiplexing ATM uses a switching and multiplexing method called Time Division Multiplexing (TDM). This method places voice, multimedia, and data into fixedlength cells. These cells are then routed to their destination without regard to content. TDM combines the information from different resources onto a single serial trunk link that dedicates a predefined timeslot on the multiplexed line for a piece of each resources data, as shown in Figure 8.2. If a source has nothing to send, then the timeslot goes unused, and the bandwidth is considered wasted.
Figure 8.2: Data from multiple switch ports (resources) is sent down a single multiplexed serial link.
163
The ATM Cell Header The ATM cells can be found in one of two formats, depending on whether the endpoints are a UNI or an NNI connection. The two differ in one way: The NNI header does not contain a Generic Flow Control (GFC) field. The NNI header has a Virtual Path Identifier (VPI) that occupies the entire first 12 bits. A cell header for a UNI cell is shown in Figure 8.3.
Figure 8.3: An ATM UNI cell header. Lets take a look at the fields in a cell header: Generic Flow Control (GFC)An 8bit field that is used to provide information to identify multiple stations that share a single ATM interface. The GFC is typically not used. Virtual Path Identifier (VPI)An 8bit field used with the VCI to identify the next destination of a cell as it passes through a series of ATM switches on its way to its destination. Virtual Channel Identifier (VCI)An 8bit field used in conjunction with the VPI to identify a cells next destination. Payload Type (PT)A 3bit field that indicates whether the cell contains user data or control data. If the cell contains user data, the second bit in the user data indicates congestion, and the third bit indicates whether the cell is the last in a series of cells that represent a single AAL5 frame. Congestion Loss Priority (CLP)A 1bit field that indicates whether the cell should be discarded if it encounters extreme congestion as it moves through the network. Header Error Check (HEC)An 8bit field that indicates a checksum calculated only on the header itself.
ATM layer is responsible for establishing connections and passing cells through the ATM network. The ATM Adaptation layer translates the different types of network traffic. Four AALs are defined, but only three are actively in use: AAL1Used to transport timingdependent traffic such as voice AAL3/4Used by network service providers in Switched Multimegabit Data Service (SMDS) networks AA5The primary AAL used for nonSMDS traffic that doesnt require the pacing AAL1 would provide Figure 8.4 shows the mapping of the ATM Reference Model compared to the OSI Reference Model.
Figure 8.4: The ATM Reference Model layers compared to OSI Reference Model layers. The Physical Layer The ATM Physical layer controls transmission and receipt of bits on the physical media. This layer also tracks the ATM cell boundaries and packages cells into the appropriate frame type. This layer is divided into two sublayers: the physical medium dependent (PMD) sublayer and the transmission convergence (TC) sublayer. The PMD sublayer is responsible for sending and receiving a continuous flow of bits with the timing information to synchronize the transmission and reception of data. ATM does not care about the physical media being used, and all widely used physical topologies are capable of supporting ATM cells. Existing highspeed topologies capable of supporting ATM cells include Synchronous Optical Network (SONET), DS3/E3, Fiber Distributed Data Interface (FDDI), and unshielded twisted pair (UTP). The TC sublayer is used to maintain the ATM cell boundaries, verify the validity of data, maintain data synchronization, create and check header error control to ensure valid data, and put the cells into a format that the physical media can use. This sublayer also extracts and inserts ATM cells within either a Plesiochronous Digital Hierarchy (PDH) or a Synchronous Digital Hierarchy (SDH) Time Division Multiplexed (TDM) frame and passes this frame to and from the ATM layer. The ATM Layer The ATM layer is responsible for establishing connections, passing cells to and from the AAL, inserting the ATM header, and extracting the ATM header. This layer is also responsible for multiplexing and demultiplexing data through the ATM network. To do this, ATM uses information contained in the header of each ATM cell. ATM switches use a VPI and a VCI field inside the ATM cell header to identify the next network segment a cell needs to transit on its way to its final destination. A VCI is also known as a virtual channel. It is an identifier for the physical connection between the two ends that form a logical connection. A VPI is the identifier for a group of VCIs that allows an ATM switch to perform operations on a group of virtual connections (VCs).
165
The ATM Adaptation Layer The ATM Adaptation Layer (AAL) provides the translation between the larger service data units of the upper layers of the OSI Reference Model and ATM cells. It works by receiving packets from the upperlevel protocols and breaking them into 48byte segments to be dumped into the payload of an ATM cell. The AAL has two sublayers: segmentation and reassembly (SAR) and the convergence sublayer (CS). The CS has further sublayers: the common part (CP) and the service specific (SS). Like protocols specified in the OSI Reference Model, Protocol Data Units (PDUs) are used to pass information between these layers. The AAL translates between the different types of network trafficsuch as video streams, data packets, and voice packetsof upperlayer processes and ATM cells. In other words, the AAL receives packets from upperlevel protocols and breaks them into the 48byte segments that form the payload field of an ATM cell. Several types of AAL standards are defined for this layer. Which AAL you use will largely depend on the type of traffic and what you are trying to do with the traffic. The characteristics of each AAL are as follows: AAL1 (Class A)This layer is a connectionoriented service that provides endtoend timing provisions. It maintains a constant data transfer rate, which is used for transporting telephone traffic and uncompressed video traffic. This is known as a constant bit rate (CBR) service. It is appropriate to use AAL1 to transport voice and video traffic or another type of timingsensitive data. AAL2 (Class B)This layer is reserved for data traffic that requires variable bit rates (VBR) and timing sensitivity, such as multimedia. It multiplexes short packets from multiple sources into a single cell with endtoend timing and connection orientation. AAL3/4 (Class C)This layer was designed for network service providers; it closely aligns with SMDS. This layer uses no VBR and has no timing requirements. It supports both connectionoriented and connectionless data for WAN links using Frame Relay or X.25. This layer is perfectly suited for use in environments that need to send or receive large files. AAL3 is identical to AAL4, with the exception that the AAL3 layer is connectionoriented only, whereas AAL4 is both connectionoriented and connectionless. AAL5 (Class D)This layer is the primary AAL used to transfer nonSMDS data. It supports both connectionoriented and connectionless data. This layer is used for such applications as classical IP (CLIP) over ATM and LANE. Catalyst switches use this layer to provide LANE services for ATM. ATM networks provide the transport method for several different independent emulated LANs. When a device is attached to one of these emulated LANs, its physical location no longer matters to the administrator or implementation. This process allows you to connect several LANs in different locations with switches to create one large emulated LAN. This arrangement can make a big difference, because attached devices can now be moved easily between emulated LANs. Thus, an engineering group can belong to one ELAN and a design group can belong to another ELAN, without the groups ever residing in the same location. LANE also provides translation between multiplemedia environments, allowing data sharing. Thus, Token Ring or FDDI networks can share data with Ethernet networks as if they were part of the same network.
166
Variable bit ratereal time (VBRRT)Typically used for connections that carry VBR traffic in which a fixed timing relationship exists between either VBR video or voice compression. Variable bit ratenon real time (VBRNRT)Used to carry VBR traffic in which no timing relationship exists for data traffic where a guarantee of bandwidth or latency is needed. This type of connection is used in Frame Relay where the committed information rate (CIR) of the Frame Relay connection is mapped into a bandwidth guarantee within the ATM network. Unspecified bit ratereal time (UBRRT)Does not offer any service guarantees whatsoever. This type of connection is typically for the bursty or unpredictable traffic patterns from LAN protocols served by ATM routers.
ATM Addressing
ATM devices must have unique ATM addresses in order to connect to other ATM devices. The device at the other end of your circuit must know your address. ATM uses both private and public types of addresses. Because the ATM standard has adopted the subnetwork model of addressing, the ATM layer is responsible for mapping Network layer addresses to the ATM addresses. Currently, two types of ATM addressing plans are used. The ATM UNI address format defined by ITUT uses telephonetype E.164 addresses. This format is used to connect an endpoint to a telephone carriers network. One drawback to this type of address is that E.164 addresses are available only from large telephone carriers, which prevents the addresses from being assigned to competitors and private businesses. The ISO has defined a second address type that uses a Network Service Access Point (NSAP) format. This format is used to connect an ATM endpoint to a private network. The ATM Forum has now used this method to incorporate the E.164 address of the public networks into the address of customers using NSAP addresses. The ATM Forum is also working on a method for the phone carriers to use NSAPbased addressing on their networks. Lets take a look at the components of an NSAP address, as shown in Figure 8.5:
Figure 8.5: The format of an ATM NSAP address. Authority and format identifier (AFI)Used to indicate which standard is being used for the ATM address. An AFI of 47 indicates a British Standards Institute address (used by Cisco on all its ATM devices); an AFI of 39 indicates an ISO address and an E.164 address. Initial domain identifier (IDI)Indicates the address allocation and administrative authority. Domain specific part (DSP)Contains the actual routing information. Endsystem identifier (ESI)Places the end systems MAC address in the frame. NSAP selector field (SEL)Identifies the LANE components.
changing the application itself or Layer 3 drivers. This approach allows backward compatibility with existing LANs, broadcast support, and connectionless delivery. LANE has some drawbacks, however: It prevents the use of ATMspecific benefits such as QoS and doesnt have the ability to provide flexible bandwidth allocations. LANE is the primary component that provides connectivity between ATM devices and the devices residing on the Layer 2 LAN. This connectivity extends to devices attached to ATM stations and devices attached to LAN devices spanning the ATM network. This connectivity between ATM devices and other LAN devices is done through ELANs.
What Are ELANs? ELANs are just like VLANsone of their functions is to create independent broadcast domains in ATM, the same way that VLANs do in Ethernet and Token Ring networks. ELAN workstations are independent of the physical location, and like VLANs, ELANs must be connected to a Layer 3 device in order to communicate with members of another ELAN. The Data Link layers MAC sublayer allows ELANs to use the Microsoft or Novell upperlevel NDIS/ODI driver interfaces. This method allows ELANs to transmit Layer 3 protocols such as TCP/IP, IPX, and AppleTalk.
LANE is a standardized conversion process that allows a connectionless environment in a LAN to connect to a connectionoriented ATM environment. LANE fragments an incoming Layer 3 into a 48byte payload and places a 5byte ATMspecific identification header on the front of the packet, yielding a 53byte cell. It then removes the checksum from the cell and forwards the cell through the ATM network. When the cell has traveled the ATM network, the ATM information is removed and the cell fragments are reassembled and returned to the LAN environment as a packet. The LANE 1.0 standard can be summed up as a software interface for the Layer 3 protocol environment that encapsulates user data for either Ethernet or Token Ring packets. LANE isnt actually the media access method for this conversion processLANE uses three servers, which clients access over the ATM connections. The LANE servers provide address registration and resolution functions, including collecting address and route descriptor types based on the LANE standard. Lets take a look at the LANE components. Note FDDI can be used with LANE 1.0; however, it is not accurately defined like Ethernet and Token Ring protocols. ATM uses translational bridging techniques to map FDDI packets into either Ethernet or Token Ring.
LANE Components
LANE uses several components to provide LANbased network connectivity. The interaction of these components allows address registration, address caching, and searchable databases. LANE uses the following components: LAN Emulation Client (LEC)Emulates a LAN interface to higherlayer protocols and applications of the OSI Reference Model. LAN Emulation Server (LES)Provides a database of LANE services, resolves addresses, manages stations that make up an ELAN, and provides registration services to LANE clients for the emulated LAN. LAN Emulation Configuration Server (LECS)Uses a database to track device memberships in each ELAN.
168
Broadcast and Unknown Server (BUS)Sends broadcasts, sequences cells, controls unicast flooding, and distributes multicast packets. Warning Notice that although LEC and LECS sound the same, they are completely different terms and components in LANE. LAN Emulation Client (LEC) The LEC resides in every ATM end system. It provides services to emulate the Data Link layer interface that allows communication of all higherlevel protocols and applications to occur. It provides both ATMattached devices and ATMcapable Token Ring, Ethernet, and legacy LAN topologies the ability to coexist within an ATM emulated LAN and WAN environment. The LEC is the component responsible for passing traffic between separate VLANs on the Catalyst switches and between ELANs on the ATM switch. You can configure multiple LECs for one or more ELANs on the ATM modules. Prior to configuring a LEC on an ATM module, a VLAN must be configured on the switch, and the LES/BUS or an ELAN must be configured on one or more ATM module subinterfaces. The LEC forwards data to other LANE components in the ELAN and performs control functions. Each LEC is a member of only one ELAN. In many instances, an Ethernet switch may have multiple LECs for each ELAN. Examples of LEC implementations include servers, routers, switches, or other network hosts. The LEC has the following functions: Resolves MAC addresses Transfers data Performs address caching Interfaces with other LANE components Provides interface driver support LAN Emulation Server (LES) The LES for an ELAN is the central piece of LANE. It gives the LECs the information they need to establish ATM connections to other LECs in their ELAN. A single LES is responsible for address registry and resolution for an ELAN. When a LEC joins an ELAN, it forms a connection with the LES. The LEC registers its MAC and ATM addresses with the LES. The LES has the following functions: Supports LECs Registers addresses from LECs Resolves addresses from LECs Interfaces to the LEC, LECS, and BUS The LES performs traffic control for all LECs connecting to an ELAN. This component provides the address resolution, registration, broadcast, and unknown server information that guides communication among LECs. When configuring each LEC, the LEC must request a connection from the LES. The request information contains the ATM address of the LEC, a LAN identifier, and an optional MAC address. This component also performs verification of each LEC during the initial connection with the server, checking to make sure that each LEC has permission to join the requested ELAN. Address registration is also a function of the LES. It must maintain a database to aid in resolving addresses. This registration occurs after the LEC joins an ELAN. Each LEC provides the LES with one registered address with a join request, and no separate registrations are required. The LES with the ATM address database responds to all address resolution queries and attempts to locate partnering LECs. The LES responds with the ATM addresses for the targeted ELANs. If no address can be found, the LES attempts to forward the request to other LECs on other ELANs.
169
The ultimate goal of the LES is to arrange and control connections with a LEC. This connection is commonly known as a control direct ATM virtual channel connection (VCC). After this connection is established, it will handle address resolution and registration responses. Note The LES establishes communication with the LECS and provides verification information for LECs attempting to join. The LES does not maintain a constant connection with the BUS. The LES only provides each LEC with the ATM address of the BUS for forwarding.
The LANE servers provide the address registration and resolution functions. These functions include collecting address and route descriptor types based on the LANE standard. Lets take a look at the address resolution process, which is shown in Figure 8.6 and outlined as follows:
Figure 8.6: The LES address resolution process. 1. A workstation connects to a router or ATM switch and performs a physical outbound packet transmission. This example uses the Address Resolution Protocol (ARP) query to try to locate a device on a remote segment. Note The local router is typically the ATM LEC and provides the circuit for the initial ATM address mapping. 2. The LEC takes an Ethernet frame and assigns an immediate LEC link, which is used to obtain the ATM address identifier needed to establish an ATM connection. If this process is not successful, the LEC must locate a LES. 3. The LES circuit holds the main ATM network address table and returns with the VCI assignment. LAN Emulation Configuration Server (LECS) The LECS provides key services such as registration for Integrated Local Management Interface (ILMI) and configuration support for the LES addresses for the corresponding emulated LAN identifiers. The LECS contains a database of ATM addresses for the LES and BUS pairs for known ELANs. The LEC consults the LECS to determine the LESs ATM address when it first joins an ELAN. Note At least one LECS is required per ATM LANE switch cloud. The LECS has the following functions: Registers the LECS ATM addresses for known ELANs Supplies LECs with LESs ATM addresses Provides interfaces to the LEC and the LES The registration process of the LECS ATM address uses the ILMI functions to connect to the ATM network; this situation usually includes an ATM switch. Support for configurations from the LECS ensures that the correct LES address is supplied to the LEC. 170
Broadcast and Unknown Server (BUS) The BUS provides broadcasting support for an ELAN. The BUS distributes multicast data, sends or distributes unicast data, and connects the other LANE components. When the destination address of an Ethernet or Token Ring frame contains a local broadcast or a multicast address, the LEC forwards the traffic to the BUS, which forwards it to all the other LECs in the ELAN. At least one combined LES and BUS is required per ELAN. The BUS has the following functions: Distributes multicast data Sends or distributes unicast data Interfaces to LEC and LES The LES is the component responsible for resolving MAC addresses to ATM addresses, and the BUS is the component responsible for servicing multicast, Ethernet, and Token Ring broadcasts. The Cisco LANE implementation calls for the LES and the BUS to be configured in the same endstation.
ATM Module Subinterfaces In order to configure ATM components on an ATM LANE module for the Catalyst 5000 or 6000 family of switches, you need to use subinterfaces. Depending on the level of traffic you expect on your network, you may want to place different LES/BUS components throughout the framework of your network. To configure a LES or BUS on the ATM module, you need to complete the following tasks: 1. Enter Interface Configuration mode. 2. Specify the subinterface for the ELAN. 3. Specify the type of link: Ethernet or Token Ring. 4. Enable the LES and BUS on the ELAN. 5. Repeat this process for each LES/BUS.
The BUS must be used to sequence and distribute broadcast data to all the LECs. However, sending a large volume of broadcast data to all the LECs can severely impact the overall performance of the network. For this reason, it may be necessary for the BUS to place restrictions on the LANE components to control the maximum throughput rate for each device. The BUSs primary function is to provide broadcast management support for LANs. The BUS must supply the following services: Distribute unicast and multicast data to all the LECs in the network Connect interfaces to the ELAN Distribution of unicast and multicast data includes the transmission of data to the LECs in the network. Whenever possible, the LEC will establish a direct connection to another LEC. If this isnt possible, then data the BUS receives is broadcast to each LEC on the ELAN. This option can be enabled and disabled, and you should carefully consider whether you need this option, because it can eat up costly bandwidth. Note When interfacing to ELANs, the BUS establishes a bidirectional connection that allows forwarding of multicast and unicast frames with unknown destinations. LEC Queries LECs send queries for configuration information to receive the LES address. The LECS then assigns the correct LES address for each LEC. The LES also has the ability to establish a connection with the LECS. A reply to a query can be as simple as providing a single LES address or it can provide more information, such as:
171
The default ELAN name The LEC address and corresponding LES The ELAN name and corresponding LES The ATM address prefix and corresponding LES The ELAN type and corresponding LES The ELAN name The corresponding ATM address of a LANE server A LANE client MAC address A client MAC address with the corresponding ELAN name The LANE client ATM template
ATM Addresses ATM addresses are 40digit addresses that use the ILMI protocol to provide the ATM prefix address of the switch for the LECs. This process configures the initial 26 (hexadecimal) digits of the ATM address, which are identical for each LEC. The next 12 (hexadecimal) digits of the ATM address are known as the ESI. There is also a twodigit SEL field. To provide this part of the ATM address, Cisco provides a pool of 16 MAC addresses for each ATM module, although only 4 are used. The following assignments pertain to the LANE components: The prefix fields are the same for all LANE components and indicate the identity of the ATM switch. All LECSs are assigned an ESI field value from the first pool of MAC addresses assigned to the interface. All LESs are assigned an ESI field value from the second pool of MAC addresses. The BUS is assigned an ESI value from the third pool of MAC addresses. The LECS is assigned an ESI value from the fourth pool of MAC addresses.
LANE Communication
Now that we have looked at the individual components that make up the LANE model, lets examine the communication process. Like X.25 and Frame Relay, LANE components communicate by using SVCs. Several different types of SVCs exist in the ATM LANE implementation; they are called virtual channel connections or virtual circuit connections (VCCs), depending on the standards documents you refer to. These VCCs are as follows: Unidirectional VCCs Bidirectional VCCs Pointtomultipoint control distribute VCCs Pointtopoint configure direct VCCs
172
In the ATM LANE communications process, when a client wants to join an ELAN, the client must build a table that links ATM addresses to Ethernet MAC addresses. Lets take a close look at this process: 1. The LEC first sends a LAN Emulation ARP (LE_ARP) message to the LES that is using a pointtopoint configure direct VCC. This query is made to the ATM switch containing the LECS, using ILMI. The query is a request for the ATM address of the LES for its emulated LAN. The switch contains a Management Information Base (MIB) variable containing the requested ATM address. The LEC will attempt to locate the LES using these steps: a. Uses ILMI to connect to the LECS b. Checks to see if any locally configured ATM addresses exist c. Checks to see if it has received a fixed address defined by the MIB variable using UNI d. Checks to see if this is a wellknown permanent virtual circuit 2. The LES forwards the LE_ARP to all clients on the ELAN using a pointtomultipoint control distribute VCC. 3. The LECS responds across the established connection with the ATM address and name of the LES for the LECs ELAN. The LEC can establish a connection with the LES based on the configuration data received. This connection is a bidirectional pointtopoint control direct VCC; it remains open throughout the remainder of the communications process. 4. The LES forwards the response using a pointtomultipoint control distribute VCC to the LEC. While the connection is established with the LEC requesting entry to the ELAN, the LES attempts to make a bidirectional connection to the LECS to request verification that the requesting LEC may enter the ELAN. After this verification is completed, the server configuration that was received in the first connection is verified against the LECS database; if authentication is approved, the client gains membership in the ELAN. 5. The LEC creates another packet with the correct ATM address for the LES and establishes a control direct VCC to make the connection. The LEC sends out a LE_JOIN_REQUEST to the LES containing the LEC ATM address as well as the MAC address, in order to register with the ELAN. 6. The LES checks with the LECS to verify the LEC. The LES receives the data, creates a new entry in the cache for the LEC, and sends a LE_JOIN_RESPONSE back to the LEC. 7. The LES replies to the LEC using the existing configure direct VCC. This process is completed by either allowing or denying membership in the ELAN. If the LES rejects the LECs request, the session is terminated. 8. If the LES connection is allowed, the LEC is added to the pointtomultipoint control distribute VCC connection. The LEC is granted a connection using the pointtopoint control VCC to the corresponding LEC, and the higherlevel protocols take over. 9. If permission is granted by the LES, the LEC must determine the ATM address for the BUS in order to become a member of the broadcast group. 10. The LEC must locate the BUS, so it sends an LE_ARP_REQUEST packet containing the MAC address 0xFFFFFFFF. This packet is sent down the control direct VCC to the LES, which understands the request for the BUS. The LES responds with the ATM address for the BUS. 11. When the BUS is located, the LEC can become a member of the ELAN. LE Messages An LE_ARP message is used to allow a LEC to indicate that a particular MAC address resides on a local node on the local network. This message can then be redistributed to all other LECs in the ELAN to allow those LECs to update their address cache. Once a client has joined an ELAN and built an address cache based on the LE_ARP messages received, the client can establish a VCC to the desired destination and transmit packets to the ATM address mapped to the physical MAC address using a bidirectional pointtopoint data direct VCC. Lets take a look at four types of packets:
173
LE_ARP_REQUESTContains the broadcast MAC address 0xFFFFFFFF. This packet is sent on a control direct VCC to the LES to query for the ATM address of the BUS. LE_ARP_RESPONSESent in response to an LE_ARP_REQUEST; it contains the ATM address of the BUS. LE_JOIN_RESPONSEContains the LANE client identifier (LECID) that is a unique identifier for each client. This ID is used to filter return broadcasts from the BUS. LE_JOIN_REQUESTAllows the LEC to register its own MAC and ATM addresses with the LES as well as any other MAC addresses for which it is proxying. This information is maintained to make sure that no two LECs will register the same MAC or ATM address. Joining and Registering with the LES After a LEC joins the LES, the LEC uses its own ATM and MAC addresses. The following process shows how this is done: 1. After the LEC obtains the LES address, the LEC clears the connection to the LECS to set up a controldirect VCC to the LES. It then sends an LE_JOIN_REQUEST on that VCC. 2. When the LES receives the LE_JOIN_REQUEST, the LES checks with the LECS with its open connection, verifies the request, and confirms the clients membership. 3. If this verification is successful, the LES adds the LEC as a branch in its ATM pointtomultipoint controldistribute VCC. 4. The LES issues the LEC a successful LE_JOIN_RESPONSE that contains a unique LECID. Note The LECID is used by the LEC to filter its own broadcasts from the BUS. When this process is complete, LANE will have created an ATM forwarding path for unicast traffic between the LECs. This forwarding path will enable you to move data across the ATM network.
Lets step through the process. Suppose that you were working on an ELAN and you wanted to access a file stored on a server that was located on a physically separate LAN: 1. You send the file request. Your LEC determines if it knows the ATM address of its LES. 2. If your LEC does not know this address, the client queries the LECS and asks for the ATM address of the LES. 3. After your LEC receives the correct address, it queries the LES for the ATM address of the LES where the file is located. If the LES knows this address, it sends the address to your LEC. 4. If the LES does not know this address, it queries the LANE BUS. The LANE BUS, in turn, asks all the LECs on the ELAN for their ATM addresses. The LANE BUS returns the correct address to the LES, which returns the address to your LEC. 5. Your LEC establishes a virtual circuit to the server on which the file is stored. The LEC converts its Ethernet or Token Ring frames into cells and sends these cells over the virtual circuit to the server.
Implementing LANE
LANE is supported on many of the products offered by Cisco, including all Cisco switches from the Catalyst 1900 series through the 12000 series, the Cisco LightStream switches, and the 8000 series of WAN switches. Routers such as the Cisco 4000, 4500, 7000, and 7500 can support LANE, as well. If youre designing an ATM LANE network, you need to examine each switchs level of performance and functionality. Doing so allows you to determine which switching product is needed at each point in the network. Cisco has created four product lines for specific network types. Each product provides a certain level of performance and functionality. Cisco provides ATM devices that fit well in all sizes of ATM implementations, from the smallest to the largest. These four product lines are as follows: Workgroup switchesThe smallest switches, typically found in the Access layer of the network. Workgroup switches begin with the 1900 series switches and includes the Cisco Catalyst 5000. Most workgroup switches are located in the wiring closet closest to the end user. These switches are usually Ethernet based for the local LAN environment and provide an ATM uplink to a campus switch. Campus switchesTypically implemented to relieve the congested nature of the network and to eliminate bandwidth problems across the existing backbone. These switches include the LightStream family of ATM switches. Campus switches support a wide variety of interfaces, including those that have connections to backbone and to the WAN. Enterprise switchesThe next level of ATM switches. These switches allow multilevel campus ATM switches to be connected for enterprise installations. They also provide the internetworking processes necessary to route multiprotocol traffic in the network. These switches are not used in the Core layer or backbone; they are used in the enterprise or WAN to meet the needs of hightraffic enterprises or even public service providers. These are Ciscos BPX and AXIS switches. Multiservice access switchesProvide a multitude of services for the growing needs of networks. They can provide services to support MANs, WANs, and the campus network.
LANE Modules The following ATM LANE modules are available for the 5000 family of switches; the list also indicates the cable types that can connect to each. Tables 8.1 and 8.2 show the LED lights and functions on the LANE modules. These modules provide a connection between multiple ATM networks connecting through the ATM switch:
Table 8.1: LANE module status LEDs. Port Color Red Orange Green Table 8.2: ATM LANE module indicator LEDs. LED TX (Transmit) RX (Receive) Link Meaning Diagnostics failure Module disabled Functioning normally
ATM LANE Single PHY Module (UTP)Provides a connection between the 155Mbps ATM network, Category 5 UTP cables, and one RJ45 connector ATM LANE Single PHY Module (MMF)Provides a connection between a 155Mbps ATM network and one multimode SC fiberoptic connector ATM LANE Single PHY Module (SMF)Provides a connection between a 155Mbps ATM network and one singlemode, SC fiberoptic connector ATM LANE Dual PHY Module (UTP)Provides two connections between the ATM network, Category 5 UTP cables, and two RJ45 connectors ATM LANE Dual PHY Module (MMF)Provides two connections between an ATM network, multimode fiberoptic cable, and two multimode, SC fiberoptic connectors ATM LANE Dual PHY Module (SMF)Provides two connections between an ATM network, a singlemode fiberoptic cable, and two singlemode, SC fiberoptic connectors ATM Dual PHY OC12 Module (MMF)Provides two connections between the OC12 (622Mbps) ATM network, a singlemode fiberoptic cable, and two singlemode, SC fiberoptic connectors ATM Dual PHY DS3 ModuleProvides two interfaces for two DS3 (45Mbps) connections between an ATM network, 75ohm RG59 coaxial cable, and two BayonetNeillConcelman (BNC) twistlock connectors ATM Dual PHY OC3 Module (MMF)Provides two direct connections between an OC3 (155Mbps) ATM network, multimode fiberoptic cable, and two multimode, SC fiberoptic connectors ATM Dual PHY OC3 Module (SMF)Provides two direct connections between an OC3 (155Mbps) ATM network, a singlemode fiberoptic cable, and two singlemode, SC fiberoptic connectors The singlemode LANE module is better equipped for longer distances. It uses a laser optical source and has a maximum distance of 10 kilometers. The multimode module uses an LED optical source and has a maximum distance of two kilometers. Both modules have a SAR of 512, meaning that the module can segment and reassemble up to 512 packets simultaneously. Network Management on the LANE Module The LANE modules in the Catalyst 5000 and 5500 series switches are configured by using the standard Cisco commandline interface (CLI), which is similar to that of a router. This interface can be accessed through the 176
Supervisor Engines console port. Tip Even though the LANE module is configured through the Supervisor Engine, the Supervisor Engine maintains no configuration information regarding the LANE module. This information is stored on the LANE module itself. Segmentation and Reassembly In a framebased network such as Ethernet, packets sent on the physical wire require a minimum frame size. Ethernet requires a minimum frame size of 64 bytes; this size is larger than an ATM cell, which is only 53 bytes with the header information included. A process must occur to segment or reassemble the data into the needed minimum size for the physical media. This is the job of segmentation and reassembly (SAR), which is a task performed by the Adaptation layer of the ATM Reference Model. SAR is responsible for breaking frames into cells and padding cells to result in a larger payload than the 48 bytes from the cells. This process allows the data in cells to traverse the local LAN and meet the minimum frame size requirements. Unfortunately, SAR is one area in which ATM switches fail to perform up to the standard of the physical wires available bandwidth. As a result, SAR alone on the LANE module may have a problem processing packets fast enough to keep up with frames or cells arriving and being sent on a 155Mbps OC3. To resolve this issue, Cisco installed two LSI ATMizers to provide lowlatency and wirespeed performance on the LANE module. Each ATMizer operates by itselfone is used for receiving, and the other transmits cells and frames. Tip The LANE module is capable of addressing 4,096 virtual circuits; however, the default is 1,024, which provides sufficient capability for most installations. To provide for data bursts (associated with LANs and not WANs), the LANE module SAR is capable of traffic shaping using a singlerate queue.
177
After the destination node receives the LE_ARP response from the LES, the destination client responds to the source with its address information. The source sends a flush message to the BUS, which instructs the BUS to stop sending any unsent cellsthe source will now establish a direct connection with the destination and send the remaining data.
178
LANE Server: 47.00817200000000E04BAAA006.00E04BAAA061.** LANE Bus: 47.00817200000000E04BAAA006.00E04BAAA062.** LANE Config Server: 47.00817200000000E04BAAA006.00E04BAAA063.00 note: ** is the subinterface number byte in hex
Note The asterisks in this example indicate that the addresses are in hexadecimal. The ATM LANE module does not list these addresses with this command.
2. Enter Interface Configuration mode for the ATM0 interface, subinterface 1, and indicate whether the link is pointtopoint or multipoint:
ATM(config)#interface atm0.1 pointtopoint
3. Make this subinterface the Ethernet default LES/BUS and identify the ELAN:
ATM(configsubif)#lane serverbus ethernet ELAN2
Note You cannot configure more than one LES/BUS per subinterface. 4. Repeat Steps 2 and 3 for each LES/BUS you want to configure on this LANE module. 5. Enter Interface Configuration mode for the ATM0 subinterface 2:
ATM(configsubif)#interface atm0.2
2. Enter Interface Configuration mode for the ATM0 interface, subinterface 1: 179
ATM(config)#interface atm0.1
4. Repeat Steps 2 and 3 for each LEC you want to configure on this LANE module. 5. Enter Interface Configuration mode for the ATM0 subinterface 2:
ATM(configsubif)#interface atm0.2
In the previous example, the state is initialState. This state indicates that the LEC is not yet a member of the ELAN. The zeroes in the ATM address columns are an indication that the LECS database has not yet been configured. This is normalLECS will not come up until the LES/BUS is configured and the LECS database has been configured. 180
Make a note of the address following the ATM address: label. To set up this LEC in a default unrestricted ELAN, perform the following commands: 1. Enter Global Configuration mode on the LANE module:
LANEMODULE#configure terminal Enter configuration commands, one per line. End with CNTL/Z.
2. Configure a LANE database and specify the LANE database name with the following command:
LANEMODULE(config)#lane database LANE_DB
3. To bind the ELAN name to the ATM address of the LES/BUS for each ELAN, use the ATM address displayed when using the show lane server command:
LANEMODULE(laneconfigdatabase)#name ELAN2 serveratmaddress 47.00918100000000E04FCCB100.00100DAACC51.01
4. Repeat this step for each ELAN in the LANE network. 5. You can optionally specify an ELAN as the default ELAN. Doing so will allow the LECs not to be bound to an ELAN:
ATM(laneconfigdatabase)#defaultname default ATM(laneconfigdatabase)#end
2. Use the lane config autoconfigatmaddress command to allow the ATM address to be computed automatically for the LECS:
ATM(configif)#lane config autoconfigatmaddress
3. Use the lane config database command to associate a database with the configuration server on the selected ATM interface:
181
182
LightStream 100
As with all the LightStream switches, the LS100 switch shown in Figure 9.1 is a desktop ATM switch used in the LAN, WAN, or campus backbone. This switch supports a maximum of 16 ATM lines; it supports a maximum of 155Mbps per line, for an aggregate throughput of 2.5Gbps.
Figure 9.1: The LS100 switch. This switch carries a unique core called the expandable ATM outputbuffer modular switch (XATOMSW). The XATOMSW component supports the buffering that takes place in order to allow the switch to provide a guaranteed Quality of Service (QoS), making this switch a great asset in a multimedia environment. The switch also supports mixedmedia interfaces. Interface types can be mixed on an LS100 ATM switch used as a backbone, workgroup, or WAN access switch. Table 9.1 shows the supported media types and the supported line speeds.
Table 9.1: LS100 supported interface types and media speeds. Interface DS3/T3 E3 Media Speed 45Mbps 34Mbps 183
LightStream 1010
The LS1010, shown in Figure 9.2, is the most recent addition to the LightStream series of ATM switches used for multiservice applications. The switch has a fiveslot, modular chassis with two faulttolerant, loadsharing power supplies. The switch contains a central slot that is dedicated to a single, fieldreplaceable switch processor module. The switch processor module supports 5Gbps of shared memory that is fully nonblocking. Nonblocking means the switch fabric can process and switch just as much or more data than all the ports on the switch combined can possibly bring in. This is possible because the switch uses a feature card and a highperformance reduced instruction set computer (RISC) processor that provides the speed and routing intelligence for the architecture.
Figure 9.2: The LS1010 switch. The RISC processor provides traffic management mechanisms that allow for bursty data traffic and QoS for such data as voice, video, multimedia, and other applications that require guaranteed bandwidth. The LS1010 can buffer up to 65,536 cells in its onboard shared buffers; this buffering minimizes the possibility of cell loss. Policies and scheduling with userdefinable thresholds permit flexible support of multiple service classes. The LS1010 familys architecture is flexible. The switch architecture is scalable and can support WAN interfaces with speeds ranging from a T1 to an OC12. The LS1010 supports many traffic classes, such as those listed in Table 9.2.
Table 9.2: Traffic classes supported on the LightStream 1010. Traffic Class Constant bit rate (CBR) Designation Used for telephony, legacy, and sitetosite videoconferencing applications. Realtime variable Used for timedelay or jittersensitive applications such as those used for videoconferencing at the desktop level. Variable bit rate (VBR) Comes in two forms: real time (VBRRT) and non real time (VBRNRT). These forms are used in highdelay, highjittertolerant, and highbandwidth applications, including many video broadcasts. Available bit rate (ABR) + minimum cell rate (MCR) Used in the WAN. This class provides besteffort delivery with congestion feedback notification. Optionally, you can define a minimum bandwidth requirement. Unspecified bit rate (UBR) Used by many legacy data applications. This class provides besteffort delivery. 184
A unique Cisco class for besteffort data traffic delivery with a specified minimum bandwidth. This class is used in a LAN for highend resource applications or in a WAN with an ATM for a guarantee of a certain amount of bandwidth (also called a committed information rate [CIR]). One of the great features of the LightStream 1010 switch is its ability to use the same interface modules as the Cisco Catalyst 5500 series of switches. This feature allows the LS1010 to be controlled in the same way as the Catalyst 5500 series, with the AtmDirector, CiscoView, and CiscoWorks for Switched Internetworks (CWSI) software available from Cisco.
UBR + MCR
LightStream 2020
The LS2020 is one of Ciscos most powerful LAN, WAN, backbone, campus, and multiservicetype ATM switches. This switch offers costeffective bandwidth coupled with superior QoS handling in the network. Several other features make this switch a perfect solution for ATM: This switch works well with existing devices and will scale well with future technologies and applications. The switch supports not only ATM but also fastpacket switching applications, which means that it can support Frame Relay, circuit emulation, and LAN technologies such as Fiber Distributed Data Interface (FDDI) and Ethernet. Switching and communications on the LS2020 are performed at wire speed, so no noticeable latency is caused by the switch processor or the ApplicationSpecific Integrated Circuits (ASICs) used to switch data traffic from one interface to another. Processing tasks are handled by three components based solely on the speed required for each task. Lets take a look at these three components: Line cardUsed when a particular function must be completed in a tenth of a millisecond or less. Such functions include implementing traffic policies and cell forwarding. Line card control processorPerforms complex tasks that must be completed in a tenth of a millisecond or less. These functions include interface management, error handling, and lineup and linedown protocol processing. Network processor softwarePerforms less critical processing that can be handled in more than a tenth of a millisecond, such as cell processing and network management request processing. The LightStream 2020 processor card is shown in Figure 9.3.
Figure 9.3: The LightStream 2020 processor card. The LS2020 switch can use a software package called ControlStream, which is a traffic management application used to control data traffic. This software allows very high line utilization while at the same time maintaining users QoS guarantees. ControlStream software employs congestion avoidance and traffic control techniques that allow network links to operate at high levels of utilization by scaling back data that has a much lower priority, including data traffic that is tolerant to traffic delays in the network. As a result, traffic selection can occur at congestion points in the network. The LightStream 2020 uses an internal routing mechanism to provide a path through an ATM virtual channel connection (VCC). These routing mechanisms allow the LS2020 network to provide paths through permanent virtual connections (PVCs) and switched virtual connections (SVCs). Through these virtual connections, the LS2020 supports synchronous connections over ATM usernetwork interface (UNI) PVCs, Frame Relay PVCs, and circuit emulation PVCs. The switch also provides connections over physical LAN medias such as Ethernet and FDDI.
185
algorithm to determine the path for any data that arrives and needs to be switched through the network. The routing algorithm calculates the minimum distance path through the network, verifies the availability of bandwidth, and then sets up a connection between the two ATM endpoints in the network. The routing algorithm can use metrics to determine the leastcost route for setting up a virtual connection. A route that is selected through the route generation function is based on the smallest number of hops to the destination. If two equal paths exist, the routing algorithm uses the bandwidth of the links as the tiebreaker: It uses the fastest link with the most available bandwidth. When a route needs to be generated, the routing algorithm creates the most efficient route based on the following information: Source and destination addresses (the internal addresses used to designate the VCC endpoints in the network) Bandwidth type (indicates the pool to be used for allocation, data, or control purposes) Service specification of the desired bandwidth or a minimum acceptable bandwidth Scaling factors allow for a partial allocation of bandwidth for certain types of data traffic. The primary scaling factor is not definable and is always set to 1. A secondary scaling factor can be defined by an administrator; its typically set to a range of 1 to 2 percent. When identifying a minimum acceptable bandwidth, you must set a parameter that will be an enforced rate for the VCC. This parameter will make the routing algorithm choose a link that has bandwidth equal to or greater than the assigned minimum acceptable bandwidth value. Doing so prevents the possibility of an output port sending data at a greater rate than an intermediate link can handle and guarantees a certain amount of bandwidth for those applications that require it.
These lines indicate how much memory is installed in the switch. Checking the amount of memory installed in the switch against the amount displayed here can identify a hardware problem. If the bootstrap fails to load, the boot ROM could have a problem. If the switch has no configuration, it will default to setup mode. If you see the following notice during the boot process and youre prompted to set up the switch, then the installed nonvolatile RAM (NVRAM) may have a problemparticularly if a saved configuration existed when the power was recycled. Lets take a look:
Notice: NVRAM invalid, possibly due to a write erase. System Configuration Dialog At any point you may enter a question mark ? for help. Use ctrlc to abort configuration dialog at any prompt.
187
Default settings are in square brackets [] Would you like to enter the initial configuration dialog? [yes]
From this prompt, you can enter the initial configuration dialog or decline and manually enter the configuration. This choice allows an administrator to use the Command Line Interface (CLI) on the LightStream switch. If you are not familiar with configuring a LightStream switch, you may want to continue using the System Configuration Dialog screen.
Snooping Mechanisms
Snooping mechanisms used by the LightStream 1010s ports allow a mirrored connection from one or more ports to be mirrored to another port. As a result, any data on a selected mirrored port will be copied and sent to the mirror port. This process is completely transparent to the end devices connected to the port or ports being monitored, and the data can be analyzed by an external ATM analyzer attached to the mirrored port. Snooping mechanisms are one of the most important monitoring and troubleshooting tools used in ATM switches. ATM analyzers can be used to monitor the traffic flows in and out of the selected ports. No external devices can be connected to monitored ports to easily identify problems associated with ATM.
188
The MPC Configuring an MPC on a router provides routerinitiated and routerterminated shortcuts for nonNBMA networks. The MPC functionality involves the following: Dataplane and controlplane VCC management Ingress/egress cache management MPOA frame processing MPOA protocol and flow detection An MPC identifies packets sent to an MPOAcapable router over the NBMA network and establishes a shortcut VCC to the egress MPC, if possible.
3. Use the enable password command followed by a password to configure the enable password:
CoriolisLS1010(config)# enable password book1
CoriolisLS1010> enable
3. You must identify the route for traffic to take to the internal network (referred to as a static route) using the ip route command, as shown here:
CoriolisLS1010(config)# ip route 63.78.127.0 255.255.255.0 ethernet 0
5. Assign the IP address and subnet mask to the interface just as you would a switch or router Ethernet interface, and then exit:
CoriolisLS1010(configif)# ip address 63.78.127.2 255.255.255.0 CoriolisLS1010(configif)# ^C CoriolisLS1010#
5. Create an ATM subinterface. This example uses the PVP number as the subinterface number:
CoriolisLS1010(configif)# interface atm 3/0/2.2 CoriolisLS1010(configsubif)# end CoriolisLS1010#
190
IFSide: Unitype:
not applicable
CoriolisLS1010#
Tip To verify the address configuration, use the show atm ilmiconfiguration command.
191
control distribute: vcd 1452, 3 members, 196 packets proxy/ (ST: Init, Conn, Waiting, Adding, Joined, Operational, Reject, Term) lecid ST vcd pkts Hardware Addr ATM Address 1 O 1451 6 0060.705a.8f02 47.0091810000000060707B8A01.0060705A8B12.01 2 O 1455 10 00e0.d7b1.ba12 47.0091810000000060707B8A01.112233461176.02 3P O 1466 59 0090.a2fb.b430 47.0091810000000060707B8A01.009086FB1021.01 LE BUS ATM2/0.2 ELAN name: elan1 Admin: up State: operational type: ethernet Max Frame Size: 1516 ATM address: 47.009181000000006007B8A01.1B2133CC51BA.02 data forward: vcd 1454, 3 members, 244 packets, 5 unicasts lecid vcd 1 1453 2 1458 3 1467 pkts ATM Address 32 47.0091810000000060707B8A01.0060705A8B12.01 28 47.0091810000000060707B8A01.112233461176.02 58 47.0091810000000060707B8A01.0060705A8B12.01
LE Client ATM2/0.2 ELAN name: elan1 Admin: up State: operational Client ID: 2 LEC up for 22 minutes 53 seconds Join Attempt: 605 HW Address: 00e0.f9b1.b410 Type: ethernet Max Frame Size: 1516 ATM Address: 47.0091810000000060707B8A01.112233461176.02 VCD rxFrames txFrames Type ATM Address 0 0 0 configure 00.000000000000000000000000.000000000000.00 1456 1 10 direct 47.0091810000000060707B8A01.112233461176.02 1457 196 0 distribute 47.0091810000000060707B8A01.112233461176.02 1459 0 28 send 47.0091810000000060707B8A01.112233461176.02 1460 245 0 forward 47.0091810000000060707B8A01.112233461176.02
MACAddress(es) 00e0a3a50000 thru 00e0a3a503ff 00608342e44b thru 00608342e44d 00400b430264 00603ecd4295 00400b914216 thru 00400b914217
Fw Sw 2.2(1) 3.1(1) 2.2(4) 3.1(1) 1.3 2.2 1.1 2.1(2) 20.2 11.2
192
2 EARL 1+ WSF5511 0002278010 1.0 Mod SMT UserData TNotify CFSt ECMSt Bypass 5 WorkGroup Stack 30 isolated in absent CoriolisLS1010>
2. Specify the ATM interface to which the MPC is attached. In this example, the interface is 1/2:
interface ATM 1/2
4. Enter Subinterface Configuration mode for the ATM interface that contains the LEC to which you will bind the MPC:
interface atm 1/2.1
193
2. The ATM address that specifies the control ATM can be optionally identified using this command:
atmaddress atmaddress
3. Enter Subinterface mode for the processor card using the following command:
CoriolisLS1010(config)# interface atm 0[.subinterface]
4. You must specify an ATM address to override the automatic ATM address assigned to a LANE client:
CoriolisLS1010(configif)# lane clientatmaddress atmaddresstemplate
194
5. Use the lane client ethernet command followed by the name of the ELAN to configure a LANE client:
CoriolisLS1010(configif)# lane client ethernet elanname
6. Use the set clock command to set the clock to synchronize the time with the other connected LightStream switches. This step will also determine if the switch is a master or slave time synchronizer unit. 7. Use the set interface command to register a line. This command sets the interface type to usernetwork interface (UNI) or networktonetwork interface (NNI), the standard body conformance to either ATM or ITU, the length of the VPI valid bits, and the length of VCI valid bits. 8. Use the pvc establish command to configure a pointtopoint PVC. Warning This command becomes active immediately. 9. To optionally set PVC multicast, use the pvc add command to add the endpoint. The pvc add command can also be used to add a PVC endpoint for pointtomultipoint connection. If you are using an SVC, use the route add command instead of the pvc add command. The pvc establish command allows you to enter the line number, VPI, and VCI. Note To delete an endpoint, use the pvc remove command. 10. Use the save command to save the configuration data. 11. Use the exit command to exit Privileged EXEC command mode. 195
196
NCR 53C710: Chip Revision: 0x2, IB: 0xec18e000 LynxOS/68040MVME167 Version 2.1.0 Copyright 1992 Lynx RealTime Systems Inc. All rights reserved. LynxOS release 2.1.0, level 1: NPLynxOS #112: compiled Nov 08 1994 19:49:33 Singleuser boot singleuser$ Type . to get a TCS hub prompt: singleuser$ . TCS HUB<> Reset the NP card: TCS HUB<> reset 1 TCS HUB<> connect 1 Memory Autosizing(32Meg)Done Clearing 32Meg MemoryDone NP1 POST Version 0.220 Nov 23 1994 NP1 POST SUMMARY: 0 Tests Failed The following accounts do not have passwords: root fldsup npadmin oper Install a password on the root account? (y/n) [y] y Changing password for root Enter new password: Retype new password: Install a password on the fldsup account? (y/n) [y] y Changing password for fldsup Enter new password: Retype new password: Install a password on the npadmin account? (y/n) [y] y Changing password for npadmin Enter new password: Retype new password: Install a password on the oper account? (y/n) [y] y Changing password for oper Enter new password: Retype new password: Starting VM system Virtual Memory Engaged! inetd started Starting crond Initializing the switch hardware interface Using switch A, cards are NOT synchronized, fast cutover is supported PCP version: 0x410, CMP version: 0x12, FSU version 0x109 Starting the switch software LightStream 2020 Version 2.0.6 Copyright 1993 LightStream Corp. All rights reserved. Portions copyright 1992 by Lynx RealTime Systems Inc., 1983 by the Regents of the University of California, 1988 and 1990 by Paul Vixie, and 1991 by SNMP Research Inc. This software contains unpublished proprietary and trade secret information of LightStream Corp. LightStream 2020 Software provided to the U.S. Government is subject to the notices on the software and on the LightStream user documentation copyright page. PROGRAM: cbuf: (ls2_0) compiled Nov 08 1994 @ 23:33:35 [pid:50] Login as root and check the new password:
197
This process changes the password and recovers any lost passwords.
198
Frames
A switch will typically receive three types of frames without a specific destination. These frames in turn become a broadcast and are flooded out all the ports except for the port of arrival. These frame types are:
199
Table 10.1: Broadcast and multicast destination addresses. Frame Type Binary Value Broadcast Address Broadcast 11111111.11111111.11111111.11111111 255.255.255.255 Multicast 00001010.00000001.11111111.11111111 10.1.255.255 When a switch receives a broadcast or a multicast, the frame is sent out all the ports of the switch by default, with the exception of the port on which the frame arrived. VLANs can be used to break down the broadcasts into smaller broadcast domains. In the case of a VLAN, if a broadcast arrives on a port assigned to VLAN 5, only ports assigned to VLAN 5 will receive the broadcast.
Unknown Unicasts
An unknown unicast is similar to a broadcast. This type of unicast is sent when a destination address is unknown by the switch. In this case, the bridge forwards the frame just like a broadcast; the frame is sent out all ports except the port on which it arrived.
Figure 10.1: A network with more than one path in the network. Data can return to the source node on a second link, causing a data loop. Manufacturers needed a consistent standard that they all could use to block redundant paths through a network. Digital Equipment Corporation (DEC) answered the call and submitted to the Institute of Electrical 200
and Electronics Engineers (IEEE) a protocol similar to STP to become a networking standard. However, after the IEEE 802 committee revised it into what is now known as the IEEE 802.1D standard (Spanning Tree Protocol), the protocol differed just enough from DECs version that they were incompatible.
201
Figure 10.2: An example of a directed graph. STA assigns each switch in the network a unique identifier. This identifier is one of the switchs MAC addresses, as well as an assigned priority (explained in more detail later in this chapter in The Selection Process). After STA assigns each switch this unique identifier, it then assigns each port in every switch a unique identifier. This port identifier is typically the ports own individual interface MAC address. Each bridge port is then associated with a path cost, which represents the cost of transmitting a frame onto the network through the port. Path costs are assigned by default, but can be assigned manually by a network administrator. As I stated in the last section, the graph theory chooses a reference point in the network and calculates the redundant paths to that particular point in the network topology. After STP discovers all the links in the network, the STA chooses a single path through the network and blocks the redundant links. It does so by electing a root bridge. Lets take a look at root bridges in the next section.
202
Figure 10.3: The root bridge calculating the path cost to switch D. The lowest calculated path is not always the most ideal path. For example, if multiple highspeed links to a destination exist, the links may total more than the cost of a very slow link, such as a modem. Even though the straight path has the fewest hops, it is much slower than using a highspeed, longer path. To overcome this problem, you as the administrator can manually change a slowerspeed link to have a higher port cost, which STP will use to calculate a higher path cost. The goal is to make changes to the network so that the fastest, most efficient route to the root port is designated for the switch to use. The fastest links should always have the lowest port costs. A designated bridge is the bridge or switch on each LAN that provides the shortest route with the least path cost. The designated bridge is the only bridge that is allowed to forward frames to and from the other bridges. A designated port on the switch is the port that connects the switch to the physical interface of the designated bridge.
Figure 10.4: The 12 fields of a BPDU message. Protocol IdentifierContains 2 bytes and the value of zero. 203
VersionContains 1 byte and the value of zero. Message TypeContains 1 byte and the value of zero. FlagContains 1 byte; only the first 2 bits are used. The topology change (TC) bit signals that there has been a topology change. The topology change acknowledgment (TCA) bit is then set to acknowledge receipt of a configuration message with the TC signal bit set. Root IDContains 8 bytes that identify the root bridge by listing a 2byte priority followed by a 6byte ID. Root Path CostContains 4 bytes containing the cost of the path from the bridge sending the configuration message to the root bridge. Bridge IDContains 8 bytes identifying the priority and ID of the bridge sending the message. Port IDContains 2 bytes identifying the port from which the configuration message was sent. This field allows loops created by multiple attached bridges to be detected immediately by STP. Message AgeContains 2 bytes specifying the amount of time since the root sent the configuration message on which the current configuration message is based. MaxAgeContains 2 bytes indicating when the current configuration message should be discarded. Hello TimeContains 2 bytes indicating the time period between root bridge configuration messages. FwdDelayContains 2 bytes indicating the length of time that the bridge should wait before transitioning to a new state following a topology change in the network. Timers affect the way BPDUs operate in a network and converge in the event of a data loop or network topology change. Lets take a look at these timers. BPDU Timers STP uses timers to prevent data loops and to determine how long it will take STP to converge after a link failure or change in the network topology. As frames and packets travel through the switched network, this data faces propagation delays. Propagation delays occur due to such things as bandwidth utilization, packet length, switch processing, or any other porttoport delay encountered as data traverses the network. As a result of propagation delays, BPDUs can be late to their destinations, making the switch think that a network topology change has occurred. Because propagation delays can occur at any time in the network, when a switch port converts from a blocked state to a forwarding state, the port can inadvertently create temporary data loops because it has not received a complete picture of the network topology. To overcome network propagation delays, STP members use timers to force the ports to wait for the correct topology information. The timers are set by default on the switch. Table 10.2 shows the three different STP timers and the default timer settings based on a default setting of 2 for the Hello Time and 7 for the switch diameter. Based on these assumptions, the network should always form a stable topology.
Table 10.2: The default STP timers and their default settings. Description Default Determines how often the switch 2 seconds will broadcast hello messages to other switches Maximum Time/MaxAge Determines how long protocol 20 seconds information received on a port is stored by the switch FwdDelay Determines how long listening and 15 seconds learning will last before the port begins forwarding Selecting the root bridge is important in calculating the port cost in the network. The port cost from each child switch in the network is calculated from the networks root bridge. In the next section, well take a look at how the BPDUs are used in the process of selecting a root bridge. 204 STP Timer Variable Hello Time
Parent and Child Switches A switchs diameter is a unit of measurement between the root switch and child switches. The root bridge counts as the first switch. Each subsequent child switch out from the root bridge is counted to yield the diameter number. A parent switch brings you one switch closer to the root bridge, and a child switch takes you one switch farther away from the root bridge. Each root bridge can be configured with a diameter from a minimum of two switches to a maximum of seven switches. By modifying the diameter, you will subsequently change the timer values that are advertised by the root to reflect a more accurate network diameter. For example, a diameter of 2 yields a MaxAge of 10 seconds and a FwdDelay of 7 seconds. Cisco recommends that you change the diameter to correctly reflect your network rather than manually changing the timers.
The Selection Process The root bridge selection process begins as soon as the switch powers up. The root bridge is the reference point in the network from which graph theory is used to calculate the cost of each link for each instance of a spanning tree. Using these calculations, the switches must determine if loops exist in the network and the path costs associated with each path through the network. The switch immediately assumes at startup that it gets to be the root bridge, and it configures its bridge ID equal to the root ID in the BPDU. The bridge ID field of a BPDU message is actually made up of two parts, as follows: Bridge priorityA 2byte value set by the switch. By default, the priority is set to 0x8000 or 32,768. Media Access Control (MAC) addressThe 6byte MAC address of the switch or bridge. These two fields of the bridge ID help an STP switch yield a value that can be compared with other switches bridge IDs to determine which switch will become the root bridge. The lower the bridge ID value, the higher the chance of a rootbridge assignment. If more than one switch has the same low bridge priority value, the bridge with the lowest MAC address then becomes the root bridge. Table 10.3 shows the bridge priority values assigned by STP.
Table 10.3: The bridge priority values assigned by Spanning Tree Protocol. Priority Assignment Default bridge priority Value 32,768
205
Secondary root bridge priority 16,384 Root bridge priority 8,192 The switches participating in STP (other than the root bridge) must form an association with the root bridge shortly after the root bridge has been elected. Each switch examines each BPDU as it arrives on each port. When a switch receives the same information on more than one port, it is an indication that the switch has a redundant path to the root bridge. The switch then determines which port will forward data and which ports will be blocked from sending data. This decision is made by analyzing the path cost and port ID fields of the BPDUs. Bridges look at the path cost first to determine if the port has the lowestcost path to the root switch. If the port has the lowest port cost, the port is placed in forwarding mode. All the other ports that are receiving the same BPDU information are placed in blocking mode. In blocking mode, the port will still forward BPDU and system information to the switch processor. If the path cost is equal, as in the case of identical links, the bridge looks at the port ID as a tie breaker. The port with the lowest port ID forwards, and all other ports are blocked. Port Costs, Path Costs, and Port Priorities After the root bridge has been elected, all the switches determine the best loopfree path to the root switch. STP uses several different costs, with the port priority as the tiebreaker. The sum of all the port costs to a destination through all the ports the frames must travel makes up the path cost. Table 10.4 shows the default port cost and port priority assigned to each port.
Table 10.4: The default port settings for STP. Variable Default Port priority 32 (Except 1900 and 2820 series128) Port cost 62 When the BPDU is sent to the other bridges, it carries the path cost. The spanning tree looks first at the path cost and decides which ports should forward and which ports should be blocked. If the path costs are equal for more than one port, then the spanning tree looks at the port ID. The port with the lower port ID has priority, making that port the forwarding port. If the path cost and the port ID are the same, then the STP will use the port priority as the tiebreaker. Well look more at equal cost paths in the next section. Tip On both the Command Line Interface (CLI) based IOS and the Set/Clear commandbased IOS, you should assign lower numbers to ports attached to faster media and higher numbers to ports attached to slower media. The defaults differ for media, as shown in Table 10.5.
Table 10.5: Examples of path cost calculations. Physical Wire Speed Path Cost 10Mbps 100 100Mbps 10 155Mbps 6 1000Mbps (1Gbps) 1 10000Mbps (10Gbps) 1 The port priority on each port can be modified to influence the links that will be forwarding. The port with the lowest priority value forwards frames for all VLANs. In the event that all ports have the same priority value, the port with the lowest port number will forward the frames. The possible port priority value range is from 0 to 63.
206
Equal Cost Paths If two or more links have the same root path cost, such as two identical links running between two switches, STA has a problem choosing the designated port or a root path through the network using the lowest path cost. The bridge ID is used to determine the root bridge in the network and also the root port. By default, the priority on all devices running STP is 32,768. If two switches or bridges have the same priority value, then the MAC address is used to break the tie. The bridge or port with the lowest ID wins. For example, lets look at the two switches depicted in Figure 10.5. One switch uses the MAC address 0000.80ac.0000.1111, and the other switch uses the MAC address 0000.80ac.0000.2222. The switch using 0000.80ac.0000.1111 would become the root bridge or the root port, depending on which decision the switch is making.
Figure 10.5: Two ports on two switches with equal cost paths through the network. We didnt consider another option: As the administrator, you can assign a lower path cost to faster physical media, or you can assign slower media a higher path cost. You can also decide which link to give a higher cost path when multiple links are equal. The range of numbers that can be assigned to the port costs are 1 through 65,535. Typically, the path cost is determined by dividing 1,000 by the physical wire speed in megabits per second (Mbps), as shown in Table 10.5. Note The path cost can never be lower than one. STA recalculates the cost of using each link whenever a bridge joins the network or when a topology change is detected in the network. This calculation requires communication between the spanning tree bridges, which is accomplished through the passing of BPDU messages between switches.
207
For example, the downtime caused by using the defaults would be the following:
2 * 15 + 20 = 50 seconds
Now that you have learned about the timers and how BPDUs operate in the network, lets take a closer look at how ports transition through different states before forwarding data.
Figure 10.6: The convergence process of the port states in Spanning Tree Protocol. BlockingThe port will not forward frames. It merely accepts BPDUs the port receives and processes them. All ports are in the blocking state by default when the switch is powered up. The port stays in a blocked state if STP determines that a lowercost path exists to the root bridge. The port does not put any of the information it hears into the address table. ListeningThe port continues to process BPDUs to make sure no loops occur on the network before it passes data frames. In this state the port is not forwarding frames or learning new addresses. LearningThe port is not forwarding frames but is learning addresses and putting them in the address table. The learning state is similar to the listening state, except the port can now add information it has learned to the address table. The port is still not allowed to send or receive frames. ForwardingThe port now begins to learn from the BPDUs and starts to build a filter table. A port is not placed in a forwarding state until there are no redundant links or the port determines the lowest cost path to the root bridge or switch. DisabledThe port has been manually shut down by the network administrator or by the system due to a hardware problem. Lets take a stepbystep look at what happens to a port when the switch is powered up: 1. After the switchs initialization or startup, all the ports immediately go to a blocking state. 2. After the configured MaxAge has been reached, the switch transitions from the blocking state to the learning state. 3. After the configured FwdDelay time has been reached, the port enters the learning state. 4. After the configured FwdDelay has been reached in the learning state, the port either transitions into forwarding mode or back to blocking mode. If STP has decided the port will be a forwarding port, the port is placed in forwarding mode; but if the port is a highercost redundant link, the port is placed in blocking mode again. Each port state can be manually modified using the Cisco IOS. If properly configured, the ports should create a stable network, and the ports of each switch should transition to either a forwarding or blocking state.
208
PVST and PVST+ PerVLAN Spanning Tree (PVST) is a Cisco proprietary solution to the scaling and stability problems associated with Common Spanning Tree (CST) in largescale spanning tree networks. PVST creates a separate instance of STP on each VLAN in the switch block. This setup gives each VLAN a unique STP topology containing its own port cost, path cost, priority, and root switch. By using separate instances of PVST on each VLAN, you reduce the convergence time for STP recalculation and increase reliability of the network. By implementing PVST, the overall size of the spanning tree topology is reduced significantly. PVST improves scalability and decreases convergence time, providing faster recovery in the event of network faults. It also allows control of forwarding paths on a persubnet basis while providing a simple technique for Layer 2 redundancy. PVST does have some disadvantages in the spanning tree. PVST uses more processing power and consumes more bandwidth to support spanning tree maintenance and BPDUs for each VLAN. InterSwitch Link (ISL) uses one spanning tree per VLAN, using PVST over ISL trunks. PVST implementation requires the use of Cisco ISL encapsulation in order to function. PerVLAN Spanning Tree Plus (PVST+) is not well documented by Cisco. IEEE 802.1Q can use PVST+ to map multiple spanning trees to the spanning tree of authentic IEEE 802.1Q switches. PVST+ is available in Catalyst software versions 4.1 or newer. Cisco Catalyst switches configured with version 4.1 or later are considered Cisco PVST+ switches. PVST+ is compatible and interoperable with legacy type Mono Spanning Tree (MST) and PVST switches without any user interventionthus PVST+ has a type of plugandplay functionality.
Configuring the port priority by VLAN is useful for distributing data across parallel paths. If a parallel connection exists between two devices, STP will block one of the links. If the port priority is not changed on one of the ports for each VLAN, the traffic from all VLANs will travel on one link, and one link will be used only as a backup. When you need to have multiple links to a destination be able to transmit data as though they were one link, you can use EtherChannel. Lets take a look at EtherChannel in the next section.
EtherChannel
Fast EtherChannel can provide scaled bandwidth within the campus using fullduplex bandwidth at wire speed for up to eight bundled links. A bundle is a series of links acting like a single link between two points in 209
the network. Thus, eight wires can be used to simulate one link able to handle up to 800Mbps and load balance data across those links, as shown in Figure 10.7.
Figure 10.7: Eight equalcost links between two switches, creating a bundle of eight channels acting as a single link. Lets take a look at what occurs during a link failure in an EtherChannel bundle. Well also examine the Port Aggregation Protocol (PAgP).
Link Failure
Fast EtherChannel provides redundancy in the event of a link failure. The EtherChannel bundle is managed by the Fast EtherChannel process and the Ethernet Bundle Controller (EBC). Should one link in the bundle fail, the EBC informs the Enhanced Address Recognition Logic (EARL) ASIC of the failure. The EARL ASIC immediately ages out all addresses learned on that link. The EBC and the EARL then recalculate in the hardware, sending queries to the other switches and learning the destination link based on the responses. The data traffic is rerouted on one of the other links in just a few milliseconds, making the convergence transparent to the user.
EtherChannel Administrative Groups You can define an EtherChannel administrative group to identify groups of ports that are allowed to form an EtherChannel bundle together. When you create an EtherChannel port bundle, an administrative group is defined automatically. Administrative group membership is limited by hardware restrictions. The administrative group can be any value between 1 and 1,024, inclusive. It is defined using the
set port channel <port list> <administrative group number>
Modifying a member port of an EtherChannel administrative group will cause the port to be removed from the group when STP realizes that a change has occurred in the network topology. The modified port that was a member of the EtherChannel administrative group must go through listening and learning mode again before it can return to forwarding mode and rejoin the EtherChannel bundle.
capability. The channel is then added to the spanning tree as a bridge port. Warning Dynamic VLAN ports can force a VLAN change; as a result, PAgP cannot be used to form a bundle on ports that are configured for dynamic VLANs. The VLANs must be static VLANs, meaning that the port on the switch must be assigned to a VLAN. PAgP also requires that all ports in the channel belong to the same VLAN or be configured as trunk ports. If you have a preexisting EtherChannel bundle, and a VLAN of a port contained in the bundle is modified, all ports in the bundle are modified to match the VLAN configuration. PAgP will not group ports running at different speeds or duplex. PAgP will change the port speed and duplex for all ports in the bundle. All ports in a Fast EtherChannel bundle should be assigned to the same VLAN or be configured as trunked ports. You must also configure both ends of the link with the same trunking mode. Tip You can configure the broadcast limits by percentage limit or by packetspersecond. Packetspersecond allows unicast packets to be dropped when the broadcast limit is exceeded.
PortFast
PortFast is a switch function that can be used on ports where a single server or workstation is connected, to allow a port to enter the forwarding mode almost immediately. Doing so prevents the port from entering the listening and learning states. As weve discussed, when a switch using STP is powered up, the ports running STP go through four states before forwarding frames through each port. In order to get to the forwarding state, the STA makes each port wait up to 50 seconds before data is allowed to be forwarded. This delay may cause problems with certain protocols and applications. By implementing PortFast, you can avoid these delays.
UplinkFast
One of the most important factors in a network is the convergence time when a link fails. By implementing the UplinkFast function, you can reduce the time it takes for the network to converge by optimizing convergence times. Because of the convergence time of STP, some end stations become inaccessible, depending on the current state of each switch port. By decreasing convergence time, you reduce the length of the disruption. UplinkFast allows a port in a blocked state on a switch to almost immediately begin forwarding when the switch detects a link failure or a topology change. However, UplinkFast must have direct knowledge of the link failure in order to move a blocked port into a forwarding state. Note An Uplink Group is a root port that is in a forwarding state and a set of blocked ports that does not include selflooping ports. The Uplink Group is the alternate path when the currently forwarding link fails. The UplinkFast feature should be placed only on Access layer switches that are connected to the enduser nodes. In order to utilize UplinkFast, several criteria must be met: UplinkFast must be enabled on the switch. 211
The switch must have at least one blocked port. The failure must be on the root port. If a link fault occurs on the primary root link, UplinkFast transitions the blocked port to a forwarding state. UplinkFast changes the port so that it bypasses the listening and learning phases. This change occurs in three to four seconds, allowing convergence to begin immediately without waiting for the MaxAge timer to expire. Note UplinkFast becomes a global setting on the switch. It affects all the VLANs on the switch and cannot be applied on just one VLAN. When you enable UplinkFast, it automatically increases the path cost, making it unlikely that the switch will become the root switch. If UplinkFast is not being used, you should use the Catalyst default settings.
BackboneFast
BackboneFast is a function that allows the switch to converge more quickly in the event that a redundant link fails. An inferior BPDU is sent when a link from the designated switch has been lost to the root bridge. When the root port or a blocked port on a switch receives an inferior BPDU from its designated bridge, if BackboneFast is enabled, this event in turn triggers a root Link Query. The designated switch transmits these BPDUs with the new information that it is now the root bridge as well as the designated bridge, and the BPDUs begin arriving on a port that is blocked on the switch. The switch receiving inferior BPDUs will ignore the message until the configured MaxAge timer expires, to give the network time to overcome the network problem. If inferior BPDU messages continue to arrive after the MaxAge timer has been used, the root port and other blocked ports on the switch become alternate paths to the root bridge. The switch will send another kind of BPDU called the root Link Query PDU if more than one link exists to the root bridge. The switch will send a root Link Query PDU out all the available alternate paths to the root bridge to determine which one will forward. If there are no other blocked ports, the switch automatically assumes that it has lost connectivity to the root bridge, causes the maximum aging time on the root to expire, and becomes the root switch. BackboneFast must be enabled on all switches in the network in order to function properly. Tip BackboneFast cannot be used in a Token Ring network.
After using this command you must use the set spantree enable all command to enable STP on all the VLANs. An example is shown in the next section.
212
Related solutions: Found on page: Configuring a Static VLAN on a Catalyst 5000 Series 154 Switch Configuring Multiple VLANs on a Catalyst 5000 154 Series Switch
For example, you could use disable STP on VLAN 2 with the following command:
set spantree disable 2
The output should look similar to the following (Table 10.6 defines each of the fields in this output):
Spanning tree enabled Spanning tree type ieee Designated Root 00ac1522a512 Designated Root Priority 8192 Designated Root Cost 0 Designated Root Port 1/0 Root Max Age 10 Sec Hello Time 2 sec Forward Delay 7 sec Bridge ID MAC ADDR 00ac1522a512 Bridge ID Priority 8192
213
Bridge Max Age 20 Sec Port 5/1 5/2 5/3 5/4 vlan 2 2 2 2 PortState forwarding forwarding blocking blocking
The listing at the bottom of the output shows the ports in use in the spanning tree. It states the port, portstate, and priority, as well as whether FastStart (PortFast) is enabled.
Table 10.6: The show spantree command output fields. Field Spanning tree enabled Spanning tree type Designated Root Designated Root Priority Designated Root Cost Designated Root Port Root timers Bridge ID MAC ADDR Bridge ID Priority Bridge Max Age Description Shows that STP is in use Typically the IEEE standard The 6byte MAC address for the designated root bridge The 2byte priority setting for the root bridge Total cost to get to the root bridge from this switch (0 indicates the root switch) The port used to get to the root bridge Timer values of the root bridge or switch; these include the MaxAge, Hello Time, and Forward Delay timer values The 6byte address that the switch uses for its bridge ID The 2byte priority of this bridge The maximum values from the root bridge
In the following example, 5 is the VLAN number and is considered a VLANlist field; you can include up to 10 VLANs in the list:
spantree 5
214
Table 10.7: Root and secondary bridge configuration command parameters. Command Parameter root Definition Designates the root switch. The default priority of the root bridge is 8,192. 215
hello n (optional)
Used to designate the switch as a secondary root switch if the root bridge fails. The default priority of the secondary bridge is 16,384. Specifies the VLAN. If you do not specify the VLAN, VLAN 1 is used. The valid value range is 1 through 1,005. Specifies the diameter value discussed earlier in the chapter. It is essentially the number of bridges between any two points. The diameter should be measured starting from the root bridge. Valid values are 2 through 7. Specifies in seconds how often configuration messages should be generated by the root switch. The valid values are 1 through 10.
Setting the Root Bridge for More than One VLAN on a Set/Clear CommandBased Switch
To set the primary root switch for more than one VLAN on a Set/Clearbased switch, use the Privileged mode command to change configuration to a root bridge. The default priority automatically changes to 8,192, which is the default when the command is used to configure the switch as the root bridge. Use the following command to specify the root bridge:
set spantree root <root|secondary> <VLAN list> dia <diameter>
The following command specifies the root bridge for VLANs 1 through 3:
set spantree root 13 dia 2
When the root bridge is configured correctly, the output on the console should be similar to this:
VLANs 13 VLANs 13 VLANS 13 VLANS 13 Switch is bridge priority set to 8192 bridge max aging time set to 10 seconds. bridge hello time set to 2 seconds. bridge forward delay set to 7 seconds. now the root switch for active VLANs 13.
In the following example, 5 is the module number, 2 is the port number, and 100 is the configured port cost:
set spantree portcost 5/2 100
216
Verifying the Port Cost Configuration on Both a Set/Clear Command and CLIBased Interface
To verify the port cost on the port configured previously, use the following Privileged mode command:
show spantree <module/port>
Here, 4 is the module number, 3 is the port number, and 10 is the port priority:
set spantree portpri 4/3 10
217
218
In the following example, 5 refers to the MaxAge time and 1 refers to the VLAN:
spantree maxage 5 1
For this example, 2 is the module number and 1 is the port number. The output shows that the port is already configured to participate in a bundle:
catalyst5000> (enable) show port capabilities 2/1 Model WSX5225R Port 2/1 Type 10/100BaseTX Speed auto,10,100 Duplex half,full Trunk encap type 802.1Q,ISL Trunk mode on,off,desirable,auto,nonegotiate
219
Channel 2/12,2/14 Broadcast suppression percentage(0100) Flow control receive(off,on),send(off,on) Security yes Membership static,dynamic Fast start yes QOS scheduling rx(none),tx(none) CoS rewrite yes ToS rewrite IPPrecedence Rewrite yes UDLD yes AuxiliaryVlan 1..1000,untagged,dot1p,none SPAN source,destination
The following output shows 2 as the module number and 1 through 4 as the port numbers:
catalyst5000> (enable) set port channel 2/14 ? <admin_group> Admin group mode Channel mode catalyst5000> (enable) set port channel 2/14 mode ? auto Channel auto mode desirable Channel desirable mode off Turn off Channelling on Turn on Channelling <cr> catalyst5000> (enable) set port channel 2/14 mode auto Port(s) 2/14 channel mode set to auto. catalyst5000> (enable)
Table 10.8 explains the syntaxes available for the mode option. The mode on each port can be set to on, off, auto, or desirable.
Table 10.8: The four mode options for configuring an EtherChannel bundle on a switch. EtherChannel Mode Option on off auto Description Enables the port to channel or bundle without any negotiation. Disables the port from channeling or creating a bundle. Enables a port to negotiate the state in which the port will respond to PAgP packets it receives. The syntax does not, however, initiate PagP packet negotiation. This is the default setting. Enables a port to actively negotiate creating a bundle with the port on the opposite side of the link by continuously sending PAgP packets. Using the auto and desirable modes allows the configured ports to automatically negotiate whether to form a channel. The channel ports can be in different modes, as long as the modes are compatible. For example, if a port is in desirable mode, the port can form a bundle with 220
desirable Note
For example:
Catalyst5002> (enable) set port channel 2/14 10 Port(s) 2/14 are assigned to admin group 10.
221
In this case, the FastEthernet 0/26 is port A on the 1900 series switch:
Catalyst1900(config)# portchannel templateport fastethernet 0/26
The output should look similar to the following on a CLIbased command switch:
PortChannel is Enabled 802.1d STP State: ForwardingForward Transitions: 1 Portchannel mode: auto, preserveorder: Disabled Port parameters template port: A Active port: A PortMemberPriorityCap.PartnerPartnerPartnerPartner DeviceidPortidPriorityCap. AYes128100000000000000 BYes128100000000000000
The output should look similar to the following on a Set/Clear commandbased IOS:
222
catalyst5000> (enable) show interface sl0: flags=51<UP,POINTOPOINT,RUNNING> slip 0.0.0.0 dest 0.0.0.0 sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 208.44.88.4 netmask 255.255.255.192 broadcast 208.44.88.63 catalyst5000> (enable)
223
Tip
The set spantree uplinkfast command has other options, such as adding a station update rate or adding the on or off syntax for all protocols. The station update rate value is the number of multicast packets transmitted per 100 milliseconds (by default, it is set to 15 packets per millisecond). For more information on how to execute a change in the station update rate, use the Help command on the console.
224
You must clear the port and bridge costs modified by UplinkFast using the clear spantree uplinkfast command shown below:
catalyst5000> (enable) clear spantree uplinkfast This command will cause all portcosts, portvlancosts, and the bridge priority on all vlans to be set to default. Do you want to continue (y/n) [n]? y VLANs 11005 bridge priority set to 32768. The port cost of all bridge ports set to default value. The portvlancost of all bridge ports set to default value. uplinkfast allprotocols field set to off. uplinkfast disabled for bridge.
You should get output similar to the followingnotice that the VLANs followed by a comma, module number, and port number are forwarding to 3/1:
station update rate set to 15 packets/100ms. uplinkfast allprotocol field set to off. VLAN port list 1 3/1(fwd) 2 3/2(fwd),3/1 2 3/3(fwd),3/1 5 3/4(fwd),3/1
225
226
Why Not Call Them Routers? If MLS switches offer the same benefits as routers, why not just call them routers with a lot of interfaces? Although most multilayer switches are much faster and considerably less per port cost than routers, some MLS devices are simple, stackable workgroup switches that fall well short of the flexibility, protocol support, port density, and WAN features you find on most enterprise edition routers (with the exception of the Catalyst 6000, which now offers a FlexWAN Card). Until the Cisco IOS version 12.1 was released, the only protocol supported by MLS was Internet Protocol (IP). Even now, MLS supports only IP and Internetwork Packet Exchange (IPX).
Lets examine how MLS works and the components used in MLS.
manner. This method is similar to sending a piece of mail: You put it in the mailbox, but you have no guarantee that it will arrivejust the likelihood it will reach its destination. Using other protocols, including those at Layer 2 and Layer 4, the network traffic is made up of a series of endtoend conversations also known as flows. These flows are connectionoriented in nature. Connectionoriented data traffic is similar to a certified letter. You put the letter in the mailbox, and you receive a signed notice saying the letter reached its destination. MLS identifies network flows from a network source to a network destination by using the Network and Transport layer information in the packet headers; it then forwards the packets. This sequence of packets is sent in one direction between a particular source and destination and uses the same protocol and Layer 4 header information. Lets take a look at multiple flows. Suppose I am looking at Corioliss Web site to determine when the last book I wrote will be released. At the same time, I am using FTP to send the latest chapter I have written for review. Both data flows are traversing back and forth from the same source to the same destination and vice versatwo flows of data are traveling at the same time between my PC and a server at Coriolis. How does my host, a router, or even the switch know which conversation I want on my screen? Why dont parts of the Coriolis Web site get mixed into the chapter I am uploading? The reason it works is that each flow is assigned an individual port number. MLS should not be confused with NetFlow switching provided by the NetFlow Feature Card (NFFC) or the NFFC II, even though the NFFCs are used to provide MLS with the Catalyst 5000 and 6000 families of switches. MLS must use an external router or an internal route processor such as the Route Switch Module (RSM) to provide the routing resolution for the initial packet that is routed in an MLS flow (the connectionoriented session). Each subsequent packet in the flow is processed by the switch, not the router.
Prioritizing Traffic Flows MLS identifies the unique flows between hosts by identifying the user application and classifying data traffic with the appropriate priority level. These flows can be either unicast or multicast traffic. MLS identifies individual network traffic flows to provide predictable network services. It does this by supplying dedicated bandwidth to those applications that need it most. As an example, enterprise resource planning (ERP) application traffic (which can be missioncritical) can be identified as needing a higher priority and thus receive more network bandwidth than, say, Web or FTP traffic.
Before we go into more detail on packet flows, lets take a more detailed look at the hardware and software used by MLS.
MLS Components
You should understand three components in the MLS process to resolve the destination path for the initial packet flow. These components are required in order to use MLS and send routing updates to Catalyst switches. The components are as follows: MLS Switching Engine (MLSSE)The switch supporting MLS MLS Route Processor (MLSRP)The internal route processor in the switch or external router that supports MLS Multilayer Switch Protocol (MLSP)The protocol that runs between the MLSSE and MLSRP to enable MLS
228
Figure 11.1 shows the three MLS components contained in a single switch chassis, such as that of a Cisco Catalyst 5000 or 6000 family switch.
Figure 11.1: The MLS components using an internal route processor in an MLS switch. The Cisco 5000 and 6000 families of switches can use multiple internal route processors, such as the following: NetFlow Feature Card (NFFC) NetFlow Feature Card II (NFFC II) Route Switch Module (RSM) Route Switch Feature Card (RSFC) Multilayer Switch Feature Card (MSFC) Multilayer Switching Module (MSM) Note The NFFC or NFFC II must be used as a daughtercard of the Supervisor Engine III. You can also use the Supervisor IIG or IIIG card with Supervisor Engine software release 4.1 or later, which provides the functionality of the NFFC without using an NFFC card. Newer Catalyst models have the MLS functionality built into the switch. These switchesknown as Layer 3 (L3) switchesare the Cisco Catalyst 4908GL3, the Cisco Catalyst 2926GL3, and the Cisco Catalyst 2948GL3. The RSM or RSFC can be used in the Catalyst 5000 family, and an MSM or MSFC can be used in the Catalyst 6000 family. You can use an external router instead of an internal route processor to resolve the initial packet routing information. You must use an external router that supports MLS. Figure 11.2 shows an external router providing MLS route resolution functionality for the MLSSE (switch). MLS support is included in enterprise routers with the Cisco IOS version 11.3(2)WA4(4) or later. These routers include the following:
Figure 11.2: The MLS switch using an external router. Cisco 3600 series Cisco 4500 series Cisco 4700 series Cisco 7200 series Cisco 7500 series Cisco 8500 Gigabit Switch Router series In order to understand the MLS process better, we need to examine how the data packets are forwarded in an MLS environment.
229
MLS Flows
When a flow process begins, the MLSRP starts sending out multicast hello messages every 15 seconds to all switches in the network that accept MLSRP messages. These messages inform each switch that the MLSRP (router or internal route processor) is available to provide routing information to the MLS switches, allowing them to cache learned routes. MLSP is the protocol used between the MLSSE and the MLSRP. It uses a Cisco Group Management Protocol (CGMP) multicast address, so each MLSSE (switch) enabled for CGMP will hear the hello message. To distinguish between normal CGMP messages and the MLS messages, the MLSRP uses a special protocol type in the hello message itself. The MLSP hello message (which is also known as an MLSRP advertisement) can contain the following information: The Media Access Control (MAC) addresses of the router interfaces participating in MLS The routers known virtual LAN (VLAN) information The MLSRPs access lists Any known or updated routing information A switch participating in MLS has an MLSSE component. This component processes the hello message and records the MAC address of the MLSRP interfaces into its Content Addressable Memory (CAM) table. If multiple MLSRPs exist in the network, the MLSSE assigns a unique 1byte identifier called an XTAG, as shown in Figure 11.3. The XTAG is a number that distinguishes the network flows of each MLSRP.
Figure 11.3: An individual XTAG number is assigned to each MLS router in the network. When a host from one VLAN on the network begins a network flow that is destined for a host on another VLAN, the MLS switch that received the first packet in the flow extracts the Layer 3 information for the flow. This information includes the destination address, source address, and protocol port numbers. The MLSSE then forwards the first packet to the MLSRP for a routing resolution. MLSP is used to inform the MLSSE of the path to the destination hosts communicating in the flow. Because this is the first packet, no cache entry exists; a partial MLS entry for this Layer 3 flow is created in the MLS cache. When the MLSRP receives the packet, it looks at its route table to determine the destination of the packet and applies any applicable policies, such as an inbound or outbound access list. The MLSRP will then rewrite the MAC header, adding the MAC address of the destination host and using its own MAC address as the source address. The MLSRP then sends the packet back to the MLSSE. At this point, an MLS router has resolved the first packet with either a VLAN or Layer 3 logical address to a Layer 2 MAC address. The MLSSE can now use this address to make a forwarding decision and send the packet out the correct port connected to the destination node based on the entries the switch has in its CAM table. The MLSSE also determines that the MAC address of the MLS router is the source address in the packet and that the packets flow information matches a candidate entry in its MLS cache. Now that the entry for the flow has been added to the MLS cache, any further packets that are identified as belonging to the same flow are handled by MLSSE and switched based on the cached information. The MLSSE rewrites the headers, reconditions the checksums, and forwards the packets without their having to 230
go through the router. The MLSSE rewrites the packets to look as if they had been forwarded by a router. Note The MLS cache size can grow to a maximum of 128K. When the cache on the MLSSE grows larger than 32K, it is likely that flows in the network will not be switched by the MLSSE and forwarded to a router. When the conversation between the two nodes ends or discontinues for any reason, the MLS cache entry is aged out of the cache. For a new conversation to take place, the process must start again.
Figure 11.4: An MLS switch and one MLS router. The router has no access list configured, so the flow mask will be DestinationIP. Warning If a different flow mask is detected, the MLSSE will automatically change the currently used flow mask to the most stringent flow mask detected on the network and purge its cached entries. SourceDestinationIP Flow Mask The SourcedestinationIP is the next most stringent flow mask. This mask is used if any MLSRP in the network is using a standard access list, as shown in Figure 11.5. Router B contains a standard access list. Even though router A has no access lists configured, the flow mask is determined by the highest policies placed on a router. Therefore, the SourcedestinationIP flow mask is used for all flows. The MLSSE maintains one MLS entry for each source and destination IP address pair. Any flow between a given source and destination use this MLS entry, regardless of which IP protocol the interfaces use.
231
Figure 11.5: An MLS switch and two MLS routers. IP Access Lists and MLS Interaction When any interface has an inbound access list applied, the interface where the access list is applied cannot be used for MLS. However, you can apply an output access list on an interface, and it will not affect MLS. When MLS is enabled, standard and extended access lists are handled at the speed of the physical wire. Any modifications or changes to the access lists on any interface used for MLS take effect immediately after being applied to the interface on the MLSSE, on any internal route processor, or on external routers. If a flow has been established by the MLSSE and a new access list is created on the MLSRP, the MLSSE learns of the change through MLSP. This immediately changes the flow mask and purges the cache entries from the MLS cache on all the MLSSEs. Any new flows are created based on the new access list information.
IPFlow Flow Mask The IPflow flow mask is the most stringent of all flow masks. This flow mask is used when any of the MLSRPs has an extended access list configured on it, as shown in Figure 11.6. Router C contains an extended access list. This access list determines that the IPflow flow mask is used for all flows. The MLSSE creates a separate MLS cache entry for all IP flows. The IPflow entry contains the source IP address, destination IP address, protocol, and protocol interfaces.
You may become confused when trying to troubleshoot MLS because the commands you need to watch out for are not directly related to MLS. Remember this basic rule: Any command that involves the router examining each packet to perform an action will disable MLS on an interface. Lets take a look at some of these commands and the effect each command has on the interface: clear ip routeClears all MLS cache entries for all the switches that are acting as MLSSEs ip securityDisables MLS on the interface it is applied to ip tcp headercompressionDisables MLS on the interface it is applied to ip tcp compressionconnectionDisables MLS on the interface it is applied to no ip routingPurges all MLS caches and disables MLS on the interface it is applied to The following IP features and protocols also have a negative impact on MLS: Committed access rate (CAR)CAR will disable MLS on the interface. Data encryptionAny data encryption configured on the interface will cause MLS to fail. IP accountingThis feature will not work if MLS is enabled on an interface. Network Address Translation (NAT)MLS is automatically disabled on an interface if NAT is enabled. Policy route mapMLS is disabled if policy route maps are used. Now that we have discussed these issues, lets see how to configure MLS in your network. Even though this is a book on switching, in order for MLS to work properly in your network, you need to know how to configure both the MLS supporting switch and the MLS supporting router or internal route processor. In the next section, we will cover the configuration of both of these devices.
Configuring MLS
Configuring MLS involves tasks on both the MLSRP and the MLSSE. When using an internal route processor (such as an RSM) on the Catalyst 5000, the only tasks necessary are to verify that MLS is enabled on each interface and that all the interfaces are members of the same VLAN Trunking Protocol (VTP) domain. Because MLS is enabled by default, you need to reenable MLS only on the interfaces that have been disabled. On a Catalyst 6000, no configuration is needed unless you have disabled MLS. On the MLSSE, you need to configure the switch to determine the IP destination of the MLSRP, if it is an external router. If it is an internal MLSRP, no configuration is necessary. The default behavior of IP is to maintain a cache entry for each destination IP address. This entry can be modified either to a sourcedestination pair or to a more specific IP flow. On an external router being used as the MLSRP, you need to configure the router to participate in MLS. If your switch has been configured to participate in a VTP domain, the MLSRP must be in the same domain. You must configure each individual interface acting as an MLSRP for MLS. Only one interface on the MLSRP needs to be configured as the MLS management interface. Note If the router is connected via nontrunk links to the switch, you need to configure a VLAN ID for each interface. When configuring MLS on both the switch and the router, you should pay attention to several items. This information can be helpful for troubleshooting and configuring MLS. Lets take a look at the following MLS features and components: MLS cache Aging timers VLAN IDs 233
VTP domains Management interfaces Tip On the Catalyst 2926GL3, 4908GL3, or 2948GL3 switch, at least one MLSRP must be configured. Multiple MLSRPs can be configured in a single line; up to 16 MLSRPs can participate in MLS.
MLS Cache
The MLS cache is used to maintain the flow information for all active flows. The size of the MLS cache is limited to a maximum of 128K. This size limitation will occasionally cause MLS entries to be dropped from the MLS cacheusually if no traffic takes place in a network flow for 256 seconds. Certain routing changes and other network conditions can also force the MLS cache to purge its current entries.
Aging Timers
After the two hosts participating in a flow have completed their communication, you no longer need to maintain any entries regarding the flow. The quicker the end of the flow can be detected and the entries purged from the cache, the more effectively the switching process will function. Why? Because detecting and aging out these entries saves a lot of MLS cache space for real data traffic. Tip Cisco recommends that the total MLS cache entries be kept below 32K. To implement this limit, set the initial aging time value to 128 seconds. If the cache entries continue to go over 32K, decrease the aging time setting and adjust it as necessary. If cache entries still continue to go over 32K, decrease the normal aging time in increments of 64 seconds from the 128second default until the cache remains below 32K. You can adjust the amount of time the MLS cache keeps an entry in its table and set it to a value other than the default 128 seconds by using the agingtime command. This command is useful for eliminating shortlived entries in the cache, such as Domain Name Service (DNS). The aging time can be configured from 8 to 2,032 seconds, in increments of 8 seconds. At the end of the aging time interval, if no further packets are seen in a network flow, the entries related to that flow will be purged from the MLS cache. The agingtime fast command allows you to age out MLS cache entries quickly based on the number of packets received during a configured time period. The command has two parameters: fastagingtimeIdentifies the amount of time an entry remains in the cache. The default for fastagingtime is 0, which means that the aging time is disabled and no fast aging occurs. This value can be configured for 32, 64, 96, or 128 seconds. pkt_thresholdIdentifies the number of packets that must be detected during the configured fastaging time in order for the entry to remain in the MLS cache. The default parameter value is 0. You can configure this value to 0, 1, 3, 7, 15, 31, or 63 packets. If fastagingtime is not configured to one of the values indicated, it adjusts to the closest value. On the Catalyst 6000, MLS aging is configured somewhat differently. You configure it on the switch using the mls aging command, which has three parameters: normalConfigures the waiting time before aging out and deleting shortcut entries in the Layer 3 table. This parameter can be set in the range of 32 to 4,092 seconds. fast agingUsed similarly to the Catalyst 5000 command for fast aging. Ages out entries created for flows that use a few packets and then are never used again. Both the fast aging threshold and time parameters are set with this command; they can be in the range of 1 to 128 seconds. longFlushes entries that have been in use for the specified time value, even if the Layer 3 entry is still active. This parameter is used to prevent inaccurate statistics. The long parameter can be set in the range of 64 to 900 seconds. Note
234
MLS Cache Fast Aging Time The processing of the MLS cache entries can cause performance problems on your switch. To keep this situation under control, its good practice to monitor the IP cache and make sure it remains well under the maximum size of 128K. Doing so will prevent cache entries from being dropped continuously. You can keep the size of the cache more manageable by having the MLS cache prune entries that are no longer needed. This type of pruning is known as fast aging time. This method configures a timer that checks for a certain number of packets to be sent for a flow during the configured amount of time. If the flow has not sent at least the configured number of packets during the configured time, the entries for the flow are dropped. Fast aging time is good for onetimeuse entries, such as those used for DNS lookups and Trivial File Transfer Protocol (TFTP) transfers.
VLAN ID
MLS requires that interVLAN routing and packetforwarding decisions be based on which VLANs have been configured on the ports. The internal route processors (such as the MSM, MSFC, RSM, and RSFC) use only VLAN IDs to identify their interfacesit is not necessary to configure a VLAN ID for them. An external route processor has no knowledge about VLANs, because these devices are configured using subnets. A VLAN ID must be assigned to them, if they are to participate in MLS. The interface on the external route processor must be an Ethernet or Fast Ethernet interface. You cannot configure the VLAN ID on a subinterface.
VTP Domain
While configuring MLS, it is important to determine which of the MLSRP interfaces will be MLS interfaces, and to add them to the VTP domain of which your other MLS switches are members. Remember, a switch can be a member of only one domain, and any interfaces participating in MLS on the switch or router must be configured members of that domain.
Management Interfaces
Only one interface on an MLSRP needs to be configured to provide MLS management. The MLS management interface advertises MLSP hello messages, route changes, VLAN information, and MAC addresses. You must specify one of the MLSRPs interfaces as a management interface, or MLSP packets will not be sent or received. The management interface can be any MLS interface connected to the MLS switch. More than one management interface can be configured; however, doing so is unnecessary and only adds to the management overhead for the MLSRP.
235
Lets examine each of these tasks, as well as how to disable each of these features in case they are no longer needed on an interface. Related Solutions: Configuring a Hostname on an RSM Found on page: 187
Assigning a VLAN ID
To configure a VLAN ID for an external routers interface, enter the following command:
mls rp vlanid <vlanidnum>
For example, here is how to assign VLAN 3 to an interface: 1. Enter the interface for which you want to assign the VLAN ID by using the following command:
Router(config) interface fastethernet 1/1
Here is an example of how to use this command: 1. Enter the interface for which you want to assign the VLAN ID:
236
2. To assign a VTP domain of coriolis to the interface, use the following command:
Router(config) mls rp vtpdomain coriolis
Warning This step must be performed prior to using any of the other MLS interface commands on the MLS interface. If this command is not used first, the interface will be placed in a null domain and will be unable to perform MLS functions.
237
238
An example is as follows:
mls aging normal 32
2. To enable the interface as the management interface, use the following command:
CAT5000(config)mls rp managementinterface
2. To disable the interface as the management interface, use the following command:
CAT5000(configif)no mls rp managementinterface
239
Viewing MLSRPs
To see which MLSRPs are configured on an MLS switch, use the following command:
MLSRP> (enable) show mls include Included MLSRP 38.187.128.254 38.187.127.254 Console> (enable)
240
MLSRP IP 38.187.128.254
MLSRP ID 0000808dca20
Xtag 2
Related solutions: Configuring VTP on a Set/Clear CLI Switch Configuring VTP on a 1900 Cisco IOS CLI Switch
241
2 3
0000808cdca2 1 0000808cdca6 2
242
Routing Problems
Within a standard client/server network, the ability to exchange routing information between segments is allowed by Layer 3 address translation. However, although the clients may route the packet to its default gateway, they cannot route beyond their local LAN segment. Note The default gateway is the protocol address for the route processor to which data packets containing a destination address outside the local segment are sent. In order for the client to route information out of its local LAN segment, it must use a manually configured IP stack; or, the client may be configured for Dynamic Host Configuration Protocol (DHCP) to determine a default gateway. In any event, if the Layer 3 routing device assigned as the default gateway fails or is offline, all devices located on that particular subnet or network will only be allowed to communicate with each other. The local collision or broadcast domain becomes the entire network in the eyes of each device. You can place another default gateway on the network, but there is no clear way to provide a secondary configuration to another default route without manually resetting the default gateway on either the client or server.
243
The next sections look at some ways that administrators and engineers have devised to overcome problems related to assigning default gateways, along with the benefits and difficulties in using each technique.
Proxy ARP
Another solution to creating redundancy for Layer 3 uses Proxy Address Resolution Protocol (Proxy ARP). The Proxy ARP broadcasts an IP ARP request for the Media Access Control (MAC) address of the router. The router replies with the MAC address of the requesting node. If a failure occurs, however, the node configured for the default gateway has two options: Reboot the node. Wait for the ARP update and the flush period of the ARP entry to expire. This delay creates a very high convergence period.
244
The Solution
HSRP is a Cisco proprietary protocol developed for redundancy. It defines a group of routers working as one virtual router. It enables host interfaces to continue communicating outside the local segment even if a host interfaces default route fails or the link is down. Basically, HSRP is a group of routers working together as a unit to provide fault tolerance. HSRP works by assigning a group of routers a virtual IP address and a virtual MAC address. The routers in this group route packets to a virtual IP address so packets are still routed through the network even when their destination router is pushed off a shelf in the wiring closet. (Routers can fail for many reasons, most of which relate to electrical and component issues.) HSRP also uses a priority scheme to determine which HSRPconfigured router is the default active router. When you assign the standby interface a default priority that is higher than the priority of all other HSRPconfigured route processor interfaces, that router is set as the active router. Once this active router is configured, multicast messages and advertising priorities are exchanged among HSRPconfigured route processor interfaces. Now, if an active router fails to send a hello message (covered later in this chapter) within the configurable period of time, the standby router with the highest priority will be forced to become an active router. HSRP is one of the best solutions when host interfaces on a local LAN segment require continuous access to the network resources. As shown in Figure 12.1, when a failure does occur, HSRP automatically lets the elected standby route processor assume the role and function of the offline router.
Figure 12.1: Two routers between various types of servers and clients. The standby route processor assumes the failed default route processors position in the network. HSRP classifies the route processors on the network into standby groups. More than one standby group can be assigned to each route processor. The number of standby groups that can be assigned is limited by the physical topology being used. Table 12.1 shows the number of standby groups that can be configured on each type of physical LAN topology. Each group contains a route processor in each of the following roles:
Table 12.1: The maximum number of standby groups that can be assigned to a routeprocessor based on the physical topology. Topology Ethernet FDDI Token Ring Standby Groups 255 255 3
245
Active route processor Standby route processor Virtual route processor All other route processors fall into the other route processor category. Warning By increasing the number of standby groups on a route processor, you decrease the route processors performance and increase latency. Youll increase the number of standby groups primarily to facilitate load sharing.
In the Immediate Solutions section, you will learn how to configure the standby priority. If it is not manually assigned, the priority is 100. But what if none of the route processors has been assigned a group priority? If multiple route processors in the group have equal priority, the route processor with the highest IP address for the respective group will be elected as the active route processor. The route processor with the second highest IP address will become the standby route processor. All the other route processors will be placed in a Listen state (see The HSRP States). The standby router will take over once the route processor that is currently active for the group does not receive three hello messages. The actual convergence time is contingent upon the HSRP timers for the group. The HSRP hellotime timer defaults to 3, and the holdtime timer defaults to 10. Interestingly, with HSRP, the standby route processor will take over even if the active routers LAN interface state is displaying the message interface up line protocol down. Once the standby route processor becomes active, it will respond to any end station sending packets to the virtual MAC address. When an IP host interface sends an ARP request with the virtual route processors address, HSRP will respond with the virtual route processors MAC addressnot its own. This virtual MAC address is the wellknown MAC address of 0000.0c07.ac11, where 11 is the HSRP group identifier. To find the current IP address of the virtual router, use the show ip arp command and look for the virtual route processor IP and hardware MAC address. You can also use the show standby command. Route processors using HSRP can provide redundancy for a default gateway as well as loadbalance traffic across VLANs and IP subnets (if multiple VLANs are being used, a separate HSRP standby group must be in place for each VLAN). Because route processors can be assigned as members of multiple HSRP standby groups, each standby group can have its own priority and its own active route processor. As shown in Figure 12.2, the active route processor for group 1 assigned to VLAN 1 uses route processor 2. VLAN 2 using standby group 2 will use route processor 2. In the event of a failure, the standby group will begin to use the other route processor. In this situation, load sharing will take place until a failure occurs.
Figure 12.2: VLAN 1 and VLAN 2 utilize load balancing across the multiple route processors. 246
Each standby group contains an IP address and a wellknown MAC address assigned to the group. The IP address for the standby group is within the range of IP addresses belonging to the subnet or VLAN to which the route processor is providing services. The IP address cannot be assigned to any other device in the network except the standby group interfaces operating in the standby group. InterSwitch Link (ISL) links are used to transport VLAN information across the links to the different route processors used in each standby group. In order to pass HSRP standby group information between links for multiple VLANs, the interfaces in the group must be configured with ISL. The encapsulation format must be defined, and an IP address must be assigned to an interface. Note Refer to Chapter 5 for information on configuring ISL encapsulation and assigning an IP address to an interface.
to the route processor. Learn stateThe route processor transitions to this state and remains in this state until it receives a hello message from the current active router. The hello message allows the route processor to learn the virtual IP address of the current virtual router. Listen stateIn this state, the route processor has learned the IP address of the virtual router and is listening for more updated information through hello messages. In this state, the route processor is neither active nor standing by. Listen is basically a transitional state from the Learn state to the Speak state. Speak stateIn this state, the route processor begins to forward its own periodic hello messages and to notify the other route processors that it is an active participant in the voting process to become an active or standby route processor. From here, it will forward to either the Active state or the Standby state. Standby stateIn HSRP, there must be at least one standby route processor. If more than one exists, the route processors become what are known as standby candidate route processors. The route processor with the highest standby priority will enter the Active state in the event of a failure. Active stateThe route processor in the Active state acts as the default gateway for the IP address assigned to the virtual router. It forwards any packets received for the virtual IP address or MAC address sent from any of the HSRP groups host interfaces. It also continues to send hello messages to the other route processors to verify that it holds this function.
HSRP Configuration
You can configure more than one HSRP group on a Route Switch Feature Card (RSFC) VLAN interface to provide a transparent route processor backup per network. Every VLAN interface within an HSRP group shares a virtual IP and MAC address. By configuring the end users interfaces to use an HSRP virtual IP address as a default gateway, no interruption will occur in Layer 3 routing to the end users in the event of a failure of any route processor. You can configure HSRP on a number of different types of Cisco route processors, including routers. You can configure multiple route processors on the same switch with interfaces for the same HSRP group. You can also configure multiple groups with multiple interfaces on the same route processor. Note Route Switch Module (RSM), Multilayer Switch Feature Card (MSFC), and RSFC command sets are virtually identical.
Disabling ICMP Redirects It is important to disable all protocols that enable the host interfaces to discover the real MAC address of an HSRP standby group route processor interface. When enabling HSRP, ICMP redirects are automatically disabled. When you use the show runningconfiguration command under each VLAN interface configured for HSRP, a line will appear stating no ip redirects. This line indicates that ICMP redirects have been disabled. To reenable an HSRP interface, enter Interface Configuration mode and use the command no standby, followed by the group number.
standby group. If a route processor fails, it automatically decrements its priority on that interface and stops transmitting hello messages out the interface. The standby route processor assumes the active router role when no hello messages are detected for the specified holdtime period.
For example, to make the group number 3 and the virtual IP address 63.78.39.254 you would enter the following:
standby 3 ip 63.78.39.254
Tip If you do not specify a group number, then group 0 is used by default. The IP address is the virtual IP address of the default gateway that you would assign manually or by DHCP to the end stations operating in this VLAN. Related solution: Found on page: Configuring Redundancy Using HSRP 203
249
In the following example, 3 refers to the HSRP standby group number corresponding to the VLAN interface number. The number 160 is the new priority for the HSRP group.
standby 3 priority 160
To set the standby group 3 to a preempt delay of 10, use the following command:
standby 3 preempt 10
To remove the preempt status for group number 3, enter the following:
no standby 3 preempt
To set the hello timer to 5 seconds and the hold timer to 15 seconds for HSRP group 3, use the following command:
standby 3 timers 5 15
250
To set the password book1 for HSRP group 3, use the following command:
standby 3 authentication book1
The following is the configuration of the second RSFC. The priority setting here is lower than that of the first RSFC; thus the first RSFC is the active route processor (default gateway), and this RSFC is the standby route processor for the group:
HSN_KRSFC2#configure terminal Enter configuration commands, one per line. End with CNTL/Z. HSN_5KRSFC2(config)#interface vlan200 HSN_5KRSFC2(configif)#standby 200 ip 68.187.1.1 HSN_5KRSFC2(configif)#standby 200 priority 100 HSN_5KRSFC2(configif)#standby 200 preempt HSN_5KRSFC2(configif)#standby 200 timers 5 15 HSN_5KRSFC2(configif)#standby 200 authentication password HSN_5KRSFC2(configif)#^Z HSN_5KRSFC#
251
1. You selected and entered the VLAN interface you want to have configured (vlan200). 2. You configured the HSRP group and entered the virtual default gateway IP address on that interface. 3. You set the priority accordingly, allowing one route processor to be active and the other to be standby. 4. You enabled preempt on both routers and you are not accepting the default timers. You have 5 seconds for the hello timer and 15 seconds for the hold timer (which specifies how long you want the hello timer to remain valid). 5. You have configured the cleartext authentication with the word password. The result will be that since HSN_5KRSFC has a higher priority than HSN_5KRSFC2, it will be the active standby route processor for HSRP group 200.
For this example, well use HSRP standby group number 3, VLAN interface being tracked is 7, and 20 indicates the priority amount to decrease:
standby 3 track 7 20
Using the last setting, if the route processors priority was 150 and the route processor were to fail, the tracking interface would decrease its priority by 20 to a value of 130. Tip You can use the same command on an external route processor, as well. If you were in Interface Configuration mode for interface Ethernet1 and wanted to track the interface S1 for the same HSRP standby group, and with the same priority reduction setting, you would use the command standby 3 track s1 20.
The vlan3 command indicates the VLAN and 3 indicates the HSRP standby group. The output should look similar to this:
HSN_5KRSFC# show standby vlan3 3 Vlan3 Group 3 local state is Active, priority 160, may preempt Hellotime 5 holdtime 15 Next hello sent in 00:00:02.922 Hot standby IP address is 63.78.39.1 configured Active router is local Standby router is 63.78.39.2 expires in 00:00:05 Standby virtual mac address is 0000.0c07.ac03
252
Tip
To get a brief output of all the configured interfaces, you can use the show standby brief command.
Warning The debugging feature is automatically assigned a high priority on the CPU, so this command can have a big impact on the internal route processors performance. To disable the debugging feature, enter either the no debug standby or the no debug command.
253
Once access policies have been created, its a great advantage to you, as the network administrator, to know how to implement these policies and how to distribute them. The following sections will cover this material in depth and explain how it relates to Internet Protocol (IP) switching and routing.
254
Figure 13.1: A short list of various switches overlapping into different areas of the policy layers.
Managing Hypertext Transfer Protocol (HTTP) access Access Lists An access list is a list of conditions that control access to the switch, router, or route processor. IP, AppleTalk, and Internetwork Packet Exchange (IPX) access lists are like gatekeepers that control access from or to different segments of the network. After you build an access list, it can be applied to an inbound interface or an outbound interface. Once it has been applied to the interface, an implied deny all appears at the end of each access list. The packets are filtered by comparing an identified value and acting upon a permit or deny statement. The list compares the packets receiving information (such as the source and destination addresses) to the values in your access list. If a match is made, the list follows the order to permit or deny the data. If a packet is denied, an Internet Control Message Protocol (ICMP) message is sent to the sending interface listed in the packet header, notifying the requester that the packet has been denied. In Figure 13.2, the source address of 10.1.128.6 is trying to send a data packet to 10.1.128.10. Because the configured access list doesnt contain a permit statement for the source address, the access list automatically denies the packet.
Figure 13.2: The request from x.x.128.6 to x.x.128.10 encounters an access list with no permit statement applied to the interface. As a result, the request is denied. Before you apply the access list to the currently used management station using a console port or virtual terminal port, always remember to check that you have a permit statement near the top of your access list for the management station you are using. You wont believe how many times we have had to deal with an administrator who is unfamiliar with access lists and who has locked himself out of his own internal or external route processor. Tip It is important to remember that an access list is read in the order that it is configured. Heres an analogy: Suppose youre walking down a lane in a parking lot, looking for your car. Once you find your car, you dont continue looking. Access lists work the same wayif the access list makes a match, it does not continue looking for further instructions. Access List Types There are two types of access lists: standard and extended. Both types permit or deny based on certain criteria. The standard access list allows a permit or deny statement based only on the source address. The extended access list is a bit more complexit allows you to permit or deny based on the source address, destination address, protocol type, application type, or port number of the packet. Standard IP and IPX addresses are the easiest to configure. The configuration statement requires an access list number, a permit or deny statement, and then the source address. This statement allows packets originating from the identified source address to be permitted or denied through the interface to which the access list is applied. Lets take a look at an example of permitting the source address from Figure 13.2 on access list 2:
CAT5KRSM (config)# accesslist 2 permit 10.1.128.6
To identify a subnet in one statement, use a wildcard value after the IP address. If a wildcard value is not present, the source address must match completely. The wildcard value looks a lot like a subnet mask. A 0 in the wildcard string indicates that the value must match exactly in the same octet as the IP address; the value 255 allows any number in the corresponding octet of the IP address to be used. Lets look at the following 256
Tip An octet is the 8bit value between each dotted decimal in an IP address. For the IP address of 193.5.5.10 the first octet is 193 and the fourth octet is 10. It is always important to remember which octet you want to mask. The 0.0.0 of the wildcard address means that the first three octets of the source interfaces IP address must exactly match the first three octets of the network portion of the Class C IP address: 193.5.5. Because the last octet is 255, the last octet of the source interface of received data can be any value. This statement means that any host address with the network ID 193.5.5 will be permitted. Based on this IP scheme, you may be using variablelength subnet masks (VLSM). To identify IP addresses that can be used within your chosen subnet mask, you must use the correct inverse address to identify those addresses. Table 13.1 shows the possible wildcard inverse addresses matched to the subnet mask.
Table 13.1: Possible wildcard inverse addresses. Mask 255 254 252 248 240 224 192 128 0 Wildcard Inverse Address 0 1 3 7 15 31 63 127 255
There is an easy way to figure out the wildcard inverse mask for your access list or the first network available with any subnet mask. Always remember the magic number of 256, then subtract the network mask minus 1. For example, with 255.255.255.192, use the 192, subtract it from the magic number of 256, and you will get 64, which is your first network. Subtract one more and you will get the inverse wildcard mask for your access list identifying the network. Heres another example. Say you have a class C subnet mask of 255.255.255.224. Subtract 224 from the magic number of 256 and you will get the first valid network of 32. Subtract 1 and you will get the network inverse mask of 31. You can use the same magic number to subnet. Lets say you want to know the first and second networks of a 30bit mask that is commonly used on pointtopoint WAN links in order to conserve IP addresses. This would be a mask of 255.255.255.252. Taking the magic number of 256 and subtracting 252 we would get the number 4, which is our first valid network number. This time, instead of subtracting one, multiply by 2 and you get your second valid network, which is 8. This means that your valid hosts are 5 and 6 and your broadcast address is 7. This means we have just created a network with two hosts and wasted no IP addresses. Lets look at another example using 255.255.255.240, which is a 28bit mask. Table 13.2 shows the first three valid networks, the network numbers, the valid hosts for each network, and the broadcast address for each subnetted network.
Item Network 1 Network 2 Network 3 Network 16 32 48 First Host 17 33 49 Last Host 30 46 62 Broadcast Address 31 47 63 Subnetting using variable length subnet masks (VLSM) seems pretty easy, doesnt it? The type of access list defined is identified by the number you assign to the access list. Table 13.3 identifies the types of access lists that can be configured, along with the associated string of numbers that can be used with each type.
Table 13.3: The available access list numbers and the associated access list types. Available Numbers Access List Type 1 through 99 IP standard 100 through 199 IP extended 200 through 299 ProtocolTypeCode 300 through 399 DECnet 600 through 699 AppleTalk 700 through 799 48bit Media Access Control (MAC) address 800 through 899 IPX standard 900 through 999 IPX extended 1000 through 1099 IPX Service Advertising Protocol (SAP) 1100 through 1199 Extended 48bit MAC address 1200 through 1299 IPX summary address Extended access lists use many of the same configuration rules as standard access lists. An extended access list allows filtering based on source address, destination address, protocol type, application, or TCP port number. Note Just as in standard access lists, an implied deny all exists at the end of each extended access list.
The IP extended access list command is more complex than the standard access list command and offers many more options. The IP extended access list syntax is shown here:
accesslist accesslistnumber {deny|permit} {protocol type} sourceaddress sourcewildcard destinationaddress destinationwildcard [protocol specific options|operator] [log]
Tip You can use the syntax any as a parameter to replace the source or destination address; any implies all addresses. In IPX access lists, A(n1) indicates an any syntax. Lets take a look at the syntax elements for the IP extended access list that are not included in the standard access list: accesslistnumberFor an IP extended access list, the range of possible numbers is 100 to 199. deny|permitA permit indicates whether the source will be allowed in or out of an interface. A deny indicates that the data will be dropped and an ICMP message will be sent to the source address. protocol typeThis syntax element indicates the protocol to match. Possible options include eigrp, icmp, igrp, ip, nos, ospf, tcp, udp, or any number from 0 to 255. Tip The protocol syntax of ip indicates all protocol types.
258
operatorThis syntax element compares source or destination ports. Possible syntaxes include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). logThis syntax enables logging of information about packets that match access list entries. Warning The log command is optional and logs information about all packets that match the access list entry. Enabling this feature uses considerable processing power. You should use it for troubleshooting purposes only. Lets take a look at the any parameter:
CAT5KRSM(config)# accesslist 199 permit tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255 gt 255 CAT5KRSM(config)# accesslist 199 permit tcp any any gt 255
The first line permits any incoming IP address to any destination using any TCP port greater than port 255. The second line does the same thing, but replaces the source, destination, and wildcard addresses with the any command. Now, lets examine how wellknown TCP ports can work:
CAT5KRSM(config)# accesslist 199 permit tcp any any eq 25 CAT5KRSM(config)# accesslist 199 permit tcp any any eq smtp
The first line indicates that access list 199 permits any address to enter the interface for TCP port 25, which is the wellknown TCP port for Simple Mail Transfer Protocol (SMTP). The second line does the same thing, but instead of using the TCP port number, it uses the acronym. The host syntax indicates a single host, as shown in the source address in this example:
CAT5KRSM(config)# accesslist 199 permit tcp host 38.187.128.6 any eq smtp
The following example permits User Datagram Protocol (UDP) packets with a DNS name as the destination:
CAT5KRSM(config)# accesslist 199 permit udp any eq domain any
You can add a message in your access list by using the remark command. This command can help you identify lines in your access list. The following is an example of using the remark command:
CAT5KRSM(config)# CAT5KRSM(config)# CAT5KRSM(config)# CAT5KRSM(config)# accesslist accesslist accesslist accesslist 1 1 1 1 remark Sabrinas IP Address permit 18.1.12.25 remark Hansons IP Address deny 18.1.12.26
Applying Access Lists Access lists are created in various ways. Once theyre created, you can use different commands to apply an access list to various types of interfaces. Tip To disallow the flow of data through any port or interface, use the in syntax. To allow data to flow through the switch but not exit out a certain interface or port, use the out syntax on the outbound interface. The following list shows the different commands and the types of interfaces associated with each command:
259
accessclassApplies the access list to an interface for security purposes. This command identifies users of specified VTY lines. By default, five VTY lines come in to your Cisco Internetwork Operating System (IOS) or router. Because you do not know which one you will be using when you Telnet into your switch or router, you must apply the same access list to all the interfaces. accessgroupAllows you to apply an access list configured in Global Configuration mode to an interface that can be used to filter data traffic based on source address, destination address, or many other protocol identifiers. For example, if a standard access list has been created and numbered access list 2 in Global Configuration mode and you want to deny traffic for the source address identified in the access list, use the command ip accessgroup 2 followed by either in or out. The in or out syntax indicates whether data will be filtered based on traffic entering or exiting out of the interface. distributelistIdentifies the routing update information that applies rules to allow the switch to learn new routes or advertise known routes to other routers or route processors. This is used on the (configrouter) command mode when enabling a routing protocol. ipx outputsapfilterAllows the applied access list to determine what IPX protocol services will be advertised in or out of an interface. Applying Access Lists to Route Filtering By controlling the routing tables at the Core layer, you can limit the size of the tables on your network devices. Doing so allows the switches to process data more quickly, prevents users from getting to networks that do not have a default or static route, and maintains routing information integrity. To do this, apply an access list using the distributelist command. After creating a standard access list, you can apply it to an inbound or outbound interface. The following is the distributelist command and the syntax for an inbound interface:
distributelist {accesslist number|name} in [type number]
Here is the syntax when using the distributelist command to apply an access list to an outbound interface:
distributelist {accesslist number|name} out [interface name|routing process|autonomous system number]
Figure 13.3 shows a standard Class C network in which two subnets intersect at the Distribution layer switch. Subnet 128 belongs to a production network, and subnet 129 is used only for testing and development of new LAN topologies. We want subnet 128 to be permitted through to the Core layer on Gigabit Ethernet port g0/0, which connects to the Core layer switch. The second network is used for testing purposes only, so the access list should block any traffic from that subnet from reaching the Core layer switches. For this scenario, we will assume there are no other subnets in our switch block to contend with.
Figure 13.3: Two Class C IP subnets connected from the Access layer to the Distribution layer switch. Lets create an access list that allows traffic from network 192.128.0.0 but denies traffic from interface192.129.0.0. Use the following command, keeping in mind that an implied deny all exists at the end of our access list:
accesslist 2 permit 192.128.0.0 0.0.255.255
260
Next, you must specify a routing protocol: in this case, Enhanced Interior Gateway Routing Protocol (EIGRP). To do so, use the following command:
router eigrp 2
The last step is to apply the configured access list. Use the distributelist command to interface g0/0 to filter outbound traffic from network 192.129.0.0:
distributelist 2 out g0/0
Configuring Passwords
Passwords can be configured on every access method to a Cisco Catalyst switch, by the VTY line, console, Web access, and auxiliary (AUX) ports.
261
Privilege level 0 is a special level that allows the user to use a more specific defined set of commands. As an example, you could allow a certain user to use only the show arp command. This command is useful when a third party is using a sniffer on your network and needs to match a MAC address to an IP address and vice versa.
Tip
Port Security
The Cisco IOS provides a feature called port security that lets you limit the MAC addresses that are allowed to use the ports on a switch. MAC addresses come preconfigured on a Network Interface Card (NIC), and because of applied industrywide standards, no two NIC cards have the same MAC address. By configuring certain MAC addresses to use a switch port, you greatly increase control over which PCs can access the switch. Here is how port security works: When a port on the switch receives data frames, it will compare the source MAC address to the secure source address learned by the switch. If a port receives data from a MAC address that has not yet been previously identified, the switch will lock that port and mark the port as disabled. A light on that port will then turn orange, indicating that the port has been disabled. Note A trap link down message will automatically be sent to the SNMP manager if SNMP has been configured. You should know a few things before trying to apply port security: Do not apply port security to trunk links, because they carry data from multiple VLANs and MAC addresses. Port security cannot be enabled on a Switched Port Analyzer (SPAN) source or destination port. You cannot configure dynamic or static Content Addressable Memory (CAM) entries on a secure port. 262
After you enable port security on any switch port, any static or dynamic CAM entries associated with the port are cleared, and any currently configured permanent CAM entries are treated as secure MAC addresses. Not all Cisco switches support port security. Check Cisco Connection Online (CCO) at http://www.cisco.com/ to see if your hardware and IOS version support port security. The default settings of a switch allow all MAC addresses to access all ports on the switch. If you enable port security, immediately only those MAC addresses explicitly identified will be able to send data to the switch ports. You can configure ports with a static MAC address assignment or a dynamic MAC address assignment.
Static MAC Assignment vs. Dynamic MAC Assignment Dynamic MAC address assignment allows the administrator to do basically nothing. Once port security is enabled, the first interface to broadcast its MAC address on the port becomes the ports secure MAC address. If another machine broadcasts a frame over the physical wire to the switch port with another MAC address, the port will automatically go into a lockeddown, disabled mode. Static MAC address assignment requires the network administrator to physically assign a MAC address to a port. This is the most secure way of creating the secure source address list, but it requires a lot of time and effort to manage. For smaller networks, this might be a good solution; but in bigger networks, it is not easily implemented.
VLAN Management
When you first provide the switch with an IOS, all the ports on the switch are assigned to VLAN1. In a typical environment, VLAN1 is also kept as the management VLAN. As a result, if the ports were not configured or were reset to their defaults, then anyone entering the network on VLAN1 would be in the management VLAN. Cisco recommends that the management VLAN be moved to a VLAN other than the default VLAN1 to prevent this type of problem.
As an example of creating an access list, lets say you want to allow an advertising company to FTP marketing material to your sales office. However, you do not want the whole world to have access to your FTP server. To create the access list, perform the following steps: 1. Because the access list will be read in order, you first need to permit the addresses that can access the FTP server. FTP uses ports 20 and 21, so it should be configured like this:
HSNRSM(config)# accesslist 100 permit tcp 192.5.5.0 0.0.0.255 any eq 20 HSNRSM(config)# accesslist 100 permit tcp 192.5.5.0 0.0.0.255 any eq 21
2. The following commands will deny all the other traffic on ports 20 and 21: 263
HSNRSM(config)# accesslist 100 deny tcp any any eq 20 HSNRSM(config)# accesslist 100 deny tcp any any eq 21
3. Because the access list has an implied deny all at the end, you need to apply a rule that any other traffic can pass through. The ip indicates that all IP protocols are being identified:
HSNRSM(config)# accesslist 100 permit ip any any
You do not want to apply the access list to an outbound interface, because then the FTP packets would span the switch fabric and use up bandwidth and processing power. You want to apply the access list immediately to the inbound interface to the companys Distribution layer switch. To apply the access lists to an interface, follow these steps: 1. Access the interface to be configured. In this case, from Global Configuration mode, use the following command:
interface fastethernet0/0
2. Apply the access list to the interface to block access to inbound packets using the following command:
ip accessgroup 100 in
Unless the packets for FTP are coming from the advertising company, no one else will be able to access your FTP server. Related solutions: Opening a Session on an Internal Route Processor Entering Configuration Mode on an RSM Found on page: 381 381
Lets step through creating an extended access list that can be applied to an interface and deny any host on network 172.16.10.0 from going to any host on network 172.15.10.0. It will also deny ports 80, 23, 21, and 20. This will effectively disallow any access to World Wide Web services, Telnet, and FTP. Lets look at all the options: 1. For an extended access list we must identify an access list number between 100 and 199:
CoriolisRSM1(config)#accesslist 199 ? deny Specify packets to reject dynamic Specify a DYNAMIC list of PERMITs or DENYs permit Specify packets to forward
2. We must then choose who to deny. We are using TCP instead of IP so we can just identify the ports we want to deny. The first IP address identifies the network. The 0.0.0 identifies that the first three octets must be the same and the .255 identifies all the hosts in the last octet:
CoriolisRSM1(config)#accesslist 199 deny tcp 172.16.10.0 0.0.0.255 ? A.B.C.D Destination address any Any destination host eq Match only packets on a given port number gt Match only packets with a greater port number
264
A single destination host Match only packets with a lower port number Match only packets not on a given port number Match only packets in the range of port numbers
3. Now do the same for the destination address identifying the destination of 172.15.10.0:
CoriolisRSM1(config)# accesslist 199 deny tcp 172.16.10.0 0.0.0.255 172.15.10.0 0.0.0.255 ? ack Match on the ACK bit eq Match only packets on a given port number established Match established connections fin Match on the FIN bit gt Match only packets with a greater port number log Log matches against this entry loginput Log matches against this entry, including input interface lt Match only packets with a lower port number neq Match only packets not on a given port number precedence Match packets with given precedence value psh Match on the PSH bit range Match only packets in the range of port numbers rst Match on the RST bit syn Match on the SYN bit tos Match packets with given TOS value urg Match on the URG bit
4. Now enter eq for equal to, and then identify the port numbers. Use a separate statement for each port number:
CoriolisRSM1(config)# accesslist 172.15.10.0 0.0.0.255 eq 80 CoriolisRSM1(config)# accesslist 172.15.10.0 0.0.0.255 eq 23 CoriolisRSM1(config)# accesslist 172.15.10.0 0.0.0.255 eq 21 CoriolisRSM1(config)# accesslist 172.15.10.0 0.0.0.255 eq 20 199 deny tcp 172.16.10.0 0.0.0.255 199 deny tcp 172.16.10.0 0.0.0.255 199 deny tcp 172.16.10.0 0.0.0.255 199 deny tcp 172.16.10.0 0.0.0.255
5. Now we have to identify addresses to permit or we will have effectively shut down the interface. Remember, there is an implicit deny all at the end of any access list:
CoriolisRSM1(config)#accesslist 199 permit ? <0255> An IP protocol number ahp Authentication Header Protocol eigrp Ciscos EIGRP routing protocol esp Encapsulation Security Payload gre Ciscos GRE tunneling icmp Internet Control Message Protocol igmp Internet Gateway Message Protocol igrp Ciscos IGRP routing protocol Ip Any Internet Protocol Ipinip IP in IP tunneling nos KA9Q NOS compatible IP over IP tunneling ospf OSPF routing protocol pcp Payload Compression Protocol pim Protocol Independent Multicast tcp Transmission Control Protocol udp User Datagram Protocol
6. We have to use the ip syntax, which means all IP protocols. If we only used the tcp syntax, we would only permit TCP ports:
CoriolisRSM1(config)#accesslist 199 permit ip ? A.B.C.D Source address any Any source host host A single source host
7. Since we want to identify everything else that can pass through the interface, we need to use the any syntax and identify the source address. You can identify a single host by using the host syntax followed by the IP address: 265
CoriolisRSM1(config)#accesslist 199 permit ip any ? A.B.C.D Destination address any Any destination host host A single destination host
Youre not quite done yet. Even though you just created an access list, it still has to be applied to an interface before it will function.
Next, you need to enter Line Configuration mode for all five VTY lines with the following command:
CAT5KRSM (config)# line vty 0 4 CAT5KRSM (configline)#
Finally, use the accessclass command to apply the access list to an inbound interface with the following command:
CAT5KRSM(configline)# accessclass 5 in
Lets say you have an access list that will allow network traffic from network 192.1.1.0 but denies traffic from interface 192.2.1.0. Do not forget that an implied deny all is attached to the access list:
accesslist 1 permit 192.1.1.0 0.0.0.255
To use a distributionlist command you must also specify a routing protocol to use. In this case we will use OSPF:
router ospf 1
To apply the access list using the distributelist command, you must attach the access list to the outbound interface you wish to filter. Lets say for this example it is Fast Ethernet port 0/0. Here is what you command might look like:
distributelist 1 out fastethernet0/0
266
We just set the timeout value to five minutes and zero seconds. Related solution: Configuring Telnet Found on page: 67
You should assign a password for each configured privilege level. To assign the password brad1 to privilege level 3, use the following command:
1900EN (config)# enable secret level 3 brad1
When Brad wants to log in to the switch, he will use the following command:
1900EN (config)# username blarson password brad1
This setup allows the user blarson to use certain show commands by default, but gives him no access to the debug or configuration commands. To allow the user to use all the debug commands in privilege level 3, use the following command:
1900EN (config)# privilege exec level 3 debug
To allow users with a privilege level 3 to use only a certain command syntax for debug, such as debug ip, use the following command:
1900EN (config)# privilege exec level 3 debug ip
Note Privilege level 0 includes five commands associated with the privilege level: disable, enable, exit, help, and logout.
You can use the lock command to lock an unused Telnet session. After you issue the lock command, the system will ask you to enter and verify an unlocking password. To configure a Set/Clear commandbased switch with a timeout value of five minutes, use the following command:
hsn# set logout 5
Tip
267
To configure the timeout value to five minutes on the console port of an IOSbased route processor or router, use the following command:
HSNRSM (config)# line console 0 HSNRSM (configline)# exectimeout 5
To configure the timeout value to five minutes on the VTY port of an IOSbased route processor or router, use the following command:
HSNRSM (config)# line vty 0 4 HSNRSM (configline)# exectimeout 5
Tip To configure seconds beyond a round number of minutes, you can add an additional value to the command. For example, if you want the exectimeout to be 5 minutes and 10 seconds, the command is exectimeout 5 10.
To configure a MOTD banner on a Cisco IOS commandbased switch or route processor, use the following command from a Global Configuration mode prompt:
1912EN(config)# banner login We Prosecute Unauthorized Access!
An access list can be configured to allow you to choose the IP address of the network device that can be used to access the switch. For example, use the following command to allow a PC with the IP address 15.47.112.10 for access list 2:
CAT5KRSM(config)# accesslist 2 permit 15.47.112.10
Suppose this is the only statement in the access list. Because of the implied deny all, once this access list is applied, only a PC with IP address 15.47.112.10 will be able to manage the switch. Before this filter will work, however, you must still apply the access list, state the authentication type, and configure the username and password. To apply the access list, use the following command:
CAT5KRSM(config)# ip http accessclass 2
You can apply four types of authentication to HTTP access on a switch or router. Table 13.4 describes each of the four types of authentication.
Table 13.4: The four HTTP authentication types for a switch route processor or router. 268
Description Allows authentication, authorization, and accounting (AAA) to be used for authentication enable Allows the enable password method; the default method of HTTP server user authentication local Allows the local user database on the Cisco router, route processor, or access server to be used for authentication tacacs Allows the Terminal Area Security Access Control (TACACS) or Extended TACACS (XTACACS) server to be used for authentication To apply the authentication type, use the following command:
CAT5KRSM(config)# ip http authentication local
Syntax aaa
Note To disable the configured authentication type, use the no ip authentication command. To configure the username hsn with the password team, use the following command:
CAT5KRSM(config)# username hsn password team
You can provide an additional layer of protection when using Ciscos IOS ClickStart software or the Cisco Web browser interface. To do so, change the default TCP access port 80 to port 50, or any port you plan to use. To set the TCP port to 50, use the following command:
CAT5KRSM(config)# ip http port 50
You can reset the HTTP TCP port to its default by using the following command:
CAT5KRSM(config)# no ip http 50
To show a port configuration for port security, use the following show command:
CAT5K> (enable) show port 3/3
Port Security SecureSrcAddr LastSrcAddr Shutdown Trap IfIndex 3/3 enabled 0015204c78a1 0015204c78a1 Port 3/3 BroadcastLimit BroadcastDrop 0 FCSErr XmitErr RcvErr UnderSize
Port AlignErr
269
3/3 0 0
Port SingleCol MultiColl LateColl ExcessCol CarriSen Runts Giants 3/3 0 0 0 0 0 0 0 LastTimeCleared Fri Dec 22 2000, 19:53:38
To enable static port security for module 1 port 3, manually specify the secure MAC address of the attached interface 0015204c78a1 using the following command:
CAT5K> (enable) set port security 3/1 enable 0015204c78a1 Port 3/1 port security enabled with 0015204c78a1 as the secure mac address CAT5K> (enable)
On a Cisco IOS commandbased switch, you can use the port secure interface configuration command to enable addressing security. In Interface Configuration mode, to assign a port to allow only one MAC address, use the following command:
2924XL(configif)# port secure maxmaccount 1
Table 13.5: The show macaddresstable commands optional syntax descriptions. Syntax static dynamic secure self agingtime count address hwaddr interface atm slot port vlan vlanid Description Displays the static addresses Displays the dynamic addresses Displays the secure addresses Displays addresses added by the switch itself Displays agingtime for dynamic addresses for all VLANs Displays a count for different kinds of MAC addresses Displays information for a specific MAC address Displays information for the given MAC address Displays addresses for the specific port Adds dynamic addresses to an ATM module slot/port Associates the dynamic address with a slot (1 or 2) port Adds dynamic addresses to a port (the port number is always 0 for ATM interfaces) Displays addresses for a specified VLAN Displays addresses for the VLAN
show macaddresstable [static|dynamic|secure|self| agingtime|count] [address hwaddr] [interface interface] [atm slot/port][vlan vlanid]
The output from the show macaddresstable command should look like the following: 270
Dynamic Addresses Count: 5 Secure Addresses (Userdefined) Count: 0 Static Addresses (Userdefined) Count: 0 System Self Addresses Count: 12 Total MAC addresses: 8 Nonstatic Address Table: Destination Address Address Type VLAN Destination Port 0015205c80a1 Dynamic 3 FastEthernet0/6 0015205c80a1 Dynamic 1 FastEthernet0/4 0015205c80b4 Dynamic 1 FastEthernet0/4 0015205c8012 Dynamic 3 FastEthernet0/6 0015205c80c5 Dynamic 3 FastEthernet0/6
Tip You can use the no port secure command to disable addressing security or to set the maximum number of addresses allowed on the interface to the default value of 132.
271
272
IE is not supported on Solaris, and Netscape 4.6 is not supported at all. However, you can try to access the switch through your browser to determine whether your browser version is supported. If your browser is not supported, the switch will display an error message, and the session will not complete. Tip IE 5.0 will automatically refresh with the latest realtime port configuration changes. For example, if you are logged on and you add an additional device to one of the switchs Ethernet ports, the CVSM will update your currently loggedon session with the port changes (this update takes 15 or 16 seconds). However, if you make a change from half duplex to full duplex in the Ports table, you must click on the browsers Refresh button to see the latest configuration changes. Finally, wait at least one minute before you turn off your switch, so the configuration changes will be saved to the switchs startupconfig file (1900 and 2820 only).
Level 1 specifies normal User EXEC mode privileges. When no level is specified, the privilege level defaults to Level 15. Note Its important to remember that to access the CVSM for management from a Web browser, the switch will need to have a Full Access (level 15) password, an IP address, and the default gateway configured if the switch resides on another network segment.
Once the accounts have been configured and you have logged on to the switch successfully, the default home page will be displayed.
and want to retype an entry, click on Cancel to undo your first entry. Note Again, keep in mind that if you are using IE5, you must use the Refresh button in your browser after each configuration change to see the updates. Otherwise, you risk making a mistake down the line. The CVSM default home page also has a realtime display of your switch. As we mentioned earlier, each port has a colored LED display associated with it. Lets look at what these LEDs represent, because they correlate with the ports configuration.
Chapter 2, which explains how to configure the CLI for an IP address and a Level 15 password in order to use the CVSM. The last section of the Immediate Solutions section will walk you through the CVSM Web Management screens on the 1900 series switch, looking at each screen individually and identifying the configuration changes that can be made from each screen.
Configuring the Switch with an IP Address and Setting the Default Web Administration Port
When a switch is first plugged in and finishes initializing, no IP address is configured. You do not have to configure an IP address, but having one in place will help you manage your switch. Follow these steps to set an IP address and identify the TCP port to be used. (These steps assume that a password has been configured on the switch.) 1. From the Main Menu on your Catalyst 1900, select [N] for Network Management. 2. At the Network Management Console, select [I] for IP Configuration. 3. Verify your address; or, if you do not have one, enter one at this point. Heres what you should see:
Catalyst 1900 IP Configuration Ethernet Address: 00B064756540 Settings [I] IP address 192.1.2.1 [S] Subnet mask 255.255.255.0 [G] Default gateway 0.0.0.0 [V] Management VLAN 1 [M] IP address of DNS server 1 0.0.0.0 [N] IP address of DNS server 2 0.0.0.0 [D] Domain name [R] Use Routing Information Protocol Enabled Actions [P] Ping [C] Clear cached DNS entries [X] Exit to previous menu Enter Selection:
4. Once your IP configuration is set, back out to the Network Management menu. 5. Select [H] for HTTP Server Configuration. Notice that the default port is port 80. To reduce intrusion possibilities, we suggest using another port. Tip Keep in mind that although port 443 is a very common port for HTTPencrypted transmissions, in this case it is only a portit is not secured at all. 6. The HTTP server listens by default on TCP port 80 as seen here:
Catalyst 1900 HTTP Server Configuration Settings [H] HTTP Enabled [P] HTTP Port 80 [X] Exit to previous menu Enter Selection: P
However, it can be configured to listen on any other userdefined port. Port 23 cant be used because it is reserved for Telnet. To change the default port, select [P] from the HTTP Server Configuration menu. Here is an example of changing the default HTTP port:
Enter HTTP port (0 to 65535): Current setting ===> 80
275
1024
We have now changed the HTTP port to 1024. You should use a numbering scheme that your department or organization believes to be the best. Related solutions: Configuring an IP Address and Netmask Configuring Network Settings on the 1900 and 2820 Series Found on page: 57 456
Figure 14.1: The home page of the Web Management Console. Take some time to get to know what the Switch Manager has to offer. Beginning from the top, from left to right, you have the following options: Note This list covers only the options located at the top of the frame. The left frame remains the same throughout the CVSM session.
HOMEThe Basic System Configuration page and the page you are currently on. PORTThe Port Management page. This page allows you to configure every aspect of a switch portthe ports linkbeat, type of cast (uni or multi), congestion control, port name and/or description, and statistics. The page is shown in Figure 14.2.
276
Figure 14.2: This page allows you the ability to configure port speeds, view statistics, name the ports, and manage various switch modules if they have been inserted into the switch. ADDRESSThe Address Table Management page. This page manages the Dynamic Address Table, the Permanent Unicast Address and Port Security Table, and the Multicast Address Table. Figure 14.3 shows an example.
Figure 14.3: From here you can view and manage dynamic addresses and unicast and multicast tables. SNMPThe SNMP Management page. This page lets you manage and define where to send the SNMP information and who has read or write access to the SNMP information traps. Figure 14.4 shows this page.
277
Figure 14.4: This page allows you to configure the SNMP properties, such as the community settings, and identify the IP address for the trap messages to be sent to. STPThe Spanning Tree Management page. This management page allows you to enable or disable STP on the specific switch ports, modify various Spanning Tree parameters, and configure STP. Among other things, you can set the path cost, priority, and port fast mode. For an example, see Figure 14.5.
Figure 14.5: This page gives you more details and options for configuring STP. CDPThe CDP Management page. This page lists all the devices that have Cisco Discovery Protocol (CDP) enabled. You can browse them, access them by Telnet, and retrieve further details on the selected device. Figure 14.6 shows an example.
278
Figure 14.6: The CDP Management page allows you to choose which ports you want defined for CDP. SPANThe SPAN Configuration and Port Monitoring page. Here you have the option of selecting the port to which you want to send the captured frames and the ports to be monitored. See Figure 14.7.
Figure 14.7: This page allows you to configure which ports to monitor and where they are monitored from. CONSOLEThe Console and Upgrade Configuration page. As you can see in Figure 14.8, this page is self explanatory. However, we wanted to bring to your attention the Accept Upgrade Transfer From Other Hosts option; it may be a vulnerability if you leave it selected.
279
Figure 14.8: This page allows you to manage the console and firmware upgrades. Note Prior to a TFTP upgrade a dialog box will appear and say something like, When you use this page to upgrade the switch, it may not respond for up to one minute. During this time do not unplug the switch. This behavior is normal. Once you click on OK, another dialog box will pop open and ask you, Do you wish to continue with the upgrade process? STATISTICSThe Statistics Reports page. Here you can reset individual statistics or all statistics captured on each port. Figure 14.9 shows an example.
Figure 14.9: This page allows you to reset the individual ports or all ports on the switch. You can also view various receiving and forwarding information. SYSTEMThe System Management and Broadcast Storm Control page. This page is very much like the Main Menu accessed via the console port. Options include IP configuration, Mask, Domain Name, Gateway, DNS 1 and 2, RIP, Switching mode, and so on. See Figure 14.10.
280
Figure 14.10: On this page you can control and manage broadcast storms and overall IP configuration of the switch. CGMPThe CGMP Management page. By default, CGMP is enabled. This page allows you to configure the use of CGMP to dynamically discover enduser stations participating in multicast applications. In short, CGMP directs the packet to its destination rather than broadcasting the packet throughout the network. Figure 14.11 shows an example of the page.
2. Click on the ports you want to monitor in the Ports Not Monitored window. Click on the Add button to move them to the Ports Monitored Window. 3. Select the port you wish to monitor from by choosing from the pulldown menu next to Select Monitoring Port. This port will usually be one of the trunk ports. Related solution: Enabling SNMP Contact Found on page: 58
282
283
[P] [A] [D] [M] [V] [R] [F] [I] [U] [H] [K]
Port Configuration Port Addressing Port Statistics Detail Monitor Virtual LAN Multicast Registration Firmware RS232 Interface Usage Summaries Help Command Line
The following sections describe the Main Menu options. By typing the letter associated with each command on the Main Menu, you enter that configuration screen.
Here is what youll see when you select the following settings: [P] Password intrusion thresholdThis will limit the number of failed logon attempts and render the Management Console frozen for a predefined amount of time before allowing the next logon. This value may range from 0 to 65500 attempts. If you choose not to use a threshold, you should specify zero. [S] Silent time upon intrusion detectionThis is the number of minutes the Management Console will be unavailable for use, due to an excessive number of failed attempts to log on. This value may range from 0 to 65500 minutes. Specify zero only for no silent time. [T] Management Console inactivity timeoutThis can be configured to time out a session after a period of inactivity. Once a session has been timed out, the user must log on with a password to continue. The timeout can range from 30 to 65500 seconds. Setting the timeout to zero will indicate to use no timeout. Tip A nonzero timeout should be set for security reasons. [D] Default mode of status LEDThis displays one of three status LEDs: port status, duplex status, and utilization of the switch. You can select the display mode by pressing the mode button on the front panel. Once a mode is selected and the mode button is released, the display automatically returns to the default status after 30 seconds. [M] Modify passwordThe Management Console password can help prevent unauthorized access. When specifying a password, use a minimum of four characters and a maximum of eight characters. 284
The password is caseinsensitive and can contain any character with a legal keyboard representation. [E] Modify secret passwordThe Management Console secret password can help prevent unauthorized access. This password is stored in encrypted form and thus provides enhanced security. When specifying a secret password, use a minimum of 1 character and maximum of 25 characters. The password is casesensitive and can contain any character with a legal keyboard representation. This password will supersede the regular password. [X] Exit to Main MenuThis option returns you to the Main Menu.
Lets look at each of the System Configuration commands. They are listed here with brief explanations: [N] Name of systemIn multipleswitch environments, this option aids in determining which switch you are currently configuring. You can use up to 255 characters in the switch name, including spaces. [C] Contact NameThis option defines a contact name in case there are problems with the switch. This field can also contain up to 255 characters. Including a pager number or home contact information as part of the contact name can be helpful. [L] LocationThis field can contain up to 255 characters. It provides additional information about where the switch physically resides. [S] Switching ModeThis option allows the switch to be configured for all three switching modes. The three configuration choices are: [1] Storeand Forward, [2] FragmentFree, and [3] FastForward. [U] Use of storeandforward for multicastThe switch will always use storeandforward for broadcasts. This feature allows you to determine which method will be used for multicast frames. You can select from two options: [E] (enabled) allows the switch to use storeand forward for multicast frames, and [D] (disabled; the default) uses the method defined in the Switching Mode option from the System Configuration menu. [A] Action upon address violationThis option gives you three ways to inform the switch what to do when an address violation occurs. The option [S] (suspend) stops the port from forwarding frames of the violation. The option [D] (disable) turns off the port until an administrator disables it. The [I] (ignore) option indicates that no action will be taken. [G] General alert on address violationThis option indicates whether Simple Network Management Protocol (SNMP) trap messages are sent when an address violation occurs. [I] Address aging timeThis option defines the number of seconds that dynamic entries will remain in the Media Access Control (MAC) address table. The valid settings are 10 to 1,000,000 seconds. The default is 300 seconds. [P] Network PortThis option specifies the port to which all unknown unicasts are forwarded. You can specify a port in the range of port numbers on the switch: A indicates port 25, B indicates port 26, AUI indicates the AUI port, and N indicates None. 285
[R] Reset systemThis option recycles the power on the switch. [F] Reset to factory defaultsThis option clears all configuration settings back to the factory defaults. Warning If you apply the [F] option, all manual configuration settings will be lost. [B] Broadcast storm controlThis option launches the Broadcast Storm menu, which includes five options. (These options are discussed in Configuring Broadcast Storm Control on Switch Ports in the Immediate Solutions section.) [X] Exit to Main MenuThis option exits to the Main Menu.
Lets look at each option from this menu in more detail. [I] IP Configuration Choosing I from the Network Management menu brings up a menu that looks similar to the following:
Catalyst 1900 IP Configuration Ethernet Address: 00F31F10F106 Settings [I] IP address 10.17.18.254 [S] Subnet mask 255.255.0.0 [G] Default gateway 10.17.18.1 [V] Management VLAN 1 [X] Exit to previous menu Enter selection:
In order to use Telnet or SNMP to manage the switch, an IP address must be assigned to the switch. The following are the settings from the IP Configuration menu: [I] IP addressConfigures the IP address on the switch. [S] Subnet maskConfigures the switchs subnet mask. [G] Default gatewayConfigures the destination address for the route processor to which the switch will forward unknown or outofsubnet addresses.
286
[V] Management VLANAllows you to set the VLAN in which you will configure your switch. Cisco recommends that you choose a VLAN other than 1 because all ports are in VLAN1 by default. On the Standard Edition of the IOS software, the available VLANs are 1 through 4. The Enterprise Edition has 64 available VLANs. [X] Exit to previous menuExits back to the Network Management menu. Tip When you change the IP address, the change takes effect immediately. However, all other options from the Network Management menu require a recycling of the power. Configuration changes on the 1900 and 2820 series are automatically saved, but the change can take up to 30 seconds to take effect. [S] SNMP Management To make changes to SNMP, choose S from the Network Management menu. The following shows the Network Management (SNMP) Configuration menu options for a CAT 2820:
Catalyst 2820 Network Management (SNMP) Configuration Settings [R] READ community string [W] WRITE community string [1] 1st WRITE manager IP address 0.0.0.0 [2] 2nd WRITE manager IP address 0.0.0.0 [3] 3rd WRITE manager IP address 0.0.0.0 [4] 4th WRITE manager IP address 0.0.0.0 [F] First TRAP community string 0.0.0.0 [A] First TRAP manager IP address 0.0.0.0 [S] Second TRAP community string 0.0.0.0 [B] Second TRAP manager IP address 0.0.0.0 [T] Third TRAP community string 0.0.0.0 [C] Third TRAP manager IP address 0.0.0.0 [U] Authentication Trap generation Disabled [L] LinkUp/LinkDown trap generation Disabled Actions [X] Exit to previous Menu Enter selection:
The options available from this menu are as follows: [R] READ community stringIdentifies the community that is assigned to the management stations. Those management stations assigned to this community can read the trap messages sent from the switch. You can define a name up to 32 characters; the default is public. Note When VLANs are implemented, the VLAN needs to be included in the string. For example, public in VLAN2 would be public2.
[W] WRITE community stringIdentifies the community that is assigned to the management stations. Those management stations assigned to this community can read or set SNMP configurations on the switch. You can define a name up to 32 characters; the default is private. WRITE manager IP addressAllows you to define up to four SNMP management stations that can set SNMP configuration parameters on the switch. TRAPAllows you to define which SNMP management stations can receive TRAP messages on the switch. [U] Authentication Trap generationAllows you to enable or disable authentication trap message generation. [L] LinkUp/LinkDown trap generationInforms the switch of the actions to take when the port changes its state from suspended, down, or up from STP. It also notifies the switch when an address violation has occurred, link errors are present, or a manual configuration error had been found. [X] Exit to previous MenuTakes you back to the Network Management menu.
287
SNMP Default Trap Messages By default, the Cisco Catalyst 1900 and Catalyst 2820 series switches send certain trap messages. Trap messages are sent by default in response to the following events: Port security violations Power recycling (powering on and off) Logon authentication failures STP port changes STP bridge assignments Broadcast threshold problems Power supply problems
[B] Bridge Spanning Tree Selecting [B] Bridge Spanning Tree from the Network Management menu will bring up the following menu. Here we use a 2820 for an example to show a more detailed list of available settings in an upgraded version of the IOS software:
Catalyst 2820 VLAN 1 Spanning Tree Configuration Bridge ID: 0002 00D31F11B105 Information Designated root 0001 00F31F13F311 Number of member ports 27 Root port 3 Max age (sec) 20 Root path cost 1000 Forward Delay (sec) 15 Hello Time (sec) 10 Topology changes 0 Last TopChange 245f08h12m22s Settings [S] Spanning Tree Algorithm & Protocol [B] Bridge priority [M] Max age when operating as root [H] Hello time when operating as root [F] Forward delay when operating as the root
Actions [N] Next VLAN bridge [G] Goto VLAN bridge [P] Previous VLAN bridge [X] Exit to previous menu Enter Selection:
Note Spanning Tree Protocol and its defaults are covered in detail in Chapter 10. [C] Cisco Discovery Protocol Choosing C (Cisco Discovery Protocol) from the Network Management menu will bring up the following menu:
Catalyst 1900 CDP Configuration/Status CDP enabled on: 124, AUI, A, B Settings [V] Version 2 [H] Hold Time (secs) 180 [T] Transmission Interval (secs) 60 Actions [E] Enable CDP on Port(s) [D] Disable CDP on Port(s) [S] Show Neighbor [X] Exit to previous menu
288
Enter Selection:
The following list shows the commands from the CDP Configuration/Status menu: [H] Hold Time (secs)Indicates how long a CDP multicast will remain in the CDP table. The valid entries are from 5 to 255 seconds, and the default is 180 seconds. [T] Transmission Interval (secs)Defines the interval in which the switch will send CDP multicast messages. [E] Enable CDP on Port(s)Identifies one or more ports on which to enable CDP. You can use the All setting to enable all ports, or you can identify blocks of ports by using a hyphen. For example, to identify ports 1 through 10, enter 110. You can use spaces to separate the variables; so, if you also want ports 1215, enter 110 1215. [D] Disable CDP on Port(s)Identifies one or more ports on which to disable CDP. [S] Show NeighborDisplays a list of neighboring Cisco devices together with their device ID, MAC address, port, capabilities, and device platform. The devices capabilities are indicated by letters: R indicates a router, T indicates a Trans Bridge, B indicates a Route Bridge, S indicates a switch, P indicates a repeater, H indicates a host, and I indicates IGMP. [X] Exit to previous menuReturns you to the Network Management menu. [G] Cisco Group Management Protocol You configure Cisco Group Management protocol (CGMP) by selecting G (the last configuration option) on the Network Management menu. In order to function properly, CGMP needs all the ports on the switch to reside in the same VLAN. CGMP allows an intelligent means of limiting multicast flooding to specific ports. The following shows the menu on a Catalyst 2820 when the G command is chosen from the Network Management menu:
Catalyst 2820 Cisco Group Management Protocol (CGMP) Configuration Settings [H] Router hold time (secs) 300 [C] CGMP Enabled Actions [L] List IP multicast addresses [X] Return to previous menu
The following list shows the commands and descriptions for the CGMP Configuration menu: [H] Router hold time (secs)Indicates the amount of time the switch will keep CGMP multicast information. When the CGMP router fails or the power is recycled, the switch will flood multicast broadcasts out all the ports. The valid range is from 5 to 900 seconds; the default is 5 seconds. [C] CGMPEnables or disables CGMP on the switch. There are two valid options: E (enabled) and D (disabled; the default). [L] List IP multicast addressesLists all multicast addresses learned by CGMP along with the VLAN, source MAC address, and port of the source address. [X] Return to previous menuReturns you to the Network Management menu.
Table 15.1: The available configurable ports on a Catalyst 2820 from the Port Configuration menu. 289
Syntax Port A1 Port 25 B1 Port 26 AUI The AUI port 1 through 24 An individual port on the switch The Port Configuration menu is as follows:
Catalyst 2820 Port 24 Configuration Settings [D] Description/name of port Port To Hansons PC [S] Status of port Suspendedjabber Related Menus [A] Port addressing [V] View port settings [N] Next port [G] Goto port [P] Previous port [X] Exit to Main Menu Enter Selection:
The following list shows the options and descriptions for the Port Configuration menu: [D] Description/name of portThis option allows the port name to be changed to a name with 60 characters or less, such as Port to Hansons PC. [S] Status of portThis option has two configurable settings: E (enabled) and D (disabled). The default setting places all ports in the enabled mode.
Port Statuses Although the administrator has only two configurable settings under the Status Of Port option, the port can be in any of the following statuses: EnabledThe port is available to send and receive data frames. DisabledmgmtThe port has been manually disabled. SuspendedlinkbeatThe port cannot detect a link at the other end of the cable. Possibly the cable has become unplugged, the device on the other end is turned off, or the port is not configured on the farend device. SuspendedjabberThe port is temporarily disabled because of excessive jabber or indecipherable data frames. SuspendedviolationThe port has been temporarily disabled because of an address violation. The port is automatically reenabled once it discontinues receiving invalid source address information. Suspendedring downThe port is using Fiber Distributed Data Interface (FDDI) links and cannot detect an attached FDDI ring. SuspendedSpanningTreeProtocolThe port is not participating in any STP forwarding state. SuspendednotpresentA module in an expansion slot (on the 2820 series only) cannot be detected. SuspendednotrecognizedThe switch cannot detect the switch port or a module in the expansion slot (on the 2820 series only). DisabledselftestThe port has been disabled due to a selftest failure. DisabledviolationThe port has been disabled due to an address violation. When a port is in this state it must manually be reset and enabled. ResetThe port has been manually reset and enabled.
[A] Port addressingThis option is used to access the Port Addressing menu. [V] View port settingsThis option is used to display individual port statistics. 290
[N] Next portThis option is used to forward to the next configurable port. [G] Goto portThis option is used to configure any identified port. [P] Previous portThis option is used to configure the previous configurable port. [X] Exit to Main MenuThis option returns you to the Main Menu. Lets take a look at the options available on the 2820 using an FDDI module on port A1:
Catalyst 2820 Port A1 Configuration (Left Slot) Module Name: FDDI (Fiber SAS Model). Version 00 Description: Single Attached Station Ring Status: Not operational 802.1d STP State: Blocking Forwarding: 0 Settings [D] Description/name of port Module Settings [M] Module status Suspendedringdown [I] Port priority (spanning tree) 128 (80 hex) [C] Path cost (spanning tree) 100 [H] Port fast mode (spanning tree) Disabled [L] Novell SNAP frame translation Automatic [U] Unmatched SNAP frame destination All Actions R] Reset module [F] Reset to factory defaults Related Menus [1] Basic FDDI settings [2] Secondary FDDI settings [A] Port addressing [V] View port settings [N] Next port [G] Goto port [P] Previous port [X] Exit to Main Menu Enter Selection:
The following list shows the menu options and an explanation of each: [M] Module statusThis feature has three options. To see the status of the module, use the S option; the other two choices let you either enable or disable the module. [I] Port priority (spanning tree)This option sets the port priority for the STP root port. The lower the number, the higher the priority. The valid range is from 0 to 255; the default is 128. [C] Path cost (spanning tree)This option sets the path cost used to choose the STP root port. [H] Port fast modePortFast is an option that allows a port to immediately go into forwarding mode. This option offers two settings: E (enable) and D (disable). (The option is explained in detail in Chapter 10.) [L] Novell SNAP frame translationThis option determines whether manual or automatic frametranslation is used by IPX. [U] Unmatched SNAP frame destinationThis option identifies the translation of frames for which the frame type cannot be determined. To use this option, option L should be set to automatic. [R] Reset moduleThis option resets the expansion modules. [F] Reset to factory defaultsThis option resets the expansion modules configuration to the factory defaults. [1] Basic FDDI settingsThis option allows you to see the first expansion modules status and current configuration. [2] Secondary FDDI settingsThis option displays the second screen of the expansion modules status and current configuration. [A] Port addressingThis option is used to access the Port Addressing menu. [V] View port settingsThis option is used to display an individual ports statistics. [N] Next portThis option is used to forward to the next configurable port. [G] Goto portThis option is used to configure any identified port. [P] Previous portThis option is used to configure the previous configurable port. [X] Exit to Main MenuThis option returns you to the Main Menu.
291
Table 15.2: The available configurable ports on a Catalyst 2820 from the Port Addressing menu. Syntax Port A Port 25 AUI The AUI port 1 through 24 An individual port on the switch Following is the Port Addressing configuration menu:
Catalyst 2820 Port 2 Addressing Address: Static A000F31F1134 Settings [T] Address table size Unrestricted [S] Addressing security Disabled [U] Flood unknown unicast Enabled [M] Flood unregistered multicast Enabled Actions [A] Add a static address [D] Define restricted static address [L] List addresses [E] Erase an address [R] Remove all addresses Related Menus [C] Configure port [V] View port statistics [N] Next port [G] Goto port [P] Previous Port [X] Return to Main Menu Enter selection:
When the port is a secured port, its MAC address will be 000000000000. The following is the list of options and parameters for the Port Addressing menu: [T] Address table sizeDefines the number of allowable MAC addresses if the port is secure port enabled. The range can be any value from 1 to 132. The default is 132; it cannot be changed if the port is not secure port enabled. [S] Addressing securityAllows you to enable or disable secure port, which is also known as addressing security. [U] Flood unknown unicastAllows you to enable or disable flooding of unknown unicasts out all the ports. [M] Flood unregistered multicastAllows you to enable or disable flooding unregistered multicasts out all the ports. [A] Add a static addressAllows you to add a static unicast hexadecimal MAC address to the table, if the table is not full. [D] Define restricted static addressAllows a source MAC address to be identified, thereby allowing only the device using that MAC address to use the port. [L] List addressesDisplays all the static and dynamic MAC addresses that the switch has learned are attached to the port. The screen displays the first 15 entries beginning with those that have been statically configured. [E] Erase an addressAllows you to remove a statically or dynamically configured MAC address associated with the port. [R] Remove all addressesAllows you to remove all statically or dynamically configured MAC address associated with the port. 292
[C] Configure portProvides a shortcut to the Port Configuration menu. [V] View port statisticsDisplays individual port statistics. [N] Next portForwards to the next configurable port. [G] Goto portConfigures any identified port. [P] Previous portConfigures the previous configurable port. [X] Exit to Main MenuReturns you to the main menu.
[M] Monitor
Choosing M from the Main Menu will show you the following Monitoring Configuration menu:
Catalyst 1900 Monitoring Configuration Settings [C] Capturing frames to the Monitor [M] Monitor port assignment Current capture list: 124, AUI Actions [A] Add ports to capture list [D] Delete ports from capture list [X] Exit to Main Menu Enter Selection:
Disabled None
The following list shows the Monitoring Configuration menu options and a description of each: [C] Capturing frames to the MonitorAllows you to enable or disable port monitoring on the switch. [M] Monitor port assignmentAllows you to indicate the port to which captured frames are sent. The default is None. [A] Add ports to capture listAllows the addition of ports you want to monitor. You can enter all to monitor all ports. [D] Delete ports from capture listAllows the addition of ports you want to remove from monitoring. You can enter all to remove all ports. [X] Exit to Main MenuReturns you to the Main Menu.
293
Catalyst 2820 Virtual LAN Configuration VLAN Name Member Ports 1 VLAN 1 124, AUI, A, B Action [C] Configure VLAN [X] Exit to Main Menu Enter Selection:
This menu only gives two options. You can choose C to enter another menu that lets you configure a VLAN name and move member ports to another VLAN; or, you can exit to the Main Menu.
The first line of the menu displays the number of registered multicast addresses. The menu options are as follows: [R] Register a multicast addressAllows the addition of multicast addresses and ports to which multicasts can be forwarded. Invalid multicastssuch as unicasts, broadcasts, and reserved multicastsare automatically rejected. The switch supports up to 64 IP multicast group registrations. [L] List all multicast addressesDisplays all registered multicast addresses that exist in the switch. [U] Unregister a multicast addressRemoves registered multicast addresses. [E] Erase all multicast addressesRemoves all registered multicast addresses from the switchs address table. [X] Exit to Main MenuDisplays the management console Main Menu.
[F] Firmware
Loading an upgraded version of the system software is fairly simple. When you download the firmware to Flash memory, the switch does not respond to commands for approximately one minute. You should not turn off the switch until after the switch resets and begins using the new firmware. Note Cisco periodically provides new firmware to implement enhancements and maintenance releases. New firmware releases can be downloaded from Cisco Connection Online (CCO), the Cisco Systems customer Web site, at http://www.cisco.com/. When you enter the Firmware Configuration menu, your display will look similar to this: 294
Catalyst 1900 Firmware Configuration System Information FLASH: 1024K bytes V9.00.00 Standard Edition Upgrade status: No upgrade currently in progress. Settings [S] TFTP Server name or IP address [F] Filename for firmware upgrades [A] Accept upgrade transfer from other hosts
Disabled
Actions [U]System XMODEM upgrade [D]Download test subsystem (XMODEM) [T]System TFTP upgrade [X]Exit to Main Menu Enter Selection:
The switch firmware version and the amount of Flash memory are displayed in the System Information area of the Firmware Configuration menu. The following list displays each option and its description: [S] TFTP Server name or IP addressAllows you to enter the server name or the IP address of the TFTP server where the upgrade file is located. [F] Filename for firmware upgradesLets you enter the name of the firmware upgrade file to be downloaded. [A] Accept upgrade transfer from other hostsAllows you to enable or disable an upgrade from another host on the network. To prevent any unauthorized upgrades, disable this option after you upgrade your firmware. [U] System XMODEM upgradeAllows you to begin the upgrade using the XMODEM protocol. [T] System TFTP upgradeAllows you to begin the upgrade from a TFTP server. The address of the server and the name of the file must already be configured with options S and F. [D] Download test subsystem (XMODEM)Available for Cisco personnel only. This option is not available during a Telnet session. [X] Exit to Main MenuReturns you to the Main Menu.
295
The following list explains the options available from the RS232 Interface Configuration menu: [B] Baud rateLets you enter the baud rate. The possible settings are 2400, 9600, 19200, 38400, or 57600 for the console port. The default baud rate is 9600. [D] Data bitsAllows the configuration of data bits for the console port. The possible options are 7 and 8. The default is 8. [S] Stop bitsAllows the configuration of the stop bit value for the console port. The default is 1. [P] Parity settingChanges the parity settings for the console port. The default is None. [M] Match remote baud rate (auto baud)Allows you to enable or disable the console port from automatically matching the baud rate of an incoming call. The switch only matches a baud rate that is lower than its configured baud rate. [A] Auto answerAllows you to enable the switch to automatically answer incoming calls or disable it from doing so. [N] Number for dialout connectionLets you enter the phone number the switch is configured to use when dialing out. This number is dialed when the switch is configured to communicate with a remote terminal upon powerup or power recycling. [T] Time delay between dial attemptsConfigures the number of seconds between dialout attempts. Zero (0) disables all retries. The default is 300 seconds. [I] Initialization string for modemAllows you to change the initialization string to match your modem requirements. [C] Cancel and restore previous group settingsAllows you to undo any new values entered for the baud rate, data bits, stop bits, and parity settings. [G] Activate group settingsAllows you to activate the settings you have entered for baud rate, data bits, stops bits, and parity. [X] Exit to Main MenuReturns you to the Main Menu.
The following list explains the options from the Usage Summaries menu: [P] Port Status ReportThis option displays the Port Status Report, which displays the current connection status of ports. A sample of this report is as follows:
Catalyst 1900 Port 3 Statistics Report Receive Statistics Transmit Statistics Total good frames 9342 Total frames 90269 Total octets 983976 Total octets 6147813 Broadcast/multicast frames 834 Broadcast/multicast frames 81389 Broadcast/multicast octets 133139 Broadcast/multicast octets 5492328 Good frames forwarded 9342 Deferrals 1 Frames filtered 0 Single collisions 0 Runt frames 0 Multiple collisions 0 No buffer discards 0 Excessive collisions 0 Queue full discards 0
296
0 0 0 0
Errors: Late collisions Excessive deferrals Jabber errors Other transmit errors
0 0 0 0
Select [A] Port addressing, [C] Configure port, [N] Next port, [P] Previous port, [G] Goto port, [R] Reset port statistics, or [X] Exit to Main Menu:
[A] Port Addressing ReportThis option displays the Port Addressing report, which displays the number of MAC addresses and the MAC addresses assigned to a port:
Catalyst 1900 Port 3 Addressing Address : Dynamic 00608CBA5214 Settings [T] Address table size Unrestricted [S] Addressing security Disabled [K] Clear addresses on link down Disabled [U] Flood unknown unicasts Enabled [M] Flood unregistered multicasts Enabled Actions [A] Add a static address [D] Define restricted static address [L] List addresses [E] Erase an address [R] Remove all addresses [C] Configure port [V] View port statistics [N] Next port [G] Goto port [P] Previous port [X] Exit to Main Menu Enter Selection:
[E] Exception Statistics ReportThis option display the Exception Statistics Report, which gives a summary of errors on a port:
Catalyst 1900 Exception Statistics Report (Frame counts) Receive Transmit Security Errors Errors Violations 1 : 0 0 0 2 : 0 0 0 3 : 0 0 0 4 : 0 0 0 5 : 0 0 0 6 : 1 0 0 7 : 0 0 0 8 : 0 0 0 9 : 0 0 0 10 : 0 0 0 11 : 0 0 0 12 : 0 0 0 AUI: A : B : 0 0 0 0 0 0 0 0 0
[U] Utilization Statistics ReportThis option displays the Utilization Statistics Report, which displays the utilization of each port:
Catalyst 1900 Utilization Statistics Report (Frame counts)
297
Receive Forward Transmit 1 : 0 0 0 2 : 0 0 0 3 : 9352 9352 90514 4 : 0 0 0 5 : 0 0 0 6 : 3678 3677 81423 7 : 0 0 0 8 : 0 0 0 9 : 0 0 0 10 : 0 0 0 11 : 0 0 0 12 : 0 0 0 AUI: A : B : 0 0 0 0 0 0 82461 0 0
[B] Bandwidth Usage ReportThis option displays the Bandwidth Usage Report, which displays portbyport bandwidth usage:
Catalyst 1900 Bandwidth Usage Report Information Current Bandwidth Usage 0 Mbps Peak Bandwidth Usage during this interval 0 Mbps Peak Time recorded since start up 1d 06h 58m 02s Settings [T] Capture time interval 24 hour(s) [R] Reset capture [X] Exit to previous menu Enter Selection:
298
The following list describes the three menu options: [M] MenusDisplays the switchs Main Menu. [I] IP AddressAvailable at logon if the switch does not have a password configured. [P] Console PasswordAllows you to enter an unencrypted privilegedlevel password to the switch management interface. This option is available at logon only if the switch does not have a password. The password must be at least four characters and no more than eight characters long. 2. Choose selection [I] and enter an IP address that you have already predefined. Once you have completed the IP configuration, you need to select [S] from the following menu to enter the subnet mask for your segment:
Catalyst 1900 IP Configuration Ethernet Address: 00B064756540 Settings [I] IP address 192.1.2.1 [S] Subnet mask 255.255.255.0 [G] Default gateway 0.0.0.0 [V] Management VLAN 1 [M] IP address of DNS server 1 0.0.0.0 [N] IP address of DNS server 2 0.0.0.0 [D] Domain name [R] Use Routing Information Protocol Enabled Actions [P] Ping [C] Clear cached DNS entries [X] Exit to previous menu Enter Selection:
3. Enter the Default Gateway by selecting [G]. This option will let you enter the DG information. 4. By default, the management VLAN is set to VLAN1. If you selected another VLAN prior to this configuration, you should verify that the correct management VLAN value is set. 5. Enter the DNS information by selecting [M] to enter the primary DNS server and then selecting [N] to enter the secondary DNS server. 6. Select [D]. You will be prompted to enter the name of the domain into which the switch falls. 7. Routing Information Protocol (RIP) is enabled by default. Because all changes are in real time, you can use one of the actions to verify connectivity. Select [P] (ping); then, if you have a client attached to your switch, try to ping a host on that particular subnet. If you can do so, your configuration was successful. Related solutions: Configuring an IP Address and Netmask Configuring the Switch with an IP Address and Setting the Default Web Administration Port Found on page: 57 421
299
This menu allows you to control the propagation of broadcasts to each port. The following list gives a brief description of each setting: [A] Action upon exceeding broadcast thresholdIndicates what action will be taken in the event that the broadcast number threshold is exceeded. There are two settings: Option I ignores the excess broadcasts, and option B blocks them until the number of broadcasts becomes lower than the threshold setting. [G] Generate alert when threshold exceededControls whether an SNMP trap is sent when the broadcast threshold has been exceeded. Two options are available: E (enabled) and D (disabled). [T] Broadcast Threshold (BCs received / sec)Sets the broadcast threshold in broadcasts per second. The possible settings are 10 to 14,400; the default is 500 per second. [R] Broadcast reenable thresholdIndicates the number of broadcasts per second at which the port will reenable after an instance in which the threshold maximum disabled the port. The possible settings are 10 to 14,400; the default is 500 per second. [X] Exit to previous menuReturns you to the System Configuration menu.
2. Select [S] to enter the SNMP configuration menu, which looks like the following:
Catalyst 1900 Network Management (SNMP) Configuration [R] READ configuration [W] WRITE configuration [T] TRAP configuration [X] Exit to previous menu Enter Selection:
3. This menu has options to give a client read or write access to the local SNMP log files on the switch. Lets say we want to configure a read string for remote clients to access 1900 switch SNMP log files. And we want to change it from the default Public string to Techs. To do so, select [R], and then choose [1] to change the first string:
300
Catalyst 1900 Network Management (SNMP) READ Configuration Settings [1] First READ community string [2] Second READ community string [3] Third READ community string [4] Fourth READ community string [X] Exit to previous menu Enter Selection: 1
This command configures the community string the switch will recognize on all SNMP read ( Enter READ community string: Current setting ===> public New setting ===> Techs
4. Remember that all SNMP traps are case sensitive, so you will want to have your SNMP configurations well documented to reduce human error. Once your community string has been set you will return to the previous menu. 5. Choose [X] to exit from the previous menu. We will now configure a Write Manager to allow write access to the SNMP log files and MIB objects. Select [W] from the Network Management SNMP configuration menu, and then [A] from the Network Management (SNMP) WRITE Configuration menu. Your screen should look like the following:
Catalyst 1900 Network Management (SNMP) WRITE Configuration Settings [1] [2] [3] [4] [A] [B] [C] [D] First Second Third Fourth First Second Third Fourth WRITE WRITE WRITE WRITE WRITE WRITE WRITE WRITE community string community string community string community string manager name or IP manager name or IP manager name or IP manager name or IP
SNMP Write Manager is the management station allowed to issue write (Set) requests to the Enter First Write Manager name or IP address: Current setting ===> New setting ===> 63.78.39.84
6. Notice that we have selected the Write Manager management station with the IP address 63.78.39.84. This will be the only client that has write access to the MIB objects and log files. After entering this information your screen will refresh and should look like this:
Catalyst 1900 Network Management (SNMP) WRITE Configuration Settings [1] First WRITE community string [2] Second WRITE community string [3] Third WRITE community string [4] Fourth WRITE community string [A] First WRITE manager name or IP address [B] Second WRITE manager name or IP address [C] Third WRITE manager name or IP address 63.78.39.84
301
[D] Fourth WRITE manager name or IP address [X] Exit to previous menu
7. At this point you can select option [1] and configure the WRITE community string and change the default community string from private to techwrite, as we did in the following:
Catalyst 1900 Network Management (SNMP) WRITE Configuration Settings [1] [2] [3] [4] [A] [B] [C] [D] First Second Third Fourth First Second Third Fourth WRITE WRITE WRITE WRITE WRITE WRITE WRITE WRITE community community community community manager manager manager manager string string string string or or or or IP IP IP IP address address address address 63.78.39.84
This command configures the community string the switch will recognize on all SNMP read/w Enter WRITE community string: Current setting ===> private New setting ===> techwrite
8. Again, once you have entered the new setting, your screen will automatically refresh. At this point, enter option [X] and return to the SNMP configuration menu. 9. At the Network Management (SNMP) Configuration Menu, select [T]. This will allow you to configure the trap message configuration settings:
Catalyst 1900 Network Management (SNMP) Configuration [R] READ configuration [W] WRITE configuration [T] TRAP configuration [X] Exit to previous menu Enter Selection: T Catalyst 1900 Network Management (SNMP) TRAP Configuration Settings [1] First TRAP community string [A] First TRAP manager name or IP address [2] Second TRAP community string [B] Second TRAP manager name or IP address [3] Third TRAP community string [C] Third TRAP manager name or IP address [4] Fourth TRAP community string [D] Fourth TRAP manager name or IP address [U] Authentication trap generation [L] LinkUp/LinkDown trap generation [X] Exit to previous menu Enter Selection: Enabled Enabled
302
10. We now want to bind the IP address of our SNMP management station to the trap community string. To do this, enter the new community string, and select [1]. Then select [A] to enter the IP address. The following will appear on your screen:
Enter Trap Manager community string (32 characters max): Current setting ===> New setting ===> Techtraps Catalyst 1900 Network Management (SNMP) TRAP Configuration Settings [1] First TRAP community string [A] First TRAP manager name or IP address [2] Second TRAP community string [B] Second TRAP manager name or IP address [3] Third TRAP community string [C] Third TRAP manager name or IP address [4] Fourth TRAP community string [D] Fourth TRAP manager name or IP address [U] Authentication trap generation [L] LinkUp/LinkDown trap generation [X] Exit to previous menu Enter Selection: A SNMP Trap Manager is the management station to which the switch will send any SNMP traps (alerts). The types of traps the switch can send are authentication traps, linkUp/linkDown traps, among others. From the Management Console, up to 4 Trap management stations can be defined. If no trap managers are defined, the switch will not send any traps. Enter First Trap Manager server name or IP address: Current setting ===> New setting ===> 63.78.39.84 Enabled Enabled Techtraps
11. Notice that that IP address is the previously configured SNMP management station. Once this has been completed, you have successfully enabled SNMP on a Catalyst 1900 switch. Related solution: Enabling SNMP Contact Found on page: 58
303
Actions [A] Add ports to capture list [D] Delete ports from capture list [X] Exit to Main Menu Enter Selection: A This command adds ports to the capture list. Actual monitoring takes place only if all of the following information has been properly configured: 1) the capturing status, 2) the identity of a port to which monitored frames are sent, and 3) a nonempty capture list.
Port numbers should be separated by commas or spaces. A port number range may also be spe Enter port numbers: ALL
This command enables or disables the monitoring (capturing) of frames from ports that hav 1) the capturing status, 2) the identity of a port to which monitored frames are sent, an Capturing frames to the Monitor may be [E]nabled or [D]isabled: Current setting ===> Disabled New setting ===> Enabled
3. At this point, we want to send the captured information to a specific port. To do so, select [A]. In this example, we have selected trunk port B:
Identify Port: 1 to 12[112], [AUI], [A], [B], or [N]one: Select [1 12, AUI, A, B, N]: A Current setting ===> None New setting ===> B
4. Now you want to select option [C] and enable Capturing frames to monitor to successfully complete the Port Monitoring configuration.
304
2. Select [V], and accept the default setting of Server. Because the change we want to make is to add a server, we will take the defaults:
VTP mode may be set to [C]lient, [S]erver or [T]ransparent: Current setting ===> Server New setting ===> Server
3. Select [A] to add an Ethernet VLAN to the switch. Youll see the following:
The following VLAN types can be added: [1]Ethernet, [2]FDDI, [3]TokenRing, [4]FDDINet, or [5]TokenRingNet Select a VLAN type [15]: 1
4. Now we need to specify a name for the newly created VLAN. To change the name to Techs we need to select option [V], as shown in the following output:
Enter Selection: V This command selects the unique name of a VLAN. Configuration change only takes effect when the VLAN SAVE command is executed. A string of up to 32 characters may be specified to name a VLAN. Example: Engineering, Manufacturing, Blue Enter VLAN name (32 characters max): Current setting ===> VLAN0002 New setting ===> Techs
5. Now you need to save the VLAN configuration. To do so, select option [S]. Save and exit. 6. To view information about your newly created VLAN, from the Virtual LAN Configuration menu, choose [M]. 7. Next, select the VLAN you want information on. In this case, its VLAN 2. Enter 2 and you should see the following:
Catalyst 1900 Modify Ethernet VLAN Information Current member ports: Type: Ethernet VLAN Number: 2 Settings [V] VLAN Name Techs [I] 802.10 SAID 100002 [M] MTU Size 1500 [L] Translational Bridge 1 0 [J] Translational Bridge 2 0 [T] VLAN State Enabled Related Menus [S] Save and Exit [X] Cancel and Exit [N] Cancel and goto Next VLAN [G] Cancel and goto VLAN [P] Cancel and goto Previous VLAN
8. To exit from this screen, select option [X]. 9. To configure your trunk ports (Ax and/or Bx) to pass the VLAN information to neighboring switches, you must enable at least one of the trunk ports. From the Virtual LAN Configuration menu select option [T]. 10. Now you need to enter a trunk port. We will be configuring port A:
Select a trunk port [A, B] : A
305
11. You should now see the Trunk A Configuration menu The next step is to enable trunking. To do so, select [T] from the menu, as shown here:
Catalyst 1900 Trunk A Configuration Menu Trunking status: Off Encapsulation type: Unknown Information Transmit Flood traffic to VLANs N/A Receive Flood traffic from VLANs N/A Allowed VLANs 11005 Pruning Eligible VLANs 21001 Settings [T] Trunking Off Actions [S] List VLANs that Transmit Flood traffic [R] List VLANs that Receive Flood traffic [V] List Allowed VLANs [F] List Pruning Eligible VLANs [A] Add Allowed VLAN(s) [D] Delete Allowed VLAN(s) [N] Next Trunk Enter Selection: T [E] Add Pruning Eligible VLAN(s) [C] Delete Pruning Eligible VLAN(s) [X] Exit to Vlan Menu
This command configures the state of this trunk. [1] on dictates that the port will always be a trunk. [2] off allows an operator to specify that the specified port is never to be trunk, regardless of any dynamic mechanisms to the contrary. [3] desirable is used to indicate that it is desirable for the port to become a trunk. The device will initiate any negotiation necessary to become a trunk but will not become a trunk unless it receives confirmatio [4] auto is used to indicate that the port is capable and willing to become a trunk but will not initiate trunking negotiations. Other participants on the link are required to either start negotiations or start send [5] nonegotiate dictates that the port will always be a trunk, like the on(1) state. However, The port will neither generate DISL frames nor process received DISL frames. Trunking control state may be [1]On, [2]Off, [3] Desirable, [4]Auto, [5]Nonegotiate: Current setting ===> Off New setting ===> On
12. Now you want to pass the information through the specified trunk. You need to grant access to the VLANs so they know which trunk to send their information through. We are allowing the default VLAN (the management VLAN) and the newly created VLAN 2. To do so, select A from the Trunk A Configuration menu and enter 12:
This command adds one or more VLANs to the allowed VLAN list for this trunk.
VLAN numbers should be separated by commas or spaces. A VLAN number range may also be specified Example: 1, 2, 1020 Enter VLAN numbers [11005] : 12
Thats it. You completed the configuration. Related solutions: Configuring a Static VLAN on a Catalyst 5000 Series Switch Configuring Multiple VLANs on a Catalyst 5000 Series Switch Creating VLANs on a Catalyst 1900EN Series Found on page: 154 154 155
306
3. From this menu select option [U] for Uplink Fast. This allows for quick recovery should a root port fail:
Catalyst 1900 Bridge Spanning Tree Configuration Information [S] VLAN spanning trees enabled 164 Settings [U] Uplink Fast Disabled [R] Uplink Fast Frame Generation rate 15 Bridge Configuration [1] Configuration option 1 [2] Configuration option 2 [3] Configuration option 3 [4] Configuration option 4 [O] VLAN bridge operating parameters Actions [E] Enable spanning tree(s) [D] Disable spanning tree(s) [C] Uplink Fast statistics [X] Exit to previous menu Enter Selection: U
5. When you return to the Bridge Configuration menu, you can enable the Spanning Tree Protocol by selecting [E]. 6. Select the VLAN you want to enable STP on. Notice we selected VLAN 2:
This command enables the Spanning Tree Protocol for a list of VLANs. You may enable the Spanning Tree Protocol for a list of VLAN numbers. VLAN numbers range from 1 to 1005.
VLAN numbers should be separated by commas or spaces. A VLAN number range may also be spe Enter VLAN numbers: 2
7. To disable STP on a particular VLAN, you need to select option [D] from the same menu: 307
This command disables the Spanning Tree Protocol for a list of VLANs. You may disable the Spanning Tree Protocol for a list of VLAN numbers. VLAN numbers range from 1 to 1005.
VLAN numbers should be separated by commas or spaces. A VLAN number range may also be specified Enter VLAN numbers: 1
Notice here we selected the management VLAN, VLAN 1. Once you have configured STP and the Management VLAN you can see from the following output that only VLANs 2 through 64 are using the Spanning Tree Protocol:
Catalyst 1900 Bridge Spanning Tree Configuration Information [S] VLAN spanning trees enabled 264 Settings [U] Uplink Fast Enabled [R] Uplink Fast Frame Generation rate 15 Bridge Configuration [1] Configuration option 1 [2] Configuration option 2 [3] Configuration option 3 [4] Configuration option 4 [O] VLAN bridge operating parameters Actions [E] Enable spanning tree(s) [D] Disable spanning tree(s) [C] Uplink Fast statistics [X] Exit to previous menu
308
Hardware Troubleshooting
The most common hardware problems are power supply problems, failed modules or interface problems, failed RAM, and cabling issues. Lets first take a look at what to do in the event of a power failure, the bootup POST, and the different indicator lights that can be used for troubleshooting. Warning The following steps are my recommendation, based on troubleshooting procedures I use every day. These steps do not come from Cisco documentation.
No Power
The first indicator of a problem is the failure of a switch to power up. If there is no power to the switch, meaning the fan does not power up and no indicator lights appear lit on the front or back of the switch, follow these steps: 1. Check the physical cable for breaks or an unsecure connection. 2. Check the outlet with a multimeter for proper throughput. 3. Reseat the RAM in the chassis. 4. Check the connection and verify that all interfaces, cards, and modules are securely fastened in the chassis. Make sure you use proper grounding techniques before removing or touching any components, and that the switch is unplugged from all power sources. 5. Make sure all goldplated connections for the cards, modules, and RAM are not corroded and can make a good connection. To clean the goldplated connections, I use an eraser from a pencil. 6. If necessary, contact Cisco Technical Assistance Center (TAC) or an authorized Cisco repair vendor for further troubleshooting steps and replacement parts. Tip Heat from a failed fan followed by a cooling of components in the switch can cause a flexing of the connections. By reseating the connections, you can resolve the problem. Warning
POST
The power on self test (POST) can be a powerful tool in solving hardware issues. On the 1900 and 2820 series switches, the POST is not displayed on the screen. Instead, as the switch powers up, all the LEDs are lit except the LED that represents the test the switch is performing. The LEDs and their related tests are shown in Table 16.1.
Table 16.1: The LEDs and the POST tests they represent. 309
Port Number LED Test 1 Ports (loopback) 2 Ethernet address PROM 3 CAM (MAC address) table 4 RS232 console port 5 Realtime clock 6 CAM memory (SRAM) 7 Timer interrupt 8 Port control status 9 Flag memory (DRAM) 10 Buffer memory (DRAM) 11 Forwarding engine memory (SRAM) 12 Forwarding engine CPU 16/26 ECU memory (DRAM) Tip If the light turns green, the test has been passed. The switch will not boot if all the tests are not passed, with the exception of the realtime clock test. You can enter the Diagnostic Console on a 1900/2820 series switch to activate debugging or firmware upgrade options.
Indicator Lights
Indicator lights can be your biggest signal that a hardware, software, or configuration issue exists. In addition to the Catalyst 1900/2820 series switch LED tests, which were discussed in the last section, the Supervisor Engine on the Catalyst 5000 and 6000 family has five LEDs that can indicate a problem or tell you current utilization of the switch. The Supervisor Engine LEDs indicate the system, fan, power supplies, the load utilization, and whether the Supervisor Engine is active. Figure 16.1 shows the LEDs.
Figure 16.1: The Supervisor Engine LEDs. The switch load bar indicates the load on the switch. If the local device load is over 80 percent, then either there is a network problem such as a broadcast storm, or you need to upgrade the switching devices. The system status lights indicate the following: RedThe diagnostics on the switch have failed. OrangeThe PS2 power supply has failed. GreenAll diagnostics have passed. The fan LED indicates the following: RedThe fan has failed to power up. GreenThe fan is operating correctly. The PS1 and PS2 LEDs indicate the following: RedThe power supply has failed. GreenThe power supply is operating normally. OffThe power supply bay is empty or off.
310
The active LED indicates the following: OrangeThe Supervisor Engine is in standby. GreenThe Supervisor Engine is operating correctly. Other LEDs are on the individual line modules, as shown in Figure 16.2. These LEDs indicate the status of each module. A green link light indicates a good established link. An orange or amber link light indicates a problem with the link. A red light indicates that a nonport test has failed.
Figure 16.2: The 10/100 Ethernet module LEDs. Note A green switch port (SP) light indicates that the port is operating at 100BaseT. When the SP light is off, the port is operating in 10BaseT.
Switch Cabling
The amount of data traffic that can float down a single pipe is almost unimaginable. With the introduction of 1 and 10Gbps links as well as Fast and Gigabit EtherChannel, data can move around todays networks at lightning speed. When gigabyte hard drives were first introduced for Intelligent Drive Electronics (IDE) drives, to copy one gigabyte to another drive took hourseven days. Now, you can send whole gigabytes over a network in mere seconds. This higher speed adds complexity like never before. In early implementations, cable distances had greater flexibility. In todays highspeed networks, the distance limitations should be strictly adhered to. Many times, administrators will upgrade the network interface cards on both ends of a former 10Mbps link and find that the new 100Mbps link fails to work or has an excessive number of errors, forcing the link to become unusable. This happens because exceeding the 10BaseT cable limits didnt have the same detrimental effect as exceeding limits on 100BaseT. You also may have a noncompatible cable type. For instance, 10BaseT will work over Category 3 twistedpair, whereas 100BaseT requires Category 5. Table 16.2 shows the common cable limits for cabling in todays networks.
Table 16.2: Cable distance limitations. Cable Category 3 cable Category 4 cable Category 5 copper Multimode fiber (half) Multimode fiber (full) Singlemode fiber Distance Limit 100 meters 100 meters 100 meters 2,000 meters 400 meters 10,000 meters Switched Port Analyzers 10/100Mbps Compatible 10 10 10/100 10/100 10/100 10/100
Its hard to use a network sniffer on a switch the way you can in a flat topology network, because the switch isolates traffic, segments broadcast domains, and makes each port the collision domain. This isolation forces an administrator to manually connect a network sniffer to each port on a switch to monitor the traffic.
311
This problem is addressed by Cisco with the use of Switched Port Analyzer (SPAN). SPAN allows the switch to copy all the packets that are sent to nodes connected to the switch ports and direct them to another port. In essence, the designated switch port becomes a mirror of the monitored port or ports.
Cable Problems
When a cable problem surfaces, it usually appears as an intermittent problem; however, it can cause an immediate failure. Intermittent errors are hard to troubleshoot, and you must keep in mind that almost any connectivity issue can be cable related. Youll need to replace cables with a cable you know works in order to see if the change resolves your connectivity issue. Multimeters, time domain reflectometers (TDRs), cable analyzers, and breakout boxes can be used to test for cable problems, but they may not always find the trouble. Just because cables were installed by a certified cable installer doesnt mean that they arent improperly made, wont break, or dont have connector failures. Cables are moving parts, and any moving parts are subject to wear and tear as well as failures.
CrossOver Cables
When I am teaching classes, hardened Microsoft Certified Systems Engineers (MCSEs)s frequently have to ask me what a rollover or crossover cable is. This doesnt apply to all MCSEs of course, since I am one myself. I have always been on the networking side of technical support, so it is hard for me to believe that longtime network administrators dont know the differences between a straightthrough and a crossover cable or when to use them. A connection to a network node from a switch or hub uses a straightthrough cable. A crossover cable is used to connect two network devices: a hub to a hub, a switch to a switch, a switch to a router, and so on. Many times in my classroom or on the job, I have come across someone who couldnt get a connection between switches because they were using a straightthrough cable and should have been using a crossover cable. See Chapter 2 for more information on cables and pinouts.
312
Figure 16.3: A screen capture from CiscoView. User TrackingUsed in the creation and management of dynamic VLANs. Cisco switches permit VLAN assignments based on dynamic VLAN assignments. This means the Media Access Control (MAC) address is used to assign the port to a specific VLAN. User Tracking defines these dynamic VLANs and maintains the whereabouts of workstations throughout the network. VlanDirectorAnother GUIbased application. It is a very powerful tool to aid in the creation of multiple VLANs on a switch. This tool helps the administrator add users and assign ports, and it makes managing VLANs easy. TrafficDirectorA GUI component that is a great way to create usage baselines and to troubleshoot switched environments. This tool allows you to view the switched network as well as trunked and switched ports. A screen capture of TrafficDirector appears in Figure 16.4.
Figure 16.4: A screen capture from TrafficDirector. AtmDirectorUsed in Asynchronous Transfer Mode (ATM) networks. This tool can be used to configure, administer, and troubleshoot ATM switched networks.
show cam show cdp neighbors show config show flash show interface show log show mac show port show spantree show system show test show version show vtp domain controller show cam The show cam command displays a switchs transparent bridging table (also known as the Content Addressable Memory [CAM] table). This is a table of the Layer 2 MAC addresses attached to each port that the switch has learned in order to make forwarding decisions.
Duplicate MAC Addresses Occasionally, because of production mistakes, network devices are configured with identical MAC addresses on their interfaces. There are also some dualhomed Unix workstations that use manually assigned MAC addresses. This is a situation that leaves the door wide open for a duplicate MAC address in the network. This in turn can prevent communication in the local network. When the devices with the same MAC address are on the same broadcast domain, duplicate MAC addresses can become a substantial problem in your network. By using the show cam command, you can view the list of known MAC addresses for interfaces attached to each switch port. If you are in a network where the administration of network devices is divided within the organization, I recommend that a central process be created to review and document assigned MAC addresses and thereby avoid this duplication problem. Note On the Cisco CLIbased IOS, use the show mac command.
show cdp neighbors Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol used to discover neighboring Cisco devices. The show cdp neighbors command displays the hardware, IOS version, and active interfaces. This information is passed between Cisco devices by CDP packets on physical media that support SNAP. CDP packets are multicast packets that are advertised by the Cisco router or switches but not forwarded. This protocol is available on the Cisco IOS version 10.3 and later. You can use the show cdp neighbors command on both the CLI and Set/Clear commandbased IOS. show config The show config command displays an incredible amount of troubleshooting information. With this command, you can obtain the entire configuration of switches and modules (except the Route Switch Module [RSM]) including passwords, system information, protocol settings, interface settings, and the system log settings. Note On the CLIbased IOS, use the show runningconfig command. 314
show flash Cisco switches operate with software that is very similar to the Cisco IOS on routers. This software is stored and may be upgraded in flash stored on the Supervisor module. The show flash command reports the space required for the installed software and the version of the code, including the file names, software version numbers, and file sizes. Unfortunately, there is no comparable command on the 1900EN series switches. show interface You can use the show interface command to get the IP configuration, interface flags, interface state, VLAN information from the Supervisor Console 0 (SCO) interface, and broadcast address. This command can be used on both the Set/Clear and CLIbased IOS. show log Using the show log command, you can look at significant events, including reboots of all the modules, traps, logged events, boot history, nonvolatile RAM (NVRAM) logs, module logs, and power supply failures. This command cannot be used on the 1900EN series switches. show mac The output from the show mac command is quite long. This command displays numerous counters that are maintained during normal operation. These counters include information on the traffic for each port, number of incoming frames, number of frame discards, total number of frames sent, and maximum transmission unit (MTU) violations. Note On the Cisco CLIbased IOS, use the show usage utilization command. show port Using the show port command, you can receive specific information about selected ports or all the ports on a specified module. This data includes the VLANs the port belongs to, port configuration information, port status, port speed, port duplex, port media type, security information, source MAC address of the last packet received, broadcast threshold, number of collisions, link error rate (LER), link error monitor (LEM), last report cleared time, and whether port trap is enabled. Related solution: Creating an EtherChannel on a Set/Clear CommandBased Switch show spantree Found on page: 334
The use of spanning trees is a necessity in todays networks in order to provide for redundant links and at the same time avoid a data looping problem. The show spantree command can be used to display the STP configuration crucial to the successful running of a switched network. The output from this command can tell you whether STP is enabled or disabled, the bridge or port priorities, the root bridge priorities, the path cost to the root, BPDU information, the bridge MAC address, timer information, the port states, and information on the faststart configuration of each port. This command is similar on the Set/Clear IOS and the CLIbased IOS. Related solutions: Verifying the STP Port Priority on a Set/Clear CommandBased Switch Verifying the VLAN Priority Settings Found on page: 331 331
315
show system Using the show system command, you can obtain a component status summary regarding the switch components. This information includes the system status, current traffic percentage, peak percentage, status of the fans, power supplies, and modem; uptime, and system identification configuration. There is no comparable command on the 1900EN series switches. show test The show test command can be used to obtain the status of the switch, interface cards, power supplies, Enhanced Address Recognition Logic (EARL) tests, or active loopback. It also displays the memory status of the readonly memory (ROM), flash electrically erasable programmable ROM (EEPROM), serial EEPROM, and nonvolatile RAM. There is no comparable command on the 1900EN series switches. show version The show version command provides hardware and software version numbers, in addition to memory and the system uptime statistical information. This command can be used on both the Set/Clear IOS and the CLIbased IOS. show vtp domain controller The VLAN Trunking Protocol (VTP) maintains a consistent VLAN configuration throughout the network. In a VTP management domain, a configuration change is done only once on a VTP serverconfigured switch. The new configuration is propagated throughout the network. The show vtp domain controller command provides the status and configuration information for VTP. Related solutions: Configuring the VTP Version on a Catalyst 5000 Switch Configuring VTP on a Set/Clear CLI Switch Configuring VTP on a 1900 Cisco IOS CLI Switch Verifying the VTP Configuration on a Set/Clear CLI Displaying VTP Statistics Found on page: 162 164 165 166 166
password $22$hgjhru^jf#sdc enablepass $22$hgjhru$fhkn prompt Catlayst5002 length 24 default logout 0 banner motd Unauthorized Use Prohibited!
316
set system contact Sean Odom/Gina Galbraith ! #snmp set snmp community readonly public set snmp community readwrite private set snmp community readwriteall all set snmp rmon disable set snmp trap enable module set snmp trap enable chassis set snmp trap enable bridge set snmp trap enable repeater set snmp trap enable vtp set snmp trap enable auth set snmp trap enable ippermit set snmp trap enable vmps ! #ip set interface sc0 2 68.127.186.100 255.255.255.0 68.127.186.255 set interface sl0 0.0.0.0 0.0.0.0 set arp agingtime 1200 set ip redirect enable set ip unreachable enable set ip fragmentation enable set ip route 0.0.0.0 68.127.186.254 0 set ip alias default 0.0.0.0 ! #Command alias ! #vmps set vmps set vmps set vmps set vmps
! #dns set ip dns disable ! #tacacs+ set tacacs attempts 3 set tacacs directedrequest disable set tacacs timeout 5 set authentication login tacacs disable set authentication login local enable set authentication enable tacacs disable set authentication enable local enable ! #bridge set bridge ipx snaptoether 8023raw set bridge ipx 8022toether 8023 set bridge ipx 8023rawtofddi snap ! #vtp set vtp domain Coriolis set vtp mode server set vtp v2 enable set vtp pruneeligible 91005 clear vtp pruneeligible 10011005 set vlan 1 name default type ethernet mtu 1500 said 100001 state active set vlan 1002 name fddidefault type fddi mtu 1500 said 101002 state active set vlan 1004 name fddinetdefault type fddinet mtu 1500 said 101004 state active bridge 0x0 stp ieee set vlan 1005 name trnetdefault type trbrf mtu 1500 said 101005 state active bridge 0x0 stp ieee
317
set vlan 1003 name TokenRingdefault type trcrf mtu 1500 said 101003 state active parent 0 ring 0x0 mode srb aremaxhop 7 stemaxhop 7 ! #spantree ! #uplinkfast groups set spantree uplinkfast disable ! #vlan 1 set spantree set spantree set spantree set spantree set spantree ! #vlan 2 set spantree set spantree set spantree set spantree set spantree ! #vlan 10 set spantree set spantree set spantree set spantree set spantree #vlan 1003 set spantree set spantree set spantree set spantree set spantree set spantree set spantree set spantree set spantree #vlan 1005 set spantree set spantree set spantree set spantree set spantree set spantree
enable 1003 fwddelay 4 1003 hello 2 1003 maxage 10 1003 priority 32768 1003 portstate 1003 auto 0 portcost 1003 80 portpri 1003 4 portfast 1003 disable
enable 1005 fwddelay 15 1005 hello 2 1005 maxage 20 1005 priority 32768 1005 multicastaddress 1005 ieee
! #cgmp set cgmp disable set cgmp leave disable ! #syslog set logging console enable set logging server disable set logging level cdp 2 default set logging level cgmp 2 default set logging level disl 5 default set logging level dvlan 2 default set logging level earl 2 default set logging level fddi 2 default set logging level ip 2 default set logging level pruning 2 default
318
set logging level snmp 2 default set logging level spantree 2 default set logging level sys 5 default set logging level tac 2 default set logging level tcp 2 default set logging level telnet 2 default set logging level tftp 2 default set logging level vtp 2 default set logging level vmps 2 default set logging level kernel 2 default set logging level filesys 2 default set logging level drip 2 default set logging level pagp 5 default ! #ntp set ntp broadcastclient disable set ntp broadcastdelay 3000 set ntp client disable set timezone PST 0 0 set summertime disable ! #permit list set ip permit disable ! #drip set tokenring reduction enable set tokenring distribcrf disable ! #module 1 : 2port 100BaseFX MM Supervisor set module name 1 set vlan 1 1/12 set port channel 1/12 off set port channel 1/12 auto set port enable 1/12 set port level 1/12 normal set port duplex 1/12 half set port trap 1/12 enable set port name 1/12 set port security 1/12 disable set port broadcast 1/12 100% set port membership 1/12 static set cdp enable 1/12 set cdp interval 1/12 60 set trunk 1/1 auto 11005 set trunk 1/2 auto 11005 set spantree portfast 1/12 disable set spantree portcost 1/12 19 set spantree portpri 1/12 32 set spantree portvlanpri 1/1 10 set spantree portvlanpri 1/2 10 set spantree portvlancost 1/1 cost 18 set spantree portvlancost 1/2 cost 18 ! #module 2 : 24port 10/100BaseTX Ethernet set module name 2 set module enable 2 set vlan 1 2/124 set port enable 2/124 set port level 2/124 normal set port speed 2/1124 auto set port speed 2/19 10 set port duplex 2/12 full set port trap 2/124 enable set port name 2/124 set port security 2/124 disable set port broadcast 2/124 0
319
set set set set set set set set set set set set
port membership 2/124 static cdp enable 2/124 cdp interval 2/124 60 spantree portfast 2/124 disable spantree portcost 2/11 10 spantree portcost 2/12 10 spantree portcost 2/17 10 spantree portcost 2/18 10 spantree portcost 2/19 100 spantree portcost 2/21 10 spantree portcost 2/110,2/1316,2/20,2/2224 19 spantree portpri 2/124 32
! #switch port analyzer set span enable ! #cam set cam agingtime 12,10,1003,1005 300 end
320
1912EN#
321
epld lcp atm lcp tr lcp c5ip lcp 64k atm/fddi lcp 360 mcp Catalyst5002>
. . . . . . . . . (. . . . = Pass, F = Fail, N = N/A) Bootcsum : . Archsum : N CBL : . DPRAM : . SAMBA : . Repeater : N FLASH : N
LCP Diag Status for Module 1 CPU : . Sprom : RAM : . LTL : Saints : . Pkt Bufs : MII Status: Ports 1 2 N N SAINT/SAGE Status : Ports 1 2 3 . . . Packet Buffer Status : Ports 1 2 3 . . .
322
SAINT/SAGE Status : Ports 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Packet Buffer Status : Ports 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Loopback Status [Reported by Module 1] : Ports 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
324
Protocols Configured: IP
Address: 68.127.187.10
Received: 95563219847
Transmitted: 81294682
Virtual LAN ID: 2 (Inter Switch Link Encapsulation) vLAN Trunk Interface: Protocols Configured: IP Catalyst5002> FastEthernet1/0.2 Address: 68.127.186.1 Received: 855147 Transmitted: 854281
325
Catalyst5002> (enable) show spantree VLAN 1 Spanning tree enabled Spanning tree type
ieee
Designated Root 0000800ca1b3 Designated Root Priority 32768 Designated Root Cost 0 Designated Root Port 1/0 Root Max Age 20 sec Hello Time 2 sec Forward Delay Bridge ID MAC ADDR Bridge ID Priority Bridge Max Age 20 sec Port 1/1 1/2 2/1 2/2 2/3 2/4 2/5 2/6 2/7 2/8 2/9 2/10 2/11 2/12 2/13 2/14 2/15 2/16 2/17 2/18 2/19 2/20 2/21 2/22 2/23 2/24 Vlan 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
15 sec
0000800ca1b3 32768 Hello Time 2 sec Forward Delay 15 sec Cost Priority 19 32 19 32 10 32 10 32 10 32 10 32 10 32 19 32 100 32 100 32 100 32 10 32 10 20 19 32 10 32 10 32 10 32 19 32 10 10 10 32 100 10 10 32 100 100 10 100 32 32 32 32 FastStart Groupmethod disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled
PortState notconnected notconnected forwarding forwarding forwarding forwarding forwarding notconnected forwarding forwarding notconnected forwarding forwarding notconnected forwarding forwarding forwarding notconnected forwarding forwarding notconnected forwarding forwarding notconnected forwarding notconnected
326
Port Ethernet 0/1 of VLAN2 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0000.0C00.4BD0 Designated port is Ethernet 0/7, path cost 0 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/2 of VLAN2 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/2, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/3 of VLAN2 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/3, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/4 of VLAN3 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/4, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/5 of VLAN3 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/5, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/6 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/6, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/7 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/7, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/8 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/8, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/9 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/9, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/10 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/10, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/11 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/11, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/12 of VLAN1 is Forwarding
327
Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/12, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/25 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/25, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port FastEthernet 0/26 of VLAN1 is Blocking Port path cost 10, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is FastEthernet 0/26, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port FastEthernet 0/27 of VLAN1 is Blocking Port path cost 10, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is FastEthernet 0/27, path cost 100 Timers: message age 20, forward delay 15, hold 1
1912EN#show mac Number of permanent addresses : 5 Number of restricted static addresses : 0 Number of dynamic addresses : 1 Address Dest Interface Type Source Interface List 0030.194C.80A6 Ethernet 0/1 Permanent All 0000.0C00.4BD0 Ethernet 0/1 Permanent All 00A0.2457.2877 Ethernet 0/1 Permanent All 0000.0C33.4283 Ethernet 0/5 Permanent All 0000.0C33.4283 Ethernet 0/10 Permanent All 0000.0C33.4286 Ethernet 0/10 Permanent All 0010.A4EF.92FB Ethernet 0/6 Dynamic All 1912EN#
1912EN#show cdp neighbors Capability Codes: R Router, T Trans Bridge, B S Switch, P Repeater, H DeviceID IP Addr Local Port Capability 1005 68.127.187.254 Et0/1 R 1912EN#
Source Route Bridge Host, I IGMP Platform Remote Port cisco 1000 Ethernet0
330
MAC DelyExced MTUExced InDcrd LrnDcrd InLost OutLost 1/1 0 0 0 0 0 0 1/2 0 0 0 0 0 0 2/1 0 0 0 0 0 0 2/2 0 0 0 0 0 0 2/3 0 0 0 0 0 0 2/4 0 0 0 0 0 0 2/5 0 0 0 0 0 0 2/6 0 0 0 0 0 0 2/7 0 0 0 0 0 0 2/8 0 0 0 0 0 0 2/9 0 0 0 0 0 0 2/10 0 0 0 0 0 0 2/11 0 0 0 0 0 0 2/12 0 0 0 0 0 0 Port 1/1 1/2 2/1 2/2 2/3 2/4 2/5 2/6 2/7 2/8 2/9 2/10 2/11 2/12 Port 1/1 1/2 2/1 2/2 2/3 2/4 2/5 2/6 2/7 2/8 2/9 2/8 2/9 2/10 2/11 2/12 Port 1/1 1/2 2/1 2/2 2/3 2/4 2/5 2/6 2/7 2/8 2/9 2/10 2/11 2/12 RcvUnicast 0 0 326653 2465834 99675 345562 0 0 0 0 0 0 0 0 XmitUnicast 0 0 8809 5798 6260 7341 0 0 0 0 0 0 0 0 0 0 RcvOctet 0 0 3346321 3442573 6738753 234434 3455 0 0 0 0 0 0 0 RcvMulticast 0 0 3444 1755 3467 453 0 0 0 0 0 0 0 0 XmitMulticast 0 0 431 540 895 935 0 0 0 0 0 0 0 0 0 0 RcvBroadcast 0 0 72348 566432 66432 77645 0 0 0 0 0 0 0 0 XmitBroadcast 0 0 227 101 83 107 0 0 0 0 0 0 0 0 0 0 XmitOctet 0 0 437519 465421 6345326 563002 3225 0 0 0 0 0 0 0
331
1 2 3 4 5 6 7
: : : : : : :
8 : 9 : 10 : 11 : 12 : AUI: A : B : 1912EN#
332
Port SingleCol MultiColl LateColl ExcessCol CarriSen Runts Giants 2/1 3442 603 0 0 0 1 0
333
Ethernet 0/9, Ethernet 0/10, Ethernet 0/11, Ethernet 0/12 Ethernet 0/25, FastEthernet 0/26, FastEthernet 0/27 1912EN#show port monitor Port monitoring state: Enabled Monitor port: None Ports being monitored: Ethernet 0/1 1912EN#show port system Switching mode: FragmentFree Use of store and forward for multicast: Enabled Network port: Ethernet 0/8 Half duplex backpressure (10 Mbps ports): Disabled Enhanced Congestion Control (10 Mbps ports): Disabled Default port LED display mode: Port Status 1912EN#
Virtual LAN ID: 2 (Inter Switch Link Encapsulation) vLAN Trunk Interface: Protocols Configured: IP Catalyst5002> FastEthernet1/0.2 Address: 68.127.186.1 Received: 855147 Transmitted: 854281
334
1 default Enabled 512, AUI, A, B 2 Engineering Enabled 12 3 Admins Enabled 34 1002 fddidefault Suspended 1003 tokenringdefau Suspended 1004 fddinetdefault Suspended 1005 trnetdefault Suspended VLAN Type SAID MTU Parent RingNo BridgeNo Stp Trans1 Trans2 1 Ethernet 100001 1500 0 0 0 Unkn 1002 1003 2 Ethernet 100002 1500 0 0 0 Unkn 1002 1003 3 Ethernet 100003 1500 0 0 0 Unkn 1002 1003 1002 FDDI 101002 1500 0 0 0 Unkn 1 1003 1003 TokenRing 101003 1500 1005 1 0 Unkn 1 1002 1004 FDDINet 101004 1500 0 0 1 IEEE 0 0 1005 TokenRingNet 101005 1500 0 0 1 IEEE 0 0 1912EN#
335
Receive Statistics Total good frames 2504 Total octets 242467 Broadcast/multicast frames 359 Broadcast/multicast octets 105187 Good frames forwarded 360 Frames filtered 2144 Runt frames 0 No buffer discards 0 Errors: FCS errors Alignment errors Giant frames Address violations 1912EN#
0 0 0 0
Transmit Statistics Total frames 11745 Total octets 875657 Broadcast/multicast frames 11745 Broadcast/multicast octets 875657 Deferrals 0 Single collisions 0 Multiple collisions 0 Excessive collisions 0 Queue full discards 0 Errors: Late collisions 0 Excessive deferrals 0 Jabber errors 0 Other transmit errors 0
Exceptions: 1 Last Exception occurred on Software version = 4.1 Error Msg: PID = 0 Kernel PC: 10000D0C, Status: 2704, Vector: 007C sp+00: 14041000 0D0C007C 2604101F 0D3A00AC sp+10: 00000000 101785A2 00000030 102FB12C sp+20: 10FFFF9C 10179C06 10357A90 102FB12C sp+30: 10FFFFA8 101FB86E 00000000 10FFFFE8 sp+40: 101FC0D4 00000000 10278814 00002000 sp+50: 00000080 0000101F B9862078 01000001 sp+60: 1CD80000 001E0000 00010000 00000000 sp+70: 00000000 00000000 00000007 68000000 sp+80: 00000000 00000000 00000000 00000000 sp+90: 00000000 103FFFEC 10000420 100009C2 sp+A0: 10000940 10000A4E 10001030 10001030
336
sp+B0: 10001030 10001030 10000BD0 10000AD0 sp+C0: 10000B28 10001030 10001030 10001030 sp+D0: 10001030 10001030 10001030 10001030 sp+E0: 10001030 10001030 10001030 10001030 sp+F0: 10001030 10001030 10001030 493798E4 D0: 00000000, D1: 00000004, D2: 00000030, D3: D4: 11000000, D5: 11000000, D6: 10FF0008, D7: A0: 68000000, A1: 00000000, A2: 10357A90, A3: A4: 103C182C, A5: 64000000, A6: 10FFFF8C, sp: NVRAM log: Module 2 Log: Reset Count: 1 Reset History: Fri Aug 04 2000, 8:07:12
2. To enable SPAN for port monitoring, you must identify the source module, source port, destination module, destination port, and (optionally) whether you want it to monitor received frames, transmitted frames, or both. The syntax for the command is as follows:
set span <source module/source port> <destination module/ destination port> [rx|tx|both]
2. To enable SPAN for VLAN monitoring, you must identify the source VLAN, destination module, destination port, and (optionally) whether you want it to monitor received frames, transmitted frames, or both. The syntax for the command is as follows:
set span <source VLAN> <destination module/ destination port> [rx|tx|both]
337
2. Press and hold down the Mode button, as shown in Figure 16.5, while cycling the power on the switch.
Figure 16.5: The Mode button on a 1900 Series switch. 3. Proceed through the following options:
Cisco Systems Diagnostic Console Copyright(c) Cisco Systems, Inc. 1997 All rights reserved. Ethernet Address: 003080546C00 Press enter to continue. Diagnostic Console Systems Engineering Operation firmware version: 8.01.02 Boot firmware version: 3.10 Status: valid
[C] Continue with standard system start up [U] Upgrade operation firmware (XMODEM) [S] System debug interface Enter Selection:
Using the Diagnostic Console to Upgrade the Firmware on a Cisco 1900 or 2820 Series Switch
Follow these steps to upgrade the firmware on a Cisco 1900 or 2820 series switch: 1. Press the Mode button on the front of the switch while booting, to enter the Diagnostic Console, as shown here:
Cisco Systems Diagnostic Console Copyright(c) Cisco Systems, Inc. 1997 All rights reserved. Ethernet Address: 003080546C00 Press enter to continue. Diagnostic Console Systems Engineering Operation firmware version: 8.01.02 Boot firmware version: 3.10 Status: valid
338
[C] Continue with standard system start up [U] Upgrade operation firmware (XMODEM) [S] System debug interface Enter Selection:
2. Use the [U] Upgrade Operation Firmware (XMODEM) option to upgrade the firmware (you must be using XModem compatible software on the network node attached to the switch):
Enter Selection: U The XMODEM protocol will be used to perform this firmware upgrade. The user must initiate an XMODEM file transfer from the terminal side using an appropriate terminal application specific command. Do you wish to continue with the download process, [Y]es or [N]o?
3. By answering [Y]es here, the switch immediately deletes the IOS from the Flash. It doesnt give you any warning. The configuration is left to run on the new IOS that is installed:
Erasing invalid flash may take up to 1 minute. Erasure completed.
4. You now need to select the speed at which to upload the IOS. If you are using the console cable it should be 9600. If you are using a modem you can upload a new image at 57,600Kbps:
Do you wish to upgrade at [9]600 (console speed) or [5]7600? 9600 Waiting for image at the configured baud rate
Using the Diagnostic Console for Debugging the Firmware and Hardware
Follow these steps to start debugging on the switch: 1. To enter the Diagnostic Console, press the Mode button on the front of the switch while booting. 2. Use the [S] System option to enter the debug interface, as follows:
Enter Selection: S Diagnostic Console System debug interface
Generic I/O Memory (CPU) I/O Return system to factory defaults Reset main console RS232 interface to 9600,8,1,N View management console password
Here is an example of the output from the [G] Generic I/O option:
Enter Selection: G
Diagnostic Console Generic I/O Settings [A] Autoincrement address Yes [F] From address location 0000H (0) [L] Length in 16bit words 0001H (1)
339
Actions [I] Input [O] Output [X] Exit to Previous Menu Enter Selection:
Here is an example of the output from the [M] Memory (CPU) I/O option:
Enter Selection: M
Settings [F] [L] [T] [V] From offset location Length in 16bit words Toggle byte/word display Value for output 0000H (0) 0001H (1) Word 0000H (0)
Actions [I] Input [O] Output [X] Exit to Previous Menu Enter Selection:
Here is an example of the output from the [F] Return System To Factory Defaults option:
Enter Selection: F Reset system with factory defaults, [Y]es or [N]o? Yes
Here is an example of the output from the [R] Reset Main Console RS232 Interface To 9600,8,1,N option:
Enter Selection: R Reset main console RS232 interface to 9600,8,1,N, [Y]es or [N]o? Yes
Here is an example of the output from the [V] View management console password option:
Enter Selection: V The current management console password is: 62592 Press any key to continue.
340
Books
McDysan, David E. and Darren L. Spohn, ATM Theory and Application, McGrawHill: New York, 1998. ISBN: 0070453462. This book is a great resource on Asynchronous Transfer Mode (ATM) and LAN Emulation (LANE). Odom, Sean and Douglas Hammond, CCNP Switching Exam Prep, The Coriolis Group: Scottsdale, AZ, 2000. ISBN: 1576106896. This book covers the curriculum for the Cisco Switching Exam number 640504.
341
Online Resources
Multiple documents are available on the Web, but the best place for information is the Cisco Web site. Cisco is one of the best companies at providing documentation on its products. You can find the Cisco Web site at http://www.cisco.com/.
Cisco IOS
The Cisco IOS Easy IPwww.cisco.com/warp/public/cc/pd/iosw/ioft/ionetn/tech/ezip1_wp.htm IOS troubleshooting commandswww.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/fun_r/frprt4/frtroub Configuring User Interfacewww.cisco.com/univercd/cc/td/doc/product/atm/c8540/wa5/12_0/12_3/sw_conf/admin.htm
InterSwitch Link
ISL Functional Specificationwww.cisco.com/warp/public/741/4.html ISL Trunking on the Catalyst 5000 and 6000 Family Switcheshttp://www.cisco.%20com/warp/public/793/lan_switching/2.html
IP Multicast
Higherlevel Protocols Used with Multicastwww.ipmulticast.com/community/whitepapers/highprot.html IP Multicast Routing Commandswww.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/ip_r/iprprt3/1rdmulti.h Simple Multicast Routing Protocolwww.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/smrp.htm
Multilayer Switching
Configuring IP Multicast Multilayer Multicast Switchingwww.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/switch_c/xcprt5/xcdmms Configuring IP Multilayer Switching for IOS 12.1www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/switch_c/xcprt5/xcdmsc.htm Configuring IPX Multilayer Switchingwww.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/switch_c/xcprt5/xcdmsip
342
Quality of Service
Quality of Service Overviewwww.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/qos_c/qcdintro.htm Configuring Quality of Service on a Cisco Catalyst 6000www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sw_5_4/config/qos.htm Configuring IOS Quality of Service on the Catalyst 6000 Familywww.cisco.com/univercd/cc/td/doc/product/lan/cat6000/ios127xe/qos.htm
TACACS+
Configuring TACACS+ and RADIUS on the Catalyst 5000, 5500, 4000, and 2900 Serieswww.cisco.com/warp/public/473/cat_tacacs_plus.html Configuration examples using TACACS+www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/secur_c/scprt1/scdathor
VLANs
VLAN and router technical tipswww.cisco.com/warp/public/741/10.html IEEE 802.10 VLAN encapsulation informationwww.cisco.com/warp/public/741/3.html VLAN configuration issues on the Catalyst 5000www.cisco.com/warp/public/741/9.html
Standards Organizations
American National Standards Institute (ANSI)This organization coordinates many specialized standards organizations and technical committees. ANSIs Web site can be found at http://www.ansi.org/. Electronic Industries Alliance (EIA)This is the parent organization for a number of standards groups, including the Telecommunications Industry Association (TIA). TIA/EIA standards relate mostly to cabling. The TIA members are providers of communications and information technology products and services. The TIA/EIA Web site can be found at http://www.tiaonline.org/. Gigabit Ethernet AllianceThis group was formed to promote industry cooperation in developing Gigabit Ethernet. You can find this groups Web site at http://www.gigabitethernet.org/. High Speed Token Ring AllianceThis group was formed by Token Ring vendors to establish highspeed solutions for Token Ring. Their Web site can be found at http://www.hstra.com/. Institute for Electrical and Electronics Engineers (IEEE)This standards organization creates and publishes standards related to electronic technologies. It is best known for its 802 committee, which has produced a series of standards documents that describe LAN protocols and physical transmission topology standards. The IEEEs Web site can be found at http://www.ieee.org/. International Organization for Standardization (ISO)This organization is best known for the Open System Interconnection (OSI) Model. It creates and publishes standards that cover a wide range of topics. The ISO Web site can be found at http://www.iso.ch/. International Telecommunications Union Telecommunication Standardization Sector (ITUT)This organization is responsible for the networking standards relating to Asynchronous Transfer Mode (ATM). The ITUT Web site can be found at http://www.itu.int/.
343
Internet Engineering Task Force (IETF)This organization is responsible for the TCP/IP, Simple Network Management Protocol (SNMP), and Internet standards. A lot of its work relates to upgrading and enlarging the TCP/IP protocol suite and networks utilizing that protocol. The IETF Web site can be found at http://www.ietf.org/. National Committee for Information Technology Standards (NCITS)This organization was formed to produce market condition standards for storage devices, multimedia, programming languages, and security. The T11 committee is responsible for fiber channel standards. You can find the NCITS T11 Web site at http://www.t11.org/.
344
Table B.1: 1900EN commands mapped to 5000 commands. 1900EN IOSBased Switch description <description_string> Description Configures the port name Sets the port duplex Set/ClearBased Switch set port name <modnumber> <description> set port duplex <half|full> set password set enablepass set prompt <name> set interface sc0 <ip_address><netmask> set port speed <mod/number> <10|100|auto> set system name <name> clear trunk <mod/num> <vlan_range> set spantree disable <mod|number>
duplex <auto|full|fullflowcontrol|half> <mod|number> enable password level 1 <password> Sets the switch password enable password level 15 <password> Sets the enable password hostname <name> Sets the prompt/hostname ip address <ip_address> <netmask> Sets the IP address N/A Sets the port speed N/A Sets the system name no trunkvlan <vlan_range> Clears a trunk port no spantree <vlanlist> Disables SpanningTree Protocol (STP) portchannel mode Sets the port <on|off|auto|desirable> channel mode show interface<type><mod|port> Shows the port configuration show ip Shows the configured IP address show runningconfig Shows the running configuration show spantree <vlan> Shows the spanningtree configuration show uplinkfast Shows the UplinkFast 345
set port channel <mod|number> <on|off|auto|desirable> show port <mod/number> show interface
show config
spantree <vlanlist> spantree cost <costvalue> spantree priority <priorityvalue> spantree startforwarding spantreetemplate spantreetemplate spantreetemplate uplinkfast trunk <on|off|desirable|auto|nonegotiate> vlan <vlan_number> name <vlan_name> vlanmembership static <vlan> vtp <mode>
configuration Shows the VLAN show vlan configuration Shows the VLAN show vtp domain Trunking Protocol (VTP) configuration Configures STP set spantree enable <mod/number> hello <hellotime> Configures the set spantree portcost <mod/number cost> port cost Configures the set spantree portpri <mod/number><priority> port priority Enables PortFast set spantree portfast <mod/number> enable Sets the set spantree fwddelay [vlan] delayvalue FwdDelay timer Sets the STP timer set spantree hello <interval> HelloTime Sets the MaxAge set spantree maxage agingtime [vlan] time timer Enables set spantree uplinkfast enable UplinkFast Configures the set trunk <mod/num> trunk port <on|off|desirable|auto|nonegotiate> Configures the set vlan <vlan_num> name <vlan_name> VLAN name Assigns a port to set vlan <vlan_num> a VLAN <mod/number> set vtp mode <mode> Configures the VTP mode: Transparent, Server, or Client Configures the set vtp domain <name> VTP domain Configures the set vtp passwd <password> VTP domain password
346
Establishing Credibility
There are many ways you can project a good degree of credibility with your customer. Here are a few suggestions: Wear the proper attire. Come prepared. Make the customer feel like theyre important to you. Show your certifications. When you first meet the prospective customer, its a good idea to wear your company attire (a logo shirt and slacks). If the company doesnt have a standard outfit, make sure you make your first impression (depending on your gender) in a white shirt, tie, and slacks or a blouse, slacks or a dress. (Wearing tennis shoes is not a good complement to this attire.) Take a current price list, including all the latest Cisco devices, their basic abilities, available modules, and prices. (Knowing the products will help you price things correctly, as well.) Almost every Cisco device has modules, cards, power supplies, and other accessories you can purchase separately, By the waythis Black Book is a great item to carry in your bag!
347
Make sure you are on time for your first appointment with the customer. Turn off your cellular phone (let voice mail be useful for once) and put your pager on vibrate. You want to project to the customer that he or she is the most important person in the world at that moment. No one wants to buy something from someone who frustrates them by answering a cellular phone or pager every five minutes. Put your certifications on your business card. You need to show the customer that you are a skilled network consultant, and nothing does that better than industryrecognized certifications such as those Cisco has to offer. Displaying at least a CCNA or CCDA on your card projects to the customer that you are a proven professional in the industry. Although your peers may know that a CCNA is entry level, to the customer (who has no technical ability) you have a networking black belt. (Of course, I have found that writing a book on the subject never hurt, either!) You need to keep your certifications currentand never lie about them. It is too easy for any business entity to do a quick check and see if you are who you say you are. If you dont have any certifications, you should hit the books, take a class, and get certified. One of the students in my class a few weeks ago put it this way: I am taking your class because getting a Cisco certification is just like printing truckloads of money! And in many ways, he is right.
Designing a Solution
When you finally get the chance to make a proposal, you need to design a solution. Many pieces of software are available from Cisco to help you in the design process. If you dont have access to this software or you need to make the proposal at the customers site, a Web page is dedicated to this task on the Cisco Connection Online (CCO) site. You need to imagine and draw every piece of the network you are designing. If you forget to include every cable youll need, you will be in trouble. As you know, Cisco devices and cabling are quite expensive. I like to draw a diagram of the building, placing a picture of every piece of equipment and every cable I will need. Doing so will help you decide on the modules you will need in the switches as well as the number of specific ports. Dont forget to look at the aggregate bandwidth of all the ports on the switches. Remember, the amount of bandwidth that can be sent on all these ports may be more than the trunk links can handle, if the correct network design is not implemented. When submitting a proposal, keep in mind that you should actually make two proposals: one that includes the equipment needed to handle the immediate and shortterm solutions and another that covers both the immediate and longterm solutions. In the proposal, you might want to explain the term forklift upgrades 348
(briefly, this term refers to the fact that buying equipment correctly up front will be significantly cheaper than upgrading individual components later when it becomes necessary). Customers may not want to invest more money than they have to in the short term, but sometimes they willand you wind up making a much bigger sale. Occasionally, your customers will find wisdom in investing in the future.
The last thing you should do is place an expiration date on the proposal. Equipment costs change, and so do your time constraints. Usually I make mine good for 90 days. This limit gives the customer plenty of time review the proposal and come to a decision.
349
Contracting
When you first go into business as a consultant, you should have a contract that is created by an attorney and authorized by your insurance carrier. Once you have the contract in a wordprocessing document form that outlines your liabilities and those of the customer, you can modify the contract to suit each individual customer. The investment is worth itnot just in case you are ever in a legal bind, but because good contracts help keep you out of a legal bind. Make sure that the contract restates your deadlines, because the period between the time the proposal was made and approved may have been quite lengthy. During that period, your time constraints or the availability of the equipment may have changed. Other than making sure that the person who signs your contract is authorized to do so, youre ready. After the contracts are signed, sealed, and delivered, go to work!
would only be there a week or so. The first day the contractor showed up, we gave him the initial payment for his work. He did a great day of work, removing the old flooring, vents, cabinets, toilet, and other fixtures. He said he would be back the next day to work some morebut the next day came and went, and he failed to show up. I called him, and he said a personal situation had come up and he was unable to make it. He assured me he would be there the next day to get most of the work done. The next day he showed up, worked about an hour, and then left, saying nothing. I could tell by the quality of his work that he was rushed and in a hurry to be somewhere else instead of where he was paid to be. This went on for daysthe contractor either didnt show up on time, didnt come at all, or worked a short period and disappeared. My wife finally told me that we needed to find someone else. Because I was the one who had been calling and getting a different excuse every time, I called the contractor and warned him that we were getting upset. He returned the next day, worked for quite some time, and then again returned to his habit of not showing up. After three weeks, my wife demanded that we get someone else to finish the job. She was tired of having mirrors and cabinets sitting in the hallway. The following day, I called the contractor, informed him that he would no longer be allowed in our home, and told him we would hire someone else to complete the job he had started.
Conclusion
As a consultant, you must remember to manage your time and yourself. You are your own project manager. In fact, not only are you the project manager, you are the employee who is going to do the work. Youll probably make many mistakes in the beginningbut, I hope, none that cant be overcome. Ill leave you with one last quote that I like: Experience is a tough teacher. You get the test first; then youre going to learn the lesson. I am not sure who wrote it, but it sure does make a good point.
352
Required Equipment
To complete this lab, you will need: One Cisco Catalyst 5000 (Cisco 2926G, 2948G, 2980G, 5002, 5500, 5505, 5509, 6006, 6009, 6506, or 6509 are great Set/Clear commandbased IOS substitutes). One Supervisor Engine III Module for the Cisco Catalyst 5000 running IOS version 5.5(2), as shown here in my show version output:
Catalyst5000> (enable) show version WSC5000 Software, Version Copyright (c) 19952000 by NMP S/W compiled on Jul 28 MCP S/W compiled on Jul 28 McpSW: 5.5(2) NmpSW: 5.5(2) Cisco Systems 2000, 16:43:52 2000, 16:38:40
System Bootstrap Version: 3.1.2 Hardware Version: 2.0 Model: WSC5000 Serial #: 011454261 Mod Port Model Serial # Versions 1 0 WSX5530 011454261 Hw : 2.0 Fw : 3.1.2 Fw1: 4.2(1) Sw : 5.5(2) WSF5521 011455134 Hw : 1.1 2 24 WSX5225R 013405523 Hw : 3.1 Fw : 4.3(1) Sw : 5.5(2) DRAM FLASH NVRAM Module Total Used Free Total Used Free Total Used Free 1 32640K 20331K 12309K 8192K 5548K 2644K 512K 185K 327K Uptime is 2 days, 19 hours, 3 minutes Catalyst5000> (enable)
One 24port 10/100BaseTX module, as shown in the following show module output (you can substitute any 10/00 Ethernet module):
Catalyst5000> (enable) show module Mod Slot Ports ModuleType 1 1 0 Supervisor III 2 2 24 10/100BaseTX Ethernet Mod ModuleName 1 2 SerialNum 00011454261 00013405523 Model WSX5530 WSX5225R Sub yes no Status ok ok
353
Mod MACAddress(es) 1 0050bda0b000 to 0050bda0b3ff 2 00500fb7ff50 to 00500fb7ff67 Mod SubType SubModel SubSerial SubHw 1 NFFC WSF5521 0011455134 1.1 Catalyst5000> (enable)
Hw 2.0 3.1
Fw 3.1.2 4.3(1)
Sw 5.5(2) 5.5(2)
One Cisco 1912EN using version 9 of the Catalyst IOS, as shown here (1924EN, 2822, or 2828 are great Access layer substitutes with Enterprise Network Edition of the CLIbased IOS):
1912EN#show version Cisco Catalyst 1900/2820 Enterprise Edition Software Version V9.00.00 Copyright (c) Cisco Systems, Inc. 19931999 1912EN uptime is 9day(s) 10hour(s) 26minute(s) 36second(s) Cisco Catalyst 1900 (486sxl) processor with 2048K/1024K bytes of memory Hardware board revision is 5 Upgrade Status: No upgrade currently in progress. Config File Status: No configuration upload/download is in progress 15 Fixed Ethernet/IEEE 802.3 interface(s) Base Ethernet Address: 003080546C00
One Cisco 2600 router. (Any Cisco router from the 2600 series through the 7000 series will work fine as a substitute as long as it has at least two 10/100 Ethernet ports. A 10Mbps attachment unit interface [AUI] port will not work, because InterSwitch Link [ISL] needs to use a 100BaseTX port for optimum trunking support.) Note For this lab, the Cisco 2620 series router has been previously configured with its basic configuration. Two Ethernet crossover cables to run between devices. One console cable and connector.
Lab Objectives
During this lab, you will complete the following tasks: Configure the basic switch configuration on the Cisco 1912EN. Configure the basic passwords, the hostname, and IP information. Set up three VLANs: VLAN 2, named CAD; VLAN 3, named Graphics; and VLAN 4, named DocProduction. Configure the basic switch configuration on the Cisco Catalyst 5000. Configure the basic passwords, the hostname, and IP information. Enable trunking on port f0/27 on the 1912EN to trunk to port 2/2 on the Cisco Catalyst 5000 using Dynamic ISL (DISL) on the 1912EN side and ISL on the Catalyst 5000 side. Create a trunk port on the Catalyst 5000 port 2/24 to the Fast Ethernet 0/2 interface on the 2600 router using ISL. Enable a VLAN Trunking Protocol (VTP) domain named Coriolis. Make the 1912EN a VTP server and the Catalyst 5000 a client in order to propagate the 1912ENs VLAN configuration. The diagram shown in Figure D.1 illustrates the configuration.
354
Possible Solution
More than one solution exists to any problem; however, here is the suggested solution to configuring the Cisco Catalyst 1912EN, the Cisco Catalyst 5000, and the Cisco 2620 trunked interface.
2. Just like on a router, enter the conf terminal command to configure an interface:
#conf terminal
355
1912EN(config)# enable password level ? <115> Level number 1912EN(config)# enable password level 1 coriolis1 1912EN(config)# enable password level 15 coriolis2 1912EN (config)# enable secret coriolispass
5. Enter Interface Configuration mode to configure the Fast Ethernet 0/27 port on the 1912EN. Enter the switchs IP address and the default gateway (router):
(config)# interface f0/27 (configif)#ip address 63.78.39.164 255.255.255.0 (config)# 1912EN(config)#ip defaultgateway 63.78.39.254 1912EN(config)#
8. Assign the VLAN number that matches the Ethernet port number on the front of the switch:
1912EN#config terminal Enter configuration commands, one per line. End with CNTL/Z. 1912EN(config)#interface e0/2 1912EN(configif)#vlanmembership static ? <11005> ISL VLAN index 1912EN(configif)#vlanmembership static 2 1912EN(confiif)# exit 1912EN(config)#interface e0/3 1912EN(configif)#vlanmembership static 3 1912EN(confiif)# exit 1912EN(config)#interface e0/4 1912EN(configif)#vlanmembership static 4 1912EN(configif)#exit
9. Enable this device to be a VTP server for the Coriolis VTP domain:
1912EN(config)#vtp ? client VTP client domain Set VTP domain name password Set VTP password pruning VTP pruning server VTP server transparent VTP transparent trap VTP trap 1912EN(config)#vtp domain ? WORD Name of the VTP management domain
356
Note The configuration on the 1912EN is saved automatically, so you do not need to save the configuration.
3. Configure a password for the switch. Press Enter for the old password if none has ever been configured:
Catalyst5000> (enable) set password Enter old password: Enter new password: coriolis1 Retype new password: coriolis1 Password changed.
4. Configure the password for Enable mode. Press Enter for the old password if none has ever been configured:
Catalyst5000> (enable) set enablepass Enter old password: Enter new password: coriolis2 Retype new password: coriolis2 Password changed. Catalyst5000(enable)
5. Enter the IP address and the default gateway (router) for the switch. The switch must be configured on the SC0 interface:
Catalyst5000> (enable) set interface sc0 63.78.39.174 255.255.255.0 Interface sc0 IP address and netmask set. Catalyst5000> (enable) set ip route default 38.68.127.254 Route added.
6. Enable trunking on interface 2/2 to complete your trunk link to the 1912EN switch and on interface 2/24 to the router for interVLAN routing:
Catalyst5000> (enable) set trunk 2/2 mode on isl Port(s) 2/2 trunk mode set to on. Port(s) 2/2 trunk type set to isl. 2000 Oct 19 12:31:54 %DTP5TRUNKPORTON:Port 2/2 Catalyst5000> (enable) set trunk 2/24 mode on isl
357
Port(s) 2/24 trunk mode set to on. Port(s) 2/24 trunk type set to isl. 2000 Oct 19 12:32:46 %DTP5TRUNKPORTON:Port 2/24
7. Enable this switch to be a VTP client for the Coriolis VTP domain. By doing this step you will propagate VLAN information to and from the 1912EN switch:
Catalyst5000> (enable) set vtp domain ? Usage: set vtp [domain <name>] [mode <mode>] [passwd <passwd>] [pruning <enable|disable>] [v2 <enable|disable> (mode = client|server|transparent Use passwd 0 to clear vtp password) Usage: set vtp pruneeligible <vlans> (vlans = 2..1000 An example of vlans is 210,1000) Catalyst5000> (enable) set vtp domain Coriolis mode client VTP domain Coriolis modified
2. Create a subinterface for each VLAN. Assign a description (optional), an IP address for the VLAN, and an encapsulation type, as well as the VLAN number:
Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confip)# Cisco2621(confif)# Cisco2621(confif)# Cisco2621(confif)# interface fastethernet 0/2.2 description vlan2 ip address 63.78.39.2 255.255.255.0 encapsulation isl 2 interface fastethernet 0/2.3 description vlan3 ip address 63.78.39.3 255.255.255.0 encapsulation isl 3 interface fastethernet 0/2.4 description vlan4 ip address 63.78.39.4 255.255.255.0 encapsulation isl 4
Note
Dont forget to save your configurations. Use the show config command on each device to verify the configurations.
358
Table E.1: Features available for the Cisco Catalyst 1912 and Catalyst 1924. Feature Ports Backplane Processor Flash DRAM Forwarding rate Max MAC addresses 1912 12 1Gbps 80486 CPU 1MB 2MB 370 pps 1,024 1924 24 1Gbps 80486 CPU 1MB 2MB 370 pps 2,048
359
Table E.2: Features available for the Cisco Catalyst 2822 and Catalyst 2828. Feature Ports Backplane Processor Flash DRAM Forwarding rate 2822 24 1Gbps 80486 CPU 1MB 2MB 370 pps 2828 24 1Gbps 80486 CPU 1MB 2MB 370 pps
Table E.3: The models and features available for the standard version of each Cisco Catalyst 2900 XL series switch. Feature 2908 XL 2912 MFXL 2916 XL 2924 MXL 2924 CXL 10/100 ports 8 0 16 24 22 100BaseFX ports 0 12 0 0 2 Expansion slots 0 2 0 2 0 Enterprise Yes Yes Yes Yes Yes Edition Standard Edition Yes No Yes Yes Yes Backplane 3.2Gbps 3.2Gbps 3.2Gbps 3.2Gbps 3.2Gbps Flash 4MB 4MB 4MB 4MB 4MB DRAM 8MB 8MB 8MB 8MB 8MB Modularity No Yes Yes Yes No Forwarding rate 3 million pps 3 million pps 3 million pps 3 million pps 3 million pps Max VLANs 64 64 64 64 64 The Cisco Catalyst 2926 and the 2948G are both similar to the architecture of the Cisco Catalyst 5000 series. These switches are storeandforward mode switches with many highend features: A highperformance 24Gbps nonblocking architecture switching fabric capable of delivering over 1 million packets per second (pps). The capability for users to configure each port with priority levels to accommodate timesensitive applications such as voice and video. Support of Fast EtherChannel (FEC) uplink bundles for up to 400Mbps on the Catalyst 2926T and 2926F. The Catalyst 2926GS and 2926GL each support uplinks of up to 800Mbps. These FEC ports can be configured between two switches, two routers, or a switch and a router. Special configurations and Network Interface Cards (NICs) also allow a server to be configured with FEC uplinks to a router or switch. This ability results in a very efficient highspeed backbone and data center uplinks with automatic load balancing and failover for port failures. Support for RMON statistics, which give a good picture of network activity in the form of statistics, history, events, and alarms groups. Support for VLAN loadbalancing and SpanningTree on multiple parallel Fast Ethernet ISL trunks to increase capacity and fault tolerance between switches. Support for ISL, Dynamic InterSwitch Link (DISL), CDP, VLAN Trunk Protocol (VTP), VLAN Membership Policy Server (VMPS), Dynamic VLANs, and port security based on the MAC address. Support for complete SNMP management for Ethernet Management Information Base (MIB), bridge MIB, MIB II, and VTP. Support for management with CWSI, CiscoView, TrafficDirector, and VlanDirector. The 2948G supports advanced scalability for Fast EtherChannel, Dynamic VLANs, and 802.1Q trunking and bandwidth control using Quality of Service (QoS) features such as protocol filtering, link load balancing, perport security, TACACS+ authentication, and IP permit lists. The hardware features available for the Cisco Catalyst 2900 series switches are listed in Table E.4.
Table E.4: The models and features available for the standard version of the Cisco Catalyst 2926, 2948G, and 2980G switches. Feature 10/100 ports 100MB FE Gb ports 2926T/F 24 2 0 2926GS/GL 24 0 2 2948G 48 0 2 2980G 80 0 2
361
Expansion slots Enterprise Edition Standard Edition Backplane Flash RAM Modularity Forwarding rate Max VLANs
Table E.5: The key features of the Cisco Catalyst 3000 series switches. Feature 10BaseT ports Flex slots Expansion slots Max VLANs 3000 16 0 0 1,700 3100 24 1 1 1,700 3200 0 1 7 1,700
Gigabit Ethernet ports for GBIC Ethernet aggregation. It also has builtin support for Voice Over IP telephony, in addition to builtin support for up to 250 portbased VLANs and ISL VTP. In addition, the 3500 series supports many of the features of the 1900 and 2900 series, such as DNS and DHCP. The series is offered in both Standard and Enterprise Editions. Table E.6 shows the features of the Catalyst 3500 series.
Table E.6: The Cisco Catalyst 3500 series key switching features. Feature 10/100 ports GBIC ports Enterprise Edition Standard Edition Backplane Flash DRAM Stackable Forwarding Rate 3512 12 2 Yes Yes 10.8Gbps 4MB 8MB Yes 4.8 million pps 3524 24 2 Yes Yes 10.8Gbps 4MB 8MB Yes 6.5 million pps 3548 48 2 Yes Yes 10.8Gbps 4MB 16MB Yes 8.8 million pps 3508 0 8 Yes Yes 10Gbps 4MB 8MB Yes 7.5 million pps
Key Features and Benefits The Catalyst 3900 has the following features: Twenty shielded Token Ring ports for 150ohm shielded twisted pair (STP) or 100ohm unshielded twisted pair (UTP) connectivity FlexSlot accommodating two expansion modules or one doublewide module for future expansion Ninepin EIA/TIA232 interface for local console or modem connectivity Automatic 4, 16, and 32Mbps speed adaptation TokenChannel switch interconnect MAC address and protocol (DSAP/SNAP) filters IEEE and IBM SpanningTree Protocol The Catalyst 3920 provides the following features: Twentyfour shielded Token Ring ports for 150ohm STP or 100ohm UTP connectivity Ninepin EIA/TIA232 interface for local console or modem connectivity Automatic 4, 16 and 32Mbps speed adaptation TokenChannel switch interconnect MAC address and protocol (DSAP/SNAP) filters SpanningTree Protocol When you need to upgrade the Catalyst 3900 or 3920 IOS, you can do so by using the same serial port that is used for configuration. You can upgrade code by using Trivial File Transfer Protocol (TFTP) from a TFTP server or uploaded through the workstation using HyperTerminal. Table E.7 shows key features of the Catalyst 3900 series.
Table E.7: The key features of the Cisco Catalyst 3900 series. Feature Ports Stack slot Expansion slots Backplane Processor DRAM Stackable 3900 20/24/28 1 1 FlexSlot 520Mbps Intel 960SA Up to 8MB Yes 3920 24 1 None 520Mbps Intel 960SA Up to 8MB Yes
364
Table E.8: Catalyst 4000 series key features. Feature Slots Max ports Max MAC addresses Max VLANs Backplane 4003 3 96 16,000 1,024 24Gbps 4006 6 240 16,000 1,024 60Gpbs 4908G Fixed 8 16,000 1,024 22Gbps 4912G Fixed 12 16,000 1,024 24Gbps
configuration across all switches Support for all advanced switching features of the Cisco IOS software Support for advanced multicasting with CGMP The Catalyst 5000 series of switches uses an architecture based on Supervisor Engines I, II, and III. The Supervisor Engine provides network management and uplink ports. The Supervisor Engine II uses a fixed configuration, but it supports Fast EtherChannel technology on all uplink ports. The Supervisor Engine III module can be deployed in any Catalyst chassis. In a Catalyst 5500, 5505, or 5509, the Supervisor Engine III enables the 3.6Gbps crossbar fabric. The Supervisor Engine III also has modular uplinks, with Fast EtherChannel and Gigabit Ethernet support. NetFlow LAN Switching provides multilayer switching for the Catalyst 5000 series. It is supported through the NetFlow feature card, an upgrade that is available for Supervisor Engine III. Table E.9 shows the key features of the Catalyst 5000 family of switches.
Table E.9: The key features of the Catalyst 5000 family of switches. Feature 5000 5002 5500 5505 5509 Modular slots 5 2 13 5 9 Backplane 1.2Gbps 1.2Gbps 3.6Gbps 3.6Gbps 3.6Gbps Forwarding rate 1 million pps 3 million pps 25 million pps 25 million pps 25 million pps Max VLANs 1,000 1,000 1,000 1,000 1,000 Table E.10 shows the switching modules, the ports available for each module, and the maximum allowable ports on each switch chassis.
Table E.10: Catalyst 5000 family port densities for each switch chassis. Switching Module Ports Supported per Module Max Ports per Chassis 5002 5000 5505 3 20 20 48 192 192 48 192 192 24 96 96 12 48 48 24 96 96 26 98 98
Gigabit Ethernet 2, 3, 9 GroupSwitched 48 10BaseT Ethernet 24/48 Switched 10BaseT 24/48 Switched 10BaseFL 12 GroupSwitched 24 Switched 12/24 10/100BaseTX Switched 24 26 98 98 194 266 10/100BaseTX Switched 100BaseFX 12 12 50 50 98 134 ATM Uplink 1 (dualPHY) 1 4 4 7 7 CDDI/FDDI 1 1 4 4 8 11 The Catalyst 5000 series has many switching modules that have made it popular for highdensity wiring closets and data center connectivity. These switching modules provide the ability to have a high port density for connectivity to the desktop, in addition to a highspeed uplink.
switching in distribution and serveraggregation environments. The Catalyst 6000 family complements the Catalyst 5000 series and 8500 series switches. The Catalyst 6000 family is capable of scaling bandwidth from T1 to OC192 in the WAN/MAN, and from Ethernet to 10 Gigabit Ethernet in the LAN. The Catalyst 6000 series uses a Cisco IOS software base with ASICs to deliver wirespeed traffic management services endtoend. The Catalyst 6000 series also offers a range of WAN/MAN protocols and media, as well as future scalability for direct analog and digital connectivity to existing voice infrastructures, to allow easy migration from existing networks to highspeed converged LAN/WAN/MAN networks and Voice Over IP architectures. The Catalyst 6000 and 6500 series switches offer multilayer services using interchangeable line cards. The first of these cards is the PFC, which is an integral part of the CiscoAssure endtoend QoS and policybased security solution. The PFC can identify user applications and classify traffic with the appropriate priority level. For example, a video conferencing packet can be given higher priority than, say, a Web page request. The second of these services is the MSFC, which, in combination with the PFC, provides 15 million pps of forwarding performance for IP, IPX, and IP Multicast traffic. The MSFC also supports Hot Standby Routing Protocol (HSRP) for routing redundancy between MSFCs in the same chassis, across Catalyst 6000 family switches, or between a Catalyst 6000 series switch and a standalone Cisco router. The MSFC also supports trafficstatistics collection and accounting with no impact on switching performance. In addition, Cisco offers the FlexWAN module, which accepts up to two Cisco 7200/7500 series WAN port adapters, supporting asynchronous and synchronous serial interfaces at speeds from 56Kbps to 155Mbps. The FlexWAN module provides native support of the Frame Relay, ATM, Packet over SONET (PoS), PointtoPoint Protocol (PPP), and HighLevel Data Link Control (HDLC) protocols along with a range of interfaces, including T1/E1, T3/E3, HighSpeed Serial Interface (HSSI), and OC3. Up to eight FlexWAN modules are supported in a Catalyst 6000 family switch. However, this module does not support modules for Ethernet, Token Ring, FDDI, channel port adapters, encryption service modules, compression service modules, and doublewide port adapters. Table E.11 shows the key features of the Catalyst 6000 series.
Table E.11: The key features of the Cisco Catalyst 6000 family. Feature Backplane Forwarding rate Modular slots Max Gigabit ports Max 100FX ports Max 10/100 ports Max 10BaseFL Max ATM Max VLANs 6006 32Gbps 15 million pps 6 130 192 240 192 8 1,000 6009 32Gbps 15 million pps 9 130 192 384 192 8 1,000 6506 256Gbps 150 million pps 6 130 130 240 192 8 1,000 6509 256Gbps 150 million pps 9 130 130 384 192 8 1,000
Catalyst 8400 series Catalyst 8500 series BPX 8600 series MGX 8800 series Catalyst 12000 series Note Cisco considers the Catalyst 5500 and the Catalyst 6500 series switches as versatile Distribution and Core layer switches.
LowDelay, CodeExcited Linear Prediction (LDCELP) at 16Kbps ConjugateStructured, Algebraic CodeExcited Linear Prediction (CSACELP) at 8Kbps The IGX voice interfaces also support the VAD silence suppression technique, which sends cells on the trunk only when there is something to send. With most voice connections consisting of up to 60 percent silence, VAD technology enables the IGX 8400 series to achieve an average twotoone compression ratio, thus saving additional bandwidth. When combined with ADPCM, LDCELP, or CSACELP compression schemes, VAD enables you to achieve compression ratios beyond eight to one. In addition, the voice interfaces support fax and modem data transport. For Group 3 fax, the Universal Voice Module supports Fax Relay, whereby it demodulates and remodulates the signal and transports a fax across the network using only 9.6Kbps of network capacity. The Catalyst 8400 series also supports voice switching capabilities using the Voice Network Switching (VNS) system. VNS enables a Catalyst 8400 network to function as a tandem voice network that receives signaling, interprets it, and dynamically establishes voice connections between the source and destination ports. The network routes each voice channel on a percall basis and extends advanced voice features (such as transfer, caller ID, and campon) across the widearea network. With VNS, available trunk capacity can be dynamically used by bandwidthhungry data applications, thus maximizing the efficiency of available network resources. The network ensures an optimal connection for each call, reducing delay and improving voice quality by minimizing compression cycles. IGX 8400 series circuit data capabilities enable synchronous or asynchronous legacy data or video to be transported across the WAN through a fixeddelay, fixedthroughput, zero discard, or pointtopoint data connection. Available speeds range from 1.2Kbps to T1/E1 for synchronous data and from 1.2Kbps to 19.2Kbps for asynchronous data using standard serial interfaces such as V.28/RS232, V.11/X.21, V.35, EIA/TIA449, and T1/E1. A network of Catalyst multiservice ATM switches can be deployed with a variety of trunk interfaces and speeds ranging from 64Kbps to OC3/STM1. Network Management The Catalyst 8400 can be managed using the CiscoView GUI management tool or Cisco Strata View Plus for integration with NetView or HP OpenView. The Strata View Plus software also provides management applications using SNMP, application programming interfaces (APIs), and SQLbased API for database inquiries.
369
Table E.12: The key features of the Cisco Catalyst 8510 and 8540. Feature Modular slots Forwarding rate Backplane 8510 5 6 million pps 10Gbps 8540 13 24 million pps 40Gbps
370
371
The MGX 8800 RPM also supports MPLS. It can act as a label edge router or label switch router. It also supports MPLSVPNs via mulitprotocol BGP extentions, VPN routetarget extended BGP community attributes, MPLS forwarding across backbone, and multiple routing/forwarding instances on the provider edge router. As mentioned earlier, the Route Processor Module has an ATM deluxe port adaptor interface to the chassis backplane. Advanced traffic management features are as follows: ATM service classes: nrtVBR, ABR, and UBR Traffic shaping (per VC) Highperformance architecture Extended VC capabilities Up to 4,096 VCs Up to 200 concurrent segmentation and reassemblies (SARs) ATM adaptation layer 5 (AAL5) for data traffic Advanced traffic management mechanisms in the ATM port adaptor (PA) architecture allow for the support of bursty, client/server traffic, while supporting applications that require guaranteed or besteffort service. The ATM PA traffic management capabilitiesbased on ATM Forum specificationssurpass those of any existing ATM interface in highend routers.
512K configuration nonvolitile RAM (NVRAM) 8MB boot flash Two PC Card Type II software upgrades Ethernet (RJ45 and MII connectors) for network management access Local console and modem ports (DB25/EIA/TIA232c) The GRP provides the following key functions: Processes interior gateway protocols (IGPs) such as Intermediate SystemtoIntermediate System (ISIS), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), and Enhanced IGRP (EIGRP) to determine the network topology Processes external gateway protocols (EGPs) such as Border Gateway Protocol (BGP) Creates and maintains the routing table (up to 1 million route entries) Distributes and updates Express Forwarding (EF) tables on the LCs and maintains copies of the tables of each LC for card initialization Handles general maintenance functions such as diagnostics, console support, and LC monitoring Processes inband management through Simple Network Management Protocol (SNMP), Management Information Base (MIB), Telnet, Bootstrap Protocol (BOOTP), and Trivial File Transfer Protocol (TFTP)
A
Access layer In the campus hierarchical model, the layer where the workstation connects to the network. Hubs or switches reside at this layer, and workgroups access the network here. access link The users entry point into the switched network. This link connects the NIC in the users local resource to a switch or other device such as a bridge or hub that in turn connects to the network backbone or higherlayer switches and routers. access list A security feature used with the Cisco IOS to filter traffic types as part of data routing. Access lists are also used to filter traffic between different VLAN numbers. active route processor (activeRP) The active router or route process in HSRP that is currently handling routing decisions and discovering routes for the attached segments. address A set of numbers, usually expressed in binary format, used to identify and locate a resource or device on a network. address filter A feature of the Cisco Catalyst 3000 series. It is a way of using Layer 2 MAC addresses or switching ports to filter traffic. This process allows you to filter traffic and restrict access without the use of VLANs. It uses a process similar to access lists on the Cisco IOS. However, you can apply multiple address filters to the same interface. Address Resolution Protocol (ARP) The protocol used to map the IP address to the MAC address. adjacency table Works with the FIB and the CEF ASIC to keep a table of nodes that are adjacent to or within a single hop of the switch. CEF uses the adjacency table to prepend Layer 2 address table information. administrator A person responsible for the control and security of the user accounts, resources, and data flow on the network. All Routes Explorer (ARE) On a Token Ring network, if the node of destination is not found on the local network segment, an ARE frame is sent to all the bridges. Each bridge receiving an ARE updates the frame with a RIF and 373
then forwards the frame out all the ports. American National Standards Institute (ANSI) The organization that publishes standards for communications, programming languages, and networking. ANDing The process of comparing the bits of an IP address with the bits in a subnet mask to determine how a packet will be handled. anycast address An address used in ATM for shared multipleend systems. An anycast address allows a frame to be sent to specific groups of hosts. Application layer The layer of the OSI model that provides support for end users and for application programs using network resources. ApplicationSpecific Integrated Circuit (ASIC) A feature of many LAN controllers. ASICs are internal to the switch. They work in conjunction with the internal processor to make Layer 2 forwarding decisions. However, they lack the ability to make flexible softwareimplemented forwarding decisions. Their ability to perform small tasks quickly and inexpensively makes them a key in the switching process. ASICs used in Cisco switches and routers are the Phoenix, FE, LMA, PFPA, SAMBA, SAGE, SAINT, and CEF. Asymmetric Digital Subscriber Line (ADSL) A service that transmits digital voice and data over existing (analog) phone lines. Asynchronous Transfer Mode (ATM) An international standard originally developed by the International Telecommunications Union Telecommunication Standardization Sector (ITUT), used in highspeed transmission media such as E3, Synchronous Optical Network (SONET), and T3 for cell relay. It can be used in multiple service types such as voice, video, or data, and its sent in fixedlength, 53byte cells. ATM has become common on todays corporate networks. It guarantees throughput and minimizes delay. It can provide scalable speeds up to multiple gigabits per second. Asynchronous Transmission Synchronization (ATS) A process used in serial data transfer in which a start bit and a stop bit are added so the receiving station knows when a particular bit has been transferred. Also known as bit synchronization. ATM Adaptation layer (AAL) The ATM layer that adapts data to the ATM 48byte payload. There are a number of adaptations to this layer, such as AAL1, AAL2, AAL3/4, and AAL5. AAL5 is by far the most common in todays networks. AAL5 defines how data from a node on the network such as a PC or server handles ATM cells. It is also used by Cisco Catalyst switches with LANE to perform segmentation and reassembly of ATM frames into cells and cells into frames. ATM System Processor (ASP) A Cisco ATM cellswitching processing card, located on the Cisco Catalyst 5500 chassis or slot 2 on the LS1010 chassis. attachment unit interface (AUI) IEEE 802.3 specification used between a Multistation Access Unit (MAU) and a NIC. attachment unit interface (AUI) connector A 15pin Dtype connector sometimes used with Ethernet connections. attenuation The loss of signal that is experienced as data is transmitted across network media. Automated Packet Recognition and Translation (APaRT) A FDDI line module feature found on Cisco Catalyst 2820 and 5000 series switches that allows for the automatic detection of frame types with translational bridging. It uses the CAM table to get the frametype information for all end nodes.
374
B
backbone A highcapacity infrastructure system that provides optimal transport on a LAN. Typically in a LAN, the data running from router to router, switch to switch, or switch to router is transported through a faster physical topology than the rest of the local area or virtual LAN devices. The physical cable is called the backbone. BackboneFast Initiated when a root port or blocked port receives an inferior BPDU from its designated bridge. It allows the secondary or backup port to immediately begin forwarding after a link fault with the root link. BackboneFast bypasses the MaxAge timer. backplane Similar to the motherboard in a PC. The backplane is the primary data/control bus located on a Cisco Catalyst switch. It interconnects all the modules inside the switch chassis. bandwidth The rated throughput capacity of a given network protocol or medium. base bandwidth The difference between the lowest and highest frequencies available for network signals. The term is also used to describe the rated throughput capacity of a given network protocol or medium. Basic Rate Interface (BRI) An ISDN digital communications line that consists of three independent channels: two Bearer (or B) channels, each at 64Kbps, and one Data (or D) channel at 16Kbps. ISDN BRI is often referred to as 2B+D. baud rate The speed or rate of signal transfer. This term is named after French telegraphy expert J. M. Baudot. binary A Base 2 numbering system, characterized by 1s and 0s, used in digital signaling. binding The process of associating a protocol and a NIC. bit An electronic digit used in the binary numbering system. blackout A total loss of electrical power. blocking architecture A condition in which the total bandwidth of the ports is greater than the capacity of the switching fabric. bridge A device that connects and passes packets between two network segments that use the same communications protocol. Bridges operate at the Data Link layer of the OSI Reference Model. A bridge filters, forwards, or floods an incoming frame based on the MAC address of that frame. Bridge Protocol Data Unit (BPDU) A multicast frame generated by the switch that carries information about itself and changes in the network topology. bridging address table A list of MAC addresses kept by bridges and used when packets are received to determine which segment the destination address is on before sending the packet to the next interface or dropping the packet if it is on the same segment as the sending node. broadband A communications strategy that uses analog signaling over multiple communications channels. Broadband Interexchange Carrier Interconnect (BICI) An interface that connects two ATM carriers. broadcast A packet delivery system in which a copy of a packet is given to all hosts attached to the network. broadcast domain In a noneswitched network, all the devices that can receive a broadcast from one machine in the network sent on the physical wire. The broadcast domain is a segment not separated by a Layer 3 375
device or Layer 2 device that can filter broadcasts. On a switched network using VLANs, the broadcast domain is all the ports or collision domains that belong to the same VLAN. broadcast storm Occurs when broadcasts throughout the LAN become so numerous that they use up all the available bandwidth, thus grinding the network to a halt. brouter A device that can be used to combine the benefits of both routers and bridges. Its commonly used to route routable protocols at the Network layer and to bridge nonroutable protocols at the Data Link layer. brownout A shortterm decrease in the voltage level, usually caused by the startup demands of other electrical devices. bus A path used by electrical signals to travel between the CPU and the attached hardware. bus mastering A bus accessing method in which the NIC takes control of the bus in order to send data through the bus directly to the system memory, bypassing the CPU. bus topology A linear LAN architecture that uses a common cable with multipoint connections for the flow of data in a serial progression to all nodes on that network segment. byte A set of bits (usually eight) operating as a unit to signify a character.
C
cable modem A modem that provides Internet access over cable television lines. campus A group of buildings in a fixed geographical location, owned and controlled by the organization. Carrier Access Module (CAM) A module attached to the ATM cellswitching bus. A CAM can support two portadapter modules to provide physical ATM lineports used by end nodes. A CAM can be placed in the Cisco Catalyst 5500 in slot 9, 10, 11, or 12. It can also be placed in the LS1010 in slot 0, 1, 3, or 4. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) A mediaaccess method that uses collision avoidance techniques. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) A mediaaccess method that uses collision detection and that listens to the network to see if it is in use. If the network is clear, data is transmitted. If a collision occurs, both stations will retransmit their data. change control A process in which a detailed record of every change made to the network is documented. channel A communications path used for data transmission. Channel Service Unit (CSU) A network communications device used to connect to the digital equipment lines of the common carrier, usually over a dedicated line or Frame Relay. CSU is used in conjunction with a Data Service Unit (DSU). Circuit Emulation Services (CES) A Port to Application Mapping (PAM) module that allows no ATM devices utilizing either T1 or E1 interfaces to attach to an ATM switch backplane. This module can be used to connect private branch exchange (PBX), video conferencing, and nonATM routers to the network backbone. Cisco Discovery Protocol (CDP) A Cisco protocol that gathers and stores information about neighboring devices on the network. It can be used in Ethernet, Token Ring, Serial, and FDDI media types. All Cisco devices including hubs 376
support CDP. Cisco Express Forwarding (CEF) Used in the CEF ASIC (CEFA) and Distributed Cisco Express Forwarding (dCEF) ASIC, Ciscos newest ASICs. These ASICs, which are used in Ciscos highend devices, are the most functional and efficient ASICs in the Cisco product line. They use a CEF search engine, which makes IP prefixbased switching decisions using an adjacency table. The CEFA operates at both Layer 2 and Layer 3, using ARP to resolve nexthop adjacencies at Layer 2. A network interface is said to be adjacent if it can be reached in a single hop. This component looks at the first 64 bytes of an incoming frame, obtains as much information as possible, and then uses the switchs CAM table to rewrite the relevant source MAC address, destination MAC address, or destination network address to the frame or packet header. Cisco Group Management Protocol (CGMP) A Cisco protocol used by the Catalyst switch to forward multicast frames intelligently. CGMP dynamically discovers enduser stations participating in multicast applications. When receiving a multicast, it forwards the multicast directly to the end users instead of broadcasting the multicast throughout the network. Class A network A TCP/IP network that uses addresses starting between 1 and 126 and supports up to 126 networks with up to 16,777,214 unique hosts each. 127 is a Class A address but is used for loopback testing on Ethernet interfaces. Class B network A TCP/IP network that uses addresses starting between 128 and 191 and supports up to 16,384 networks with 65,534 unique hosts each. Class C network A TCP/IP network that uses addresses starting between 192 and 254 and supports up to 2,097,152 networks with 254 unique hosts each. Classless InterDomain Routing (CIDR) A technique that allows multiple addresses to be consolidated into a single entry. Clear Header A field (part of the 802.10 header) that copies the encrypted Protected Header for security purposes to help guarantee against tampering with the frame. Also known as the Secure Data Exchange (SDE) Protocol Data Unit. ClearChannel Architecture The switching architecture found in the Cisco Catalyst series 1900 and 2820 switches. The architecture is made up of the 1Gbps Packet Exchange Bus, Forwarding Engine, Embedded Control Unit, a management interface, and a 3MB shared memory buffer. client A node that requests a service from another node on a network. client/server networking A networking architecture utilizing frontend demand nodes that request and process data stored by the back end or resource node. coaxial cable Data cable, commonly referred to as coax, made of a solid copper core, which is insulated and surrounded by braided metal and covered with a thick plastic or rubber covering. This is the standard cable used in cable TV and in older bus topology networks. collapsed core A design in which both the Core and Distribution layers functions are combined into one layer. collision The result of two frames transmitting simultaneously in an Ethernet network and colliding, thereby destroying both frames. collision domain All the interfaces on a single segment that can send data on the same physical wire. In the case of a switch, all the nodes connected to each individual port are in their own collision domain. In a hub, all the interfaces connected to the hub ports are in their own collision domain. Color Blocking Logic (CBL)
377
A feature of the SAMBA ASIC used to cause the EARL to make forwarding decisions. It also ensures that a tagged frame that comes from a particular VLAN does not exit through a port belonging to another VLAN. CBL also assists in placing ports in one of four different modes for SpanningTree Protocol: blocking, learning, listening, or forwarding. common carrier A supplier of communications utilities, such as phone lines, to the general public. communication The transfer of information between nodes on a network. connectionoriented communication Packet transfer in which the delivery is guaranteed. connectionless communication Packet transfer in which the delivery is not guaranteed. connectivity The linking of nodes on a network in order for communication to take place. Content Addressable Memory (CAM) A table used by a bridge to make forwarding and filtering decisions. The CAM table contains MAC addresses with port addresses leading to the physical interfaces. The CAM table uses a specialized interface that is faster than RAM to make forwarding and filtering decisions. It examines frames it receives from a segment and then updates the table with the source MAC address from the frame. control plane Functions that dictate how data actually flows through the switching fabric. Copper Distributed Data Interface (CDDI) The implementation of the FDDI standard using electrical cable rather than optical cable. Core block The end point for networks. It requires fast access and no policy implementation. Core layer In the Cisco Hierarchical Model, the backbone of the network, designed for highspeed data transmission. crosstalk Electronic interference caused when two wires get too close to each other. cutthrough packet switching A switching method that does not copy the entire packet into the switch buffers. Instead, the destination address is placed in buffers, the route to the destination node is determined, and the packet is quickly sent out the corresponding port. The switch begins forwarding the frame as soon as the first 13 bytes and MAC address are received. It relies on the receiving device to discard the frame if there is corruption. Cutthrough packet switching maintains a low latency. cyclical redundancy check (CRC) A method used to check for errors in packets that have been transferred across a network. A computation bit is added to the packet and recalculated at the destination to determine if the entire packet contents have been transferred correctly.
D
D connectors Connectors shaped like the letter D that use pins and sockets to establish connections between peripheral devices using serial or parallel ports. The number that follows is the number of pins the connector uses for connectivity. For example, a DB9 connector has 9 pins, and a DB25 has 25 pins. data field In a frame, the field or section that contains the data. Data Link layer Layer 2 of the OSI Reference Model. The Data Link layer is above the Physical layer. Data comes off the cable, through the Physical layer, and into the Data Link layer. data plane Functions applied directly against the actual data being directed in and out of the switching fabric. 378
Data Service Unit (DSU) A component that formats and controls data for transmission over digital lines. It is used in conjunction with a Channel Service Unit (CSU). Data Terminal Equipment (DTE) A device at the user end of a usernetwork interface that serves as a data source, a destination, or both. These devices include computers, protocol translators, and multiplexers. datagram Information groupings that are transmitted as a unit at the Network layer. DB9 A connector that has nine pins and is used for a serialport or parallelport connection between PCs and peripheral devices. DB25 A connector that has 25 pins and is used for a serialport or parallelport connection between PCs and peripheral devices. dedicated line Generally used in WANs to provide a constant connection between two points. default gateway Normally a router or a multihomed computer to which packets are sent when they are destined for a host thats not on their segment of the network. demand node Any end user or interface that requests and accesses network resources such as servers or printers. destination address The network address to which the frame is being sent. In a packet, this address is encapsulated in a field of the packet so all nodes know where the frame is being sent. Destination Service Access Point (DSAP) A onebyte field in the frame that combines with the service access point (SAP) to inform the receiving host of the identity of the destination host. dialed number identification service The method for delivery of automatic number identification using outofband signaling. dialup networking The connection of a remote node to a network using POTS or PSTN. diameter A unit of measurement between the root switch and child switches, calculated from the root bridge with the root bridge counting as the first switch. Each subsequent child switch out from the root bridge is added to come up with the diameter number. Digital Subscriber Line (DSL) A public network technology that delivers high bandwidth over conventional copper wiring at limited distances. distributed switching An implementation in which switching decisions are made at the local port or the line module. Distribution layer Functions as the separation point between the Core and Access layers of the network OSI Reference Model. The devices in the Distribution layer implement the policies that define how packets are to be distributed to the groups within the network. domain A logical grouping of interfaces in a network or intranet to identify a controlled network of nodes that are grouped as an administrative unit. Dual Attached Stations (DAS) A connection that allows a device to connect to both FDDI counterrotating rings. dualattachment concentrator (DAC) A device connected to the FDDI counterrotating rings. The DAC serves as a hub to provide passive connections to the rings for peripheral devices. dualhomed A FDDI end station attached to two DACs for redundancy. 379
dumb terminal An enduser station that can access another computer or switch but cannot provide any processing at the local level. Dynamic Host Configuration Protocol (DHCP) A protocol that provides an IP address to requesting nodes on the network. Dynamic ISL A protocol that performs trunking negotiation. It also verifies that two connected ports can become trunk links. A Dynamic ISL port can be configured in one of four modes: On, Off, Desirable, or Auto. Dynamic VLAN port A VLAN number assigned to a certain MAC address. The node attaching to any dynamic port on the switch is a member of the VLAN assigned to the MAC address. Dynamically assigned VLANs are configured using CiscoWorks 2000 or CiscoWorks for Switched Internetworks software. dynamic window A mechanism that prevents the sender of data from overwhelming the receiver. The amount of data that can be buffered in a dynamic window can vary.
EF
electromagnetic interference (EMI) External interference from electromagnetic signals that causes reduction of data integrity and increased error rates in a transmission medium. Electronic Industries Association (EIA) A group that specifies electrical transmission standards. Embedded Control Unit (ECU) A component of the ClearChannel Architecture that handles frame switching on the Cisco Catalyst series 1900 and 2820 switches in software. The ECU is an Intel 486 processor, Flash memory module, and 512K DRAM. It is also used in initializing the switch, using STP on a perVLAN basis, controlling the LEDs on the chassis, maintaining RMON statistics, and handling inband and outofband management of the switch. emulated LAN (ELAN) A feature used by ATM LANE to perform the basic functionality of a VLAN in Token Ring or Ethernet environments. ELANs, like VLANs, require a route processor such as a router to route frames between ELANs. encapsulation The technique used by layered protocols in which a layer adds header information to the Protocol Data Unit (PDU) from the layer above. Encoded Address Recognition Logic (EARL) ASIC An ASIC located on the Catalyst 5000 family of switches that sees all the frames that cross the bus. It performs a task similar to that of the CAM. The ASIC is responsible for making switching decisions based on the MAC address and the source VLAN. It is also responsible for updating the address table. encryption The modification of data for security purposes prior to transmission so that it is not comprehensible without the decoding method. enterprise services Services that involve crossing the backbone to achieve access. These services are typically located on a separate subnet from the rest of the network devices. EtherChannel A connection used on the Catalyst 3000 family or Kalpana switches. It allows as many as seven Ethernet links to be bundled and loadbalanced frame by frame to provide up to 140Mbps of bandwidth. It can utilize halfduplex or fullduplex links. Extended Industry Standard Architecture (EISA) The successor to the ISA standard. It provides a 32bit bus interface used in PCs. Fast EtherChannel (FEC)
380
A connection used on the Catalyst 5000 family of switches. It allows as many as seven Ethernet links to be bundled and loadbalanced frame by frame to provide up to 800Mbps of bandwidth. It can utilize halfduplex or fullduplex links. Fast Ethernet IEEE 802.3 specification for data transfers of up to 100Mbps. fault tolerance A theoretical concept defined as a resistance to failure. It is not an absolute and can be defined only in degrees. fiber channel or fibre channel A technology that defines full gigabitpersecond data transfer over fiberoptic cable. Fiber Distributed Data Interface (FDDI) A highspeed datatransfer technology designed to extend the capabilities of existing LANs using a dual rotatingring technology similar to Token Ring. fiberoptic cable A physical medium capable of conducting modulated light transmissions. Compared with other transmission media, fiberoptic cable is more expensive; but it is not susceptible to electromagnetic interference and is capable of higher data rates. Also known as fiber optics or optical fiber. File Transfer Protocol (FTP) The set of standards or protocols that allows you to transfer complete files between different computer hosts. Flash memory A type of memory that keeps its contents (usually the operating system) when the power is cycled. flow control A method used to control the amount of data transmitted within a given period of time. There are different types of flow control. See also dynamic window and static window. forward delay The length of time a port will remain in one of four protocol states in Spanning Tree Protocol. Forwarding Engine (FE) A major component of ASIC; part of the ClearChannel Architecture on the Cisco Catalyst series 1900 and 2820 switches. It is responsible for learning addresses, allocating buffer space in the shared memory space, frame queuing, forwarding decisions, and maintaining statistics. Forwarding Information Base (FIB) A mirror image of the IP routing tables routing information, similar to a routing table or information base. It updates routing information when routing or topology changes occur in the network and recalculates the nexthop information. The FIB maintains a list of all known routes and eliminates the need for route cache maintenance associated with fast switching or optimum switching. FIB is used with the CEF ASIC. FragmentFree switching A fast packetswitching method that reads the first 64 bytes of the frame to determine if the frame is corrupted. If this first part is intact, the frame is forwarded. Also known as Runtless switching. frame Grouping of information transmitted as a unit across the network at the Data Link layer. Frame Check Sequence field A field that performs a cyclic redundancy check (CRC) to ensure that all the frames data arrives intact. frame filtering A process useful for VLANs, which utilizes a filtering table to drop frames based on a certain value contained in any one of the many fields in the data frame, such as the source or destination address. As part of normal operations, switches share filter tables. The frames contents are compared to the filter table in the switch, thereby increasing the latency of the switch. Frame filtering is not used to implement VLANs in the Cisco Catalyst 5000 or 6000 family of switches. Frame Length field In a data frame, the field that specifies the length of a frame. The maximum length for an 802.3 frame is 1,518 bytes. Frame Relay
381
A Data Link layer switching protocol used across multiple virtual circuits of a common carrier, giving the end user the appearance of a dedicated line. frame tagging A VLAN implementation method used to add VLAN information to data frames. As a frame enters the switch, it is tagged with VLAN information. It retains this information through the switching fabric; the tagging is removed before the frame exits the switch port with the attached destination interface. The process is transparent to the sending and receiving interfaces. Frame Type field In a data frame, the field that names the protocol being sent in the frame. Frequency Division Multiplexing (FDM) A technology that divides the output channel into multiple, smallerbandwidth channels, each using a different frequency range. full backup A backup method in which every file on the hard drive is copied. full duplex A transmission method in which the sending and receiving (Rx and Tx) channels are separate; therefore, collisions cannot occur. Data is transmitted in two directions simultaneously on separate physical wires.
GI
gateway A hardware and software solution that enables communication between two dissimilar networking systems or protocols. Gateways usually operate at the upper layers of the OSI protocol stack, above the Transport layer. gigabit (Gb) One billion bits or one thousand megabits. Gigabit Ethernet IEEE specification for transfer rates up to one gigabit per second. guaranteed flow control A method of flow control in which the sending and receiving hosts agree upon a rate of data transmission. After they agree on a rate, the communication will take place at the guaranteed rate until the sender is finished. No buffering takes place at the receiver. half duplex A circuit designed for data transmission in both directions, but not simultaneously. headofline blocking A situation in which congestion on an outbound port limits throughput to uncongested ports. It is completely different from oversubscription. Physical data from another source device blocks the data of the sending device. HighSpeed Serial Interface (HSSI) The network standard for highspeed serial communications over WAN links. It includes Frame Relay, T1, T3, E1, and ISDN. host Any system on a network. In the Unix world, any device that is assigned an IP address is a host. host ID A unique identifier for a client or resource on a network. hostname The NetBIOS name of the computer or node, given to the first element of the Internet fully qualified domain name (FQDN). It must be unique on your network. Hot Standby Routing Protocol (HSRP) A Cisco protocol that provides a redundant route processor on a segment. Should a route processor or link to a route processor fail, another configured router in a Standby Group can take over the routing responsibilities. The routers participating in an HSRP Standby Group are configured with a virtual MAC address and a virtual IP address. A separate instance of HSRP can exist for each VLAN. 382
hub A hardware device that connects multiple independent nodes. Also known as a concentrator or multiport repeater. Hypertext Transfer Protocol (HTTP) A protocol used by Web browsers to transfer pages and files from a remote node to your computer. IEEE See Institute of Electrical and Electronics Engineers. IEEE 802.1 Standard that defines the OSI models Physical and Data Link layers. This standard allows two IEEE LAN stations to communicate over a LAN or WAN and is often referred to as the internetworking standard. It also includes the SpanningTree Algorithm specifications. IEEE 802.2 Standard that defines the Logical Link Control (LLC) sublayer for the entire series of protocols covered by the 802.x standards. This standard specifies the adding of header fields, which tell the receiving host which upper layer sent the information. It also defines specifications for the implementation of the LLC sublayer of the Data Link layer. IEEE 802.3 Standard that specifies Physicallayer attributes such as signaling types, data rates, and topologies and the mediaaccess method used. It also defines specifications for the implementation of the Physical layer and the MAC sublayer of the Data Link layer, using CSMA/CD. This standard also includes the original specifications for Fast Ethernet. IEEE 802.4 Standard that defines how production machines should communicate and establishes a common protocol for use in connecting these machines. It also defines specifications for the implementation of the Physical layer and the MAC sublayer of the Data Link layer using Token Ring access over a bus topology. IEEE 802.5 Standard often used to define Token Ring. However, it does not specify a particular topology or transmission medium. It provides specifications for the implementation of the Physical layer and the MAC sublayer of the Data Link layer using a tokenpassing mediaaccess method over a ring topology. IEEE 802.6 Standard that defines the Distributed Queue Dual Bus (DQDB) technology to transfer highspeed data between nodes. It provides specifications for the implementation of metropolitan area networks (MANs). IEEE 802.7 Standard that defines the design, installation, and testing of broadbandbased communications and related physical media connectivity. IEEE 802.8 Standard that defines a group of people who advise the other 802standard committees on various fiberoptic technologies and standards. This advisory group is called the Fiber Optic Technical Advisory Group. IEEE 802.9 Standard that defines the integration of voice and data transmissions using isochronous Ethernet (IsoEnet). IEEE 802.10 Another Cisco proprietary protocol, used primarily to transport VLAN information over FDDI. You will find this protocol primarily used in FDDI backbones to transport VLAN information and data. IEEE 802.11 Standard that defines the implementation of wireless technologies, such as infrared and spreadspectrum radio. IEEE 802.12 Standard that defines 100BaseVG/AnyLAN, which uses a 1000Mbps signaling rate and a special mediaaccess method allowing 100Mbps data traffic over voicegrade cable. IEEE 802.1Q
383
Standard for inserting a frame tag VLAN identifier in the frame header. As a frame enters the switching fabric, it is tagged with additional information regarding the VLAN properties. The tag remains in the frame as it is forwarded between switches and is removed prior to exiting the access link to the destination interface. This process is completely transparent to the end user. Industry Standards Architecture (ISA) The standard of the older, more common 8bit and 16bit bus and card architectures. input/output (I/O) Any operation in which data either enters a node or is sent out of a node. Institute of Electrical and Electronics Engineers (IEEE) A professional organization that develops standards for networking and communications. Integrated Local Management Interface (ILMI) A protocol created by the ATM forum to allow any ATM switch and ATM device to communicate using SNMP. Integrated Services Digital Network (ISDN) An internationally adopted standard for endtoend digital communications over PSTN that permits telephone networks to carry data, voice, and other source traffic. intelligent hub A hub that contains some management or monitoring capability. interface A device, such as a card or a plug, that connects pieces of hardware with the computer so that information can be moved from place to place (for example, between computers and printers, hard disks, and other devices, or between two or more nodes on a network). internal IPX address A unique eightdigit number that is used to identify a server. It is usually generated at random when the server is installed. internal loopback address Used for testing with TCP/IP. This address 127.0.0.1 allows a test packet to reflect back into the sending adapter to determine if it is functioning properly. International Standards Organization (ISO) A voluntary organization, founded in 1946, that is responsible for creating international standards in many areas, including communications and computers. Internet Assigned Numbers Authority (IANA) The organization responsible for Internet protocol addresses, domain names, and protocol parameters. Internet Control Message Protocol (ICMP) Networklayer Internet protocol, documented in RFC 792, that reports errors and provides other information relevant to IP packet processing. Internet Engineering Task Force (IETF) A group of research volunteers responsible for specifying the protocols used on the Internet and for specifying the architecture of the Internet. Internet Group Management Protocol (IGMP) Protocol responsible for managing and reporting IP multicast group memberships. Internet layer In the TCP/IP architectural model, the layer responsible for the addressing, packaging, and routing functions. Protocols operating at this layer of the model are responsible for encapsulating packets into Internet datagrams. All necessary routing algorithms are run here. Internet Network Information Center (InterNIC) The group that provides Internet services, such as domain registration and information and directory and database services. Internet Protocol (IP) Networklayer protocol, documented in RFC 791, that offers a connectionless internetwork service. IP provides features for addressing, packet fragmentation and reassembly, typeofservice specification, and security. Internet Research Task Force (IRTF) The research arm of the Internet Architecture Board. This group performs research in areas of Internet protocols, applications, architecture, and technology. 384
internetwork A group of networks that are connected by routers or other connectivity devices so that the networks function as one network. Internetwork Operating System (IOS) Ciscos proprietary operating system, used in its routers and switches. Internetwork Packet Exchange (IPX) The Networklayer protocol generally used by Novells NetWare network operating system. IPX provides connectionless communication, supporting packet sizes up to 64K. Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) Default protocol used in NetWare networks. It is a combination of the IPX protocol to provide addressing and SPX to provide guaranteed delivery. IPX/SPX is similar to its counterpart, TCP/IP. InterSwitch Link (ISL) A special Cisco proprietary Ethernet protocol that assigns a 26byte header to an encapsulated frame and a 4byte checksum, sometimes referred to as the FCS or the CRC. This protocol is used to send more than one VLAN between Cisco network devices configured for trunk links. IPSec A protocol designed for virtual private networks (VPNs). Its used to provide strong security standards for encryption and authentication. IPX address The unique address used to identify a node in the network.
KL
kilobit (Kb) One thousand bits. kilobyte (K) One thousand bytes (transmission rate). LAN Emulation (LANE) A standard created by the ATM forum to govern the connections of ATM end stations to either Ethernet or Token Ring devices. LANE provides a bridge from devices using ATM to Layer 2 devices using Ethernet and Token Ring. LAN Module ASIC (LMA) An ASIC in the Cisco Catalyst 3000 series switch that provides frame buffering, address learning, bus arbitration, and switching decisions for Ethernet ports. latency The time used to forward a packet in and out of a device. This term is commonly used in reference to routing and switching. Layer 2 Forwarding Protocol (L2F) A dialup VPN protocol designed to work in conjunction with PPP to support authentication standards, such as TACACS+ and RADIUS, for secure transmissions over the Internet. Layer 2 Tunneling Protocol (L2TP) A dialup VPN protocol that defines its own tunneling protocol and works with the advanced security methods of IPSec. L2TP allows PPP sessions to be tunneled across an arbitrary medium to a home gateway at an ISP or corporation. learning bridge A bridge that builds its own bridging address table, rather than requiring you to enter information manually. Line Module Communication Processor (LCP) Provides communications for the MCP located on the Supervisor Engine. The LCP is located on each line module. local area network (LAN) A group of connected computers that are located in a geographic area, usually a building or campus, and that share data and services. local broadcast 385
A broadcast on the local network, looking for the IP address of the destination host. local service Service where the device supplying the service resides on the same subnet as the device requesting the service. Local Target Logic (LTL) A feature of some line modules that assists the EARL in making forwarding decisions. local VLAN Beneficial for networks whose resources are centralized and in one geographical location. The VLAN can span one switch or many switches within the same floor or building. logical addressing scheme The addressing method used in providing manually assigned node addressing. Logical Link Control (LLC) A sublayer of the Data Link layer of the OSI Reference Model. It provides an interface for the Networklayer protocols and the MAC sublayer; its also part of the Data Link layer. loop A continuous circle that a packet takes through a series of nodes in a network until it eventually times out. Without a protocol such as STP to detect loops, if no life cycle is assigned to the packet, the data could continuously encircle the network. loopback plug A device used for loopback testing. loopback testing A troubleshooting method used to verify the usability of interfaces. The output and input wires are crossed or shorted in a manner that allows all outgoing data to be routed back into the card.
MN
management Fault, capacity, accounting, performance, and security control for a network. Master Communication Processor (MCP) A feature of the Supervisor Engine that takes commands from the Network Management Processor (NMP) and forwards them to the correct LCP. The MCP is also responsible for testing and configuring the local ports and controlling the ports using LTL and CBL. It also performs diagnostics on the memory, SAINT ASICs, LTL, and CBL. In addition, the MCP is responsible for downloading software to the line modules. Media Access Control (MAC) address A sixoctet number that uniquely identifies a host on a network. It is a unique number that is burned into the NIC, so it cannot be changed. Media Access Control (MAC) layer In the OSI model, the lower of the two sublayers of the Data Link layer. Its defined by the IEEE as responsible for interaction with the Physical layer. Media Access Unit (MAU) IEEE 802.3 specification referring to a transceiver. Not to be confused with a Token Ring MAU (Multistation Access Unit), which is sometimes abbreviated MSAU. megabit (Mb or Mbit) One million bits. This term is used to rate transmission transfer speeds (not to be confused with megabyte). megabyte (MB) One million transmission bytes. This term usually refers to file size, in which case it would be 1,048,576 bytes. message A portion of information that is sent from one node to another. Messages are created at the upper layers of the OSI Reference Model. microsegmentation The process of using switches to divide a network into smaller segments. 386
microwaves Very short radio waves used to transmit data over 890MHz. modem A device used to modulate and demodulate the signals that pass through it. It converts the direct current pulses of the serial digital code from the controller into the analog signal that is compatible with the telephone network. multicast A single packet transmission from one sender to a specific group of destination nodes. multilayer switches A combination of Layer 2, 3, and 4 switches that use the concept of route once, switch many. multiprocessor Support for multiple processors in a single machine. Multiprotocol Over ATM (MPOA) An ATM forum standard that includes enhancements to LANE and adds Layer 3 switching capabilities to ATM switches. Multistation Access Unit (MAU or MSAU) A concentrator or hub used in a Token Ring network. It organizes the connected nodes into an internal ring and uses the RI (ring in) and RO (ring out) connectors to expand to other MAUs on the network. NetFlow Switching A feature incorporated into the Multilayer Switching Module (MSM), NetFlow Feature Card (NFFC), and NFFC II that was originally instituted and developed for Ciscos enterprise routers. NetFlow allows for transparent switching in hardware while incorporating QoS features including security, multicast forwarding, multilayer switching, NetFlow data exporting, and packet filtering at Layer 3 and Layer 4 application ports. NetWare Core Protocol (NCP) NetWare protocol that provides a method for hosts to make calls to a NetWare server for services and network resources. network down Situation in which the clients are unable to utilize the services of the network. This can be administrative, scheduled downtime for upgrades or maintenance, or it can be the result of a serious error. Network Driver Interface Specification (NDIS) Microsoft proprietary specification or standard for a protocolindependent device driver. These drivers allow multiple protocols to be bound to the same NIC, allowing the card to be used by multiple operating systems. NDIS is similar to Open DataLink Interface (ODI). network ID The part of the TCP/IP address that specifies the network portion of the IP address. It is determined by the class of the address, which is determined by the subnet mask used. Network Interface Card (NIC) The hardware component that serves as the interface, or connecting component, between your network and the node. It has a transceiver, a MAC address, and a physical connector for the network cable. Also known as a network adapter. Network Interface layer The bottom layer of the TCP/IP architectural model, which maps to the bottom two layers of the OSI Reference Model. Its responsible for sending, receiving, and interacting with bits at the Physical layer. Network layer The third layer of the OSI Reference Model, where routing based on node addresses (IP or IPX addresses) occurs. Network Management Processor (NMP) A feature of the Catalyst Supervisor Engine that is responsible for general control and some management functions of the switch. It is responsible for executing the systems configuration changes, the Command Line Interface (CLI), and running diagnostics on boot components as well as new components. Network Time Protocol (NTP)
387
A protocol that allows all network equipment to synchronize the date and time on the private or internetwork environment. networktonetwork interface (NNI) An interface that provides connectivity between two ATM switches. nonblocking A condition in which the fabric contains more bandwidth than the sum total of all the ports bandwidth combined. nonvolatile RAM (NVRAM) Static memory similar to that of the Flash. Information stored in the NVRAM does not get lost when the power is cycled on the device. On a switch, the NVRAM stores the VLAN configuration, system configuration, SNMP parameters, STP configuration, and configuration of each port. Novell Directory Services (NDS) The user, group, and security information database of network resources utilized in a NetWare 4.x and/or NetWare 5.x internetwork.
OP
Open System Interconnection (OSI) model A sevenlayer model created by the ISO to standardize and explain the interactions of networking protocols. oversubscription A condition in which the total bandwidth of the ports is greater than the capacity of the switching fabric. Also referred to as a blocking architecture. Packet Internet Groper (PING) A TCP/IP protocolstack utility that works with Internet Control Message Protocol (ICMP) and uses an echo request and reply to test connectivity to other systems. password A set of characters used with a username to authenticate a user on the network and to provide the user with rights and permissions to files and resources. patch panel A device where the wiring used in coaxial or twistedpair networks converges in a central location and is then connected to the back of the panel. peertopeer networking A network environment without dedicated servers, where communication occurs between similarly capable network nodes that act as both client and server. permanent virtual circuit (PVC) A logical path established in packetswitching networks between two locations. Its similar to a dedicated leased line. Also known as a permanent virtual connection in ATM terminology (not to be confused with Private Virtual Circuit, also known as a PVC). permission Authorization provided to users, allowing them to access objects on the network. Network administrators generally assign permissions. Slightly different from but often used with rights. physical addressing scheme The MAC address on every network card manufactured. It cannot be changed. Physical layer The bottom layer (Layer 1) of the OSI Reference Model, where all physical connectivity is defined. plain old telephone service (POTS) The current analog public telephone system. Also known as the PSTN. Plug and Play Architecture designed to allow hardware devices to be detected by the operating system and for the driver to be automatically loaded. PointtoPoint Protocol (PPP) A common dialup networking protocol that includes provisions for security and protocol negotiation and provides hosttonetwork and switchtoswitch connections for one or more user sessions. PPP 388
is the common modem connection used for Internet dialup. PointToPoint Tunneling Protocol (PPTP) A protocol that encapsulates private network data in IP packets. These packets are transmitted over synchronous and asynchronous circuits to hide the underlying routing and switching infrastructure of the Internet from both senders and receivers. polling The mediaaccess method for transmitting data, in which a controlling device is used to contact each node to determine if it has data to send. Port Adapter Modules Modules attached to the Carrier Access Modules on the LS1010 ATM and Catalyst 5500 series ATM bus that provide physical ATM line ports for the enduser stations. Port Aggregation Protocol (PAgP) Manages the Fast EtherChannel bundles and aids in the automatic creation of Fast EtherChannel links. PortFast A protocol that forces an STP port to enter the forwarding state immediately after startup for a single workstation or server connected to a switch port. power on self test (POST) A series of tests run on a Cisco Catalyst switch when the power is turned on. POST tests the hardware, memory, processors, ports, and ASICs to verify they are functioning properly. Presentation layer Layer 6 of the OSI Reference Model. This layer prepares information to be used by the Application layer. Primary Rate Interface (PRI) A higherlevel network interface standard for use with ISDN. Defined at the rate of 1.544Mbps, it consists of a single 64Kbps D channel plus 23 (T1) or 30 (E1) B channels for voice or data. Private Virtual Circuit (PVC) A logical connection between locations through a Frame Relay and ATM cloud. When a company has three branch offices, and each location physically connects to the Frame Relay providers network cloud through a series of switches, it appears to the end users as if the three branch offices are directly connected to the local network. (Not to be confused with a Permanent Virtual Circuit, also known as a PVC.) proprietary A standard or specification that is created by a manufacturer, vendor, or other private enterprise and is not always a recognized standard. Proprietary Fat Pipe ASIC (PFPA) An ASIC utilized on the Catalyst 3000 series switches that use no 10BaseT ports such as Fast Ethernet, 100VG/AnyLAN, ATM, or the Stackport of the Stack Port Matrix. Functionally, the PFPA is the same as the LMA. protocol A set of rules that govern network communications between networks, computers, peripherals, and operating systems. Protocol Identification field In a frame, a fivebyte field used to identify to the destination node the protocol that is being used in the data transmission. protocol stack Two or more protocols that work together, such as TCP and IP or IPX and SPX. Also known as a protocol suite. Proxy ARP Used by endstations to discover the IP address of the default gateway. The endstations dynamically acquire the IP and MAC address of the default gateway. The IP address of the default gateway is manually configured on the node running Proxy ARP. Public Switched Telephone Network (PSTN) All the telephone networks and services in the world. The same as POTS, PSTN refers to the worlds collection of interconnected public telephone networks that are both commercial and government owned. PSTN is a digital network, with the exception of the connection between local exchanges and 389
QR
Quality of Service (QoS) A guarantee of a particular level of service for a connection. QoS uses queuing and other methods to guarantee that bandwidth is available for a certain protocol, application, or address. QoS is important for implementing applications such as voice and video. queuing Uses buffering and priority control mechanisms to control data congestion on the network. Another term for QoS. read/writes The counting of packets on the ingress (read) as well as the egress (write) from the switching fabric. Remote Monitoring (RMON) An IETF standard that defines how devices gather and share network monitoring information. This information can be used to send information gathered to an SNMP management station. RMON gathers Layer 2 information concerning bandwidth use, collisions, and errors. Catalyst switches can gather four of the nine different information types: Statistics, History, Alarm, and Event. The other five groups can be monitored using a SPAN port and an attached protocol analyzer or probe. remote node A node or computer that is connected to the network through a dialup connection. Dialing in to the Internet from home is a perfect example of the remote node concept. remote services Services where the device supplying the services resides on a separate subnet from the device requesting the services. repeater A device that regenerates and retransmits the signal on a network. A repeater is generally used to strengthen signals going long distances. Request For Comments (RFC) Method used to post documents regarding networking or Internetrelated standards or ideas. Some have been adopted and accepted by the Internet Architecture Board as standards. resource node An interface on the network that provides a service for a demand node. Resource nodes can be such items as servers, printers, and other devices available to connect to a network to provide services. rights Authorization provided to users, allowing them to perform certain tasks. Network administrators generally assign rights. Slightly different from but often used with permissions. ring in (RI) A connector used in an IBM TokenRing network on a Multistation Access Unit (MAU) to expand to other MAUs on the network. Counterpart to the ring out (RO), the RI connector on the MAU connects to the media to accept the token from the ring. ring out (RO) A connector used in an IBM TokenRing network on a Multistation Access Unit (MAU) to expand to other MAUs on the network. Counterpart to the ring in (RI), the RO connector on the MAU connects to the media to send the token out to the ring. RJ11 connector Used with telephone systems; can have either four or six conductors. A red/green pair of wires is used for voice and data; a black/white pair is used for lowvoltage signals. RJ45 connector An Ethernet cable connector used with twistedpair cable, which can support eight conductors for four pairs of wires. Route Switch Feature Card (RSFC) A Cisco router on a card running the Cisco IOS. This card allows the switch to disregard installing an RSM or daughter cards, because they are built into the modules. 390
Route Switch Module (RSM) Ciscos first multiprotocol multilayer switch module, which utilizes the full support of the Cisco IOS for performing Layer 3 routing from a slot internally on a Layer 2 switch. This module provides for interVLAN connectivity. Routing Information Field (RIF) A field on Source Route Bridge Token Ring frames that contains information about the rings and bridges that the frame must travel to the destination interface. Routing Information Protocol (RIP) Protocol that uses hop counts as a routing metric to control the direction and flow of packets between routers and switches on an internetwork. Runtless switching A switching method in which the switch reads the first 64 bytes to verify that there is no corruption of the packet. If there is corruption, a preset maximum of errors changes the switching type from cutthrough switching to storeandforward switching. Also known as FragmentFree switching.
S
Secure Data Exchange (SDE) Protocol Data Unit A field (part of the 802.10 header) that copies the encrypted Protected Header for security purposes to help guarantee against tampering with the frame. Also known as the Clear Header. Security Association Identifier (SAID) One of the three values that make up a Clear Header on the FDDI frame type. It is used for security for the Clear Header. The Clear Header contains a SAID, Link Service Access Point (LSAP), and Management Defined field (MDF). Sequenced Packet Exchange (SPX) Protocol used in conjunction with IPX when connectionoriented delivery is required. It is used mainly in NetWare network environments. server A resource node that fulfills service requests for demand nodes. Usually referred to by the type of service it performs, such as file server, email server, or print server. service access point (SAP) A field in a frame that tells the receiving host which protocol the frame is intended for. Service Advertising Protocol (SAP) NetWare protocol used on an IPX network. SAP maintains server information tables, listing each service that has been advertised to it, and provides this information to any nodes attempting to locate a service. Service Advertising Protocol agent (SAP agent) Router or other node on an IPX network that maintains a server information table. This table lists each service that has been advertised to it and provides this information to any nodes attempting to locate a service. session The dialog that exists between two computers. Session layer The fifth layer of the OSI Reference Model, which establishes, manages, and terminates sessions between applications on different nodes. shared system The infrastructure component routed directly into the backbone of an internetwork for optimal systems access. It provides connectivity to servers and other shared systems. shielded twistedpair (STP) Twistedpair network cable that has shielding to insulate the cable from electromagnetic interference. Simple Network Management Protocol (SNMP) A protocol used with TCP/IP networks to provide network devices with a method to monitor and control network devices. It is used to manage configurations, statistics collection, performance, and security, and to report network management information to a management console that is a member of 391
the same community. Simple Network Management Protocol (SNMP) trap An SNMP protocol utility that sends out an alarm in an identified community notifying members of the community that some network activity differs from the established threshold, as defined by the administrator. Simple Server Redundancy Protocol (SSRP) A Cisco protocol that provides redundancy for all LANE server components. Single Attached Station (SAS) A FDDI device that has only a single connection to a single DAC. smart bridge A bridge that builds its own bridging address table. No manual configuration or intervention is required. Also known as a learning bridge. socket A logical interprocess communications mechanism through which a program communicates with another program or with a network. socket identifier An eightbit number used to identify the socket. Developers and designers of services and protocols usually assign socket identifiers. Also known as a socket number. source address The address of the host who sent the frame. It is contained in the frame so the destination node knows who sent the data. Source Route Bridging (SRB) A type of bridging used to segment Token Ring networks. It requires all rings and bridges to have a unique number. Source Route Switching (SRS) A type of bridging that combines SRB and SRT, developed to allow more physical rings on the network. It allows for growing bandwidth needs while preserving the benefits of SRB. Source Route Translational Bridging (SR/TRB) A type of bridging that bridges a Token Ring segment to another physical media type such as Ethernet or FDDI. It is transparent to the source and destination interfaces. Source Route Transparent Bridging (SRT) A type of bridging that combines SRB and TB. Using SRT, the bridge places a RIF into a frame traveling from the TB to the SRB side. It then strips out the RIF when the frame travels from the SRB port to the TB port. Source Service Access Point (SSAP) A onebyte field in the frame that combines with the SAP to tell the receiving host the identity of the source or sending host. SpanningTree Algorithm (STA) Defined by IEEE 802.1 as part of the SpanningTree Protocol (STP) to eliminate loops in an internetwork with multiple paths. The STA is responsible for performing STP topology recalculations when a switch is powered up and when a topology change occurs. SpanningTree Protocol (STP) Protocol developed to eliminate the loops caused by the multiple paths in an internetwork. Its defined by IEEE 802.1. STP communicates topology changes from switch to switch with the use of BPDUs. Standby Route Processor The router standing by in an HSRP Standby Group, waiting to take over in the event the active route processor fails. static IP addresses IP addresses that are assigned to each network device individually; often referred to as hardcoded. static VLAN port A port on a switch manually assigned a VLAN number. Any node or interface connected to the port automatically becomes a member of the assigned VLAN. static window A mechanism used in flow control that prevents the sender of data from overwhelming the receiver. Only a set amount of data can be buffered in a static window. station IPX address 392
A 12digit number that is used to uniquely identify each device on an IPX network. storage area network A subnetwork of storage devices, usually found on highspeed networks and shared by all servers on the network. storeandforward A fast packetswitching method that produces a higher latency than other switching methods. The switch waits for the entire packet to arrive before checking the CRC. It then forwards or discards the packet. StreetTalk A global naming service created by Banyan and included with the Banyan Vines network operating system. subnet mask A 32bit address that is used to mask or screen a portion of the IP address to differentiate the part of the address that designates the network and the part that designates the host. subnetting The process of dividing your assigned IP address range into smaller clusters of hosts. Subnetwork Access Protocol (SNAP) An Internet protocol that specifies a standard method of encapsulating IP datagrams and ARP messages on a network. supernetting Aggregating IP network addresses and advertising them as a single classless network address. switch A Layer 2 networking device that forwards frames based on destination addresses. switch block Switching devices located in wiring closets, requiring highspeed uplinks and redundancy. The switch block connects enduser stations to the switches that connect to the Distribution layer. Switched Multimegabit Data Service (SMDS) Defined by IEEE 802.6; the Physicallayer implementation for data transmission over public lines at speeds between 1.544Mbps (T1) and 44.736Mbps using cell relay and fixedlength cells. Switched Port Analyzer (SPAN) A port at which traffic from another port or group of ports is attached to a protocol analyzer or probe device. The SPAN aids in the diagnoses of problems related to traffic patterns on the network. switched virtual circuit A virtual circuit that is established dynamically on demand to form a dedicated link and is then broken when transmission is complete. Also known as a switched virtual connection in ATM terminology. switching fabric The highway the data takes to get from the input port on a switch to the output port. synchronous transmission Digital signal transmission method using a precise clocking method and a predefined number of bits sent at a constant rate. syslog Messages sent to a remote machine regarding the switch system configuration, such as software and configuration changes.
T
T1 Digital WAN carrier facility that transmits DS1formatted data at 1.544Mbps through the telephone switching network, using AMI or B8ZS coding. TCP/IP See Transmission Control Protocol/Internet Protocol. Telecommunications Industry Association (TIA)
393
An organization that develops standards with the EIA (Electronics Industries Association) for telecommunications technologies. Telnet Standard terminalemulation protocol in the TCP/IP protocol stack. It is used to perform terminal emulation over TCP/IP via remote terminal connections, enabling users to log in to remote systems and use resources as if they were connected to a local system. Terminal Access Controller Access Control System Plus (TACACS+) A security feature that uses an MD5 encrypted algorithm to enforce strict authentication controls. It requires both a user name and password, allowing administrators to better track network usage and changes based on user accounts. thicknet coax Thick cable (usually about .375 inch in diameter) most commonly found in the backbone of a coaxial network. thinnet coax Cable that is thinner than thicknet (about .25 inch in diameter). It is commonly used in older bus topologies to connect the nodes to the network. token A frame that provides controlling information. In a Token Ring network, the node that possesses the token is allowed to transmit next. Token Ring An IBM proprietary tokenpassing LAN topology defined by the IEEE 802.5 standard. It operates at either 4 or 16Mbps in a star topology. Token Ring adapters Traditional ISA or Microchannel devices with 4 or 16Mbps transfer capability, used to connect nodes to a Token Ring network. topology The shape or layout of a physical network and the flow of data through the network. Transmission Control Protocol (TCP) Part of the TCP/IP protocol stack. TCP is a connectionoriented, reliable datatransmission communication service that operates at the OSI Transport layer. Transmission Control Protocol/Internet Protocol (TCP/IP) The suite of protocols combining TCP and IP, developed to support the construction of worldwide internetworks. See Transmission Control Protocol and Internet Protocol. Transmission Control Protocol/Internet Protocol (TCP/IP) socket A socket, or connection to an endpoint, used in TCP/IP communication transmissions. transmit The process of sending data using light, electronic, or electric signals. In networking, this is usually done in the form of digital signals composed of bits. Transparent Bridging (TB) A bridging type that uses the MAC address to make forwarding and filtering decisions transparent to the sender and receiver interfaces. TB is used in Ethernet. Transport layer Layer 4 of the OSI Reference Model. It controls the flow of information. Trivial File Transfer Protocol (TFTP) A simplified version of FTP, allowing files to be transferred over a network from one computer to another. Its also used to install the Cisco IOS on an IOSbased switch, router, or Gigabit Switch Router (GSR). trunk link A special type of VLAN connection. Unlike a user port, trunk links expect the device at the other end of the connection to understand the inserted frame tags. Standard Ethernet and Token Ring cards do not understand frame tags. Trunk links use an encapsulation method that allows them to carry the data of more than one VLAN through the switched internetwork. Devices that support trunk links are switches, routers, and some specialized NICs meant for servers. twistedpair A type of cable that uses multiple twisted pairs of copper wire.
394
UX
unicast A frame in which the destination MAC address specifies the single destination computer. Unicast can be summarized as direct network traffic between two individual nodes. unshielded twistedpair (UTP) A type of cable that uses multiple twisted pairs of copper wire in a casing that does not provide much protection from EMI. The most common network cable in Ethernet networks, it is rated in five categories. UplinkFast Provides fast convergence after an STP topology change and achieves load balancing between redundant links. User Datagram Protocol (UDP) A communications protocol that provides connectionless, unreliable communications services and operates at the Transport layer of the OSI model. It requires a transmission protocol such as IP to guide it to the destination host. usernetwork interface (UNI) An interface that provides a connection between an ATM endstation interface and an ATM switch interface. virtual LAN (VLAN) Allows a network administrator to divide a bridged network into several broadcast domains. Each VLAN is considered its own separate subnet, and Layer 3 routing is still required to route between VLANs. VLANs can be based on the port identifier of the switch, the MAC address, Layer 3 address, directory information, or application information. VLANs can be implemented on different media types such as Ethernet, FDDI, Token Ring, or ATM. The benefits of VLANs are limited broadcast domains, added security, and redundancy. virtual private network (VPN) A network that uses a public network such as the Internet as a backbone to connect two or more private networks. A VPN provides users with the equivalent of a private network in terms of security. VLAN Trunking Protocol (VTP) A protocol used to enhance and configure the extension of broadcast domains across multiple switches. VTP dynamically reports the addition of VLANs throughout the switched network, in turn creating a consistent switched network. VLAN Trunking Protocol (VTP) pruning A protocol used to reduce the number of switches participating in VTP by removing switches from the database that do not have certain VLANs numbered ports. For example, if switch 1 and switch 2 have ports belonging to VLAN 6 and switch 3 does not, it will not forward VLAN 6 traffic on the trunk link to switch 3 unless switch 3 is a gateway to another switch that has VLAN 6 member ports. If VTP pruning were not enabled on a trunk port, all VLAN traffic would travel through the trunk links to all the switches whether they had destination ports or not. wide area network (WAN) Data communications network that serves users across a broad geographical area. A WAN often uses transmission devices such as modems and Channel Service Units/Data Service Units (CSU/DSU) to carry signals over leased lines or common carrier lines. window flow control A flowcontrol method in which the receiving host buffers the data it receives and holds it in the buffer until it can be processed. After it is processed, an acknowledgment is sent to the sender. XTAG A onebyte value used as an identifier Multilayer Switch Route Processor (MLSRP).
395