DOC-00918 Rev01 EXOC Presentation SG Version 12.1
DOC-00918 Rev01 EXOC Presentation SG Version 12.1
DOC-00918 Rev01 EXOC Presentation SG Version 12.1
Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 (408) 579-2800 http://www.extremenetworks.com Part number: DOC-00918
AccessAdapt, Alpine, Altitude, BlackDiamond, EPICenter, Essentials, Ethernet Everywhere, Extreme Enabled, Extreme Ethernet Everywhere, Extreme Networks, Extreme Standby Router Protocol, Extreme Turbodrive, Extreme Velocity, ExtremeWare, ExtremeWorks, ExtremeXOS, Go Purple Extreme Solution, ScreenPlay, Sentriant, ServiceWatch, Summit, SummitStack, Triumph, Unified Access Architecture, Unified Access RF Manager, UniStack, the Extreme Networks logo, the Alpine logo, the BlackDiamond logo, the Extreme Turbodrive logo, the Summit logos, the Powered by ExtremeXOS logo, and the Color Purple, among others, are trademarks or registered trademarks of Extreme Networks, Inc. or its subsidiaries in the United States and/or other countries. Adobe, Flash, and Macromedia are registered trademarks of Adobe Systems Incorporated in the U.S. and/or other countries. AutoCell is a trademark of AutoCell. Avaya is a trademark of Avaya, Inc. Internet Explorer is a registered trademark of Microsoft Corporation, and Microsoft Windows Server is a trademark of Microsoft Corporation. Mozilla Firefox is a registered trademark of the Mozilla Foundation. RSA Ace/Server and RSA SecurID are registered trademarks of RSA Security, Inc. sFlow is a registered trademark of sFlow.org. Solaris and Java are trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Specifications are subject to change without notice. All other registered trademarks, trademarks, and service marks are property of their respective owners. 2008 Extreme Networks, Inc. All Rights Reserved.
Table of Contents
Module 1: Introduction and Orientation............................................................................................. 1
ExtremeXOS Operation and Configuration ......................................................................................2 Introductions ..............................................................................................................................4 Facilities ....................................................................................................................................6 Student Kit ................................................................................................................................8 Administrative ..........................................................................................................................10 Course Prerequisites..................................................................................................................12 High-Level Student Objectives....................................................................................................14 Agenda ....................................................................................................................................16 Introduction to the Extreme Networks Certification Program ..........................................................22 Extreme Networks Associate (Level 1) .........................................................................................24 Extreme Networks Specialist (Level 2).........................................................................................26 ENA Certification Curriculum .....................................................................................................28 ENS Certification Curriculum .....................................................................................................30 Supportive Curriculum ...............................................................................................................32 Summary..................................................................................................................................34
Table of Contents Switch Login ............................................................................................................................14 CLI - Command Prompt .............................................................................................................16 Management Accounts ..............................................................................................................18 Creating User Accounts .............................................................................................................20 Failsafe Login ...........................................................................................................................22 Limiting CLI Sessions and Failed Logins......................................................................................24 Restricting Telnet Access...........................................................................................................26 Configuring Management Access ................................................................................................28 Using SSH and SCP ..................................................................................................................30 Using SNMP.............................................................................................................................32 Configuring SNMP System Parameters ........................................................................................34 Configuring SNMP Access Parameters.........................................................................................36 Authenticating Switch Management Users ...................................................................................38 Logging Features.......................................................................................................................40 Configuring Logging ..................................................................................................................42 Displaying Log Messages ...........................................................................................................44 Using SNTP..............................................................................................................................46 Verifying the Management Configuration......................................................................................48 Summary..................................................................................................................................50 Lab..........................................................................................................................................52 Review Questions ......................................................................................................................54
Table of Contents Using the Switch Editor .............................................................................................................42 BootStrap Menu Options............................................................................................................44 BootROM Menu Options ............................................................................................................44 Upgrading the BootROM ............................................................................................................46 Summary..................................................................................................................................48 Lab..........................................................................................................................................50 Review Questions ......................................................................................................................52
Table of Contents Stack Configuration - Stacking Operations ...................................................................................32 Operational Phase - Stacking Operations .....................................................................................32 Stack Link Failure Recovery - Stack Operations............................................................................34 Multiple Link Failure Recovery - Stack Operations ........................................................................36 Unit Failure Recovery - Stack Operations.....................................................................................38 Preparing a Stack for Configuration.............................................................................................40 Configuring a New Stack............................................................................................................42 Describing the Easy-Setup Option...............................................................................................44 Enabling / Disabling Stacking.....................................................................................................46 Configuring the Stacking Slot-number .........................................................................................48 Configure the Stacking MAC Address ..........................................................................................50 Configure Stacking Redundancy .................................................................................................52 Rebooting the Stack ..................................................................................................................54 Making The Non-Master Nodes IP Manageable.............................................................................56 Configuring Stacking License Level.............................................................................................58 Synchronizing Stacking Parameters.............................................................................................60 Verifying Stack Configuration .....................................................................................................62 Troubleshooting Stack Operation ................................................................................................62 Verifying Stack Operations .........................................................................................................64 Summary..................................................................................................................................66 Demonstration ..........................................................................................................................68 Review Questions ......................................................................................................................70
Table of Contents Extreme Link Status Monitoring (ELSM) ......................................................................................48 Verifying Extreme Link Status Monitoring ....................................................................................50 Summary..................................................................................................................................52 Lab..........................................................................................................................................54 Review Questions ......................................................................................................................56
Table of Contents
Table of Contents
Table of Contents Additional RIP Configuration Commands .....................................................................................34 Verifying the RIP-specific Configuration ......................................................................................36 Verifying RIP Interfaces and Routes ............................................................................................38 Verifying IP Forwarding and VLAN Interface.................................................................................40 Verifying the Route Source .........................................................................................................42 Summary..................................................................................................................................44 Lab..........................................................................................................................................46 Review Questions ......................................................................................................................48
Table of Contents Listing the Steps to Implement Network Login Using Local MAC-Based Authentication....................10 Creating a Network Login VLAN ..................................................................................................12 Enabling Network Login .............................................................................................................14 Configuring Local MAC Authentication ........................................................................................16 Adding a MAC-based User to the Local Authentication Database....................................................18 Verifying Global Network Login Settings ......................................................................................20 Displaying the System Log .........................................................................................................22 Network Login Design Considerations ..........................................................................................24 Local MAC-Based Network Login - Configuration Example .............................................................26 Disconnecting Network Login Sessions ........................................................................................28 Summary..................................................................................................................................30 Lab..........................................................................................................................................32 Review Questions ......................................................................................................................34
10
Table of Contents Identifying the Busiest Process...................................................................................................22 Displaying Processes .................................................................................................................26 Monitoring Process Heartbeat.....................................................................................................28 Terminating a Process ...............................................................................................................30 Starting a Process .....................................................................................................................32 Monitoring System Memory ........................................................................................................34 Monitoring Protocol Memory.......................................................................................................36 Summary..................................................................................................................................38 Lab..........................................................................................................................................40 Review Questions ......................................................................................................................42
11
Table of Contents Interpreting a Syslog File ...........................................................................................................68 Sample Syslog File: You Set Parameters......................................................................................70 Systematic Troubleshooting Steps...............................................................................................72 Defining the Problem.................................................................................................................74 Gathering Information Used for Troubleshooting...........................................................................76 Consider Escalation ...................................................................................................................78 Developing and Testing Theories.................................................................................................80 Implementing a Solution............................................................................................................82 Documenting the Solution..........................................................................................................84 Summary..................................................................................................................................86 Lab..........................................................................................................................................88 Review Questions ......................................................................................................................90
12
Target Audience
The primary audiences for this class are end-users, partners, and Extreme Networks technical personnel that are seeking Extreme Networks Associate (ENA) certification.
Module Content
Module one presents an introduction to the course content, training facilities, student objectives, course prerequisites, agenda, and certification curriculum.
Introductions
Provide your name, company, job title, and experience. Please share your previous networking experience as well as any Extreme Networks product exposure. This helps the instructor to adjust the class according to student skill sets.
Figure 2: Introduction
Facilities
Familiarize yourself with the facilities, particularly where the Emergency Exits and First Aid Stations are located. Pick up a name badge from the receptionist if available. The instructor specifies any special parking considerations when necessary.
Figure 3: Facilities
Student Kit
The illustration lists the contents of the student kit.
Administrative
The instructor circulates a class roster during the student introductions. Each student should check his or her own information on the class roster. When all information is verified, initial your name. Ensure that your name is spelled correctly the way you want it to be on the certificate at the completion of this course. Breaks are typically 15 minutes each and lunch is about an hour. However, the times may vary at the discretion of the instructor. Please silence all pagers and cell phones by turning off the audio beeps and/or muting the volume. At the instructor's discretion, pagers/phones in vibrate mode are permitted. If you need to take a phone call, go outside the classroom in consideration of the other students. Questions are encouraged at any time. Lab exercises are performed after each major topic is discussed. A student completing all the requirements of the Extreme Networks Associate (ENA) is certified and provided an Extreme Networks Certified Training Certificate.
10
Figure 5: Administrative
11
Course Prerequisites
To be successful in this class, it is recommended that students have a working knowledge of LAN fundamentals, and TCP/IP, IP addressing, and subnet masking. You should be competent in switching, bridging, and routing concepts.
12
13
14
15
Agenda
16
17
Agenda (Continued)
18
19
Agenda (Continued)
20
21
Certification Levels
Level 1 Extreme Networks Associate (ENA) Level 2 Extreme Networks Specialist (ENS)
22
23
24
25
Configure Extreme Networks advanced redundancy features. Configure Extreme Networks advanced multicast routing features. Configure Extreme Networks switches in complex routing environments. Configure Extreme Networks switches advanced security features. Troubleshoot Extreme Networks switches for Layer-2 and Layer-3 networking problems.
ENS certification is valid for two years. The exam is administered by selected Extreme Networks Authorized Training Partners.
ENS Exam
Scheduling this exam is similar to scheduling the ENA exam. Direct your web browser to www.extremenetworks.com. From the web page you can select an Extreme Networks ATP test center in your region. The ENS exam is a four-hour written and hands-on exam performed at and guided by one of Extreme Networks ATP test centers. The exam is comprised of two parts. One part consists of multiple choice questions. The other part consists of a hands-on practical exam. Candidates must achieve a score of 75% to be certified. The price for this exam is a single one-day training voucher. Be sure to bring a valid, government issued, photo identification to the testing location.
26
27
Describe Extreme Networks' products. Use the ExtremeXOS command line interface structure. Configure the Extreme Networks' switch for network management. Configure Layer 1 and Layer 2 networking features. Configure Layer 3 routing. Perform basic troubleshooting steps.
28
29
30
31
Supportive Curriculum
The following courses are currently elective.
Summit WM Fundamentals
This course is an introduction to the Summit WM-Series WLAN Switch and the Altitude AP, which comprises the Summit WM Wireless Solution. This course is designed for individuals responsible for the installation, configuration, maintenance and troubleshooting of the wireless solution.
32
33
Summary
At this point you should be familiar with the facilities and the Extreme Networks technical curriculum.
34
35
Introduction and Orientation This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
36
Student Objectives
The Product Overview module provides an overview of the Extreme Networks Products, including hardware, and software. Upon completion of this module, you will be able to:
List the various Extreme Networks product lines. Differentiate between the chassis and standalone switches. Describe Extreme Networks Summit WM system. Describe Extreme Networks Sentriant products. Describe Extreme Networks Management products. Identify the web-based user interfaces for Extreme Networks switching products.
Switching Products
Extreme Networks switching products come in two varieties: chassis and standalone. The chassis-based switching products are represented by the BlackDiamond product lines. The standalone switching products are grouped together under the Summit brand.
Wireless Products
The Summit WM20/200/2000 WLAN controller, and Altitude 350-2i/350-2d AP (indoor) are the wireless products offered by Extreme Networks.
Security Products
The Sentriant product line defines the various security products. Currently the Sentriant NG and Sentriant AG are the products in this portfolio.
ExtremeWare ExtremeXOS
ExtremeWare
ExtremeWare is a mature operating system that provides a rich set of Layer 2 and Layer 3 resiliency protocols, including EAPS. It provides ease of management and monitoring with support for LLDP and sFlow. Security features include network access authentication integrated with host integrity checking, control, and management plane security.
ExtremeXOS
ExtremeXOS is Extreme Networks advanced operating system. The functions and CLI are compatible with ExtremeWare to enable customers to easily migrate from one platform to another. It provides a high-availability architecture, extensibility via XML, dynamic application loading, and Universal Port scripting.
Network login IP security Hitless failover/upgrade MAC security Host integrity checking integration LLDP SNMPv1/v2/v3 SSH2/SCP EAPS, STP, ESRP, VRRP OSPF, RIP, PIM BGP sFlow (i-series platforms)
ExtremeXOS Only
The following list of features is only available on ExtremeXOS (not ExtremeWare):
IPv6 Layer 2 Layer 3 support Process monitoring and restart Process memory protection XML APIs Dynamic software module loading CLI scripting Universal Port
VoIP auto-configuration User-based dynamic security policies Time of the day policies
10 GB 48 8 4 8 36 20
Height 22 RU 10 RU 3 RU 10 RU 20 RU 14 RU
10
11
Summit Model / Media Type Summit48si X150-t / -p X250e-t / -p X250e-x X350-t X450-t Series X450-x Series X450a-t Series X450a-x Series X450e-p
OS EWare XOS XOS XOS XOS XOS XOS XOS XOS XOS
POE No 24 -p 24 / 48 -p No No No No No No 24 / 48 -p
NOTE
The -x, -t, and -p identifiers in the above table indicate if the product media is a optical, twisted-pair, or Power-overEthernet platform, respectively.
12
13
An Edge license can be upgraded to an Advanced Edge license. This upgrade is appropriate for Summit X250e and Summit X450e switches. An Advanced Edge license can be upgraded to a Core license. This upgrade is appropriate for Summit X450a, BlackDiamond 8800, and BlackDiamond 12802 switches. NOTE
Extreme Networks offers one-step upgrades only. Multi-step upgrades may be offered in the future.
Feature Packs
Feature packs offer separately licensed functionality on specific platforms. The following licenses are examples of Feature Packs:
14
15
16
17
Both the SWM (Summit Wireless Mobility) 100 and SWM200/2000 support the Altitude 350-2 AP. Also, both platforms feature dual hot-swappable power supplies.
Summit WM20
The Summit WM20 is a wireless system that features centralized controllers to manage APs. The Summit WM 20 System provides you with two 10/100/1000 Ethernet ports, support for up to thirty-two APs, and Dynamic Radio Management (DRM). It also supports up to five hundred twelve wireless client and eight access domains.
18
19
Sentriant NG
The Sentriant NG system has the following characteristics:
Detects and mitigates rapidly propagating threats in seconds. Defends against threats without interfering with network traffic Uses behavior-based threat detection methods (no signatures, no heuristics) Uses behavior-based technology to identify Day-Zero threats for which signatures are unavailable. Delivers fast detection with a network of virtual decoys Isolates attackers and prevents them from communicating with the remainder of the network
Sentriant AG
The Sentriant AG system has the following characteristics:
Network Access Control (NAC)protects the network by verifying that endpoint devices are free from threats and in compliance with IT security policies. Compliancy Tests Include: OS service packs and hot-fixes Browser and OS security settings Wireless security settings Anti-virus software, anti-spyware software, and personal firewall software (installed, running, and up-to-date) Administrator defined required or prohibited software
20
21
22
23
24
25
Summary
In summary, you should now be will be able to:
List the various Extreme Networks product lines. Differentiate between the chassis and standalone switches. Describe Extreme Networks Summit WM system. Describe Extreme Networks Sentriant products. Describe Extreme Networks Management products. Identify the web-based user interfaces for Extreme Networks switching products.
26
27
Review Questions
1 Which of the following products is part of the security product line? a Summit WM20 b EPICenter c Sentriant NG d Altitude 350-AP
2 The Summit WM20 is which type of product? a Switching product b Wireless product c Security product d Network management product
3 Which of the following products is a standalone switch? a Summit X450-24T b BlackDiamond 12804R c Sentriant NG d Summit WM200
4 Which of the following security products enables you to control network access? a Sentriant AG b Summit WM200 c ServiceWatch d Summit X450-24t 5 Which of the following licenses is on the Summit X150-24T by default? a Layer 2 Edge b Edge c Advanced Edge d Core
28
6 Which of the following features is available with an Edge License, but not with a Layer 2 Edge license? a MAC + IP security b IGMP snooping + filters c PIM snooping d Stacking
7 In which version of software is ExtremeXOS ScreenPlay first supported? a 11.4 b 11.6 c 12.0 d 12.1
29
Extreme Networks Product Overview This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
30
Student Objectives
The Initial Switch Configuration module presents a structured examination of the Extreme Networks Command Line Interface (CLI) along with the syntax and basic commands. Upon completion of this module, you will be able to:
Login to the switch. Interpret the system prompt. Assign a name to the switch. Use the syntax help function. Create a new user account. Describe the Simple Network Management Protocol (SNMP), Simple Network Time Protocol (SNTP), and logging management features.
The serial port is a 9-pin Male DTE connector that is configured for serial communications at ninety-six hundred bits per second, no parity bits, 8 data bits, and 1 stop bit. The serial port also uses XON / XOFF flow control. Because the serial port on the switch is configured as a serial Data Terminal Equipment (DTE) port, the serial cable connecting the switch to a PC or terminal should be a crossover cable (null modem). Once the switch and the computer are physically connected, you must invoke a terminal emulation program such as Hyper Terminal or PuTTY to manage the device.
Safe-Defaults Script
If this is the first time the switch has been configured since being set to the factory default configuration, the device executes the safe-default script and prompts you to:
Disable Telnet. Disable SNMP management access. Disable unconfigured system ports. Change the failsafe account username and password. Permit failsafe account access via the management port.
You respond with the letter Y for Yes and N for No in response to the prompts. The safe-default allows the administrator to provide a relative degree of security to the device by prompting them to disable management interfaces and ports that they will not be using. You may use the following command to rerun the safe-default script. configure safe-default-script Executing this command maintains your other configuration parameters.
CLI Access
The Extreme Networks switch product family is accessible through the Command Line Interface (CLI) using either of the following three connection types:
Any workstation with a Telnet facility should be able to communicate with the switch over a TCP/IP network. Up to eight active Telnet sessions can access the switch concurrently. With idle-timeout enabled the Telnet and console connection times out after twenty minutes of inactivity. If a connection to a Telnet session is lost inadvertently, the switch terminates the session within two hours. Nested Telnet sessions are also supported. Some Extreme Networks switches provide a dedicated 10/100 or 10/100/1000 Ethernet management port. This port provides dedicated remote access to the switch using TCP/IP. Management through this port can be Telnet using the CLI interface, ExtremeXOS ScreenPlay Web access, or SNMP access using EPICenter or another SNMP management application. The Ethernet management port is a DTE port, and is not capable of supporting switching or routing functions. The TCP/IP configuration for the management port is completed using the same syntax as is used for VLAN configuration. The pre-configured VLAN, called mgmt, only has the Ethernet management port as a member.
CLI Organization
As shown in the illustration the CLI provides commands that are nested five to six layers deep. Most of the CLI commands take effect immediately. The Extreme Networks Command Line Interface, or CLI, is simple to navigate. It uses a flat command hierarchy and doesnt require that you bounce back and forth between modules and sub-menus to configure the device. Simply start typing at the prompt in order to administer the switch.
Syntax Helper
If you are unsure of the complete syntax for a particular command, enter as much of the command as possible. The syntax helper provides a list of options for the remainder of the command.
10
11
List the ports separated by commas, i.e. 1,2,4 Specify a range of ports, i.e. ports 1-9 Specify all ports, i.e. ports all
CLI History
The Extreme Networks switch stores all the commands entered in the command history buffer. The contents of this buffer can be displayed by entering the history command. You can scroll through the command history buffer with the <Up> and <Down> arrow keys. Using these keys echo the next or previous command in the buffer and place the cursor at the end of the command string. To edit the command displayed on the command line use the left and right arrow keys. To display the commands entered, enter the following command: history
12
13
Switch Login
The switches support the following two access privileges levels:
User Administrator
The switches can have a total of sixteen management accounts. You can use the default account names (admin and user), or you can create new accounts with different names and passwords. Passwords must have a minimum of four characters and can have a maximum of twelve characters. However, account names can be entered that are between one and thirty-one characters. User names and passwords are case sensitive. You can create two admin accounts, and they are identical in their capabilities. ExtremeXOS provides a special Fail Safe account that can be used to recover from a lost Administrator account password. However, if the Fail Safe account password is lost, the switch must be returned to Extreme Networks. If you reboot the switch, you may login through the serial port using the failsafe account while the Authentication, Authorization and Accounting (AAA) system initializes. (pending-AAA) login: Once the AAA system has initialized, you may login to the switch with either a user or admin-level account.
login: admin password:
14
15
The prompt identifies the following: 3 The number of the next CLI command to be entered. (The number is reset upon reboot.) 4 The user account privilege level. # - The hash symbol represents an administrator privilege level. > - The greater than symbol represents a user privilege level. When entering a command at the prompt, ensure that you have the appropriate privilege level. Most configuration commands require the administrator privilege level.
16
17
Management Accounts
This page describes the two account levels supported.
Showing the switch configuration Showing switch management details User account database SNMP community strings
A user-level account can use the ping command to test if a device is reachable, and change the password assigned to the account name. If you have logged on with user capabilities, the command-line prompt ends with a (>) sign.
View and change all switch parameters Add and delete accounts, and change the password associated with any account name. Disconnect a management session that has been established by way of a Telnet connection. If this happens, the user logged on by way of the Telnet connection is notified that the session has been terminated.
To manage current sessions, use one of the following command: show session show session detail show session history To terminate a user CLI sessions, enter one of the following command: clear session <user_id> clear session all To log out of a session, enter one of the following commands: exit logout
18
19
Applying Passwords
Default accounts do not have passwords assigned to them. For security, always configure a password for the default accounts. To configure a password for the default admin account, enter the following command: configure account admin The system prompts you to specify a password after you enter this command. Passwords can have a minimum of 1 characters and a maximum of 32 characters. Passwords are case-sensitive.
NOTE
The default admin account cannot be deleted.
Additionally, using the following commands: configure configure configure configure you can:
| | | |
Specify that the password must contain numbers, uppercase, lowercase, and special characters. Block users from employing previously used passwords. Configure a time limit for the password. Enforce a minimum length for the password and set a maximum time limit, after which the password will not be accepted.
Show Accounts
To display user account information, enter the following command: show account The command displays the account names, access level, and number of successful and failed login attempts per account.
20
21
Failsafe Login
The failsafe account is the account of last resort to access the switch. This account is never displayed by the show account command, but is always present on the switch. To configure the failsafe account, enter the following command: configure failsafe-account You are prompted for the failsafe account name, and prompted twice to specify the password for the account. The failsafe account is immediately saved to NVRAM - not to the configuration file. For example: BD-10808.1 # configure failsafe-account enter failsafe user name: adminzilla enter failsafe password: enter password again: You may configure the switch to allow or deny the failsafe account access to the device using the following syntax: configure failsafe-account {[deny | permit] [all | control | serial | ssh {vr <vr-name>} | telnet {vr <vr-name>}]}
To use the failsafe account, enter the failsafe account name and password at the login prompt. Once you enter the failsafe account name, you are prompted to enter the password. Once you successfully log in to the failsafe account, you are logged in to an admin-level account.
NOTE
The information that you use to configure the failsafe account cannot be recovered by Extreme Networks Technical support. Protect this information carefully.
22
23
24
25
26
27
Telnet Secure Shell (SSH2) Secure copy (SCP) Simple Network Management Protocol (SNMP) Simple Network Time Protocol (SNTP) Remote Authentication Dial-In User Server/Service (RADIUS) Remote Monitoring (RMON) Remote logging
These Management features along with local logging provide enhanced management of the Extreme Networks switch family: To access the switch through the management port, an IP address must be assigned to the port. To assign an IP address and optional subnetwork mask to the management port, enter the following command: configure vlan mgmt ipaddress <ipaddress> {<netmask>} Examples: configure vlan mgmt ipaddress 10.0.0.1 255.255.255.0 NOTE
The dedicated management port is located on the MSM of a BlackDiamond switch, on the rear panel of the Summit X450 switch, and on the front panel of the SummitX450a and SummitX450e.
28
29
30
31
Using SNMP
Any Network Management application supporting SNMP or SNMPv3 can manage the switch as long as the correct Management Information Base (MIB) is properly installed on the management console. EPICenter is an integrated application suite that simplifies configuration, troubleshooting, and status monitoring of IP-based networks. EPICenter offers a comprehensive set of network management applications, including the ability to configure, monitor, troubleshoot, and manage the network and its elements.
NOTE
To have access to the SNMP agent residing in the switch, at least one VLAN must have an IP address assigned to it.
Access to one VLAN, gives you access to the entire switch. The switch is managed as a single device since it only has one MAC address that is shared.
NOTE
Ensure that the SNMP Management Information Base (MIB) is installed correctly.
32
33
System Name
The system name is the name that is assigned to this switch. To configure the SNMP system name of the switch, enter the following command: configure snmp sysname <string> A maximum 32 characters are allowed. The sysname appears in the CLI prompt. The default name is the model name of the switch (for example, SummitX450).
System Location
The system location is a text field used to identify the location of the switch. To configure the SNMP location name of the switch, enter the following command: configure snmp syslocation <string> A maximum of 255 characters are allowed.
System Contact
This is a text field used to identify the name of the person(s) responsible for managing the switch. To configure the name of the system contact, enter the following command: configure snmp syscontact <string> A maximum of 255 characters are allowed.
34
35
Community Strings
Community strings are a simple method of authentication between the switch and the remote Network Manager. The default community strings are:
private = default read/write community string public = default read-only community string
To add an SNMP read or read/write community string, enter the following command: configure snmp add community [readonly | readwrite] <string> Each community string can have up to 126 characters, and can be enclosed by double quotation marks.
The address as unicast, multicast, or broadcast. A UDP port to which the trap should be sent. The IP address of a VLAN to be used as the source address for the trap. The trap mode as standard or enhanced with extra varbinds. NOTE
NOTE
With ExtremeWare you can use Access Profiles for SNMP.
36
37
38
39
Logging Features
The switch log tracks all configuration and fault information pertaining to the device. Each entry in the log contains the following information:
Timestamp
The timestamp records the month and day of the event, along with the time (hours, minutes, seconds, and hundredths of a second)) in the form HH:MM:SS:HH. If a user caused the event, the user name is also provided.
Severity Level
Describes the four levels of importance that the switch can assign to a fault. Critical, Warning, Informational and Debug. By default, log entries that are assigned a critical or warning level remain in the log after a switch reboot. Issuing a clear log command does not remove these entries.
Message
The message contains the log information with text that is specific to the problem. The switch maintains up to 20,000 messages in its internal log depending on the model of switch. The default setting is 1000 log entries.
40
41
Configuring Logging
In addition to maintaining an internal log, the switches support remote logging using the UNIX Syslog host facility. To enable remote logging, configure the Syslog host to accept and log messages, and enable remote logging. To configure the remote syslog server host address, and filters messages to be sent to the remote syslog target. configure syslog {add} [<ipaddress> | <ipPort>] {vr <vr_name>} [local0 ...local7] {<severity>} To configure the severity level of messages sent to the target, enter the following command: configure log target [console | memory-buffer | nvram | primary-msm | backup-msm | session | syslog [all | <ipaddress> | <ipPort> {vr <vr_name>} [local0 ... local7]]] {severity <severity> {only}} By default, targets are sent messages of the following severity level and above:
console display.info memory buffer.debug-data NVRAM.warning session.info syslog.debug-data primary MSM.error (modular switches only) backup MSM.error (modular switches only)
To enable the sending of log messages to the specified target., enter the following command: enable log target [console | memory-buffer | nvram | primary-msm | backupmsm | session | syslog [all | <ipaddress> | <ipPort>] {vr <vr_name>} [local0 ... local7]]] To enable logging to all remote syslog host targets, enter the following command: enable syslog
42
43
To remove the log entries of all levels (including warning or critical), enter the following command: clear log {error-led | static | messages [memory-buffer | nvram]}
Syntax Description
error-led static memory-buffer nvram Clears the ERR LED on the MSM. Specifies that the messages in the NVRAM and memory-buffer targets are cleared, and the ERR LED on the MSM is cleared. Clears entries from the memory buffer. Clears entries from NVRAM.
44
45
Using SNTP
ExtremeXOS supports the client portion of the Simple Network Time Protocol (SNTP) Version 3. When enabled, the switch sends out a periodic query to the NTP server, or the switch listens to broadcast NTP updates. To configure the switch to update and synchronize its internal clock from an NTP server, enter the following command: configure sntp-client [pri | sec] server [<ip address> | <host name>] {vr <vr_name>} Queries are sent first to the primary server. If the primary server does not respond within 1 second, or if it is not synchronized, the switch queries the second server. If the switch cannot obtain the time, it restarts the query process. Otherwise, the switch waits for the sntp-client update interval before querying again. To configure the interval between SNTP queries, enter the following command: configure sntp-client update-interval <seconds> NTP server updates are distributed using GMT time. To properly display the local time in logs and other timestamp information, configure the switch with the appropriate offset to GMT. To configure the GMT offset and Daylight Saving Time (DST) preference, enter the following command: configure timezone {name <tz_name>} <GMT_offset> {autodst {name <dst_timezone_ID>} To enable the SNTP client, enter the following command: enable sntp-client To disable the SNTP client, enter the following command: disable sntp-client To display configuration and statistics information of the SNTP client, enter the following command: show sntp-client NOTE
SNTP is based on RFC1769.
If no time server is available, the system date and time can be set using a command similar to the following: configure time 10 09 2006 17 29 00
46
47
Enable/disable states for Telnet, and SNMP Authorized SNMP station list SNMP trap receiver list RMON polling configuration SNMP statistics
48
49
Summary
The Initial Switch Configuration module provided a structured examination of the Extreme Networks Command Line Interface (CLI) along with the syntax and basic commands. You should now be able to:
Login to the switch. Interpret the system prompt. Assign a name to the switch. Use the syntax help function. Create a new user account. Describe the SNMP, SNTP, and logging management features.
50
51
Lab
Turn to the Initial Switch Configuration Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
52
53
Review Questions
1 What are the three connection types used to access the command line interface? a Console, Telnet, and SSH2 b Console, Telnet, and SSL c Console, Telnet, and SNMP d Console, Telnet, and RADIUS
2 What key is used to display the next tier of a CLI command or to complete a command? a Number sign/pound sign/hash mark (#) b Exclamation point (!) c Question mark (?) d Tab key
3 Which two authentication mechanisms for administrative access are supported by Extreme Networks switches? a SSL and SNMP b SSH2 and Telnet c RADIUS and TACACS+ d DES3 and 802.1X
4 Which of the following statements is false? a The secure copy feature is available in the ExtremeXOS base image b Secure Socket Layer (SSL) functionality is part of the SSH installable software module. c The SSH feature is provided by an installable software module. d The SSH2 feature does not appear as a CLI option until after the SSH installable software module has been downloaded and installed.
5 Which of the following is needed to log into the switch using the serial console port? a A null modem or serial crossover cable. b A PC running terminal emulation software. c Serial communications protocol set to 9600, N, 8, 1, and None. d All of the above.
54
6 Which of the following is true? a If the CLI prompt has an asterisk as the first character, there have been configuration changes that have not been saved. b The pound sign (#) at the end of the CLI prompt indicates that the person who has logged in has user-level privileges. c If the SNMP sysname parameter is changed from its default value, it will not be reflected in the CLI prompt.
7 Which of the following commands creates a user-level account named fred? a create account fred b configure account user fred c add account fred user d create account user fred
8 Which of the following commands allows the user to view commands that have been previously entered during this session? a show history b view history c display history d None of the above
9 Which of the following commands enables the syslog feature? a configure syslog enable b start syslog c enable syslog d set syslog on
55
Initial Switch Configuration This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
56
Switch Management
Switch Management
Student Objectives
This module presents a structured examination of the Extreme Networks Switch Management. Upon completion of this module, you will be able to:
Identify switch software images and configuration files. Save the switch configuration. Copy, rename, and remove configuration files. Assign an IP address to a VLAN. Backup the switch configuration. Create, edit, and restore an ASCII-based command script. Download a software image.
Switch Management
System name, system location, system contact MAC address Current date and time, and system boot time Scheduled reboot information Non-Volatile Random Access Memory (NVRAM) image (primary/secondary image, version) NVRAM configuration (primary/secondary configuration, date, time, size)
From this display, you can determine the software image file that the switch booted from. It is identified as Image Booted. The software image file that the switch boots from next is identified as the Image Selected. You can also determine the configuration file the switch used to boot. It is identified as Config Booted. The configuration file that the switch uses during the next boot is identified as the Config Selected. In the example shown, the software image selected and booted is taken from the primary location. The configuration selected and configuration booted is also taken from the primary location.
Switch Management
VR-Default - The default VR created by the system. All data ports in the switch are assigned to this VR by default. Any port or VLAN can be added. One instance of each routing protocol is spawned for this VR during boot up. These routing instances cannot be deleted. (called VR-2 in EXOS release 10.2) VR-Mgmt - The switch management port is owned by this VR. The Mgmt VLAN is created in this VR during boot up. No other ports or VLANS can be added. Used for default access for Telnet, SNMP, SSH2, TACACS, and RADIUS. (called VR-0 in release 10.2) VR-Control - Has no external port and no VLAN interface. No port, VLAN, or routing protocol can be added. Used internally by the switch for inter-process communication. (called VR-1 in release 10.2) NOTE
NOTE
Users are allowed to create Virtual Routers on BlackDiamond platforms. Users are not allowed to create Virtual Routers on Summit Platforms.
Switch Management
Assigning IP Addresses
The switch comes with pre-configured VLANs named Mgmt (management) and Default.
The Mgmt VLAN is available on devices that feature an Ethernet Management port. The Ethernet management port provides out-of-band management access to an Extreme Networks switch. The Default VLAN comes configured with all data ports assigned to it.
For lab exercise purposes, we need to assign an IP address to one of the pre-configured VLANs and assign an IP address to the PC-laptop that is connected to the switch. Assigning an IP address creates a router interface within that VLAN. The default VLAN router interface is in the corresponding VR-Default virtual router. The mgmt VLAN router interface is in the corresponding VR-Mgmt virtual router. To assign an IP address and optional subnetwork mask to the named VLAN, enter the following command: configure vlan <vlan name> ipaddress <ipaddress> {<netmask>} The subnetwork mask notation can take either of two forms:
Full dotted-decimal notation For example: 255.255.255.0 Slash notation which indicates the network portion in binary bits. For example, /24
Examples: configure vlan mgmt ipaddress 10.0.0.1 255.255.255.0 configure vlan default ipaddress 10.0.1.1/24 To remove an IP address and optional mask from the named VLAN, enter the following command: unconfigure vlan <vlan name> ipaddress
Switch Management
Primary Secondary
When downloading a new image, select which image space (primary or secondary) the new image is to be placed into. The primary and secondary software images are stored in Flash RAM. You may find it useful to use both primary and secondary image files, especially when upgrading software. If something goes wrong with an upgrade, you have a fallback image to boot from. These containers, although called primary and secondary, are just placeholders.
Which software image is selected, and which image that is used when the switch boots. The configuration that is selected and the configuration that is used when the switch boots.
10
11
Switch Management
NOTE
Although all of the switches listed above run ExtremeXOS 12.1, the binary image files are unique for different switches.
Every switch loads a user-selected software operating system image file when it boots. The image name identifies the compatible switch type. For example:
For BlackDiamond 8810 and 8806 the current file name is: bd8800-12.1.1.4.xos For BlackDiamond 10808 the current file name is: bd10K-12.1.1.4.xos For Summit X450 the current file name is: summitX450-12.1.1.4.xos NOTE
Prior to release 11.3 the file name for BlackDiamond 8810 images began with the word aspen; for example, aspen-11.2.3.3.xos.
NOTE
Frequently the image file name downloaded from Extreme Networks web site contains square brackets. For example: bd10K-11[1][1].6.3.3.xos. Some TFTP servers cannot interpret the square brackets. Therefore the file must be renamed before it can be downloaded to the switch.
.xos - The core image file .xmod - A software module that adds functionality to supplement a core image. .xbr - A BootROM image. NOTE
The version number of a modular software package must match the version number of the core image that it will be running with.
12
13
Switch Management
Where: <Switch Platform> is the name of the platform (e.g. bd10K) <Package Name> is an abbreviated name for the content of the package. <Global Version> is the overall version of ExtremeXOS in the format <major>.<minor>.<patch>.<build>
14
15
Switch Management
16
17
Switch Management
If no parameters are specified, the image is saved to the location selected for the next reboot. To verify that the image downloaded to the correct location, enter the following command: show log
18
19
Switch Management
20
21
Switch Management
As you can see, along with the names of the configuration files that are active and selected to be loaded upon next reboot, the display shows:
The name of the active configuration file The version of software that created the configuration file The size of the configuration file And the date that the configuration file was last saved to NVRAM
22
23
Switch Management
NOTE
You may press the tab key after typing the show configuration command to display the modules for which configuration information is available.
To display the entire active configuration, enter the following command: show configuration detail To display a specific configuration module, simply use the show configuration command followed by the module name. For example to limit the display to the Routing Information Protocol (RIP) parameters that have changed from their default values, enter the following command: show configuration rip
NOTE
The use configuration command does not select the active configuration. The command selects which configuration is going to be used after the next reboot.
24
25
Switch Management
Syntax Description
host-name ip-address vr_name internal-memory local-file-internal memorycard local-file-memcard local-file remote-file Specifies the name of the remote host. Specifies the IP address of the TFTP server. Specifies the name of the virtual router. The default is vr-mgmt Specifies the internal memory card. Specifies the name of the core dump file located on the internal memory card. Specifies the removable external compact flash card. NOTE: This parameter is available only on modular switches. Specifies the name of the file on the external compact flash card. NOTE: This parameter is available only on modular switches. Specifies the name of the file (configuration file, policy file) on the local host. Specifies the name of the file on the remote host.
Example:
tftp put 10.0.4.106 -vr vr-mgmt primary.cfg Uploading /root/config/primary.cfg to 10.0.4.106 ..........
26
27
Switch Management
host-name - Is the host name of the TFTP server. ip_address - Is the IP address of the TFTP server. -g - Gets the specified file from the TFTP server and copies it to the switch. -l local_file - Specifies the name of the configuration file on the switch. -r remote_file - Specifies the name of the configuration file on the TFTP server.
You must reboot the switch to copy the downloaded configuration file into the active configuration. To reboot the switch, enter the following command: reboot
28
29
Switch Management
Modify the command script using a text editor Download a copy of the file to the same switch or to one or more different switches, and load the commands in the script on to the switch. Send a copy of the command script file to Extreme Networks Technical Support for problem-solving purposes.
To upload the current configuration as an ASCII-formatted command script to a TFTP server on your network, enter the following command: upload configuration [<hostname> | <ipaddress>] <filename> {vr <vr-name>}
Syntax Description
hostname ipaddress filename vr-name Specifies the hostname of the TFTP server where you want to upload the configuration file. You must have DNS enabled Specifies the IP address of the TFTP server where you want to upload the configuration file. Specifies a user-defined name for the command script. Specifies the name of the virtual router. The default is VR-Mgmt.
Example
upload configuration 20.0.0.102 sanjose.xsf vr vr-default NOTE
To load the ASCII-formatted command script using the load script command, the file must have an ExtremeXOS
CLI script (XSF) file extension. Even though the configuration file in the example is named primary.cfg on the switch, the upload command allows you to save it on the TFTP server as sanjose.xsf. The uploaded ASCII file retains the ASCII CLI format.
30
31
Switch Management
.Save the runtime configuration. save configuration primary Command scripts can be created or modified on the switch using the switch editor. edit script newscript.xsf
32
33
Switch Management
34
35
Switch Management
The first column displays the file permission using the following ten place holders.
The first place holder displays d for a directory and - for a file. The next three placeholders display r for read access, w for write access, and x for execute permission for the file owner. The next three placeholders display r for read access, w for write access, and x for execute permission for members of the file owners group. The last three placeholders display r for read access, w for write access, and x for execute permission for every user that is not a member of the file owners group.
The second column shows how many links the file has to other files or directories. The third column shows the file owner. The fourth column is the owners group. The remaining columns show the file size, date it was last modified, and the file name.
36
37
Switch Management
Configuration files use the .cfg file extension Policy files use the .pol file extension
This command also replicates the action from the primary MSM to the backup MSM. For example, if you rename a file on the primary MSM, the same file on the backup MSM is renamed. A message appears that asks you to confirm this action. To remove a file, enter the following command: rm <filename> The system prompts: Remove filename on switch? (y/n) Enter y to rename the file. Enter n to cancel. For example: rm oldtest.cfg Remove oldtest.cfg on switch? (y/n) Yes This command also replicates the action from the primary MSM to the backup MSM. For example, if you delete a file, the file is deleted on both the active on the backup MSM. A message appears that asks you to confirm this action.
38
39
Switch Management
Policy Files
A policy file is a text file that contains a series of rule entries describing match conditions and actions to take. Policy files are text files that are used by the access control list (ACL) application to perform packet filtering and forwarding decisions on packets. The ACL application will program these policies into the packet filtering hardware on the switch. Packets can be dropped, forwarded, moved to a different QoS profile, or counted, based on the policy statements. Policy files are used by the routing protocol applications to control the advertisement, reception, and use of routing information by the switch. Using policy files, a set of routes can be selectively permitted (or denied) based on their attributes, for advertisements in the routing domain. The routing protocol application can also modify the attributes of the routing information, based on the policy statements. The policy file can be created on the switch using the vi-like edit command. Alternately the policy file can be created on a TFTP server using a simple text editor like Windows Notepad and downloaded to the switch using the tftp command.
40
41
Switch Management
Move your cursor to the end of a line and press a to append to the end of the line. To escape the insert mode and return to the command mode, press the Escape key. When you enter command mode, your cursor appears at the end of the file at the colon : prompt. There are several commands that can be used from the command mode:
Type This dd p :q q! :wq yy :w To Do This Delete the current line. Paste the line copied. Quit the file if no changes were made. Forcefully quit the file without saving changes. Write and quit the file. Copy the current line. Write (save) the file.
42
43
Switch Management
NOTE
When asked to depress the <spacebar> remember to press and hold the <spacebar> key.
44
45
Switch Management
46
47
Switch Management
Summary
This module provided an introduction to the Extreme Networks switch management functions and configuration procedures. You should now be able to:
Identify switch software images and configuration files. Save the switch configuration. Copy, rename, and remove configuration files. Assign an IP address to the a VLAN. Backup the switch configuration. Create, edit, and restore an ASCII-based command script. Download a software image.
48
49
Switch Management
Lab
Turn to the Switch Management Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
50
51
Switch Management
Review Questions
1 Which of the following commands displays the names of the configuration and policy files on the switch? a list b show c ls d dir
2 Which of the following ExtremeXOS commands retrieves the configuration from a TFTP server? a tftp get b tftp put c retrieve d restore
3 Which of the following commands displays the switch status? a show system b show switch c show system info d show current config
4 Which command enables the system administrator to retrieve a new image file from a TFTP server? a tftp get b copy c download d transfer
5 Which of the following commands use the Virtual Router parameter? a use b tftp c edit d save
52
6 What types of switches support the mgmt VLAN? a Switches managed by the Vista web interface. b Switches managed by a directly connected EPICenter management station. c Switches with a dedicated management Ethernet port. d Switches with SNMP management enabled.
7 How many software images may be stored on the switch at the same time? a 1 b 2 c 3 d It depends on the amount of free memory
8 Which command enables the system administrator to save the current configuration to a file named myConfig.cfg that will be stored on the switch? a store configuration myConfig b write configuration myConfig c put configuration myConfig d save configuration myConfig
9 What does the unconfigure switch all command do? a It deletes the currently selected configuration except for user accounts, and reboots the switch. b It deletes the currently selected configuration except for user accounts. c It deletes all administrator created user accounts and resets the administrator password to the factory default.
d It initializes the value stored in the "Config Selected" field to "NONE", resets the parameters to original factory defaults, and reboots the switch.
10 Which of the following commands displays the software versions running on the switch? a show version b show software c show image d show running
53
Switch Management 11 In the display of the show switch command which field identifies the currently running software? a Primary b Secondary c Image Selected d Image Booted
12 XOS core image files typically end with which one of the following extensions? a .xos b .xmod c .xbr d all of the above
13 The upload command is used for which of the following? a To transfer a core image to a TFTP server as a binary file. b To transfer a configuration file to a TFTP server as XML-formatted file. c To transfer a configuration file to a TFTP server as an ASCII-formatted command script. d To transfer a configuration file to a TFTP server as compressed backup configuration file.
14 Which of the following commands saves the configuration to the secondary location? a save configuration secondary b use configuration secondary c save image secondary d use secondary
15 Which of the following commands configures the switch to boot from the software image in the primary location on the next boot up? a boot image primary b use configuration primary c save image primary d use image primary
54
16 The use image primary command does which of the following? a Causes the switch to load the primary image file in to memory and cause it to immediately execute without a reboot. b Causes the switch to load the primary image file in to memory and cause it to execute on the next reboot. c Causes the switch to clear the current configuration in memory and then immediately load the primary configuration image.
d Causes the switch to load the primary configuration image after next reboot.
17 Which of the following commands copies the primary configuration file to backup.cfg? a copy primary.cfg backup.cfg b duplicate primary.cfg backup.cfg c backup primary.cfg backup.cfg d cp primary.cfg backup.cfg
18 What is the command to reset all configuration parameters except date and time? a reset switch default b reset switch c unconfigure switch d unconfigure switch all
19 Which of the following commands causes the switch to reboot? a reboot b restart c reset d system shutdown
55
Switch Management This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
56
Layer 1 Configuration
Layer 1 Configuration
Student Objectives
The Layer 1 Configuration module provides an introduction to the Extreme Networks switch port types, port parameters, and port and load sharing configuration commands. Upon completion of this module, the successful student will be able to:
Configure port speed and duplex. Define the link aggregation feature and its benefits. Describe the different link aggregation algorithms. Configure dynamic address-based link aggregation. Verify the link aggregation configuration. Describe the Extreme Discovery Protocol. Enable the Link Layer Discovery Protocol.
Layer 1 Configuration
Layer 1 Configuration
Port Parameters
Ports on the switch can be configured in the following ways:
Enabling and disabling individual ports Configuring the port speed Configuring half- or full-duplex mode Enabling and disabling auto-negotiation Enabling and disabling auto polarity Creating link aggregation groups on multiple ports Configuring QoS on a port-by-port basis
Layer 1 Configuration
Fast Ethernet ports can be manually configured for either 10 Mbps or 100 Mbps. Fast Ethernet ports can be configured for half- or full-duplex operation. 10/100 Mbps copper ports can be manually configured for duplex and speed. 100BASE-FX ports operate in full-duplex only and the speed cannot be modified. 1 Gigabit fiber and copper Ethernet ports are statically set to 1 Gbps. The speed and duplex mode cannot be modified. Flow control for Gigabit Ethernet ports is supported, and is enabled or disabled as part of autonegotiation:
To configure port duplex and speed, enter the following command: configure ports <port_list> auto off speed [10 | 100 | 1000 | 10000] duplex [half | full] For example: configure ports 9 auto off speed 100 duplex full
Layer 1 Configuration
10
11
Layer 1 Configuration
Link Aggregation
The link aggregation (load sharing) feature allows you to interconnect switches with multiple links, yet have those links treated as if they were one physical connection. If there is only a single link between switches, it presents network challenges resulting from the following:
Link aggregation allows you to increase bandwidth and resilience between Extreme Networks switches by using a group of ports to carry traffic in parallel between switches. The sharing algorithm allows the switch to use multiple ports as a single logical port. For example, VLANs treat a load-sharing group as a single logical port. Most load sharing algorithms guarantee packet sequencing between clients. If a port in a load-sharing group fails, traffic is redistributed to the remaining ports in the load-sharing group. If the failed port becomes active again, traffic is redistributed to include that port. The load-sharing feature is supported between all Extreme Networks switches, and may also be compatible with third-party trunking or sharing algorithms
NOTE
Load sharing must be enabled on both ends of the link, or a network loop results.
12
13
Layer 1 Configuration
Address-based
The address-based link aggregation algorithm examines a specific place in the packet to determine which egress port to use for forwarding traffic.
For Layer 2 load sharing, the switch uses the MAC source address and destination addresses. For Layer 3 load sharing, the switch uses the IP source address and destination addresses. If the packet is not IP, the switch applies the Layer 2 algorithm. Layer 3_4 Examines the IP port number in addition to the IP address. NOTE
Beginning with ExtremeXOS software version 11.2, the switch can use IPv6 addresses.
Port-based
Port-based load sharing uses the ingress port to determine which load-sharing member port to forward traffic out of. This is a static mapping between ingress port and load-share port. Along with guaranteed packet sequencing, the address-based link aggregation algorithm provides a more even distribution of traffic than the port-based algorithm.
14
15
Layer 1 Configuration
dynamically determine if link aggregation is possible. automatically enable and configure link aggregation. dynamically reconfigure the sharing groups.
The group is only enabled when LACP detects that the other end is also using LACP, and the ports are configured to be in a group. Among those ports deemed aggregatable by LACP, the system uses those ports with the lowest port number as active ports; the remaining ports aggregatable to that LAG are put into standby status. If more ports in the LAG are selected than the aggregator can handle because of the system hardware, those extra ports are moved into the standby state. As the name implies, the standby ports are available to join the aggregator if one of the selected ports should fails or is disabled. The lowest numbered ports are the first to be dynamically added to the aggregator.
NOTE
LACP does not control the packet distribution algorithm. Both ends of the link should be configured to use the same algorithm.
16
17
Layer 1 Configuration
BlackDiamond 10808, BlackDiamond 12804, and BlackDiamond 8800 switches support Cross-Module Link Aggregation (CMLA). The link aggregation group can span I/O modules On the BlackDiamond 8800 original modules and Summit X450 switch, any broadcast, multicast, or unknown unicast packets are transmitted on the logical port of a load-sharing group. On the BlackDiamond 8800 a-series and e-series modules and Summit X450a and X450e series switches, broadcast, multicast, or unknown unicast packets are transmitted on all port of a loadsharing group. Port-based load sharing is not supported on the BlackDiamond 8800 series and Summit X450 series of switches. Only the address-based algorithm is supported. The BlackDiamond 10808 and BlackDiamond 12804 switches cannot specify L2 or L3 for the addressbased LACP algorithm. A static Link Aggregation Group (LAG), or load-sharing group, can include a maximum of 8/16 ports. An LACP (dynamic) LAG can include a maximum of 16/32 ports; out of these up to 8/16 can be active links and the remaining 8 will be standby links. The maximum number of LAGs is 32/128. NOTE
The first LAG limitation number applies to BlackDiamond 8800 and Summit X450. The second number applies to the BlackDiamond 10808.
18
19
Layer 1 Configuration
Syntax Description
port port_list port-based address-based L2 L3 L3_L4 Specifies the logical port for a load-sharing group or link aggregation group (LAG). Specifies one or more ports or slots and ports to be grouped to the logical port. Specifies link aggregation by port-based algorithm. NOTE: This parameter is only on the BlackDiamond 10808 and BlackDiamond 12804 switches. Specifies link aggregation by address-based algorithm. Specifies address-based link aggregation by Layer 2. Layer 2 is the default value. NOTE: This is only on the BlackDiamond 8800 series and Summit X450 switches. Specifies address-based link aggregation by Layer 3. NOTE: This is only on the BlackDiamond 8800 series and Summit X450 switches. Specifies address-based link aggregation by Layer 3 IP plus Layer 4 port. NOTE: This parameter is available only on the Summit X450a switch, X450e switch and BlackDiamond 8800 a-series and e-series modules. lacp Specifies dynamic link aggregation, or load sharing, using the LACP.
All ports in an LAG must have at the same speed and duplex settings. Each port can belong to only one LAG. After link aggregation is enabled the LAG can be modified using the configure command. ExtremeXOS allows the following configuration without deleting the LAG:
Change the address layer for address-based groups. Add ports to or delete ports from the LAG.
The software supports control protocols across the LAGs, both static and dynamic. For example, EAPS, ESRP, LLDP, and STP. Although you can only reference the logical port of an LAG in a Spanning Tree Domain (STPD), all the ports of a load-sharing group actually belong to the specified STPD. Always reference the logical port of the LAG when configuring or viewing VLANs. VLANs configured to use other ports in the LAG will have those ports deleted from the VLAN when link aggregation becomes enabled. NOTE
Load sharing must be enabled on both ends of the link, or a network loop may result.
20
21
Layer 1 Configuration
Syntax Description
port priority Specifies the logical port for the LAG you are setting the priority for. Enter the value you want for the priority of the system for the LACP. The range is 1 to 65535; there is no default. Lowest priority controls LACP.
To remove the assigned priority entirely enter 0. To dynamically add ports to a link aggregation group, enter the following command: configure sharing <logical_port> add ports <port_list> To configure the order that ports are added to the aggregator, enter the following command: configure lacp member-port <port> priority <port_priority> The lower value is added first. If you do not configure this parameter, the lowest numbered ports in the LAG are the first to be added. To configure whether the switch sends LACPDUs periodically (active) (default) or only in response to LACPDUs sent from the partner on the link (passive), enter the following command: configure sharing <port> lacp activity-mode [active | passive] To configure the timeout used by each LAG to stop transmitting once LACPDUs are no longer received from the partner link, enter the following command: configure sharing <port> lacp timeout [long | short] The long value uses 90 seconds as the timeout value. The short value uses 3 seconds as the timeout value. A LAG port moves to expired and then to the defaulted state when it fails to receive an LACPDU. You can configure whether you want an LAG port that moves into the default state removed from the aggregator or added back into the aggregator. If you configure the LAG to remove the ports, those ports are removed from the aggregator and the port state is set to unselected. To configure whether a defaulted LAG port is removed from the aggregator, enter the following command: configure sharing <port> lacp defaulted-state-action [add | delete]
22
23
Layer 1 Configuration
MAC address for the system, which is used for LACP priority in the absence of a specifically configured priority.
Identifies the particular LAG. This number comes from the logical port assigned to the LAG and is the LAG group ID. Shows the system priority for that LAG. If this number is lower than the number displayed for the Partner Sys-Pri, the system you are working on is the controlling partner in the LAG. Automatically generated LACP key. Identifies the MAC address for the system connecting to the LAG on the remote end. Shows the system priority for that LAG on the remote end. If this number is lower than the number displayed for the Actor Sys-Pri, the system at the remote end is the controlling partner in the LAG. LACP key automatically generated by the system to which this aggregator is connected. If this number is lower than the number displayed for the Actor Key, the partner system is the controlling partner in the LAG. Identifies the number of ports added to the aggregator for that LAG.
Actor Sys-Pri
Actor Key
Partner MAC
Partner Sys-Pri
Partner Key
Agg Count
To display the configuration and status of an LAG, enter the following command: show lacp lag <group-id>
24
25
Layer 1 Configuration
The configured logical port Current logical port The load-sharing algorithm used The load-share member ports The link status Number of link transitions
To display LACP settings for a specified port that is a member of an LAG, enter the following command: show lacp member-port <port> {detail} To display all LACP, or dynamic link aggregation, counters for all member ports in the system, enter the following command: show lacp counters To verify if a port is part of an LAG, enter the following command: show ports configuration
26
27
Layer 1 Configuration
28
29
Layer 1 Configuration
Port Mirroring
Port mirroring configures the switch to copy all traffic associated with one or more ports to the monitor ports on the switch. The monitor ports can be connected to a network analyzer, RMON probe, or Sentriant appliance for packet analysis. The switch uses a traffic filter that copies traffic to the monitor ports. You may designate up to 16 ports as monitor ports when you enable port mirroring using the port-list option. The traffic filter can be defined based on one of the following criteria:
Physical port - All data that traverses a port, regardless of VLAN configuration, is copied to the monitor ports VLAN - All data to and from a particular VLAN, regardless of the physical port, is copied to the monitor ports. Up to 16VLANs can be mirrored. Virtual port - All data for a specific VLAN on a specific port is copied to the monitor port. You can configure up to 16 mirroring filters and one monitor port on the switch. After a port is configured as a monitor port, it cannot be used for any other function.
To configure a mirror output port, use the following syntax: enable mirroring to [port <port> [tagged | untagged] | port-list <portlist> loopback-port <port> [tagged | untagged]] {remote-tag <vlan tag>} NOTE
Frames that contain errors are not mirrored. The untagged parameter is available only on the Black Diamond 10808 and Blackdiamond 12804 switches.
To add a single mirroring filter definition for a VLAN, physical port or a specific VLAN/port combination, enter the following command: configure mirroring add [vlan <name> {port <port>}| port <port> {vlan <name>}] {ingress | egress | ingress-and-egress} NOTE
The ingress and egress parameters are available only on the BlackDiamond 8800 series switches and the Summit X450 series switches.
To delete a particular mirroring filter definition, enter the following command: configure mirroring delete [all | port <port> {vlan <name>} |vlan <name> {port <port>}] To disables port-mirroring. disable mirroring To verify the parameter settings, enter the following command: show mirroring
30
31
Layer 1 Configuration
Switch MAC address (Switch ID) Switch software version information Switch IP Address Switch VLAN-IP information Switch port number
To enable the generation and processing of EDP messages on one or more ports, enter the following command: enable edp ports [all | <port number>] To disable the generation and processing of EDP messages on one or more ports, enter the following command: disable edp ports [all | <port number>] To verify the EDP parameter settings, enter the following command: show edp {ports [all | <ports>] {detail}}
32
33
Layer 1 Configuration
LLDP
Beginning with ExtremeXOS version 11.2, the software supports the Link Layer Discovery Protocol (LLDP). LLDP is a Layer 2 protocol (IEEE standard 802.1ab) that is used to determine the capabilities of devices such as repeaters, bridges, access points, routers, and wireless stations. LLDP enables devices to advertise their capabilities and media-specific configuration information and to learn the same information from the devices connected to it. The LLDP supports discovery of network topologies in a multivendor environment. LLDP transmits periodic advertisements containing device information and media-specific configuration information to attached neighbors. The type length value (TLV) within link layer control frames is used to communicate with other LLDP agents. LLDP agents receive link layer control frames, extract the information in the TLVs, and store them in LLDP Management Information Base (MIB) objects. LLDP is configured on a per-port basis. Each port can store information for a maximum of four neighbors. All LLDP configurations are saved when you issue the save configuration command. LLDP can work concurrently with EDP or independently of EDP. The LLDP multicast address is defined as 01:80:C2:00:00:0E, and the EtherType is defined as 0x88CC.
NOTE
The LLDPDU has a maximum of 1500 bytes, even with jumbo frames enabled. TLVs that exceed this limit are dropped. Extreme Networks recommends that you advertise information regarding only one or two VLANs on the LLDP port, to avoid dropped TLVs.
Chassis ID (mandatory) Port ID (mandatory) Time-to-live (mandatory) Port description System name System description (system name, hardware version, OS, networking software) System capabilities (WLAN access point, router, IP phone, etc.) Management address (addresses of local LLDP agent) 802.1-specific information
VLAN name Port VLAN ID Port and protocol VLAN ID (protocol/port based VLAN support and VLAN tag) MAC/PHY (duplex and bit rate. auto-negotiation or manual configuration) Power via MDI (power support capabilities of the LAN device) Link aggregation (can be aggregated or is currently aggregated)
802.3-specific information
34
35
Layer 1 Configuration
Configuring LLDP
LLDP information is transmitted periodically and stored for a finite period. Once you enable LLDP, you can set a variety of time periods for the transmission and storage of the LLDP messages (or you can use the default values), as follows:
Reinitialization period (default is 2 seconds) Delay between LLDP transmissions (default is 2 seconds)applies to triggered updates, or updates that are initiated by a change in the topology Transmit interval (default is 30 seconds)applies to messages sent periodically as part of the protocol Time-to-live (TTL) value (default is 2 minutes)time that the information remains in the recipients LLDP database. Configure the Transmit Hold time and Transmit Interval to determine the TTL. The TTL is equal to the Transmit Interval X Transmit Hold.
LLDP is disabled by default. To enable the transmitting or receiving of LLDP TLVs, enter the following command: enable lldp ports [all | <port_list>] {receive-only | transmit-only} To modify the LLDP transmit interval, hold timer, or transmit delay, enter the following commands: configure lldp transmit-interval <seconds> configure lldp transmit-hold <hold> configure lldp transmit-delay [ auto | <seconds>] To enable or disable the advertisement of specific TVLs, enter the following command: configure lldp ports [all | <port_list>] [advertise | no-advertise] [ management-address | port-description | system-capabilities | systemdescription | system-name | vendor-specific <TVL_name> Additional commands control the advertisement of the management address, port description, system capabilities, system description, system name, port vlan ID, port VLAN, Power-over-Ethernet, and similar information. To verify the configuration of LLDP, enter the following command: show lldp {port [all | <port_list>]} {neighbors} {statistics} {detailed} Additional useful commands include: show process lldp
36
37
Layer 1 Configuration
Summary
The Layer 1 Configuration module provides an introduction to the Extreme Networks switch port types, port parameters, and port and load sharing configuration commands. You should now be able to:
Configure port speed and duplex. Define the link aggregation feature and its benefits. Describe the different link aggregation algorithms. Configure dynamic address-based link aggregation. Verify the link aggregation configuration. Describe the Extreme Discovery Protocol. Enable the Link Layer Discovery Protocol.
38
39
Layer 1 Configuration
Lab
Turn to the Layer 1 Configuration Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
40
41
Layer 1 Configuration
Review Questions
1 Which of the following commands correctly configures the link aggregation feature? a configure sharing 1 grouping 1-4 b enable sharing 1 grouping 1-4 c create sharing 1 grouping 1-4 d create grouping 1 sharing 1-4
2 Which of the following commands dynamically adds ports to a link Aggregation group? a configure sharing 6 add ports 7,8 b configure linkaggragation 6 add ports 7,8 c configure lacp group 6 add ports 7,8 d add group 6 lacp ports 7,8
3 What is the purpose of LLDP? a LLDP supports the discovery of network topologies in a multivendor environment. b LLDP supports the discovery of network topologies in an Extreme Networks proprietary environment. c LLDP supports dynamic addition to and deletions from a link aggregation group. d LLDP supports equal-cost multiple paths in a routed environment.
4 Which of the following commands activates the Extreme Discovery Protocol on all ports? a configure edp ports all b create edp ports all c create edp all d enable edp ports all
5 Why is the address-based Port Load Sharing or link aggregation algorithm recommended? a It provides the fastest link-failure recovery time and guarantees packet sequencing. b It provides the most information for troubleshooting and guarantees packet sequencing. c It provides a more even distribution of traffic than the port-based algorithm and guarantees packet sequencing.
d It provides the most reliable transfer of data and guarantees packet sequencing.
42
6 Which of the following identifies the maximum number of monitor ports that can be configured on a switch? a One b Two c Four d Sixteen
7 What feature allows you to copy all traffic associated with one or more ports to a monitor port? a Port monitoring b Port copying c Port mirroring d Port reflecting
8 Which of the following commands correctly configures port 6 to be the port-mirroring monitor port? a create mirroring add port 6 tagged b configure mirroring add port 6 tagged c enable mirroring to port 6 tagged d configure mirroring to port 6 tagged
9 Which of the following examples correctly disables ports one through five on the switch? a disable ports 1-5 b disable ports 1:5 c disable ports 1,5 d disable ports 1:2:3:4:5
10 What is Extreme Discovery Protocol used for? a Performs an active search for all IP devices on the network. b Performs a passive search for all Layer-2 devices on the network. c Exchanges topology information with other third-party and Extreme Networks switches. d Exchanges topology information with other Extreme Networks switches.
43
Layer 1 Configuration 11 What does port mirroring do? a Reflects all received traffic on a port back out the transmit side. b Configures the switch to copy all traffic associated with one or more ports to the monitor ports on the switch. c Configures the switch to copy all traffic entering the switch to a monitor port on the switch. d Displays a real time packet analysis on the console port for traffic received on a specified Ethernet port.
12 What is the link aggregation feature used for? a To increase bandwidth and resilience between switches. b To balance traffic across multiple paths. c To guarantee packet sequencing. d To increase delay tolerance.
44
This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
45
Layer 1 Configuration
46
EXOS Stacking
EXOS Stacking
Student Objectives
Upon completion of this module, you will be able to:
Describe the benefits of SummitStack Stacking Technology Explain how stacking operates Identify the various components of stacking Configure a set of devices to employ stacking Verify the stacking configuration Troubleshoot stacking issues Student objectives
EXOS Stacking
EXOS Stacking
10/100/1000BASE-T available in AC and DC powered versions 10/100/1000BASE-T with Power Over Ethernet in AC powered versions 100/1000BASE-X mini-GBIC available in AC and DC powered versions 10/100BASE-TX with or without PoE in AC powered versions
Extreme SummitStack provides an optimized stacking Architecture. Other stacking technologies can reduce the management overhead of fixed-format switches, but often at a cost in overall performance and reliability. A stacking architecture that lacks adequate bandwidth or incurs forwarding penalties results in a serious loss of performance, which is unsuitable to support new converged applications. The SummitStack stacking architecture was designed to provide significant throughput, up to 320 Gigabits per Second (Gbps) per stack, and the distributed, shortest path forwarding can provide performance comparable with chassis switches. Resiliency is of key importance for these applications and is provided by redundant bidirectional ring architecture and n-1 master redundancy, distributed Layer 2 and Layer 3 link aggregation, link redundancy and distributed uplinks. You will realize Decreased Connectivity Costs with our stacking solution. Using Extreme Networks special stacking cables and built-in stacking ports to connect the supported switches is less expensive than purchasing 10 Gigabit modules to interconnect the devices. The SummitStack stacking architecture delivers the best of both worlds: the benefits of a chassis at the cost of a stackable, in an architecture designed to support todays evolving LAN applications. The resulting network simplification can provide lower management and maintenance costs while enhancing overall availability.
EXOS Stacking
Hardware Requirements
There are some hardware requirements in order to benefit from the SummitStack architecture. The first requirement is that the stack be built from SummitStack Compatible Hardware. As of this writing, ExtremeXOS allows the following hardware platforms to be joined together in a stack:
Summit x250 Series Switches Summit x450 Series Switches Summit x450a Series Switches Summit x450e Series Switches
Each of these products supports various capabilities and media types. Please refer to company literature to ensure that you select switches that best meet your application's needs. The second hardware requirement is the addition of stacking cables. The SummitStack Stacking Cables contain special connectors that support the high-speed ring topology of the SummitStack Architecture and meet the resiliency requirements of this feature. Extreme Networks offers Stacking cables in four lengths - from a minimum to a half meter, to a maximum of five meters long. The order numbers are listed on the screen for your convenience and more information is available on the Extreme Networks corporate web site.
EXOS Stacking
Software Requirements
SummitStack Stacking Technology requires ExtremeXOS Software Version 12.0 or later. Units running less than ExtremeXOS 12.0 will not join stack. Whichever version of ExtremeXOS Software you plan to deploy in your network, the SummitStack architecture requires that all units run the exact same version of software in order to ensure device interoperability and stack stability. Units with software versions greater than 12.0 but not equal to stack master version become active stack members (provided there are no other stack topology issues) with disabled front panel ports. The noncompliant unit is still accessible to the stack master through the stack port. This allows the network administrator to download the appropriate version of code to the device using the following command: download image This command loads the appropriate version of software the non-conforming unit requiring that the unit be removed from the stack.
NOTE
Since the front panel ports on the target unit are disabled, the tftp server must be accessible though the ports of another unit in the stack.
If possible, stage and configure devices before adding them to a live stack.
10
11
EXOS Stacking
12
13
EXOS Stacking
The Master Unit manages the configuration of all units. No unit in the stack is allowed to look at it's configuration file and program its own switching ASICs. This is because the Master Unit has acquired the ownership of the configuration for all other units in the stack. However, to ensure that the stack can survive it's loss, the master will share the configuration of the stack with the Backup Master Unit. The Backup Master maintains the configuration of the stack in memory, in case it is needed, but does nothing with it unless the Master Unit becomes unavailable. You can compare the functionality of the Master Unit to that of a Master MSM. Much of the architecture and code for the SummitStack Technology is derived from ExtremeXOS chassis code that is used to manage I/O modules. The Backup Master Unit has a hybrid role in the stack. It must be ready to immediately assume the role of the master unit, should the master unit fail, however, it is like every other Standby Unit in that it does not own its own configuration. Remember, the Master Unit acquires ownership of the configuration of all units in the stack, not just the standby units. In order to ensure that a failover condition (where the Master Unit fails and the backup unit takes over) is expedited in the most judicious fashion, the backup master unit will acquire co-ownership of the standby units configuration files. The Backup Master Unit will not exercise its right to configure the standby units unless the Master Unit has failed and the Backup Master Unit has assumed the role of Master Unit. You can compare the functionality of the Backup Master Unit to that of a Backup MSM. The last unit role we'll examine is that of the Standby Unit. These units are essentially slaves to the Master Unit. The ASICs are configured by the master, but the standby unit doesn't maintains a copy of the database in memory. In other words, the standby unit does what it is told, but doesn't know why it's doing it. However, for stack management purposes, the standby unit is aware of its stack configuration. It knows its own slot number, the stack MAC address, the master unit, and other parameters necessary to maintain stack operations. In case of a stack error, such as the loss of the Master Unit or Backup Master Unit, a Standby Unit may become a Master Unit or a Backup Master Unit, depending upon its stack configuration. Finally, you can compare the functionality of the Standby Unit to that of a chassis-based I/O module.
14
15
EXOS Stacking
16
17
EXOS Stacking
Topology Traffic Unicast Traffic Multicast Traffic VLAN Traffic which consists of Unknown Unicast, Unknown Multicast, and Broadcast Traffic
Topology Traffic
Topology Traffic is generated by a proprietary hop-by-hop protocol that is used to manage the stack's topology. Among other things, the Topology protocol is responsible for:
Interrogating the various units that are interconnect by the stack cable to determine their capabilities and stack configuration Electing a stack master Electing a backup master Ensuring a stack MAC address is configured Ensuring each switch in the stack has a unique slot number Managing all stack joins, merges, and failures
Topology traffic does not include any user data, nor does it include any non-stack related configuration messages. Only stack configuration messages are sent using the topology protocol. Topology traffic is processed by the CPU, not by the switching ASICs. The topology of the stack must be determined before user data can be forwarded. Therefore, the topology protocol must work before the stack is formed. Since it works before the stack is formed, it can be used to configure stacking options on devices in the stack even if there are stacking issues. After the stack is formed, topology traffic consumes very little bandwidth.
18
19
EXOS Stacking
20
21
EXOS Stacking
22
23
EXOS Stacking
Because the destination port is unknown, Unknown Multicast, Unknown Unicast, and Broadcast traffic must be flooded to the entire VLAN - in fact this type of traffic is sometimes referred to as VLAN traffic because it is distributed to every port on a VLAN. This type of traffic can come into from any port, so it doesn't make sense to try to equalize the distribution of traffic in the way that known multicast traffic handles distribution. Therefore, all VLANs will have the same stacking ports blocked to ensure that frames do not endlessly circulate throughout the stack. The blocked port is Stack Port 1 on the unit with the lowest MAC address plus the interconnected port on the adjacent switch.
24
Figure 12: Unknown Unicast / Broadcast / Unknown Multicast - Traffic Handling - Stacking Architecture
25
EXOS Stacking
Discover Stack Topology Elect Master Elect Backup Master Stack Synchronize Operational Phase
In the next few slides, we'll take a look at each one of these tasks in more detail.
26
27
EXOS Stacking
Stack Mode (enabled / disabled) Unit MAC Address Stack MAC address Model Number Slot # Stack Priority Stack Master Capable Hops Count - Starting count of 0 Unit License Level Alternate IP / Mask Alternate Gateway
Next, the units that are connected to the sending device's stack ports receive the packet and forward them to their respective CPUs. The CPU on each unit processes the packet by extracting information about the unit that originated the packet, incrementing the hop count, and retransmitting the packet out of the port that did not receive the packet originally. Using this hop-by-hop forwarding technique, all the units in the stack will eventually have information about all their neighbors. Finally, a when a unit receives a packet that has its own MAC address as the source, it will remove that packet from the stack plane and will note that the stack is a ring. In a ring topology, each unit should have a path to every other unit through both of its stack ports. The unit will use the shortest path when making forwarding decisions. During the discovery process, if the ring is broken, the units in the stack will not receive the topology packets that they sent (so they know that the stack is not a ring configuration), but they build a daisy chain topology based upon the packets received. Once the discovery process is complete, the units that are qualified to become active stack members proceed to the next step of selecting a stack master. The units that are not qualified to go to the next step are:
Units with stacking mode disabled Units with the same slot number as another device
28
29
EXOS Stacking
Stacking Priority
Next, the units evaluate the stacking priority of each unit. The lower the number, the higher the priority. This parameter is user configurable and can accept the values of AUTOMATIC, and 1 to 100. The unit with the highest priority becomes the stack master. If there are two or more units with the same stack priority (and the value is not automatic), then the system uses the slot number as the tie-breaker.
Slot Number
The slot number is a user configurable parameter. Each unit must be configured with a unique value from 1 to 8 in this parameter. While the slot number is derived from the slot number parameter in an Extreme Networks chassis system, the slot number in a stackable system does not correspond to the unit's physical position in stack or the distance from Master. This number is purely a logical number that is assigned by the network administrator. In terms of electing the Master Unit, if more than one unit is tied with the highest stack priority value (and the parameter is not set to AUTOMATIC), the unit among these with the lowest slot number will become the Master Unit. At this point, the system should be able to select a Master Unit. The units in the stack will then go through the same process to elect the Backup Master Unit.
Automatic Priority
The default value for the stack priority value is AUTOMATIC. The AUTOMATIC setting allows the system to elect the stack master based upon a prioritization algorithm provide by Extreme Networks that may include factors such as CPU speed, memory, or number of ports. As of this writing, the AUTOMATIC setting has not been implemented. If all units have their Stacking Priority parameter set to AUTOMATIC, the master unit will be elected based upon the unit with the lowest slot number.
30
31
EXOS Stacking
32
33
EXOS Stacking
34
35
EXOS Stacking
One segment has both the master and backup master units and the other segment has no master unit One segment has the master unit and the other segment has the backup master unit
If the Master Unit and the Backup Master Unit end up on different stack segments, then the segment with master needs to elect a new backup master, recalculate the path to other units, and update switching ASICs to remove entries for units that are no longer accessible to the units. In order to elect a new backup master, there must be another unit on the stack segment that is master-capable. If no other unit on the stack is configured as master-capable, then a Backup Master Unit cannot be elected. On the segment with the Backup Master Unit, the Backup Master Unit becomes the Master Unit; a new backup master is elected if a master-capable unit is available, the stack-path to other units is recalculated by all units on the segment, and all units update their switching ASICs to remove entries for units that are no longer available. This scenario causes two issues that make it difficult to manage either segment. The first issue is that the master on both segments retains the Stack IP Address. Both units could potentially respond to ARP requests. The other problem is that the master unit on both segments retains the Stack MAC address. This, of course, could cause problems with other device on the network with the Stack MAC address may appear to move. If a segment ends up with no master units, all units reboot because they have lost contact with both the Master Unit and the Backup Master Unit. From this point, the units in the stack segment will act as if they have just been powered up and go through the standard stack-join process; including attempting to elect master and backup master units. Unfortunately, these units will be using the same Stack MAC address and Stack IP address as the other segment. Finally, if a segment ends up with both the Master and Backup Master Unit, it simply has to recalculate the shortest path between units. Obviously, having two stack cable failures in the same stack at the same time is extremely rare. This type of failure is more than likely a result of human activity.
36
37
EXOS Stacking
38
39
EXOS Stacking
40
41
EXOS Stacking
The stacking mode parameter is set to disabled. The slot-number parameter is set to 1. The master-capable parameter is set to Yes. The license-level restriction is unconfigured. The stack MAC address is unconfigured.
3 Log in to the intended stack master through the console port. The user name should be admin, and there should be no password. The safe-script command may be executed since there is no configuration on the device. Answer the prompts as you normally would in your network environment. 4 Verify the stack configuration using the show stacking and show stacking configuration commands. Verify the state of the units in the stack - including which units are master and backup master units by issuing the show stacking command. 5 If necessary, configure license level restrictions using the configure stacking license-level command. 6 Enable stacking by issuing the following command: enable stacking Since the stack has no configuration, the system will prompt you to use the easy setup option. Answer Yes to this prompt. Next, answer Yes to proceed to configure the device and reboot. 7 Log into the switch with admin privileges once the stack reboots. At this point - since the stack has a default configuration - the safe-default script runs. Select values for normal operation. 8 Verify that the master node is the one you intended to be the master. 9 Verify reminder of the configuration using the show stacking command. 10 Save the configuration
42
43
EXOS Stacking
enable stacking configure stacking slot-number automatic configure stacking mac-address configure stacking redundancy minimal reboot stack-topology
The administrator could execute each of these commands on their own if they wanted to.
44
45
EXOS Stacking
If you enter yes to the prompt, the easy setup procedure is invoked and following message is displayed:
Executing "configure stacking easy-setup" command...
To disable stacking, use the following command: disable stacking This command accepts a node-address argument to allow you to target a specific unit provided you follow the node-address argument with the targeted unit's MAC address. All units are targeted by the command if you omit the node-address argument. If a unit is a stack has stacking disabled, it will not forward the customer's data through its stacking links and will not become a member of the active topology. Also, a disabled node becomes its own master and processes and executes its own configuration independently. The command does not take effect immediately, but at the node(s) next reboot. You may verify that this command has executed correctly by issuing the command: show stacking configuration You may verify that the enable stacking command has executed correctly by issuing the command:
show stacking configuration
The output of this command displays the current setting of the stacking flags. The lowercase e flag should be set on the target unit(s). The presence of the lowercase e flag indicates that the target unit will have stacking enabled if it is rebooted. The uppercase E flag indicates whether or not stacking is currently enabled on the target device. The presence of an uppercase E flag indicates that stacking is currently enabled. The absence of the uppercase E flag indicates that stacking is currently disabled.
46
47
EXOS Stacking
The configure stacking slot-number command syntax that uses the node-address parameter allows the network administrator to configure the slot number on a specific unit by specifying the keyword nodeaddress followed by the MAC address of the target device. To identify ports in the stack, the network administrator uses the slot:port syntax. For example, to identify port 22 of node 3, the administrator would enter 3:22. The command does not take effect immediately, but at the node(s) next reboot. You may verify that this command has executed correctly by issuing the command: show stacking configuration
48
49
EXOS Stacking
If a stack node that has just joined the stack detects that its stack MAC address is not configured or is different than the stack MAC address in use, it will log the following message at the Error log level: The stack MAC address is not correctly configured on this node. The stack can not operate properly in this condition. Please correct and reboot. If you have not configured (or inconsistently configured) the stack MAC address you might encounter difficulty in diagnosing the resulting problems. Whenever the master node (including itself) detects that one or more nodes in its active topology do not have the correct or any stack MAC address configured, it will display the following message to the console every five minutes until you configure a MAC address and restart the node(s): The stack MAC address is either not configured or its configuration is not consistent within the stack. The stack can not operate properly in this condition. Please correct and reboot. You may verify the results of this command by using the command: show stacking detail By default, no stack MAC address is configured.
50
51
EXOS Stacking
Since only eight nodes can be operational in an active topology at a time, you must disconnect the remaining nodes before configuring master-capability using this command. If you are using the none or minimal redundancy configuration:
The configured values of slot-number and priority decide the nodes on which the master-capability should be turned on. If the priority values are configured on the nodes, the highest priority node(s) will be chosen. If the priority values of all nodes are set to automatic or to the same priority value, the node(s) with the lowest slot number(s) will be chosen. Extreme Networks may change automatic priority behavior in a future release.
If there is a slot number tie or if neither slot-number nor priority were ever configured, the following message appears and the command is not executed:
ERROR: Unique slot numbers must be configured before using this command.
The master-capability setting does not take effect immediately, but at the node(s) next reboot. You may verify that this command has executed correctly by issuing the command: show stacking configuration The output of this command displays the current setting of the stacking flags. The uppercase C flag indicates whether or not master-capability is currently enabled on the target node. The presence of an uppercase C flag indicates that master-capability is currently enabled. The absence of the uppercase C flag indicates that master-capability is currently disabled.
52
53
EXOS Stacking
54
55
EXOS Stacking
The node-address parameter specifies the MAC address of the target node. The slot-number parameter identifies the slot number of the target unit. The ipaddress and netmask parameters enable you to separately identify the IP address and subnet mask you wish to assign to the target node or nodes. The gateway parameter identifiers the address of an IP router. The alternate-ip-address is not applied if the subnet mask differs from the subnet mask already assigned to the management VLAN. The alternate-ip-address is applied if the command's subnet mask is the same as the subnet mask used to assign an IP address to the management vlan, or there is no IP address assigned to the management VLAN.
The alternate-ip-address and its associated parameters are not used unless the node is operating in stacking mode. The configuration takes effect immediately after the command is successfully executed. You may verify the configuration by issuing the command: show stacking configuration By default, there is no alternate-ip-address configured.
56
57
EXOS Stacking
58
59
EXOS Stacking
stacking mode stack MAC address failsafe account and password failsafe account access point permissions (whether the failsafe account is allowed over the stacking links, console port, or management port) the selected partition
60
61
EXOS Stacking
Node MAC Address Configured Slot # Current Slot # Slot priority Alternate Management IP and Mask Alternate Gateway IP address Flags License level restriction
62
63
EXOS Stacking
To obtain more detailed information about the configuration of various modules in the stack, use the detail option of the show stacking command: show stacking details This command provides a comprehensive display of the configuration of each device.
64
65
EXOS Stacking
Summary
You should now be able to:
Describe the benefits of SummitStack Stacking Technology Explain how stacking operates Identify the various components of stacking Configure a set of devices to employ stacking Verify the stacking configuration Troubleshoot stacking issues
66
67
EXOS Stacking
Demonstration
Turn to the Configuring a Stacked Switch Demonstration Overview in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
68
69
EXOS Stacking
Review Questions
1 Which of the following statements best describes the SummitStack technology? a SummitStack technology allows you to install standalone switches, such as model X450a directly into a chassis-based switch. b SummitStack allows you to physically stack up to 20 units without the need for a system rack. c SummitStack allows you automate the use of your system by stacking commands in a command buffer for execution at a user designated time.
d SummitStack allows you to physically connect up to eight individual Summit switches together as a single logical unit. 2 Which of the following statements is true? a All units in the stack must run the same version of ExtremeXOS software. b All units in the stack must be managed by EPICenter software. c All units in the stack must be identical model numbers. d All units in the stack must be connected to a redundant power supply. 3 Which of the following items specifies the bandwidth for each of the individual stacking ports? a 20 MB b 200 MB c 2 GB d 20 GB 4 Which unit (node) type manages the stack? a Master b Backup Master c Standby d Standalone 5 The functionality of which of the following may be compared to the functionality of a Master MSM? a Master Switch Unit b Backup Master Switch Unit c Standby Switch Unit d Standalone Switch Unit 6 Which of the following stack topologies is supported for continuous operation? a Bus b Daisy Chain c Ring d Star
70
7 Which of the following traffic types manages the function of the stack? a Unicast Traffic b Multicast Traffic c VLAN Traffic d Topology Traffic 8 Which of the following statements is true in regards to the way the stack handles unicast traffic? a Unicast traffic can be sent and received traffic on both stacking ports. b Unicast traffic is handled by the switching fabric and not the CPU. c Unicast traffic may be transmitted by any port in the stack as no ports are blocked. d All of the above 9 Which of the following statements is true in regards to the way the stack handles known multicast traffic? a Multicast traffic is handled by the CPU when traversing the stack. b Multicast traffic is only sent out of stack port 1. c Multicast traffic requires that ports be blocked to prevent loops. The port that is blocked is based upon the multicast group address.
d All of the above 10 Which of the following parameters are taken into account when electing the stack master? a Master capability b Stacking priority c Slot number d All of the above 11 Which of the following is true about how the stack manages its configuration? a The master unit is responsible for configuring all devices in the stack. b Each unit in the stack is responsible to manage its own configuration files and to configure itself. c The master switch and the backup master switch split configuration responsibilities. Each manages half of the units in the stack.
71
EXOS Stacking This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
72
Layer 2 Forwarding
Layer 2 Forwarding
Student Objectives
The Layer 2 forwarding module presents a description of the various functions a bridge (Layer 2 switch) performs, how a bridge handles frames received from the networks, and a definition of the forwarding database (FDB). Upon completion of this module, the successful student will be able to:
Describe transparent bridging. Describe the flooding and learning port states. Describe the forwarding and filtering port state. Describe the forwarding database. Identify the various FDB entry types. Manage forwarding database entries. Configure egress flooding. Configure and verify the limit-learning feature. Configure and verify the lock-learning feature. Configure the Extreme link status monitor.
Layer 2 Forwarding
Layer 2 Forwarding
Layer 2 Forwarding
Collision Detection
A second element to the Ethernet access protocol is used to detect when a collision occurs. When there is data waiting to be sent, each transmitting node monitors its own transmission. If it observes a collision (excess current above what it is generating, i.e. > 24 mA for coaxial Ethernet), it stops transmission immediately and instead transmits a 32-bit jam sequence. The purpose of this sequence is to ensure that any other node, which may currently be receiving this frame, receives the jam signal in place of the correct 32-bit MAC CRC, this causes the other receivers to discard the frame due to a CRC error. When two or more transmitting nodes each detect a corruption of their own data (i.e. a collision), each responds in the same way by transmitting the jam sequence. Once the collision event subsides, all stations wait for a random period of time before attempting to transmit any data. A station may attempt to retransmit a packet up to 16 times.
Layer 2 Forwarding
A local bridge, which connects two or more Ethernet LAN segments. A remote bridge, which connects Ethernet LAN through high-speed serial connection. It is accomplished with a pair of bridges using a Wide-Area Network (WAN).
A transparent bridge makes the forwarding decisions based on the MAC destination address. This process is completely transparent to the end-devices. Extreme Networks switches provide the Layer 2 services of a transparent switch.
10
11
Layer 2 Forwarding
Ethernet Frames
All Extreme Networks switches are fully compliant, 802.1d Layer 2 bridges capable of wire-speed forwarding. Decisions are based on a given destination MAC and port pair. An Ethernet frame contains:
Destination Address - Ethernet address of the destination host, 48-bits. Source Address - Ethernet address of the source host, 48-bits. Type - Type of data encapsulated for Ethernet v2 and Length for 802.3. 16-bits. Data Field - Data area, 46-1500 bytes, which includes the higher layer headers.
Payload - Contains the data or higher layer protocol contents. 0 - 1500 bytes. Padding - Added data (typically 0x00) if payload contents is less than 46 bytes. This enables the Ethernet frame to meet 64-byte minimum length requirement.
12
13
Layer 2 Forwarding
Bridge Functions
The operation of an individual bridge is described in terms of the current port activity. In terms of network data processing, the port performs one of four functions:
Flooding
The function of the switch is to receive all packets on the networks it is connected to, and make forwarding decisions based on MAC addresses in the frames and in the switch Forwarding Database (FDB). Initially, there are no MAC addresses learned on a port and the forwarding database for that port is empty. Because the forwarding database is empty, the destination is considered to be unknown, and the packet must be forwarded to every attached interface in an attempt to reach all the nodes. The process of transmitting packets to all ports in a VLAN is referred to as flooding.
Learning
The learning process examines the source addresses of frames received on the port and creates an entry in the forwarding database associating the port on which the frame was received with the MAC address in the source address field of the frame. If the source address does not already exist in the FDB when a packet is received on a port, it is learned and added to the FDB.
Forwarding
A performing this function is now taking part in frame re-transmission. A port that is forwarding can re-transmit received frames and make entries into the forwarding database.
The switch performs a forwarding table lookup on the destination address. If the address is known, the bridge identifies the port on which the destination address is located. If the port is different from the port on which the frame is received, the frame is forwarded to the destination port.
Filtering
When frames are received and the destination MAC address matches the FDB entry for the inbound port, the switch drops (filters) the frame at the port. Other packets which match FDB entries for other ports are forwarded. Unknown addresses and broadcast addresses are still flooded.
14
15
Layer 2 Forwarding
Flooding
In the diagram is an example of a newly initialized switch. Host 0B is attempting to initiate a conversation with host 1E. In this situation, host 0B transmits an initial packet to host 1E. The function of the switch is to make packet forwarding decisions for all traffic generated on connected networks. After receiving a packet, the switch makes a forwarding decisions by looking up the destination MAC address in the frame to the entries in its forwarding database. When the switch receives the packet from host 0B, it attempts to find station 1E in the forwarding table. However, the forwarding table is empty because no MAC addresses have been learned by the switch. Because the forwarding database is empty and there is no entry for the station 1E, the destination is "unknown" by the switch. Since the destination station's location is unknown, the switch forwards the frame to every port to ensure that if the station is connected, it will receive the packet. Sending a packet out of every port is referred to as flooding. Host OB is learned on the inbound port and an entry is added to the forwarding database. When host 1E transmits a packet, its MAC address will also be learned.
16
Figure 9: Flooding
17
Layer 2 Forwarding
Forwarding
In the example shown, host 1E replies to host 0B, using the following steps:
The bridge performs a forwarding table lookup on the destination address. If the address is known, the bridge identifies the port on which the destination address is located. If the port is different from the port on which the frame is received, the frame is forwarded to the destination port. If the source address does not exist in the Forwarding Database (FDB) it is added.
Thus, the packet is forwarded onto the destination port learned for 0B which is port 1. At the same time, the MAC address for 1E is learned and added to the bridge table.
18
19
Layer 2 Forwarding
Filtering
Using the same network configuration but a different operation, host "0B" transmits a frame to host "0A", and the bridge receives the frame. Both workstations are attached to the same switch port, and the switch learns the MAC addresses of all workstations that are active on a single port in the same way it would for a single workstation attached to a port. When frames are received and the destination MAC address matches the inbound port, the switch drops (filters) the frame at the port. This reduces traffic on the other ports within the broadcast domain (VLAN) and optimizes performance.
20
21
Layer 2 Forwarding
Forwarding Database
The switch-forwarding table is also known as the bridge table or the Layer 2 forwarding table. For an Extreme Networks switch, the forwarding table is known as the Forwarding Database (FDB). The switch maintains a database of all Media Access Control (MAC) addresses received on all of its ports. The information in this database is used to decide whether a frame should be forwarded or filtered. The Forwarding Database holds a maximum number L2 entries depending on the product. Refer to the appropriate User Guide for specific information about switch limitations. Each entry consists of the MAC address of the device, an identifier for the port on which it was received, and an identifier for the VLAN to which the device belongs. Frames destined for devices that are not in the FDB are flooded to all ports within the VLAN.
22
23
Layer 2 Forwarding
Dynamic Entries
Dynamic entries are those that are learned by the switch as it examines incoming traffic. Dynamic entries are removed or aged-out of the FDB if the device does not transmit for a period of time. This period of time is defined as the aging time. Aging out entries from the FDB prevents the database from becoming full with obsolete entries by ensuring that when a device is removed from the network, its entry is deleted from the FDB. Dynamic entries do not survive a switch reset or power cycle.
Non-Aging Entries
If the aging time is set to zero, all entries in the database are defined as static, non-aging entries. This means that they do not age, but they are still deleted if the switch is reset.
Permanent Entries
Permanent Entries are retained in the database if the switch is reset or a power cycle occurs. Only the system administrator can make entries permanent. A permanent entry can either be a unicast or multicast MAC address. All entries entered using the command-line interface are stored as permanent. Once created, permanent entries stay the same as when they were created. For example, the permanent entry is not updated when any of the following take place:
A VLAN is deleted A VLAN ID is changed A port mode is changed (tagged/untagged) A port is deleted from a VLAN or disabled A port enters STP blocking state A port QoS setting is changed A port goes down (link down) NOTE
Each switch family can support a maximum number of permanent entries. Refer to the appropriate user guide for specific information about switch limitations.
24
25
Layer 2 Forwarding
Command Syntax
show fdb {<mac_addr> {netlogin [all | mac-based-vlans]} | permanent {netlogin [all | mac-based-vlans]} | ports <port_list> {netlogin [all | mac-based-vlans]} | vlan <vlan_name> {netlogin [all | mac-based-vlans]} | stats | netlogin [all | mac-based-vlans] | blackhole {netlogin [all | macbased]}}
Syntax Description
mac_addr netlogin all mac-based-vlans Specifies a MAC address, using colon-separated bytes. Displays all FDB entries created as a result of the netlogin process. Not supported on the BlackDiamond 10808. Displays all FDBs created as a result of the netlogin process. Displays all netlogin MAC-based VLAN FDB entries. NOTE: This parameter is supported only for the Summit family of switches, SummitStack, and the BlackDiamond 8800 series switches. permanent port_list vlan_name stats blackhole Displays all permanent entries, including the ingress and egress QoS profiles. Displays the entries for one or more ports or ports and slots. Displays the entries for a specific VLAN. Displays the number of static, permanent, dynamic, and dropped FDB entries. Displays the blackhole entries. (All packets addressed to these entries are dropped.)
26
27
Layer 2 Forwarding
The switch can learn entries dynamically. The system updates its FDB with the source MAC address from an Ethernet frame, as well as the VLAN, and the port identifier on which the frame was received. MAC addresses may be manually entered or updated through the user interface.
You may wish to manually add an entry to the FDB in the following circumstances:
You do not wish to allow the switch to learn new MAC addresses. The application you are using only receives traffic and does not transmit, therefore the MAC address cannot be learned by the application but must be added manually.
To create a permanent FDB table entry for a specified MAC address, use the following syntax: create fdbentry <mac_addr> vlan <vlan_name> [ports <port_list> | blackhole]
Syntax Description
mac_addr vlan_name port_list blackhole Specifies a device MAC address, using colon-separated bytes. Specifies a VLAN name associated with a MAC address. Specifies one or more ports or slots and ports associated with the MAC address. Specifies a blackhole entry.
Examples
Add a permanent static entry to the FDB: create fdbentry 00:E0:2B:12:34:56 vlan finance port 3:4 If the MAC address is encountered on any port and VLAN pair other than VLAN finance, port 3:4, it is handled as a black hole entry, and packets from that source are dropped. Add a black hole entry to the FDB: create fdbentry 00:E0:2B:12:34:56 vlan finance blackhole Verify the results of the above commands: show fdb
28
29
Layer 2 Forwarding
Syntax Description
all mac_address vlan vlan_name Specifies all FDB entries. Specifies a device MAC address, using colon-separated bytes. Specifies a VLAN. Specifies the specific VLAN name.
Syntax Description
mac_addr port_list vlan_name blackhole Specifies a MAC address, using colon-separated bytes. Specifies one or more ports or slots and ports. Specifies a VLAN name. Specifies the blackhole entries.
Examples
Remove a permanent entry from the FDB: delete fdbentry 00:E0:2B:12:34:56 vlan default Remove a dynamic entry from the FDB: clear fdb 00:E0:2B:12:34:56 To verify the results of the delete fdbentry or clear fdb command: show fdb
30
31
Layer 2 Forwarding
Syntax Description
drop-packets forward-packets Specifies that packets with unknown source MAC addresses be dropped. Specifies that packets that ingress on this port with unknown source MAC addresses be forwarded.
NOTE
The drop-packets and forward-packets options are available only on the BlackDiamond 8800, SummitStack, and the Summit X150, X250, and X450 series switches.
Examples
To only forward packets with static FDB entries on port 5: disable learning drop-packets port 5 To forward all packets on this port: disable learning forward-packets port 5 To view port the MAC address learning configuration on port 5: show ports 5 information NOTE
The presence of the m flag indicates that MAC address learning is enabled.
32
33
Layer 2 Forwarding
Examples
To change the FDB agetime to an hour: configure fdb agingtime 3600 To ensure no entries in the FDB age out: configure fdb agingtime 0 To verify the agingtime value: show fdb
34
35
Layer 2 Forwarding
Egress flood control determines whether broadcast, multicast, or unknown unicast packets are flooded. Limit-learning limits the number of devices that can be learned. Lock-learning freezes the entries in the FDB on a port and VLAN basis. Once enabled, this feature does not allow new MAC address entries to be added dynamically. Layer 2 security features are configured on a per-port basis or by port and VLAN. For example, egress flooding control is configured by port. However, limit-learning and lock-learning are configured based upon the port and VLAN of the entries.
NOTE
Layer 2 security is not foolproof because it is possible for end-users to alter their PC's MAC address and assume the MAC address of another computer. The technique of assuming another station identity it is known as spoofing. Nevertheless, Layer 2 security provides powerful protective mechanisms, particularly when used in conjunction with other security features.
36
37
Layer 2 Forwarding
38
39
Layer 2 Forwarding
Egress flooding can be disabled on ports that are in a load-sharing group. If that is the situation, the ports in the group take on the egress flooding state of the master port; each member port of the loadsharing group has the same state as the master port. FDB learning is independent of egress flooding; either can be enabled or disabled independently. Disabling unicast (or all) egress flooding to a port also stops packets with unknown MAC addresses to be flooded to that port. Disabling broadcast (or all) egress flooding to a port also stops broadcast packets to be flooded to that port. enable / disable flooding [all_cast | broadcast | multicast | unicast] port [<port_list> | all]
To control egress flooding, use the enable or disable flooding command with the port option:
Examples
To disable flooding of unknown unicast packets on port 1: disable flooding unicast port 1 To enable flooding of broadcast packets on all ports enable flooding broadcast port all To verify egress flooding configuration on port 1 show port 1 info detail The following commands configures normal flooding behavior on switch ports 1 through 6: enable flooding all_cast ports 1-6
Usage Guidelines
Use this command to re-enable egress flooding that you previously disabled using the disable flooding port command. The following guidelines apply to enabling and disabling egress flooding:
Disabling multicasting egress flooding does not affect those packets within an IGMP membership group at all; those packets are still forwarded out. If IGMP snooping is disabled, multicast packets are not flooded. Egress flooding can be disabled on ports that are in a load-sharing group. If that is the situation, the ports in the group take on the egress flooding state of the master port; each member port of the woolgathering group has the same state as the master port. FDB learning is independent of egress flooding. FDB learning and egress flooding can be enabled or disabled independently.
40
41
Layer 2 Forwarding
Configuring Limit-Learning
You can set a predefined limit on the number of dynamic MAC addresses that can participate in the network. After the FDB reaches the defined MAC-address limit, all new source MAC addresses are configured as a black hole entry at both the ingress and egress points. This prevents these MAC addresses from responding to Internet control message protocol (ICMP) and address resolution protocol (ARP) packets. The limit-learning feature lets the network administrator control the number of MAC addresses per physical port and VLAN. By limiting the number of MAC addresses per physical port and VLAN, an administrator can block rogue networks from being added to the corporate backbone, prevent a user from adding their own devices (e.g., printer, IP phone) to the network, or keep foreign switches or surreptitious wireless snooping devices off the infrastructure. Limit-learning applies to dynamic FDB entries; permanent FDB entries are not affected by the MAC limit. Packets originating from stations whose MAC addresses that are not in the FDB will be dropped once the limit-learning threshold is reached and the station's MAC address is entered into the FDB as a blackhole entry. For ports that have a learning limit in place, the following traffic still flows to the port:
Packets destined for permanent MAC addresses and other mac address that are not black hole entries. Broadcast traffic from MAC addresses that are not black hole entries. EDP and LLDP traffic
Dynamically learned entries still get aged, and can be cleared. If entries are cleared or aged out after the learning limit has been reached, new entries are then able to be learned until the limit is reached again. Permanent static and permanent dynamic entries can still be added and deleted using the create fdbentry and delete fdbentry commands. These commands override any dynamically learned entries.
42
43
Layer 2 Forwarding
Configuring Lock-Learning
There are applications that require you to freeze the current state of the FDB and not allow the switch to learn new addresses or age out existing address entries. For example, a hotel or library with publicly accessible computers may want to ensure that other stations do try to access the network from those public ports. With the lock-learning feature, the network administrator can connect the publicly accessible computers to the switch, verify the MAC addresses, and then freeze the FDB to ensure that no new stations are authorized access to the network. The lock-learning feature causes all dynamic FDB entries associated with the specified VLAN and ports to be converted to locked static entries. It also sets the learning limit to zero, so that no new entries can be learned. Locking learning has the following results:
All new dynamic source MAC addresses are added to the FDB as black hole entries. Packets to and from black hole stations will be dropped. Locked entries do not get aged, but can be cleared. Dynamic entries active at the time of lock-learning remain in the FDB after the switch is reset or a power cycle occurs. Permanent static entries can still be added and deleted making it easy to add and remove network device when needed.
Design Considerations
When designing a solution using the lock-learning feature, remember that the following traffic is still forwarded:
Packets destined for the permanent MAC entries and other MAC addresses that are not black hole entries Broadcast traffic from MAC addresses that are not black hole entries EDP traffic
Examples
To lock the FDB entries associated with port 4 and the accounting VLAN configure ports 4 vlan accounting lock-learning To unlock the FDB entries associated with port 4 and the accounting VLAN configure ports 4 vlan accounting unlock-learning NOTE
You may apply either the limit-learning or lock-learning feature a particular port on a particular VLAN, but not both.
44
45
Layer 2 Forwarding
46
47
Layer 2 Forwarding
48
49
Layer 2 Forwarding
Ready. Indicates that the port is enabled but there is no physical link Active. Indicates that the port is enabled and the physical link is up.
The state of the ELSM logical link is known as the ELSM link state. The ELSM link state can be one of the following:
ELSM is enabled and the ELSM peer ports are up and communicating ELSM is enabled but the ELSM peer ports are not up or communicating ELSM is disabled
Up. Indicates a healthy remote system and this port is receiving Hello+ messages from its peer.
If an ELSM-enabled port enters the Up state, the up timer begins. Each time the port receives a Hello+ message from its peer, the up timer restarts and the port remains in the Up state. The up timer is 6* hello timer, which by default is 6 seconds.
Down. Indicates that the port is down, blocked, or has not received Hello+ messages from its peer.
If an ELSM-enabled port does not receive a hello message from its peer before the up timer expires, the port transitions to the Down state.
NOTE
When ELSM is down, data packets are neither forwarded nor transmitted out of that port.
If the port enters the Down state and later receives a Hello+ message from its peer, the port enters the Down-Wait state. If the number of Hello+ messages received is greater than or equal to the hold threshold (by default 2 messages), the port transitions to the Up state. If the number of Hello+ messages received is less than the hold threshold, the port enters the Down state.
Down-Stuck. Indicates that the port is down and requires user intervention.
If the port repeatedly flaps between the Up and Down states, the port enters the Down-Stuck state.
50
51
Layer 2 Forwarding
Summary
The Layer 2 Forwarding module presents a description of the various functions a bridge performs, how a bridge handles frames received from the networks, and how to configure Layer 2 forwarding. You should now be able to:
Describe transparent bridging. Describe the flooding and learning port states. Describe the forwarding and filtering port state. Describe the forwarding database. Identify the various FDB entry types. Manage forwarding database entries. Configure egress flooding. Configure and verify the limit-learning feature. Configure and verify the lock-learning feature. Configure the Extreme link status monitor.
52
53
Layer 2 Forwarding
Lab
Turn to the Layer 2 Forwarding Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
54
55
Layer 2 Forwarding
Review Questions
1 Which of the following commands configures normal flooding behavior on ports 1 through 6 on a switch? a flood ports 1-6 all_cast b enable flooding all_cast ports 1-6 c configure ports 1-6 enable flooding all_cast d configure all_cast flooding ports 1-6
2 Which of the following commands removes a permanent Layer-2 FDB entry? a configure fdbentry delete 00:E0:2B:12:34:56 vlan finance b delete fdbentry 00:E0:2B:12:34:56 vlan finance c delete fdb permanent 00:E0:2B:12:34:56 d delete fdb 00:E0:2B:12:34:56 permanent
3 Which of the following best describes an Extreme Networks Ethernet switch? a A remote bridge b A transparent bridge c A source route bridge d A source route transparent bridge
4 What action does the switch take when a packet is received on a port and the source MAC address does not already exist in the FDB? a The source MAC address is learned and added to the FDB. b The switch filters the frame at the port. c The destination MAC address is learned and added to the FDB. d The source MAC address is added to the FDB as a black hole entry.
5 Which of the following are the switch functions related to Layer-2 forwarding? a Flooding, learning, forwarding, and filtering. b Blocking, learning, forwarding, and filtering. c Blocking, listening, learning, and forwarding. d Listening, learning, filtering, and forwarding.
56
6 What part of the Ethernet packet does a transparent bridge use to make forwarding decisions? a The destination Layer-3 address b The Layer-3 protocol type field c The Layer-2 protocol type field d The destination MAC address
7 Which of the following best describes the flooding bridge function? a The forwarding database does not contain the entry for the destination, the destination is considered to be unknown, and the packet must be forwarded to every attached interface. b When frames are received and the destination MAC address matches the FDB entry for the inbound port, the packet must be forwarded to every attached interface. c When a packet is received on a port, if the source address does not already exist in the FDB it is learned and flooded to the FDB.
d When a packet is received on a port, if the source address does not already exist in the FDB it is dropped.
8 How many times may a station attempt a retransmission after detecting a collision? a 4 b 8 c 16 d 32
9 Which of the following identifies the minimum Ethernet packet length? a 46 b 64 c 128 d 256
10 Which of the following switch functions is best defined by the following sentence? This function examines the source addresses of frames received on the port and creates an entry in the forwarding database associating the port on which the frame was received with the MAC address. a Flooding b Learning c Forwarding d Filtering
57
Layer 2 Forwarding 11 Which of the following switch functions is best defined by the following sentences? This function looks up the destination address in the forwarding database. If the address is known and the port is the same as the port on which the frame is received, the frame is discarded. a Flooding b Learning c Forwarding d Filtering
12 Which of the following switch functions is best defined by the following sentence? This function forwards packets to all interfaces if the destination MAC address is unknown. a Flooding b Learning c Forwarding d Filtering
13 Which of the following switch functions is best defined by the following sentences? This function looks up the destination address in the forwarding database. If the address is known and the port is different from the port on which the frame is received, the frame is sent to the destination port. a Flooding b Learning c Forwarding d Filtering
14 Which of the following is NOT a Layer 2 FDB entry type? a Dynamic Entries b Static Entries c Black hole Entries d Fast-Aging Entries
15 Which of the following is true? a The show ports command is used to determine the configuration of MAC address learning b MAC address learning is enabled by default c MAC address learning is configured on a per-port basis d All of the above
58
16 Which of the following values is the default for the FDB agingtime parameter? a 15 Seconds b 60 Seconds c 100 Seconds d 300 Seconds
17 Which of following Layer 2 security features freezes the FDB and does not allow new MAC address entries to be added dynamically? a Egress Flood Control b Limit-learning c Lock-learning d All of the above
18 Egress Flood Control enables you to control the transmission of which of the following packets? a Broadcast b Multicast c Unknown Unicast d All of the above
19 Which of the following describes how MAC addresses from unknown stations are handled after the limit-learning threshold has been reached? a MAC addresses are ignored and packets originated by these stations are dropped b MAC addresses are learned and packets originated by these stations are dropped c MAC addresses are learned as black hole entries and packets originated by these stations are dropped
d MAC addresses are learned as black hole entries and packets originating from these stations are forwarded
20 Which of the following commands enable you to view the Layer 2 forwarding database? a show Layer 2 forwarding table b display L2 table c show fdb d L2 view
59
Layer 2 Forwarding 21 Which of the following commands enable you to add an entry to the Layer 2 forwarding database? a add fdbentry b create fdbentry c fdbentry create d fdbentry add
22 Which two commands of the following list enable you to remove entries from the Layer 2 forwarding database? a delete fdbentry / clear fdb b clear fdbentry / delete fdb c remove fdbentry / unconfigure fdb d unconfigure fdbentry / remove fdb
23 Which of the following networking devices defines the boundary of a collision domain? a Hub b Bridge c Repeater d All of the above
60
This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
61
Layer 2 Forwarding
62
Introduction to VLANs
Introduction to VLANs
Student Objectives
Upon completion of this module, you will be able to:
Define VLANs. Describe port-based (untagged) VLANs. Describe tagged VLANs. Describe protocol-based VLANs. Describe the benefit of VLANs. Manage port-based (untagged) VLANs. Manage tagged VLANs. Manage protocol-based VLANs.
Introduction to VLANs
Virtual LANs
A Virtual Local Area Network (VLAN) is an emulation of a Local Area Network (LAN). But, it's more than that. It's a way of grouping different network devices to ensure that those devices can communicate directly with one another. Typically, network devices are grouped together into VLANs based upon one the following criteria:
A VLAN emulates a LAN by managing how Ethernet frames are propagated throughout a network. For example, in order for the VLAN to operate like a typical LAN, broadcast, multicast, unknown unicast frames must be forwarded to all the stations in the VLAN. A virtual local area network is a collection of devices that communicate as if they were on the same broadcast domain. VLANs are a feature found in most switches (bridges) today. VLANs allow the administrator to configure a bridge to participate in multiple broadcast domains. To forward traffic from one VLAN to another VLAN, use a Layer-3 device such as a router or Layer-3 switch. Virtual LANs are a technology that provides the network administrator with greater control over network traffic and administration.
VLANs can span multiple Layer-2 switches and do not restrict node placement. Broadcast packets are flooded only within a VLAN / broadcast domain. A VLAN is a Layer-2 broadcast domain. With the use of VLANs, the Layer-2 broadcast domain is no longer defined by just a device's physical location. VLANs allow the administrator to define which devices are contained within the same Layer-2 broadcast domain. Devices configured to be within the same VLAN, communicate as though they were on the same physical network. (regardless of physical location)
VLANs greatly increase the control available to the administrator. VLANs can enhance network performance and design flexibility as follows:
A single switch may be configured to support multiple VLANs. A single port on a switch can be a member of more than one VLAN.
Introduction to VLANs
VLAN Operation
A VLAN emulates a LAN by managing how Ethernet frames are propagated throughout the network. For example, in order for the VLAN to operate like a typical LAN; broadcast, multicast, and unknown unicast Ethernet frames that originate from a station that is part of a VLAN must be forwarded to all the stations in that VLAN. Therefore, a VLAN defines the parts of the network where broadcast packets are to be forward - or the broadcast domain. Just like in traditional LANs, a router (Layer 3 forwarding device) is required to forward traffic from one VLAN to another. This is true even if all VLANs are in a single device. Devices configured to be within the same VLAN, communicate as though they were on the same physical network (regardless of physical location). There must be either an external Layer-3 router, or something inside the switch that acts as a Layer-3 router in order for traffic to traverse VLANs.
Introduction to VLANs
Types of VLANs
VLANs are created by associating network devices with one another based upon some criteria. That criterion can either be the physical port upon which the network device's traffic ingresses the switch or some other information that is contained in the Ethernet frame. The various VLAN types are named after the criteria used to determine which devices are members of the VLAN.
Membership is based upon the 802.1Q tag value of the frame. Membership is based upon the Ethernet Frame's ingress port. Membership is based upon the protocol information in the Ethernet Frame. It is quite possible for one station to be a member of several VLANs when using protocol based VLANs. Devices whose MAC addresses match (or partially match) a predefined set of MAC addresses are part of the same VLAN
Protocol VLAN
Introduction to VLANs
Port-Based VLANs
In a port-based VLAN, membership is based upon which ports are assigned to the VLAN. For example, if ports 1, 2, 3, and 4 are assigned to VLAN_BLUE, then any untagged Ethernet frames that are received by the switch on ports 1, 2, 3, or 4 are distributed to only those ports. Untagged Ethernet frames that are received on ports 1, 2, 3, or 4 should never be forwarded to any of the other ports on the switch without the aid of a router. If a tagged Ethernet frame is received on a port that is configured as a member of an untagged VLAN, it can be handled by switches in a number of ways:
Drop the frame. The switch assumes that the port is only meant for untagged frames. Forward the frame based upon the VLAN ID in the frame. This assumes that the switch has a corresponding tagged VLAN configured. If a tagged VLAN with a corresponding VLAN ID is not configured on the switch, there is no way to forward the frame, so it is dropped. Forward the frame as if the incoming frame didn't have a tag. NOTE
Refer to the product documentation to determine how your switch handles this situation.
To create a port-based VLAN, the network administrator associates or assigns ports to the VLAN. This informs the switch on how to redistribute the frames that it receives. If a frame is received on any of the associated VLAN ports, the switch will distribute the frame to the other ports associated with the portbased VLAN. A port can be a member of only one port-based VLAN. However, a port may be a member of another VLAN provided the other VLAN is not a port-based VLAN. For example, a port may be a member of one port-based VLAN and three 802.1Q tagged VLANs.
10
11
Introduction to VLANs
802.1Q Fields
VLAN tagging is a process that inserts an 802.1Q Tag into the Ethernet frame. The 801.Q Tag contains these fields:
Tag Protocol ID (TPID) User Priority Canonical Format Indicator (CFI) VLAN Identifier (VID)
Since the 802.1Q tag adds four bytes to the Ethernet frame, the frame may expand to become larger than the IEEE 802.3 Ethernet Maximum Transmit Unit (MTU) of 1,518 bytes. This can affect network statistics and error counters in some devices, and can also lead to connectivity problems if non-802.1Q bridges or routers are placed in the path. The current version of IEEE 802.1D specifies that a device can receive up to 1,522 bytes.
12
13
Introduction to VLANs
14
15
Introduction to VLANs
Protocol-Based VLANs
Protocol-based VLANs enable you to define a packet filter that the switch uses as the matching criteria to determine if a particular packet belongs to a particular VLAN. A Protocol-based VLAN dynamically forwards packets within a VLAN based on a protocol filter. The Ethernet frame's protocol is usually defined in one of the following fields:
Ethernet Type Logical Link Control (LLC) Subnetwork Access Protocol (SNAP)
Destination Service Access Point (DSAP) Source Service Access Point (SSAP) Control
The one-byte fields DSAP and SSAP Fields identify the encapsulated protocol. Details of the LLC protocol are not covered by this course.
16
17
Introduction to VLANs
Benefits of VLANs
This page lists several advantages of implementing VLANs on your networks.
18
19
Introduction to VLANs
Switch ports connected to a hotel's guest rooms may be all be part of a hotel_guest VLAN. Each cube may have a dedicated port for data and a dedicated port for Voice-over-IP (VoIP). Company ports in public access areas may belong to a visitor VLAN,
When compared to other types of VLANs, port-based VLANs are easy to implement, understand, and document. These benefits make port-based VLANs a very popular tool. Managing a port-based VLAN is comprised of several discreet activities. Among these activities are:
Displaying the VLAN configuration. Creating and Deleting VLANs. Adding and Removing Ports. Verifying VLAN functionality. Enabling and Disabling VLANs. Renaming the VLAN.
20
21
Introduction to VLANs
Examples
To display a concise description of all VLANs configured on the device, including their tag values, enter the following command: show vlan To display a detailed description of all VLANs configured on the switch, enter the following command: show vlan detail To display a detailed description of the VLAN named accounting, enter the following command: show vlan detail accounting
22
23
Introduction to VLANs
Syntax Description
vlan_name vr vr-name Specifies a VLAN name (up to 32 characters). Specifies a virtual router. Specifies in which virtual router to create the VLAN.
Examples
To create a VLAN named accounting, enter the following command: create vlan accounting To remove the VLAN named accounting, enter the following command: delete vlan accounting
Implementation Notes
A newly-created VLAN has no member ports, is untagged, and uses the protocol filter ANY until you configure it otherwise. Use the various configuration commands to configure the VLAN to meet your needs. Internal VLAN IDs are assigned automatically using the next available VLAN-ID starting from the high end (4094) of the range. Each VLAN name can be up to 32 standard alphanumeric characters, but must begin with an alphabetical letter. VLAN names are locally significant. That is, VLAN names used on one switch are only meaningful to that switch. NOTE
The BlackDiamond 8800 series switches, SummitStack, and the Summit family of switches do not support usercreated virtual routers; all user-created VLANs are in VR-Default.
24
25
Introduction to VLANs
Implementation Notes
The VLAN must already exist before you can add (or delete) ports. Ports can only be in one VLAN as untagged. A port can be added to multiple VLANs only when it has multiple tags. By default, all ports are members of the default VLAN. In order to add untagged ports to a different VLAN, you must first remove them from the default VLAN. Failure to do so results in this error:
Error: Protocol conflict when adding untagged port 1:2. Either add this port as tagged or assign another protocol to this VLAN.
Examples
To add all ports to the VLAN named accounting, use the following command: configure vlan accounting add ports all To remove ports 4, 6, and 10 from the port-based VLAN named accounting, use the following command: configure vlan accounting delete ports 4, 6, 10
26
Figure 15: Adding and Removing Ports to and from a Port-Based VLANs
Figure 16: Adding and Removing Ports to and from a Port-Based VLANs Examples
27
Introduction to VLANs
Disabling a VLAN stops all traffic on all ports associated with the specified VLAN. You cannot disable any VLAN that is running any Layer-2 protocol such as ESRP or EAPS. When you attempt to disable a VLAN running Layer-2 protocol traffic (for example, the VLAN accounting), the system returns a message similar to the following:
VLAN accounting cannot be disabled because it is actively use by an L2 Protocol
You can disable the default VLAN; however, ensure that this is necessary before disabling the default VLAN. You cannot disable the management VLAN. Although you can remove ports from a disabled VLAN, you cannot add ports to a disabled VLAN or bind Layer-2 protocols to that VLAN.
To re-enable a VLAN, use the following command syntax: enable vlan <vlan_name>
28
29
Introduction to VLANs
Renaming VLANs
If a department moves from one location to another, it may be easier to rename a VLAN than to completely reconfigure the switch to accommodate the move. Consider this scenario:
The accounting department will move from the second floor of building 301 to the first floor of building 300. The engineering department will move into the space vacated by the accounting department after the space is renovated next week.
Rather than remove the ports and deleting the accounting VLAN, it may be easier to simply rename the VLAN engineering.
Command
To rename a VLAN, use the following command syntax: configure vlan <vlan_name> name <name>
Example
To rename the accounting VLAN to finance, use the following command: configure vlan accounting name finance
30
31
Introduction to VLANs
Tagging Field
This field indicates if the VLAN has been configured with a tag. In the case of port-based VLANs, this field should contain the value Untagged.
Primary IP Field
The Primary IP field displays the IP address and the Sub-net Mask of the internal router interface for this VLAN.
Protocol Field
When examining the configuration of a port-based or untagged VLAN, the protocol should be listed as ANY or Match all unfiltered protocols.
Ports Field
The Ports field indicates the number of ports that are in the VLAN. The example on the slide indicates that there are three ports in this VLAN. The ports are then listed. The example shows that ports 1, 4 and 7 are members of VLAN blue. The asterisk (*) preceding each port number indicates that the port is active.
32
33
Introduction to VLANs
System VLANs
The following two VLANs are pre-configured on ExtremeXOS switches:
Default Mgmt
Default VLAN
The default VLAN has the following properties:
An internal VLAN ID of 1 Contains all the switch data ports (all ports except the Ethernet management port) as members Ports are defined as untagged NOTE
The default VLAN cannot be deleted. Although you can rename an existing VLAN, the default and Mgmt VLAN names should not be changed. VLAN names are not case sensitive.
Mgmt VLAN
Many Extreme Networks switches have an additional pre-configured VLAN called Mgmt which contains the dedicated Mgmt Ethernet port. The Mgmt VLAN has the following characteristics:
Only exists on switches that have an Ethernet management port. Only contains the management port. Is only used for management functions. No switching or routing is supported on this VLAN.
You can configure an IP address, subnetwork mask, and a default route for the mgmt VLAN. The Mgmt VLAN and Mgmt port are connected to the VR-Mgmt virtual router interface.
Management Port
The management port supports access for Telnet, SNMP, and TFTP. The management port is a DTE port, and is not capable of supporting switching or routing functions.
34
35
Introduction to VLANs
The switches must be connected together. VLAN names must be unique. The same VLAN name should be configured on each switch. Each switch must have a configured port(s) for each VLAN. Each link between the switch ports must connect to a port that is a member of the same VLAN on the next switch.
The illustration shows one way to extend three VLANs across two switches. The following steps show the basic process involved in configuring each of the three VLANs:
Create the VLANs on each switch. create vlan finance create vlan engineering create vlan marketing
Add ports to each VLAN on each switch. configure vlan finance add ports 1-4 configure vlan engineering add ports 9-12 configure vlan marketing add ports 17-24
Cable the switches together using one port per VLAN on each switch. NOTE
This type of physical connection uses a lot of physical port resources. To overcome this limitation, implement other VLAN types such as tagged VLANs.
36
37
Introduction to VLANs
38
39
Introduction to VLANs
Creating the VLAN Assigning a tag value (VLAN ID) to the VLAN
Create a VLAN with a unique name using the following syntax: create vlan <vlan name> NOTE
You may want to consider including the tag value as part of the VLAN Name. This may make it easier to maintain the VLAN configuration.
Assign a tag value (VLAN ID) to the VLAN using the following syntax: configure vlan <vlan_name> tag <tag>
Example
To create a VLAN named ENGINEERING with a VLAN ID of 2004, enter the following commands: create vlan ENGINEERING configure vlan ENGINEERING tag 2004
Implementation
The tag range is 2 - 4094. The VLAN tag is the same as its VLAN ID.
40
41
Introduction to VLANs
Ingress Processing
At ingress, the incoming frame is processed based upon:
The Ethernet frames VLAN ID. The port membership type whether it is tagged or untagged. The port is a member of a VLAN that is configured the same tag value as the incoming frame.
When an Ethernet frame is received by a port that is a member of tagged VLAN, the system must first examine the incoming frame to determine if the frame is tagged or untagged. Using the table on the slide, when a tagged frame is received on Port 1, the switch checks to see if the VLAN ID in the frame has the value of either 2 or 3. If not, the frame is dropped. If an untagged frame is received on Port 1, the frame is associated with the GUEST VLAN.
Egress Processing
Egress frame processing is based upon:
When an Ethernet Frame is transmitted by a switch port, the switch formats the frame based upon the frames associated VLAN and the type of membership associated with the egress port. Using the table on the slide as an example, when the switch transmits a frame that is associated with the FINANCE VLAN out of Port 1, the switch transmits a tagged frame with a VLAN ID value of 2. When the switch transmits a frame that is associated with the FACILITIES VLAN out of the same port, the switch transmits a tagged frame with a VLAN ID value of 3. However, when the switch transmits a frame that is associated with the GUEST VLAN out of Port 1, the switch transmits an untagged frame.
42
Figure 27: Adding and Deleting Ports to and from a Tagged VLAN
43
Introduction to VLANs
The name of the VLAN of which the port will become a member The port number of the target port The membership type whether tagged or untagged
Once you have this information, use the following command syntax to add the port(s) to a VLAN: configure vlan <vlan_name> add port <port_list> [ untagged | untagged ]
Examples
To delete port 7 from the default VLAN: configure vlan default delete port 7 To add port 7 to the engineering VLAN as an untagged member, use the following command: configure vlan engineering add port 7 untagged To add ports 2 and 3 to the engineering VLAN as tagged members, use the following command: configure vlan engineering add ports 2,3 tagged To delete all ports from the default VLAN: configure vlan default delete port all
44
Figure 28: Adding and Deleting Ports to and from a Tagged VLAN
45
Introduction to VLANs
NOTE
For the purposes of VLAN classification, packets arriving on a port with an 802.1Q tag containing a VLANid of 0 are treated as untagged.
46
47
Introduction to VLANs
configure a network station to send tagged frames use a device to generate packet such as those provided by Ixia use software on your PC that allows you to generate tagged packet such as Network Packet Generator (npg.exe) use a switch with the egress port configured as a tagged port
Once you are able to transmit tagged and untagged frames, and have the ability to manipulate the VLAN ID in the tagged frames, you are ready to proceed to the next step.
Onboard Statistics
You can also examine the packet statistics for the VLAN. When a packet is generated by the network device, you can view the statistics for the appropriate VLAN to verify that the frame is associated with the correct VLAN. Use the command syntax to guide you: clear counters configure port [<port_list> | all} monitor vlan <vlan name> show ports {port_list} vlan statistics {no-refresh}
48
49
Introduction to VLANs
50
51
Introduction to VLANs
VLAN Rules
When designing your network's VLANs, follow a few simple rules.
Links between switches are all tagged. VLANs with the name Yellow and Red are created on all three switches. VLAN Yellow is consistently assigned a tag value of 10. VLAN Red is consistently assigned a tag value of 30.
52
53
Introduction to VLANs
54
55
Introduction to VLANs
56
57
Introduction to VLANs
58
59
Introduction to VLANs
For IP, IPX, IPv6, MPLS, and DECNet protocols, the Extreme Networks switch investigates the Ether Type field to determine if there is a match. Matching traffic will be forwarded, other traffic will be discarded. For NetBIOS and IPX_8022 protocols, the device looks at the LLC field to determine if there is a match. For IPX_SNAP and AppleTalk protocols, the switch will investigate the SNAP Organizationally Unique Identifier (OUI) to ascertain if there is a match. Finally, the protocol filter ANY is the default protocol filter for all VLANs. This filter essentially associates all incoming traffic with the VLAN. Note: Protocol filters on the BlackDiamond 8800 series switches, SummitStack, and the Summit series switch only. These devices do not forward packets with a protocol-based VLAN set to AppleTalk. To ensure that AppleTalk packets are forwarded on the device, create a protocol-based VLAN set to any and define other protocol-based VLANs for other traffic, such as IP traffic. The AppleTalk packets are forwarded on the VLAN with the ANY protocol filter, and the other protocols pass traffic on their specific protocol-based VLANs. To display a list of custom and pre-defined protocol filters, enter the following command: show protocol
60
61
Introduction to VLANs
snap - Ethernet frame type inside the IEEE SNAP packet encapsulation hex_value Specifies a four-digit hexadecimal number between 0 and FFFF that represents:
The Ethernet protocol type taken from a list maintained by the IEEE. The DSAP/SSAP combination created by concatenating a two-digit LLC Destination SAP (DSAP) and a two-digit LLC Source SAP (SSAP). The SNAP-encoded Ethernet protocol type.
To display the configuration of pre-defined protocol filters, enter the following command: show protocol <protocol_name> For example to build a filter for LLC SAP packets, enter the following commands: create protocol llcsap configure protocol llcsap add llc 0xfeff To build a filter with multiple protocol types, enter the following command: create protocol new configure protocol new add etype 0xfeff llc 0xe0e0 To delete a protocol filter, enter the following command: delete protocol <protocol_name> If you delete a protocol that is in use by a VLAN, the protocol associated with that VLAN becomes None. You can continue to configure the VLAN. However, no traffic is forwarded to the VLAN until a protocol is assigned to it.
62
63
Introduction to VLANs
64
65
Introduction to VLANs
Is frame is tagged? If yes, and port is a member, then forward appropriately. Does frame have matching protocol filter? If yes then forward appropriately. Protocol filters may include ANY.
66
67
Introduction to VLANs
68
69
Introduction to VLANs
VLAN Orange - IP based VLAN In this example the IP server in the orange VLAN is protected from the traffic coming from the blue VLAN. To assign ports to a protocol-based VLAN, enter the following command: configure vlan <vlan name> add ports <portlist> To remove a protocol filter from a VLAN, enter the following command: configure vlan <vlan_name> protocol any
70
71
Introduction to VLANs
Assign only one protocol filter to a VLAN. The protocol filter is treated like a tag with one tag per VLAN. When a protocol filter is deleted, the VLANs which had the protocol filter assigned are now assigned a protocol filter of none. Precedence of tagged packets over protocol filters:
If a VLAN is configured to accept tagged packets on a particular port, incoming packets that match the tag configuration take precedence over any protocol filters associated with the VLAN When a packet is received on the port configured as VLAN purple with a Tag = 10 and VLAN green with an IPX protocol filter. You might ask which the switch services first? When a new VLAN is created, it is assigned the any protocol by default. This means that the VLAN forwards traffic independent of the protocol type. If you want to remove the protocol filter from a VLAN, you should assign the any protocol to the VLAN
72
73
Introduction to VLANs
Summary
You should now be able to:
Define VLANs. Describe port-based (untagged) VLANs. Describe tagged VLANs. Describe protocol-based VLANs. Describe the benefit of VLANs. Manage port-based (untagged) VLANs. Manage tagged VLANs. Manage protocol-based VLANs.
74
75
Introduction to VLANs
Lab
Turn to the Port-based VLAN Configuration Lab and the Tagged VLAN Configuration Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
76
77
Introduction to VLANs
Review Questions
1 Which of the following commands configures the green VLAN with a tag of 54? a create vlan green add ports all tag 54 b configure vlan green add ports all tag 54 c configure vlan green tag 54 d create vlan green tag 54 2 Which of the following pair of commands configures a new protocol filter? a create protocol new / configure protocol new add etype 0xfeff b configure protocol IPv6 / configure protocol IPv6 add etype 0x86DD c create protocol IPv6 / configure protocol add etype 0x86DD d configure protocol IPv6 / add etype 0x86DD to protocol IPv6 3 Which of the following statements is true? a The Ethernet management port is a member of the default VLAN b All ports are members of the management VLAN c You cannot disable the management VLAN d You may add ports to a disabled VLAN 4 Which of the following commands configures ports 4, 5, and 6 as tagged ports for the green VLAN? a create vlan green add ports 4-6 tagged b configure vlan green add ports 4-6 tagged c configure vlan green tag ports 4-6 d create vlan green tag ports 4-6 5 Which of the following commands displays a list of protocol filters? a show protocol b show protocol filter c show protocol list d show protocol configuration 6 Which of the following commands displays the configuration of the IP protocol filter? a show protocol b show protocol ip c show protocol configuration d show protocol ip configuration
78
7 Which of the following commands displays the VLAN tag value? a show vlan b show switch c show tag d show vlanid 8 How many VLANs can an untagged port be added to simultaneously? a One b Two c Eight d 4095 9 A VLAN defines which type of domain? a The collision domain b The broadcast domain c The routing domain d The physical topology 10 What is the IEEE specification for VLAN tagging? a 802.1Q b 802.1W c 802.1D d 802.1p 11 Which types of packets are flooded throughout the VLAN? a known unicast b broadcast c PING d collision detection 12 Port-based VLANs are also known by which other name? a MAC-Based VLANs b Tagged VLANs c Protocol VLANs d Untagged VLANs
79
Introduction to VLANs 13 What is VLAN tagging primarily used for? a To transparently interconnect existing VLANs in separate locations across a Metropolitan Area Network. b To dynamically determine VLAN membership based on the MAC address of the end stations connected to the physical port. c To dynamically determine VLAN membership based on a specified protocol. d To create VLANs that span multiple switches using uplinks. 14 Which of the following best describes protocol-based VLANs? a Dynamically assigns end stations to a VLAN based on the MAC address. b Dynamically assigns end stations to a VLAN based on the Layer-3 address. c Dynamically forwards packets within a VLAN based on a protocol filter. d Dynamically forwards packets within a VLAN based on the physical layer. 15 Which command displays the configuration of VLAN Blue? a show VLAN Blue b display VLAN Blue c confirm VLAN Blue d show VLAN Blue config 16 Which of the following commands creates a VLAN named "Blue?" a configure VLAN blue new b add VLAN blue ports all c create VLAN Blue d enable VLAN Blue 17 Which command adds ports 1-4 to VLAN Blue? a add ports 1-4 VLAN Blue b create VLAN ports 1,2,3,4 to Blue c enable VLAN Blue with ports 1-4 d configure VLAN Blue add ports 1-4 18 Which command disables VLAN Blue? a unconfigure VLAN Blue all b disable VLAN Blue c halt VLAN Blue d configure VLAN Blue disable
80
19 Which is the default VLAN ID for the default VLAN? a 0 b 1 c 4094 d 4095 20 Which of the following statements is true? a By default, all ports are members of the mgmt VLAN b By default, the management port is a member of the default VLAN c By default, all ports except for the management port are part of the default VLAN d By default, all ports are members of the control VLAN 21 Which command removes all ports from the default VLAN? a configure VLAN default delete ports all b configure VLAN default remove ports all c disable all default VLAN ports d unconfigure VLAN default ports all 22 Which of the following is a true statement? a VLAN names must match across links for the associated tagged VLANs to be contiguous. b Tags must match across links for the associated tagged VLANs to be contiguous. c Only one end of a link must be tagged for the associated tagged VLAN to be contiguous. d VLAN names and tags must match across links for the associated tagged VLANs to be functional.
81
Introduction to VLANs This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
82
Spanning Tree
Spanning Tree
Student Objectives
The Spanning Tree module explains what the Spanning Tree Protocol (STP) is used for and how it works. This module identifies the exact building blocks of the spanning tree protocol and how spanning tree is configured on Extreme Networks switches. It also discusses the Extreme Networks STP enhancements. Upon completion of this module, you will be able to:
Define the spanning tree protocol. Explain how spanning tree works. Identify the building blocks of STP. Describe the relationship between ports, VLANs, and the Spanning Tree Domain. Configure STP on Extreme Networks switches. Describe Extreme Networks STP enhancements. NOTE
Depending on the needs of the students, the instructor may choose to reduce or eliminate the protocol overview portion of this module.
Spanning Tree
Redundant paths are disabled when the main paths are operational Redundant paths are enabled if the main path fails
Spanning tree has been adopted by the IEEE committees to run on any LAN topology. Spanning tree is a protocol that performs the task of providing fault tolerance on networks and should not be confused with the functions of a transparent bridge. Most transparent bridges support the spanning tree protocol.
NOTE
STP is a part of the 802.1D bridge specification defined by the IEEE. In this module STP is explained using terms used by the 802.1 specification. So, the Extreme Networks switches are referred to as bridges.
NOTE
To search through the IEEE Standards Status Report for 802.1 go to the following link: http://standards.ieee.org/cgi-bin/status
Spanning Tree
Network Redundancy
It is often required to design a network with redundancy at Layer 2 to ensure that frames always have an active path to their destination. Any one of the switch links in the illustration can fail and the 2 PCs can still exchange frames with each other.
Spanning Tree
NOTE
Ports in the blocking state still participate in the Spanning Tree Protocol.
Bridged networks must allow for redundancy. Only one path should be enabled to any destination on the network.
Spanning Tree
Network components being removed An active bridge failing to forward packets Management changes made to the active topology
In the example shown, if one of the other links is lost, the link that was put into the blocking state by spanning tree, is returned to the forwarding state to restore connectivity.
10
11
Spanning Tree
Blocking
A port in this state does not participate in frame re-transmission, to prevent frame duplication caused by multiple paths existing in the active topology of the Bridged LAN. A port enters the blocking state following initialization of the bridge, or because it has received information that another bridge is the Designated Bridge for the LAN to which the port is attached. A port in blocking state can transition to the listening state or be disabled by a management command.
Listening
A port in this state is preparing to participate in frame re-transmission, it makes no entries into the forwarding database. In the listening state, frame re-transmission is temporarily disabled to prevent temporary loops, which can occur as the active topology of the bridged LAN changes. A port in the listening state normally transitions to the learning state, but may transition back to the blocking state or be disabled by a management command.
Learning
A port in this state is also preparing to participate in frame re-transmission. In the learning state, frame re-transmission is still temporarily disabled, however, learning is now enabled to allow information to be collected prior to frame re-transmission. The learning process examines the source addresses of frames received on each port and creates (or updates) an entry in the forwarding database associating the port on which the frame was received with the MAC Address in the source address field of the frame. A port in the learning state normally transitions to the forwarding state, but may transition back to the blocking state or be disabled by a management command.
Forwarding
A port in this state is now taking part in frame re-transmission. A port in the forwarding state can forward received frames and make entries into the forwarding database. A port in the forwarding state may transition back to the blocking state or be disabled by a management command.
NOTE
The port states described represent a generic bridge and may not match the exact behavior of any given switch architecture.
12
13
Spanning Tree
14
15
Spanning Tree
Bridge ID Bridge Protocol Data Unit Root Bridge Root Port(s) Designated Bridge Designated Port
The following slides show how these building blocks are used to determine the optimum single path throughout the network.
16
17
Spanning Tree
18
19
Spanning Tree
20
21
Spanning Tree
Designated Ports
The definition of designated ports, are the ports on a designated bridge that attach to the segments for which that bridge is the designated bridge. Certain ports are identified as designated ports. These ports are placed in the forwarding state and are the designated best path to the root bridge. If two ports offer the same best path to the root bridge, the port connected to the bridge with the lowest bridge ID becomes the designated port. If the bridge IDs are the same, (i.e. two links to the same bridge) the port with the lowest port priority is selected. Port priority can be configured or the port interface number can be used.
22
23
Spanning Tree
Active Topology
We can now see the end result of the calculation - there is a single active path through the network. You can also see that STP has selected the optimum path by giving preference to the links with the higher bandwidth. The remaining links are now blocked from one end and are only allowed to forward traffic if a change in topology occurs.
24
25
Spanning Tree
The default of this timer of 20 seconds Whenever a bridge receives a BPDU, it resets the max age timer
If 20 seconds expire, then the bridge assumes spanning tree has failed and the bridge goes into convergence state. When this situation occurs, the same process that initially selected the original root bridge is used again to determine which bridge should now become the new root bridge. In the case where an active piece of the topology changes, a different BPDU is used to signal the event. The topology change BPDU is released, forwarded, and repeated by the root ports until it finally reaches the root bridge. When the root bridge receives this BPDU, it sets a flag in its configuration BPDU signaling the bridges to recalculate the active topology.
26
27
Spanning Tree
28
29
Spanning Tree
Draw the physical network. Identify where loops exist. Determine which bridge is the root bridge if default values are used. Decide which bridge should be the root bridge. Identify which STP parameters need to change to implement the desired root bridge. Determine which bridges becomes the designated bridges for each segment if default values are used. Decide which bridges should be the designated bridges. Identify which STP parameters need to change to implement the desired designated bridge. Determine which ports becomes the designated ports for each segment if default values are used. Decide which ports should be the designated ports. Identify which STP parameters need to change to implement the desired designated port. Label the network diagram with the root bridge, designated bridges, designated ports, and root ports. Create multiple copies of the network diagram. Determine how the network recalculates the port states and topology for each link failure scenario. Determine how the network recalculates the port states and topology for each bridge failure scenario. Decide how the network should recalculate port states for each port or bridge failure. Identify which STP parameters need to change to implement the desired topology for each failure scenario.
30
31
Spanning Tree
IEEE 802.1D This mode is used for backward compatibility with previous STP versions and for compatibility with third-party switches using IEEE standard 802.1D. Each port can only support one STPD running in 1D mode. IEEE 802.1w Rapid Spanning Tree (RSTP). RSTP takes advantage of point-to-point links in the network and actively confirms that a port can safely transition to the forwarding state without relying on any timer configurations. If a network topology change or failure occurs, RSTP rapidly recovers network connectivity by confirming the change locally before propagating that change to other devices across the network. For broadcast links, there is no difference in convergence time between STP and RSTP. RSTP supersedes legacy STP protocols, supports the existing STP parameters and configurations, and allows for seamless interoperability with legacy STP. Multiple Spanning Tree Protocol (MSTP), is based on the IEEE standard 802.Q-2004 (previously 802.1s). MSTP is able to bundle multiple VLANs into one spanning tree topology. MSTP provides the capability to logically divide a Layer 2 network into regions. Every region has a unique identifier and can contain multiple instances of spanning trees. All such regions are bound together using a common instance spanning tree, which is responsible for creating a loop free topology across regions while MSTP controls topology inside regions. MSTP uses rapid spanning tree as a converging algorithm and is fully interoperable with earlier versions of STP. NOTE
802.1w is easy to enable, provides faster switchover, and is compatible with 802.1D.
You can configure ports within an STPD to accept specific BPDU encapsulations. This STP port encapsulation is separate from the STP mode of operation.
PVST+ This mode implements Per-VLAN Spanning Tree (PVST)+ for compatibility with third-party switches running this version of STP. Extreme Multiple Instance Spanning Tree Protocol (EMISTP) This encapsulation mode is an extension of STP that allows a physical port to belong to multiple STPDs by assigning the port to multiple VLANs.
When a physical port belongs to multiple STPDs, it is associated with multiple STP ports. It is possible for the physical port to run in different modes for different domains to which it belongs.
Spanning Tree Enhancements are discussed in more detail in the class ExtremeXOS - Implementing Redundant Networks.
32
33
Spanning Tree
34
35
Spanning Tree
NOTE
You should not configure any STP parameters unless you have considerable knowledge and experience with STP. The default STP parameters are adequate for most networks.
7 Specify the time delay (in seconds) between the transmission of BPDUs from this root bridge for this STPD, by using the following syntax: configure stpd <stpd_name> hellotime <seconds> The hello time range is 1 through 10 seconds. The default is 2 seconds. 8 Specify the time (in seconds) that the ports in this STPD spend in the listening and learning states when the switch is the root bridge, by using the following syntax: configure stpd <stpd_name> forwarddelay <seconds> The forwarding delay range is 4 through 30 seconds. The default is 15 seconds. 9 Specify the maximum age of a BPDU in this spanning tree protocol domain, by using the following syntax: configure stpd <stpd_name> maxage <seconds> The maximum age range is 6 through 40 seconds. The default is 20 seconds. 10 Verify the configuration settings, by using the following syntax: show configuration stp
36
37
Spanning Tree
If the bridge ID and the Designated Root match, then this switch is the root bridge.
To verify the state of the spanning tree ports, use the following command syntax: show stpd <stpd_name> {[detail | <port_list> {detail}]} The command displays the following information:
STPD port configuration STPD state (the root bridge) STPD port state (forwarding and blocking.)
Unconfiguring STP
To disable the STP protocol, use the following command syntax: disable stpd {<stpd_name>} To restore the default spanning tree protocol values, use the following command syntax: unconfig stpd {<stpd_name>}
38
39
Spanning Tree
The 802.1D ports must be untagged. A VLAN and port can belong to only one 802.1D STPD. If a port is a member of multiple VLANs then all those VLANs must belong to the same 802.1D STPD.
Spanning Tree is designed for a Layer 2 environment where you can have redundant paths but only have one active path at a time to eliminate loops which eventually cause broadcast storms. Each VLAN forms an independent broadcast domain. STP blocks paths to create a loop-free environment. When assigning VLANs to an STPD, pay careful attention to the STP configuration and its effect on the forwarding of VLAN traffic. When STP blocks a path, no data except BPDUs can be transmitted or received on the blocked port. Within any given STPD, all VLANs belonging to it use the same spanning tree. An STPD with multiple VLANs must contain only VLANs that belong to the same virtual router instance. You should remove all VLANs associated with the STP before deleting the STPD. If you do not remove all VLANs associated with the STPD, deleting the STPD also deletes the member VLANs which might not be desired. STP and load-sharing work together. STP and the redundant physical port/link work together. NOTE
Care must be taken to ensure that multiple STPD instances within a single switch do not communicate with each other in the same broadcast domain. For example, this could happen if another external bridge is used to connect VLANs belonging to separate STPDs.
40
41
Spanning Tree
Summary
The Spanning Tree module presents the IEEE 802.1D Spanning Tree Algorithm and Protocol, and examines the implementation of the spanning tree protocol on traditional bridge technology. This Module also provides an explanation of how the spanning tree protocol may be configured on the Extreme Networks switch product family as well as Extreme Networks enhancements to STP. You should now be able to:
Define the spanning tree protocol. Explain how spanning tree works. Identify the building blocks of STP. Describe the relationship between ports, VLANs, and the Spanning Tree Domain. Configure STP on Extreme Networks switches. Describe Extreme Networks STP enhancements.
42
43
Spanning Tree
Lab
Turn to the Spanning Tree Configuration Lab in your XOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
44
45
Spanning Tree
Review Questions
1 What is the spanning tree protocol used for? a To provide fast protection switching for Layer 2 switches interconnected in an Ethernet ring topology. b To prevent loops in a redundant network topology. c To use a group of ports to carry traffic in parallel between switches. d To guarantee packet sequencing across redundant links.
2 What type of problem is caused by a loop topology in an Ethernet network? a Slow Layer 3 topology convergence. b Intermittent link flapping. c A broadcast storm. d Out-of-sequence packet delivery.
3 How does spanning tree protocol eliminate loops in an Ethernet network topology? a By disabling certain ports. b By distributing packets over multiple links using an address-based algorithm. c By forwarding each packet over the best path for that particular packet. d By placing certain ports in blocking mode.
4 What is the primary value used to determine the root bridge? a Bridge ID. b Port priority. c Bridge cost. d Port cost, path cost.
5 What is the primary value used to determine the designated bridge? a Bridge priority b Port priority c Bridge cost d Path cost
46
6 How does a bridge detect a link failure? a The CBPDU does not arrive before the max age timer expires. b The topology change BPDU does not arrive before the max age timer expires. c The CBPDU does not arrive before the hello timer expires. d The topology change BPDU does not arrive before the hello timer expires.
7 Which of the following spanning tree parameters is used to influence which bridge is elected as the root bridge? a The port priority b The hello timer c The port cost d The bridge priority
8 Which of the following commands activates the default spanning tree domain? a create stpd s0 b enable stpd s0 c create stpd s1 d enable stpd default
9 Which of the following commands configures the spanning tree bridge port cost? a configure stp port cost 15 6 b configure port cost 15 6 c configure stpd s0 port cost 15 6 d configure stpd bridgeport cost 15 6
10 Which of the following commands displays the configuration of the default spanning tree? a show stpd s0 b show stp c show stp default d show stpd default
11 Which of the following commands configures the spanning tree bridge priority? a configure stp bridge priority 4 b configure bridge priority 4 c configure stpd s0 priority 4 d configure stpd default priority 4
47
Spanning Tree 12 Which of the following commands configures the VLAN blue to participate in the spanning tree protocol? a configure vlan blue add stpd s0 b configure stpd s0 add vlan blue port 1,2,3 c configure stpd default add vlan blue port 1,2,3 d configure stpd default add vlan blue
13 Which of the following spanning tree parameters is used to influence which port is elected as the designated port? a The port priority b The hello timer c The bridge cost d The bridge priority
48
This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
49
Spanning Tree
50
Student Objectives
The EAPS module presents basic information about the Ethernet Automatic Protection Switching (EAPS) feature. Upon completion of this module, the successful student will be able to:
Identify the EAPS ring elements. Describe the EAPS domain and VLAN relationship. Identify the control VLAN configuration rules. Describe EAPS MAC address and flush-FDB MAC address. Describe EAPS fault detection. Describe EAPS fault restoration. Identify the steps to create an EAPS ring. Configure EAPS. Verify the EAPS configuration and status.
This revolutionary technology provides end users with continuous operation normally associated with the Public Switched Telephone Network. While EAPS provides an advanced function, it does so with radical simplicity. The real strength of EAPS comes from its ability to integrate into existing and new networks to solve real business issues. EAPS can be built using Ethernet at Layer-2, independent of the physical interface.
Licensing Requirements
You must have a Core or an Advanced Core license to configure and use all of the EAPS features described in this chapter. To use the complete EAPS functionality, including running two or more EAPS rings, having a switch belonging to multiple EAPS rings, or configuring shared-ports that allow multiple EAPS domains to share a common link, you must have a Core software license. A subset of EAPS, called EAPS Edgemode, is available with a Layer 2 Edge license and supports a subset of EAPS. The following features are available with EAPS Edgemode:
Switches can belong to one EAPS ring. Multiple EAPS domains are supported using two matching ring ports.
EAPS Elements
A ring is made up of two or more switches. The elements that create an EAPS ring include:
Master Node (S1) - One of the nodes on the ring is designated as the master. Switch S1 in the illustration is the master. Transit nodes (S2-S6) - All other nodes on the ring (S2-S6) are designated as transit nodes, and are also configured with primary and secondary ports. Primary Port (P) - The primary ring port on the master node. Secondary Port (S) - The secondary ring port on the master node. Control VLAN - Carries EAPS Master Health Check packets to determine EAPS ring status. Protected VLAN - Carries user data traffic. The EAPS Master blocks or unblocks the secondary port to the prevent Layer 2 loops.
Control VLAN
One control VLAN is created per EAPS domain. This control VLAN is for the purpose of sending and receiving EAPS messages. The control VLAN is not blocked at the master secondary port and control traffic is received. The master sends out periodic poll packets (default = 1 sec) from its primary port on the control VLAN. The poll packets are received on the secondary port, thus verifying that the ring is up. The EAPS PDUs are removed by the Master. Even though the Control VLAN is not blocked on the Master, the EAPS PDUs do not loop around the ring. There can be multiple EAPS domains running on the same switch, each with its unique control VLAN.
NOTE
A control VLAN cannot belong to more than one EAPS domain. If the domain is active, you cannot delete the domain or modify the configuration of the control VLAN(s).
No user traffic should be on the control VLAN. The control VLAN must be a tagged VLAN. Only ring ports should be added. All ring ports should be tagged. No IP address should be assigned.
On the Master Node: When the EAPS domain is started, a static Forwarding Database (FDB) entry is created for this MAC address on the control VLAN. This FDB entry is viewable in ExtremeWare, but not in Extreme XOS. On the Transit Node: When the EAPS domain is started, a static FDB entry is created for this MAC address on the control VLAN. All EAPS packets destined to 00 e0 2b 00 00 04 are removed by the CPU of the EAPS Master.
All EAPS FLUSH--FDB PDU are removed by the switch that originated the FLUSH-FDB PDU. Each node flushes its FDB when it receives this flush-FDB message, and forwards the FLUSH--FDB PDU to the next node.
A nodes other ring-port is down. When the sending node receives a copy of the FLUSH--FDB PDU it originated.
10
11
The master receives a special Link-Down-PDU generated by a transit switch that detects a fault. The master switch has a link failure on a ring port.
Upon learning of a fault, the master unblocks its secondary port, allowing protected VLAN traffic through.
12
13
Declares a failed state. Opens the logically blocked protected VLANs on its secondary port. Flushes its forwarding database. Sends a flush-FDB message to all transit switches on the ring through the control VLAN.
The other nodes on the ring need not be aware of the fault; they simply flush their FDB on all VLANs belonging to this domain. The MAC addresses are then re-learned following the normal Layer-2 learning mechanisms. 2 Polling Polling is the fail-safe method for ring recovery. During normal operation, the master node sends out a health-check packet every hellotime interval on the control VLAN. If the ring is complete, the master receives the packet on its secondary port. When the master receives the health-check packet, it resets its failtimer and remains in the complete state. If for any reason the health-check packet does not reach the master node, it sends a QUERY_LINK_STATUS_PDU to query the switches of the ring to verify if there is an actual link failure. When the failtimer expires on the Master and it does not receive a Link-Down-PDU the action taken depends on the option set using the following command: configure eaps <name> failtime expiry-action [open-secondary-port | sendalert] The switch acts in one of the following two ways:
The default option is send-alert, which sends an alert if the failtimer expires. The master node remains in a complete or init state, maintains the secondary port blocking, and writes a critical message to the syslog warning that there is a fault in the ring. An SNMP trap is also sent. The second option is the open-secondary-port parameter. The master node:
Declares a failed state. Opens the logically blocked protected VLANs on the secondary port. Flushes its FDB. Sends a flush-FDB message to all transit switches on the ring through the control VLAN.
Use the open-secondary-port option when the EAPS ring contains switches that do not support EAPS. Non-EAPS devices do not send a link-down message when their link goes down. If you specify this option it is recommended that you set the failtime to 15 seconds.
NOTE
By default, the EAPS polling failtimer is off. It is possible to use the failtimer for EAPS fault detection, but Extreme Networks does not recommend it.
14
15
Logically blocks the protected VLANs on the secondary port Flushes the FDB on all transit switches
16
17
18
19
EAPS is a Layer 2 resiliency protocol designed for ring and interconnected ring topologies. A switch could be connected to a ring running EAPS on one side, and to a mesh network running STP on the other side.
EAPS can coexist with Layer-3 protocols like VRRP, ESRP, and OSPF. EAPS and STP should not be protecting the same VLANs. STP may set the VLANs in to a forwarding state while the EAPS Master is trying to block them, resulting in a loop in the network. EAPS can be used in the core or at the edge. An EAPS ring can be built with as few as 2 switches. There is no theoretical maximum on the number of switches on an EAPS ring. Multiple EAPS domains can coexist on a single ring. Multiple EAPS domains can be defined on a single node. Only one master can be defined per domain. An EAPS domain can be defined on only one ring (it cannot cross rings). Different switches support different maximum numbers for EAPS domains, domains per ring, and VLANs per switch. Both protected and control VLANs are counted towards the maximum VLAN limit. EAPS works with many technologies, like Ethernet (10, 100, 1000), WDM, vDSL, and WAN. The standby secondary port of the EAPS Master should be configured on the least busy link. The control VLAN should not carry data traffic or be assigned an IP address.
20
21
Link Saturation
If there is a broadcast storm or heavy traffic with a high priority 802.1p setting of 7, the EAPS healthcheck packet could be dropped on the ring.
NOTE
In Extreme Networks documentation the EAPS health-check packets are sometimes called health-check messages, health-check-PDUs, health packets, control packets, and health messages.
22
23
1 The first step in the three step process of configuring the EAPS Control VLAN is to create it. The command syntax is: create vlan <control_vlan_name> 2 That's simple enough. Now, make the VLAN an 802.1Q VLAN by adding a tag value with this syntax: configure vlan <control_vlan_name> tag <vlan_tag> 3 Okay, you're almost done. The last piece of the puzzle is to add the EAPS primary and secondary ports to the VLAN using the syntax: configure vlan <control_vlan_name> add port <EAPS_primary_port_number> tagged and configure vlan <control_vlan_name> add port < EAPS_secondary_port_number > tagged 4 That's it. You will need to repeat these steps on all the switches in the proposed EAPS ring to ensure that the control messages will be able to traverse the ring.
24
25
NOTE
Make sure you follow these steps for all the switches in the proposed EAPS ring, and remember, that while each EAPS domain may only have one control VLAN, it can have multiple protected VLANs.
26
27
2 Configure one switch in the EAPS ring to be the master, by entering the following command: configure eaps <name> mode master One node on the ring must be configured as the master node for the specified EAPS domain. The remaining nodes in the EAPS ring must be configured as transit nodes. 3 Configure the remaining switches in the EAPS ring to be the transit nodes, by entering the following command: configure eaps <name> mode transit 4 Configure the Primary Port and Secondary Port on the nodes, by entering the following command: configure eaps <name> [primary | secondary] port <port number> Each node on the EAPS ring connects to the ring through two ring ports. As part of the switch protection scheme, one port must be configured as a the primary port and one port must be configured as the secondary port. Primary and Secondary ports have significance only on Master nodes. Whether a port is Primary or Secondary has no significance on Transit nodes.
28
29
30
31
32
33
The hellotime is the number of seconds the master node waits between transmissions of health check packets on the control VLAN. The value must be greater than 0. The default value is 1 second.
NOTE
Increasing the hellotime value reduces the number of health-check packets that must be processed by the master node.
To set the values of the failtime the master node uses for the EAPS health check packet, enter the following command: configure eaps <name> failtime <seconds> The failtime is the number of seconds the master node waits before the failtimer expires. The time must be greater than the configured value for hellotime. The default value is 3 seconds.
NOTE
Increasing the failtime might be useful when the network is congested. It allows the master node to wait longer to receive a health check packet.
34
35
36
37
Summary
You should now be able to:
Identify the EAPS ring elements. Describe the EAPS domain and VLAN relationship. Identify the control VLAN configuration rules. Describe EAPS MAC address and flush-FDB MAC address. Describe EAPS fault detection. Describe EAPS fault restoration. Identify the steps to create an EAPS ring. Configure EAPS. Verify the EAPS configuration and status.
38
39
Lab
Turn to the Basic EAPS Configuration Lab in your XOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
40
41
Review Questions
1 Which of the following blocks the secondary port for all non-control traffic belonging to a specific EAPS domain? a Master Node b Transport Node c Primary Node d Transit Node 2 Which of the following commands creates an EAPS domain named D3? a configure eaps D3 b configure eaps id D3 c create eaps D3 d create eaps id D3 3 Which of the following commands configures a switch as an EAPS master for the EAPS domain D3? a configure eaps D3 master b configure eaps D3 mode master c configure D3 master d enable eaps D3 master 4 Which of the following statements is false? a Only ring ports should be members of the control VLAN. b The control VLAN must be a tagged VLAN. c User traffic is allowed on the control VLAN. d The control VLAN must be configured with QoS Profile 8 (QP8) on ExtremeWare switches. 5 Which command verifies the EAPS configuration? a enable eaps configuration display b show eaps configuration c display eaps detail d show eaps detail 6 Which of the following are four of the basic EAPS ring elements? a Master Node, Transport Node, Primary Port, Secondary Port b Master Node, Standby Node, Primary Port, Secondary Port c Primary Node, Secondary Node, Master Port, Secondary Port d Master Node, Transit Node, Primary Port, Secondary Port
42
This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
43
44
11 IP Unicast Routing
IP Unicast Routing
Student Objectives
The IP Unicast Routing module presents Layer 3 unicast routing fundamentals, Internet Protocol (IP) forwarding, IP routing functionality, and how to configure IP forwarding on the Extreme Networks switches. Upon completion of this module, you will be able to:
Describe the difference between Layer 2 (L2) and Layer 3 (L3) operation. Define routing interface and IP route tables. Describe how entries are added to the IP route table. Add static entries in the IP route table. Configure IP unicast routing. Verify the IP unicast routing configuration.
IP Unicast Routing
IP Unicast Routing
IP Unicast Routing
IP Routing Process
Upon receiving a packet, the router extracts the destination network address from the packet. Once the IP router (or IP gateway) has the target network address, it searches the routing table for the destination network. If the router finds more than one route to the destination network, it chooses the best route based upon priority and metric. Priority is assigned to a type of route. It may be assigned by how the route was learned by the system. For example, if the route was learned dynamically, it may receive a lower priority than one that is statically entered. Priority also may be based upon the routing protocol through which the route was discovered. For example, OSPF may have a higher priority than a route learned through RIP or IS-IS. If the router finds several route entries that have the same priority, the router further prioritizes the entries based upon the route Metric. The route metric describes the quality of the path to target network. Different routing protocols use various means of calculating a metric to the destination network. For example, the Routing Information Protocol (RIP) uses number of hops to the target network as the metric, while OSPF takes speed of link into consideration when calculating the Metric. After the router completes the route evaluation process, it is ready to take action. If the packet is destined to a directly attached network, the router finds the hardware (MAC) address of the destination station and sends the packet directly to the target device. If a route entry exists in the routing table to the target network, but the packet is not destined to a directly attached network, the router forwards the packet to the next-hop device. If a specific route entry to the target network does not exist in the routing table, the router forwards the packet to the default router. If there is no default route configured on the router, then the router discards the packet and - depending upon the configuration of the router - informs the station that sent it the packet that no route exists to the target network.
IP Routing Table
All routing decisions are made as a result of the contents of the routing table. The routing table defines the reachability of directly connected and remote networks. As you view the routing table, you will notice that it has the following information:
The IP network This field will be shown as a combination of the network address and the subnet mask. The network gateway This is typically the next hop router. If the network is directly connected, you should see the IP address of the VLAN's IP routing interface. The route metric This field defines the quality of the path to the target network. Since the routing table can contain multiple entries to a destination network, the router will pick the route with the lowest metric as it is considered to be of higher quality.
The routing table also identifies the source of the routing entry; whether the entry was automatically created, manually entered, or dynamically learned through a routing protocol such as RIP or OSPF.
IP Unicast Routing
with the syntax shown on the screen. This informs the switch that the ports in the VLAN are a part of a particular network. To view the routing table, use the command: show iproute The screen provides you with a sample of the output of this command when executed on Router A. The routing table entry indicates that the route is to a directly attached network by assigning the value d in the origin field. The gateway IP address is the IP address assigned to the VLAN. Finally, the uppercase U flag indicates that this network connection is up. The lowercase u and m flags indicate that the route is appropriate for both unicast and multicast routing. As the illustration on the slide indicates, Network 10.0.1.0 and 10.0.2.0 are directly attached to Router A. Network 10.0.3.0 is not directly attached to Router A. A directly attached network is a VLAN with an assigned IP Address. When you assign the IP address to the VLAN, you instantly create a logical connection to the virtual router (VR). This logical connection is referred to as a router interface. Just because you have an interface to the virtual router does not mean that IP Packets are forwarded from VLAN to VLAN. You must first enable IP forwarding in order for packets to be routed internally between VLANs.
10
11
IP Unicast Routing
Static Routes
Static routes are entries in the routing table that are manually entered by the administrator. These types of entries are typically used to reach networks that are not advertised by other routers. You may also use static routes when you have no routing protocol configured on your system. You use the following syntax to enter a static route: configure iproute add <network_addr> <netmask> <gateway> When you configure a static route, you inform the router of the existence of a network, the network's address and subnet mask, and the next hop gateway. You also assign a metric to the route to indicate the quality of the path. The static route must be associated with a gateway that is on a directly attached subnet. If a VLAN is subsequently deleted, the static route entries using the IP address that was associated with the VLAN must be deleted manually. Static routes never age out of the routing table. If there is a problem with the route, the router may continue to forward packets to the target network based upon the information provided by this route entry even though communication has been interrupted. A static route entry will have the value s in the Origin field. It will also have the value, uppercase S in the Flags filed. Static routes will also have an uppercase G in the Flags field to indicate that this entry points directly to a gateway and not to a network. As the slide illustrates, in order to forward packets that originate on network 1 to network 3, router A must either have learned about the network through the use of a routing protocol, or by having the route information manually entered into the routing database.
12
13
IP Unicast Routing
14
15
IP Unicast Routing
IP Routing is an IP forwarding methodology that is implemented in software and requires that the CPU examine the packet to make a forwarding decision. IP Switching is an IP forwarding methodology that is implemented in a hardware ASIC.
With IP Switching, once a network route is learned, the CPU programs the IP Address and MAC address of the next hop device (gateway or end station) into the switching ASICs. When subsequent packets destined for the same IP address are received, the hardware looks up the IP address in the forwarding table, and sends the packet to the associated MAC address. Packet forwarding now occurs at wire speed since the system's CPU is no longer involved. Not only does the CPU program an entry for the target device, but it also programs an entry for the source device so that packets sent back to the source can also be forwarded at wire speed.
16
17
IP Unicast Routing
IP Forwarding / Switching
As soon as it receives a packet, the switching engine compares the Layer 3 Destination IP Address with the entries in its Layer 3 forwarding table. If the switch cannot find an entry, then the packet is forwarded to the CPU for processing using the IP Routing algorithm. If the router is able the locate the IP address in the forwarding table, it will make the following changes to the packet and then forward it: 1 Insert the next-hop device's destination MAC address in the destination address field of the Ethernet Header. 2 Place its own MAC address in the source address field of the Ethernet Header 3 Decrement the Time to Live (TTL) field by one 4 Recalculate the IP Header checksum because of the change in the Time to Live field NOTE
Using this methodology, only the first packet to a station needs to be examined and processed by the CPU using IP Routing algorithms. All subsequent packets to the same destination station are switched at wire-speed using the Layer 3 forwarding table.
18
19
IP Unicast Routing
Host A sends a packet with the destination IP address of Host E to the MAC address of the Layer 3 switch S2. Switch S2 receives the packet, consults the route table, and determines that the packet should be forwarded out port 17. Switch S2 places its own hardware address in the source MAC address field and the MAC address of the next hop switch S1 in the destination MAC address field and transmits the packet. The IP addresses are not changed. Switch S1 receives the packet, consults the route table, and determines that the packet should be forwarded out port 1. Switch S1 places its own hardware address in the source MAC address field and the MAC address of Host E in the destination MAC address field and transmits the packet. The IP Address fields are not changed. Finally, the packet arrives at Host E.
20
21
IP Unicast Routing
22
23
IP Unicast Routing
ping tftp download telnet configure iproute create vlan configure vlan NOTE
The syntax used to target a particular virtual router may differ depending upon the command. Also, some commands may default to using VR-Mgmt while others may target VR-Default. Please consult your documentation to verify the syntax and default VR for the command being used.
24
25
IP Unicast Routing
26
27
IP Unicast Routing
Two VLANs were created on the switch An IP address has been assigned to each VLAN. IP forwarding is enabled for each VLAN. Static routes have been used instead of dynamic routing protocols.
You do the similar configurations for R2 and R3. Once its done, packets can be routed between remote networks.
28
29
IP Unicast Routing
If forwarding is enabled on the VLAN. If the interface is enabled. If the interface is currently operational.
30
31
IP Unicast Routing
NOTE
The command syntax contains an option to allow you to locate a MAC address when you know the IP address. It also allows you to limit your search so specific VLANs or VRs.
If you wish to clear the ARP table, you may do so by issuing the following command: clear iparp This command will also allow you to remove a single entry from the ARP table by specifying an IP address. Also, if you wish to remove all ARP entries related to a particular VLAN, you may do so by using the command's VLAN option. If you move an IP address from one device to another in your network, you may want to use this command to force the switch to learn the hardware address of the new device. Otherwise, the switch may continue to forward IP packets to the old hardware address.
Verifying IP Statistics
Use the following command to view global and per-VLAN IP routing statistics: show ipstats This command categorizes the statistics display into four sections:
IP Global Statistics consist of system-wide counters for normal and abnormal events. This command allows you to:
Limit the results to only IPV4 Statistics using the ipv4 option. View only the VLAN statistics of a particular VLAN using the VLAN option. Limit the results to those of a particular VR using the VR option.
32
33
IP Unicast Routing
The IGMP Statistics shown on this page provide information about the Internet Group Management Protocol. This protocol is used to manage the membership of IP Multicast Groups. The fourth section of the show ipstats command provides a subset of IP statistics related to each of the VLANs configured on the device. These statistics can aid in troubleshooting as they identify the number of packets in and out of a VLAN, as well as the number of transmissions and receptions that resulted in an error condition.
34
35
IP Unicast Routing
port-unreachables
redirects
time-exceeded
If you omit the VLAN option when invoking the command, then the command will be applied to all VLANs. To reset all ICMP settings to the default values, use the following command syntax: unconfigure icmp
36
37
IP Unicast Routing
NOTE
All router interfaces use the same MAC address.
38
39
IP Unicast Routing
NOTE
Please refer to the documentation for more details on these features.
40
41
IP Unicast Routing
Lab
Turn to the Static Routing/IP Forwarding Configuration Lab in your XOS Operations and Configuration Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
42
43
IP Unicast Routing
Review Questions
1 What are the types of permanent route entries that can be configured? a Static, black hole, and default. b Directly connected, dynamic, and permanent. c RIP, OSPF, and directly connected. d RIP, OSPF, and static.
2 Which of the following commands configures a black hole route? a configure iproute add 10.1.0.0/24 blackhole b configure iproute blackhole 10.1.0.0/24 c configure iproute add blackhole 10.1.0.0/24 d create iproute blackhole 10.1.0.0/24
3 By default, which of the following is used to determine the relative route priority? a The order the route is learned in. b The route metric. c The port priority of the port where the route is learned. d The route origin.
4 Which of the following commands configures a default route? a configure iproute add default 10.0.0.3 b create iproute add default 10.0.0.3 c configure iproute default 10.1.0.0 10.0.4.1/24 d create iproute add default 10.1.0.0 10.0.4.1/24
5 Which of the following commands shows the mapping between IP addresses and MAC addresses? a show fdb b show arpmap c show iparp d show ipstats
44
6 Which of the following commands configures a static route? a configure iproute add 10.1.0.0 255.255.255.0 10.0.4.1 b create iproute add 10.1.0.0 255.255.255.0 10.0.4.1 c configure iproute add 10.1.0.0 10.0.4.1 255.255.255.0 d create iproute add 10.1.0.0 10.0.4.1 255.255.255.0
7 Which of the following commands displays the IP route origin? a show route table b show ipfdb c show iproute d show fdb
8 The switch cannot route statically until which of the following happens? a The VLAN is assigned an IP address, neighbor gateways establish adjacencies, the VLAN is configured to use static routes, and the router interface is active. b The VLAN is assigned an IP address, neighbor gateways establish adjacencies, the VLAN is configured to use static routes, and IP forwarding is enabled globally. c The VLAN is assigned an IP address, IP forwarding is enabled, the VLAN is active, and neighbor gateways establish adjacencies.
d The VLAN is assigned an IP address, IP forwarding is enabled, the VLAN is configured to use static routes, and the router interface is active.
9 What is the primary difference between Layer 2 forwarding and Layer 3 forwarding? a Layer 2 forwarding is based on the MAC address and Layer 3 forwarding is based on the IP address. b Layer 3 forwarding is based on the MAC address and Layer 2 forwarding is based on the IP address. c Layer 3 forwarding is performed on the first packet only and Layer 2 forwarding is performed on all subsequent packets.
d Layer 2 forwarding is performed on the first packet only and Layer 3 forwarding is performed on all subsequent packets.
45
IP Unicast Routing 10 What is the primary difference between routing and Layer 3 forwarding in an Extreme Networks switch? a Layer 3 forwarding is performed on the first packet only and routing is performed on all subsequent packets. b Routing is performed on the first packet only and Layer 2 forwarding is performed on all subsequent packets. c Routing using the CPU is performed on the first packet only and Layer 3 forwarding using an ASIC is performed on all subsequent packets.
d Layer 2 forwarding is performed on the first packet only and routing is performed on all subsequent packets.
46
This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
47
IP Unicast Routing
48
12 Configuring RIP
Configuring RIP
Student Objectives
The Configuring RIP module describes how to configure the Routing Information Protocol (RIP) v1 and RIP v2 IP unicast routing protocols. Upon completion of this module, the successful student will be able to:
Describe the RIP routing protocol. Identify the limitations of RIP version 1. List the benefits of RIP version 2. Interpret RIP routing table entries. Describe the Split Horizon and Poison Reverse loop resolution protocols. Describe the operation of triggered updates. Configure the RIP routing protocol. Verify the RIP configuration. Test RIP operation. NOTE
Depending on the needs of the students, the instructor may choose to reduce or eliminate the protocol overview portion of this module.
Prerequisites
The course content assumes that students are familiar with IP Unicast routing. If not, refer to the following publications for additional information:
RFC 1058 - Routing Information Protocol (RIP) RFC 1256 - ICMP Router Discovery Messages RFC 1723 - RIP Version 2 Book: Interconnections: Bridges and Routers by Radia Perlman ISBN 0-201-56332-0. Published by Addison-Wesley Publishing Company
Configuring RIP
RIP1 - Routing Information Protocol Version 1 RIP2 - Routing Information Protocol Version 2 OSPF - Open Shortest Path First IS-IS - Intermediate System - Intermediate System BGPv4 - Border Gateway Protocol version 4
Configuring RIP
Configuring RIP
Triggered Updates
Both RIP version 1 and RIP version 2 support triggered updates, meaning that if there is a change in the network, (a device goes down, or we lose all active links on a particular VLAN), RIP will automatically send an update to each of its neighbors indicating the change as opposed to waiting for the next 30second cycle to send the update.
Configuring RIP
Classfull Addressing: RIP Version 1 only understands class A, B, and C IP addresses. Subnet Masks: RIP Version 1 does not propagate subnet mask information. Variable Length Subnet Masks: RIP Version 1 does not support variable length subnet masks. Generates Broadcasts: RIP Version 1 uses broadcasts to deliver routing updates. Security: RIP Version 1 does not support any authentication and routers sending updates cannot be verified.
RIP Version 2
RIP Version 2 (RIPv2) introduces subnet mask information into the Routing Information Protocol to handle variable-length subnetting that has become prevalent in the IP addressing scheme, due to the scarcity of IP addresses. Benefits of implementing RIPv2 include:
Variable-Length Subnet Masks (VLSMs) Next-hop address Support for next-hop addresses allowing for optimization of routes in certain environments Multicasting
RIP Version 2 uses the multicast address 224.0.0.9 for router updates. RIPv2 uses multicast packets instead of broadcast. This reduces the load on hosts that do not support routing protocols. Using multicast packets also allows RIP Version 2 routers to share information, which RIP Version 1 routers cannot receive. Backward compatibility with existing RIPv1 implementations is an important design criterion. The implementation allows for different compatibility modes to interoperate with both RIPv1 and RIPv2 implementations.
NOTE
If you are using RIP with supernetting/Classless Inter-Domain Routing (CIDR), you must use RIPv2 only. In addition, RIP route aggregation must be turned off.
10
11
Configuring RIP
IP address of the destination network IP address of the next router (gateway) Metric (hop count) to the destination network Flags VLAN that contains the router interface that the route is using Duration of time since the entry was last updated
The router exchanges an update message with each neighbor every 30 seconds (default value), or if there is a change to the overall routed topology (also called triggered updates). If a router does not receive an update message within six update cycles (nominally 180 seconds) from the router that was the source of the original routing table entry, it assumes that either the source router has failed or that the connecting link has become unusable. The router marks the existing route as invalid and eventually removes the route from its routing table. When the router learns of a new route from another neighbor, the new route is used to replace the deleted one. The distance-vector routing algorithm waits for six times the update interval before timing out the route, even though it expects to hear from each neighbor at every update interval. The additional time is used to avoid invalidating routes based on the loss of a single update message.
12
13
Configuring RIP
Routing Loops
The RIP protocol can have certain situations that cause slow convergence. One of those conditions is called a routing loop. A routing loop describes the condition when a router believes it has two routes to a target network when only one actually exists. The illustration shows how a loop is created between two routers: 1 Router B reaches the target network with a hop count of one using router A. 2 Router C learns, in its regular update from router B, that it reaches the target network using router B with a hop count of two. 3 In the next router C update, it advertises reachability to the target network back to router B with a hop count of three. 4 Router B now has two routes to the target network; the first using router A with a hop count of one, the second using router C with a hop count of three. 5 Router B chooses the route using router A, since router A has the smallest total hop count. 6 The link between router A and router B fails. 7 Router B does not receive an update from router A in the required time and the route times out the target network through router A. Remember that router B has a secondary route to the target network using router C with a hop count of three. 8 Router B now forwards all traffic destined for the target network to router C and router C, in turn, forwards the traffic back to router B. 9 As a result of this mutual deception, a loop is created. 10 The packet travels back and forth between router B and router C until the time to live field in the IP header is reduced to zero. 11 The packet is eventually discarded by one of the routers.
14
15
Configuring RIP
NOTE
The maximum reachable hop count is 15. A hop count of 16 is defined as unreachable.
16
17
Configuring RIP
Split Horizon
A number of modifications can be made to the basic distance-vector routing algorithm to improve performance in a dynamic environment and to help expedite convergence and eliminate routing loops. These include:
By default, both are enabled on Extreme Networks switches. This is used to prevent routing loops. The occurrence of loops between two routers can be greatly reduced by using split-horizon. The count-to-infinity problem can be overcome if the router is careful about where it sends its routing information. Split-horizon is a technique whereby a router does not advertise a route over the same port that supplied the route. In other words, a router does not claim network reachability to a neighbor from which the route was learned. The illustration demonstrates the use of split-horizon to break a loop of two hops. 1 Router B reaches the target network with a hop count of one using router A. 2 Router C learns in its regular update from router B that it reaches the target network using router B with a hop count of two. 3 Router C does not advertise the route to the target network back to router B. As a result of split-horizon, router B has only one route to the target network. If the link between router A and router B fails, router B times out the entry and advertises the target network as unreachable. The possibility of a loop has been eliminated.
18
19
Configuring RIP
Poison Reverse
Poison reverse is a technique whereby a router advertises a route over the same port that supplied the route with a hop count of 16, defining it as unreachable. A router claims that a network is unreachable over the interface from which the route was learned, preventing any route loops. Poison reverse speeds up convergence because erroneous routes are eliminated without waiting for a timeout. The illustration shows a typical exchange of routing information when a router is configured to perform split-horizon with poison reverse. In this example: 1 A routing loop is created as described on page 14. 2 Since poison reverse is enabled on switch C and the route for the target network was learned over the link from switch B. Switch C advertises the route to the target network with a metric of 16 hops. (Unreachable) The disadvantage of poison reverse is that it increases the size of the routing update messages. If split horizon with poisoned reverse is used, the router must mention all poison routes, with a metric of 16. If the system is large, this can result in a large update message, almost all of whose entries indicate unreachable networks. In many cases, the network administrator is willing to accept slower convergence to reduce the overhead that the increased size of the routing table update messages would cause.
20
21
Configuring RIP
Triggered Updates
Triggered updates occur whenever a router changes the metric for a route, and it is required to send an update message immediately, even if it is not yet time for a regular update message to be sent. This generally results in faster convergence, but also results in more RIP-related traffic. Triggered updates can cause excessive loads on networks with limited bandwidth or with many routers on them. A simple solution to this problem is to set a timer to a random number between one and five seconds after a triggered update is sent. If other changes occur that would trigger another update before the timer expires, the router must wait until the timer expires before sending the update. A triggered update may also be suppressed if a regular timed update is due by the time the triggered update would be sent. The illustration shows a network in two states:
Before the triggered update was issued (crossed-out entries) After all routers have converged their router tables
In the illustration, router A times out its route to the target network. The timeout forces router A to issue triggered updates on its ports. The update propagates backward along all paths that lead to router A, updating the metric for the target network to infinity (not shown on slide). The network converges on the new route to the target network based on the route available through router B.
22
23
Configuring RIP
RIP Limitations
Distance-vector routing algorithms can quickly determine the shortest route to a distant network. However, this can be misleading due to potential slow convergence, which may require multiple updates. The routes are based on hop count and do not take into account any cost related issues. Depending on the size and complexity of the network and the speed of the links, the amount of information exchanged between neighbors can be significant. Each router periodically transmits all its routing information to its neighbors. The information transmitted by each router is based on the information that it receives from its immediate neighbors. Thus, the identification of a router that supplies inaccurate data is quite difficult. A change in the routing table of a single router can result in a chain of updates. It can take a long time for this information to reach all other routers in the routing domain.
24
25
Configuring RIP
Create and configure VLANs. Configure the VLAN with an IP address. Enable IP forwarding. Enable RIP on the VLANs that do RIP routing and on the VLANs you want to advertise through RIP. Enable RIP globally. Verify the configuration and operation using show commands.
26
27
Configuring RIP
Removing RIP
To remove RIP from an IP interface, enter the following command: configure rip delete vlan [<vlan_name> | all] To disable RIP, enter the following command: disable rip When RIP is disabled on the interface, the parameters are not reset to their defaults.
28
29
Configuring RIP
Configuration of R2
create vlan vlan2rip configure vlan2rip add ports 2 configure vlan2rip ipaddress 10.2.0.2/24 create vlan vlan0rip configure vlan0rip add ports 1 configure vlan0rip ipaddress 10.0.0.2/24 enable ipforwarding configure rip add vlan vlan0rip configure rip add vlan vlan2rip enable rip
Configuration of R3
create vlan vlan0rip configure vlan0rip add ports 1 configure vlan0rip ipaddress 10.0.0.3/24 create vlan vlan3ip configure vlan3rip add ports 2 configure vlan3rip ipaddress 10.3.0.3/24 enable ipforwarding configure rip add vlan vlan0rip configure rip add vlan vlan3rip enable rip
30
31
Configuring RIP
32
33
Configuring RIP
Syntax Description
none v1only v2only any vlan-name all Specifies to drop all received RIP packets. Specifies to accept only RIP version 1 format packets. Specifies to accept only RIP version 2 format packets. Specifies to accept RIP version 1 and RIP version 2 packets. Specifies to apply settings to specific VLAN name. Specifies all VLANs.
The default for receiving is any. To modify the transmitted RIP version, enter the following command: configure rip txmode [none | v1only | v1comp | v2only] {vlan [vlan name | all]} The default for transmitting is v2. The features for aggregating or summarizing subnetwork routes, exporting updates from other routing protocols, split horizon, poison reverse, and triggered updates can be enable and disabled individually. To enable specific RIP features, enter the following commands: enable rip splithorizon enable rip poisonreverse enable rip triggerupdates To reset all RIP parameters for a VLAN to the default, enter the following command: unconfig rip {vlan <vlan name>}
34
35
Configuring RIP
36
37
Configuring RIP
The VLAN name. The router interface IP address and subnetwork mask. The number of RIP packets sent and received. The number of triggered updates. The interface cost.
To verify the RIP-specific routes in the routing table, enter the following command: show rip routes The display shows:
The route origin. The destination network. Any rip peers. The route metric. The VLAN name. The route age.
To verify the rip specific configuration commands, enter the following command: show configuration rip
38
39
Configuring RIP
The name of each VLAN. The IP address of each router interface. If IP forwarding is enabled for each VLAN. If the interface is enabled and active.
40
41
Configuring RIP
The origin of the route. (how was the route learned). The destination network. The next hop gateway. The type of route entry. The preferred route for unicast and multicast traffic. The duration of time this route has been in the routing table.
42
43
Configuring RIP
Summary
Configuring RIP Module describes how to configure the RIP v1 and RIP v2 IP unicast routing protocols. You should now be able to:
Describe the RIP routing protocol. Identify the limitations of RIP version 1. List the benefits of RIP version 2. Interpret RIP routing table entries. Describe the Split Horizon and Poison Reverse loop resolution protocols. Describe the operation of triggered updates. Configure the RIP routing protocol. Verify the RIP configuration. Test RIP operation.
44
45
Configuring RIP
Lab
Turn to the Routing Information Protocol (RIP) Configuration Lab in your ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
46
47
Configuring RIP
Review Questions
1 What are the advantages of using RIP? a RIP provides the fastest possible convergence. b RIP is simple and easy to understand. c RIP was originally designed to be very secure. d RIP uses a hop count rather than a cost metric.
2 In RIP, what modifications have been made to the basic distance-vector routing algorithm to address routing loops, slow convergence, and the counting to infinity problem? a Poison horizon, split updates, and reverse triggers. b Split horizon, poison reverse, and triggered updates. c LSDB synchronization, Autonomous System hierarchy, and stub areas. d Link state advertisements, hello packets, and neighbor discovery.
4 The switch cannot route using RIP until which of the following happens? a The VLAN is assigned an IP address, neighbor gateways establish adjacencies, RIP is enabled globally, the VLAN is configured to use RIP, and the router interface is active. b The VLAN is assigned an IP address, RIP is enabled globally, neighbor gateways establish adjacencies, the VLAN is configured to use RIP, and IP forwarding is enabled globally. c The VLAN is assigned an IP address, IP forwarding is enabled, the VLAN is active, and RIP is enabled globally.
d The VLAN is assigned an IP address, IP forwarding is enabled, the VLAN is configured to use RIP, the router interface is active, and RIP is enabled globally.
48
5 Which of the following is true when using RIP? a Upon expiration of the garbage timeout, the route is no longer valid; however, it is retained in the routing table until the expiration of the route timer. b Upon expiration of the route timeout, the route is no longer valid; however, it is retained in the routing table until the expiration of the garbage timer. c Upon expiration of the route timeout, the route is marked suspect; however, it is retained in the routing table until the expiration of the hello timer.
d Upon expiration of the hello timeout, the route is marked suspect; however, it is retained in the routing table until the expiration of the route timer.
6 Which of the following commands displays the state of the Split Horizon feature? a show ipconfig b show rip c show iproute d show fdb
7 Which of the following commands show the RIP peer routers? a show ipconfig b show iproute c show rip interface d show rip routes
8 In a distance-vector routing algorithm, what is the name of the condition when a router believes it has two routes to the target network when only one actually exists? a Routing loop. b Split horizon. c Poison reverse. d Slow convergence.
49
Configuring RIP This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
50
13 Configuring OSPF
Configuring OSPF
Student Objectives
The Configuring OSPF module presents the Open Shortest Path First (OSPF) IP routing protocol.Upon completion of this module, you will be able to:
Define OSPF as a routing protocol. Identify the advantages of OSPF. Describe the OSPF hierarchy. Define OSPF areas and router types. Describe how OSPF operates. Define Link State Advertisements (LSA) and hello packets. Define Link State Database (LSDB) synchronization. Configure OSPF within a single area. Verify the configuration and operation of OSPF. NOTE
Depending on the needs of the students, the instructor may choose to reduce or eliminate the protocol overview portion of this module.
Configuring OSPF
Defining OSPF
The Open Shortest Path First protocol is an IP routing protocol that is classified as an Interior Gateway Protocol (IGP). OSPF employs a link-state routing algorithm. The important features of a link-state routing protocol are:
All routers within a routing domain share information about their interfaces, or links, to directly connected networks. The link information is stored in a database. This topological database contains a complete description of which routers are connected to which networks in the given domain. Following convergence, each router has an identical copy of the link-state database from its own perspective. Each router uses the common link-state database (LSDB) to calculate a shortest-path tree to all destinations. The shortest-path tree is then used to create the routing table. Where several equal cost routes exist to a destination, traffic can be distributed among them.
OSPF as a link-state protocol has several advantages over the use of a distance vector protocols like RIP.
Fast Convergence
OSPF quickly responds to topology changes and calculates new loop free routes. This is done by flooding the information about the topology change through the network and calculating the new routes immediately.
Greater Features
OSPF offers the following:
OSPF calculates the best route based on a cost factor, which is normally related to the bandwidth of a link, not a hop count. OSPF offers greater scalability than RIP. It is not limited to a maximum hop count and supports a hierarchical network design. OSPF allows for load sharing over routes. All OSFP routing exchanges can be authenticated.
OSPF is an IP-only routing protocol. RFC 2328 is the latest RFC for OSPF.
Configuring OSPF
The Internal Router LSDB and routing table consume less router memory. Uses fewer router resources when computing the routing table. The LSDB contains fewer entries, resulting in the OSPF algorithm consuming less CPU time to complete. Uses less link bandwidth when distributing routing data because any topological change is only sent within the affected area. (Hides instability)
Overall OSPF saves network resources and bandwidth because not every link-state change is propagated to all routers in the AS. This limits the number of routers having to perform a recalculation of the OSPF routing table. The AS may contain several areas, all of which share a common administration and common design strategy. The term Domain is often used in place of AS.
Configuring OSPF
OSPF Areas
OSPF allows the grouping of contiguous networks (LANs, WANs, Point-to-Point links) and hosts into an area. The flooding of detailed information is restricted to the area. The Shortest Path First (SPF) is computed on a per-area basis, and all intra-area routes are derived from the SPF tree. Areas are built by assigning the interfaces of each OSPF router to an area. Each area has its own link state database consisting of entries called Link State Advertisements (LSA) describing how the area's routers and segments are connected. This means that routers connected to more than one area have a LSDB for each area they are connected to. There are several advantages of OSPF area-routing capabilities:
The use of areas greatly reduces the amount of routing information traffic that must be propagated throughout the entire AS. Areas allow the development of a hierarchy of routing information, and thus protect each area from external routing information. The area's information is hidden from routers outside the area. This information-hiding technique is important from a security standpoint, because it prohibits other areas from identifying the physical topology of an area.
Routing within an area is flat. In intra-area routing the packet is routed solely on information obtained within the area; no routing information obtained from outside the area can be used. This protects intraarea routing from the injection of bad routing information from outside the area. In an Extreme Networks configuration (and as defined by the OSPF protocol), area IDs are described with dotted-decimal notation. This means:
Area 0.0.0.1 can be referred to as area 1. An area ID is not an IP address and bears no relationship to IP addresses.
Configuring OSPF
Normal Area
Normal areas connect to other areas through ABRs. External routes are distributed into and out of normal areas. These areas support virtual links and Autonomous System Boundary Routers (ASBRs).
Stub Area
OSPF allows certain areas to be configured as stub areas. External route information is not distributed into stub areas. They are useful to reduce memory and computation requirements on OSPF routers. To take advantage of the OSPF stub area support, default routing must be used on all routers within the stub area. To accomplish this the area border router advertises a default route into the stub area. These default route are used for any destination that is not explicitly reachable by an intra- or inter-area path. If information about other areas is not advertised, the default route is used instead of special inter-area paths. The OSPF protocol ensures that, all routers belonging to an area agree on whether the area has been configured as a stub. The following restrictions apply: virtual links cannot be configured through stub areas and ASBRs cannot be placed internal to stub areas.
Not-So-Stubby Area
Not-So-Stubby Areas (NSSAs) are similar to the existing OSPF stub area configuration option, but have the following additional capabilities: External routes originating from an ASBR connected to the NSSA can be advertised within the NSSA and these routes can be propagated to other areas. NSSAs are an enhancement to current OSPF stub area functionality that allows importing external routes into the stub area and also propagate them out to the rest of the OSPF domain in a limited fashion.
10
11
Configuring OSPF
Internal Router
Internal routers (IRs) have all of their network interfaces in the same area. IRs run a single copy of the basic routing algorithm and generate a single LSDB.
Broadcast networks, for example, Ethernet Point-to-Point networks, for example, leased lines and ADSL Non-broadcast Multi-access (NBMA) networks, for example X.25, ATM, and Frame Relay (which is NBMA by default) Point-to-Multipoint (PMP) networks, for example, Frame Relay (if it is configured to support PMP)
For Broadcast networks, one of the directly connected routers is elected as the designated router. It represents the network and is responsible for exchanging routing information.
12
13
Configuring OSPF
14
15
Configuring OSPF
NOTE
Router priority is configured on a per-interface basis.
The parameters for each router should be configured to avoid electing a router that is very busy processing a high volume of IP traffic, or is already acting as an ASBR. The DR and BDR are elected by the use of the Hello protocol that is discussed later.
16
17
Configuring OSPF
The router that is the originator of the LSA and is generating this Link State Advertisement. The range this LSA is flooded through and whether it stays within an area or is it flooded through the whole AS. The Link ID used to identify this LSA. Detail information in this LSA.
The next page gives a short overview about the different LSA types.
18
19
Configuring OSPF
Generated by every OSPF router. Describes the set of active interfaces, their associated cost, and any neighbor information. Flooded throughout a single area only. Link State ID (Identifier) field is the router OSPF router ID.
Generated by OSPF designated routers. Describes a broadcast network along with the IDs of all currently attached routers. Flooded throughout a single area only. Link State ID field lists the IP interface address of the DR.
Originated from ABRs. Supports hierarchical routing through the use of OSPF areas. Describes networks in different areas, reachable through the ABR, with the associated cost. Flooded into the next area by the ABR. Link State ID field is an IP network number.
Originated from ABRs. Describes the existence of an AS Boundary Router. Flooded into the next area by the ABR. Link State ID field is the AS boundary router OSPF router ID
Originated by an ASBR. Describes destinations external to the AS. Flooded through the whole autonomous system. Link State ID field specifies an IP network number.
Functionally identical to a Type 5 LSA for a normal area. Originated by an ASBR. Allows the importation of external routes normally not advertised out of the Not So Stubby Area (NSSA). Destined for ABRs with the highest router ID, stays within the NSSA, are transformed by the ABRs into Type 5 LSAs. Link State ID field specifies an IP network number.
20
21
Configuring OSPF
224.0.0.5 for all OSPF routers to receive 224.0.0.6 for only DR/BDR routers to receive
When joining an OSPF network for the first time, the router goes through several stages prior to actually participating in forwarding/routing of packets. These include:
The announcement of itself. Forming adjacencies with neighbors. Exchanging information with other routers about the state of its links. Learning about other routers. Ensuring that databases are synchronized.
22
23
Configuring OSPF
24
25
Configuring OSPF
The router's OSPF router ID. The area ID. The Hello interval in seconds at which the router sends Hello packets on the given network and the corresponding Dead Interval after which a neighbor is declared dead. The router's priority value. The router's current choice for the DR and the BDR (a value of zero in these fields indicates that one has not yet been selected). A list of routers from which Hello packets have recently been received. The password if authentication is used. Information identifying if the area is a stub area or a NSSA. The subnetwork mask.
Routers examine the values of the received Hello packets and only build a neighbor relationship if certain values are the same. Neighbors must agree to which area they belong and if this is a normal, stub, or not-so-stubby area. The Hello and Dead intervals must match to ensure that the failure of a neighbor is detected in a timely manner. Of course, if authentication is used, the passwords must be correct. By examining the Hello packets received and locating its own router ID in the neighbor list, a router can be assured that bidirectional communication has been established with all neighbors. Concurrently, the DR and BDR are elected, based on the router priority value. The relationship is now bidirectional and adjacency begins to be set up.
26
27
Configuring OSPF
28
29
Configuring OSPF
LSDB Synchronization
Database synchronization in a link state protocol is crucial. Synchronization protects the network as a whole from corrupt information. Of the 5 OSPF protocol packet types, 4 are used for database synchronization with the Hello packet being the 5th type as follows:
Database Description packet Link State Request packet Link State Update packet Link State Acknowledge packet
Flooding
After a pair of routers becomes fully adjacent, database synchronization is maintained with a flooding procedure. When an LSA is flooded, it is passed from adjacent router to adjacent router until it has been distributed throughout the entire routing area. LSAs are flooded when the status of a router's link changes or when a timer expires, indicating that it is time for another periodic update. The decision of any router to pass on the LSA to its adjacent neighbor is based on several conditions. For example, an OSPF router should avoid passing timed-out or self-generated LSAs.
Reliable Updates
OSPF implements a reliable link-state flooding procedure by requiring that the adjacent router acknowledges the receipt and transfer of an LSA. In the absence of an acknowledgement, the source router retransmits the LSA until it is acknowledged or until the adjacency is declared down. Whenever it is determined that there is a change in the link-state database, a new Shortest-path Tree (SPT) is constructed and the routing table is updated.
Link-State Age
Every LSA also has an age field, which is used internally to maintain the link-state database. An LSA age is periodically increased as it is flooded throughout the area and while it resides in a router's linkstate database. An LSA can reach an age where it is no longer used in the flooding procedure and must be flushed from the link-state database.
30
31
Configuring OSPF
OSPF routers establish neighbor adjacencies The router LSDBs are fully synchronized The routing tables are constructed.
Essentially, this is the only point at which the actual IP routing/forwarding engine is able to use any indirect routes.
32
33
Configuring OSPF
IP addresses are assigned to all VLANs for which routing should be done. IP forwarding is enabled for these VLANs. Physical cabling for the router connectivity has been done and the ports are assigned to the correct VLANs.
Here are the commands to remember for these tasks: To create a VLAN, enter the following command: create vlan <vlan name> To configure a VLAN with member ports, enter the following command: configure vlan <vlan_name> add port [ all | <port number> ] To assign an IP address to the VLAN, enter the following command: configure <vlan_name> ipaddress <ipaddress> [/<netmask>] To enable IP forwarding, enter the following command: enable ipforwarding {vlan <name>}
34
35
Configuring OSPF
Each router/Layer-3 switch that is configured to run OSPF must have a unique router ID. Manually set the router ID of the switches participating in OSPF, instead of having the switch automatically choose its router ID based on the highest interface IP address. Not performing this configuration in a larger, dynamic environment could result in an older link state database remaining in use and a general lack of control.
When the OSPF router ID is set to automatic (default), the router ID is determined by the router every time OSPF is enabled. It is not necessary for OSPF to be configured or for the IP interface to be active on the interface that is used to automatically set the router ID. There is no requirement for the associated VLAN to be up or have any ports assigned to it. If a router ID changes after a reboot or a disable OSPF command, its LSAs could stay in the LSDB for 30 minutes. This corrupts the LSDB for the whole routing domain unless a manual reset is performed. Virtual links are defined to connect to a specific router ID. If this target router changes its router ID the link fails, possibly isolating an entire area
To configure the OSPF router ID, enter the following command: configure ospf routerid [automatic | <routerid>] The default setting is automatic. If automatic is specified, the switch uses the highest IP interface address as the OSPF router ID. For example: configure ospf routerid 10.1.6.1 NOTE
Do not set the router ID to 0.0.0.0, this value is reserved.
36
37
Configuring OSPF
Perform basic IP configuration. Configure the router IDs. Enable OSPF for the VLANs and associate them with the OSPF area ID 0.0.0.0. Enable OSPF globally on the switch.
In this single area example the area is 0.0.0.0. To enable OSPF for the VLANs and assign them to an area, enter the following command: configure ospf add vlan [<vlan name> | all] area <area-identifier> {passive} The <area identifier> specifies the area to which the VLAN is assigned. Passive specifies to not send and receive hello packets on this interface. A passive interface appears as a stub network to the OSPF domain and helps decrease the time it takes for recalculating the network. If an interface is a VLAN with no other OSPF routers on it, configure the interface as passive. To enable OSPF globally on the switch, enter the following command: enable ospf
Unconfiguring OSPF
To remove a VLAN from the OSPF routing process, enter the following command: configure ospf delete vlan [<vlan name> | all] To stop the OSPF process, enter the following command: disable ospf
38
39
Configuring OSPF
40
41
Configuring OSPF
Perform basic IP configuration. Configure the router IDs. Enable OSPF for the VLANs and associate them with the OSPF area IDs. Enable OSPF globally on the switch.
To create a new OSPF area, enter the following command: create ospf area <area identifier> Where:
Area IDs are formatted in dotted-decimal notation (i.e. 10.1.6.1, 3.42.6.2). Area 0.0.0.0 does not need to be created. It exists by default. An area ID is not an IP address and bears no relationship to IP addresses.
42
43
Configuring OSPF
Configure the area as a stub or NSSA area. Change the priority for one or all OSPF router interfaces. Configure the cost metric of one or more interfaces.
OSPF allows certain areas to be configured as stub areas or NSSAs. External route information is not distributed into stub areas. To configure an OSPF area as a stub area, enter the following command: configure ospf area <area-identifier> stub [summary | nosummary] stubdefault-cost <cost> To configure an OSPF area as a NSSA, enter the following command: configure ospf area <area-identifier> nssa [summary | nosummary] stubdefault-cost <cost> {translate} The router with the highest configured router priority is elected the DR for a network. To change the priority for one or all OSPF router interfaces for DR election, enter the following command: configure ospf [area <area identifier> | vlan [<vlan name> | all]] priority <priority> OSPF calculates the best route based on a cost factor, which is normally related to the bandwidth of a link. To configure the cost metric of one or all interface(s), enter the following command: configure ospf [area <area identifier> | vlan [<vlan name> | all]] cost [automatic | <cost_number>]
44
45
Configuring OSPF
Enable the redistribution other routing protocols into the OSPF domain. Configure a range of addresses to be aggregated in the area. Configure the ASBR to accept external routes. Create a virtual link to connect an area to the backbone through another area.
An Autonomous System Boundary Router is a router that has interfaces in both an OSPF routing domain, and a non-OSPF routing domain such as RIP, IS-IS, BGP or static routing information. The ASBR generates AS-external LSAs, these describe routes to external networks outside the OSPF domain To enable the redistribution of other routing protocols into the OSPF domain, enter the following command: enable ospf export [bgp | direct | e-bgp | i-bgp | rip | static] [cost <cost> type [ase-type-1 | ase-type-2] {tag <number>} | <policy-map>] To configure a range of IP addresses to be aggregated in an OSPF area, enter the following command: configure ospf area <area-identifier> add range [<ip-address> <ip-mask> | <ipNetmask>] [advertise | noadvert] [type-3 | type-7] To aggregate AS-external routes in a specified address range, enter the following command: configure ospf ase-summary add [<ip-address> <ip-mask> | <ipNetmask>] cost <cost> {tag <number>} All ABRs in an AS must be connected to the backbone physically or logically through a virtual link. To add a virtual link connected to another ABR, enter the following command: configure ospf add virtual-link <routerid> <area identifier> NOTE
Remember that the virtual link must be configured at both ends.
46
47
Configuring OSPF
The origin of the route. (how was the route learned). The destination network. The next hop gateway. The type of route entry. The preferred route for unicast and multicast traffic. The duration of time this route has been in the routing table.
To verify that IP forwarding is enabled and the interface is up, enter the following command: show ipconfig The display shows:
The name of each VLAN. The IP address of each router interface. If IP forwarding is enabled for each VLAN. If the interface is enabled and active.
48
49
Configuring OSPF
The configured router ID. OSPF is enabled, this router is not an ASBR or ABR. There is no redistribution to OSPF configured. The default cost of the OSPF interfaces.
Area ID, area type (stub or normal), and router ID. Number of SPF executions, number of ABRs known, number of ASBRs known, number of LSAs in the LSDB, and the LSA checksum. List of router interfaces (VLANs), the link state, their OSPF state, and the IP address for the DR and BDR.
Area ID 0.0.0.0, area type normal, and router ID 2.9.7.1. No known ABRs or ASBRs, number of LSAs in the LSDB is 8. There are 3 router interfaces and OSPF is enabled on all. For the third VLAN the router San Jose itself is the DR, there is no known BDR. This is normal, because San Jose is the only router on this segment at the moment. For the first VLAN the router San Jose is the BDR, the DR has the IP address 10.0.0.2.
50
51
Configuring OSPF
The first displayed router interface is 10.0.0.1/24, VLAN blue. The area ID is 0.0.0.0 and the router ID is 2.9.7.1. The cost for this link is 10. The priority for the DR election on this interface is 1.
The timers are the default values: Hello 10 seconds, Dead 40 seconds, Retransmit 5 seconds. The Retransmit Interval is the time the router waits until retransmitting routing information if it does not get an acknowledge packet.
Authentication is not used. 10.0.0.2 is the DR on this link. There is one neighbor on this interface
The area ID is 0.0.0.0 and the router ID is 2.9.7.1. The cost for this link is 4. The priority for the DR election on this interface is 1. The timers are the default values: Hello 10 seconds, Dead 40 seconds, Retransmit 5 seconds. Authentication is not used. 11.0.0.2 is the DR on this link. The BDR is the router with IP address 11.0.0.1.
To display information about OSPF neighbors, enter the following commands: show ospf neighbor {routerid [<ip-address> {<ip-mask>} | <ipNetmask>]} {vlan <vlan-name>} {detail} The display shows:
The neighbor router ID. The neighbor synchronization state. The neighbor IP address. The interface that provides the path to the neighbor.
52
53
Configuring OSPF
London generated one to describe itself, this has link ID 2.9.7.3, Londons router ID. Sanjose generated one to describe itself, this has link ID 2.9.7.1, Sanjoses router ID. Newyork generated one to describe itself, this has link ID 2.9.7.2, Newyorks router ID.
There are 4 network LSAs in London's Link State Database: The network LSA for the Broadcast Network 10.0.0.0/24 is generated by the DR, that is router Sanjose in our example.
54
55
Configuring OSPF
Summary
The Configuring OSPF module presents the Open Shortest Path First (OSPF) IP routing protocol. You should now be able to:
Define OSPF as a routing protocol. Identify the advantages of OSPF. Describe the OSPF hierarchy. Define OSPF areas and router types. Describe how OSPF operates. Define Link State Advertisements (LSA) and hello packets. Define Link State Database (LSDB) synchronization. Configure OSPF within a single area. Verify the configuration and operation of OSPF.
56
57
Configuring OSPF
Lab
Turn to the Open Shortest Path First (OSPF) Configuration Lab in your ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
58
59
Configuring OSPF
Review Questions
1 How are OSPF Link State Databases synchronized? a Hello packets are passed from adjacent router to adjacent router. b Synchronization packets are passed between adjacent routers. c LSA packets are passed between adjacent routers. d Triggered update packets are passed between adjacent routers.
2 Which of the following commands creates OSPF area 1.0.0.4? a configure ospf area 1.0.0.4 b configure ospf add area 1.0.0.4 c create ospf area 1.0.0.4 d create area 1.0.0.4
3 Which of the following best describes the OSPF stub area? a It must be connected to all areas in an OSPF autonomous system. b External route information is not distributed in this area. c Connected to other areas through ABRs. d External routes originating from an ASBR connected to this type of area can be propagated to other areas.
4 Which of the following commands enables OSPF on VLAN blue? a configure ospf add vlan blue area 0.0.0.0 b configure ospf add vlan blue c configure vlan blue add OSPF area 0.0.0.0 d configure vlan blue add OSPF
5 Which of the following commands displays the OSPF router ID? a show ipconfig b show iproute c show ospf d show fdb
60
6 Which of the following best describes an OSPF ABR? a It is responsible for representing a particular broadcast network. b It has interfaces in both an OSPF routing domain, and a non-OSPF routing domain. c It has all of its network interfaces in the same area. d It has interfaces connected to more than one area.
7 What types of networks use an OSPF designated router? a Point-to-Point b Point-to-Multipoint c Broadcast d Not-so-stubby
8 Which of the following commands shows the OSPF link state identifiers and router ID for all reachable subnetworks? a show ipconfig b show ospf c show ospf lsdb d show ospf area 0.0.0.0
9 Which of the following must be connected to all ABRs in an OSPF autonomous system? a Normal area. b Stub area. c Not-so-stubby area. d Area 0.0.0.0
10 Which of the following best describes the OSPF Autonomous System Boundary Router? a It is responsible for representing a particular broadcast network. b It has interfaces in both an OSPF routing domain, and a non-OSPF routing domain. c It has all of its network interfaces in the same area. d It has interfaces connected to more than one area.
11 Which of the following commands identifies the IP address of the designated router? a show ipconfig b show iproute c show ospf ospfdb d show ospf area 0.0.0.0
61
Configuring OSPF 12 Which of the following best describes an OSPF internal router? a It is responsible for representing a particular broadcast network. b It has interfaces in both an OSPF routing domain, and a non-OSPF routing domain. c It has all of its network interfaces in the same area. d It has interfaces connected to more than one area.
13 Which of the following commands allows non-OSPF routes to be distributed into an OSPF routing domain? a configure ospf export external b configure ospf export c export ospf external d enable ospf export
14 If all the routers have the same router priority, which of the following commands can be used to influence the election of an OSPF designated router? a configure ospf routerid 10.1.6.1 b configure ospf routepriority 1 c configure ospf dr 10.1.6.1 d configure ospf dr 1
15 How many levels of hierarchy does OSPF support? a One b Two c Three d Sixteen
16 Which of the following best describes the unique requirements of OSPF area 0? a It must be connected to all areas in an OSPF autonomous system. b External route information is not distributed in this area. c It is connected to other areas through ABRs. d External routes originating from an ASBR connected to this type of area can be propagated to other areas.
62
17 What do OSPF routers use to discover their neighbors? a Router Link-state Advertisements. b Router discovery packets. c Extreme Discovery Protocol packets. d Hello packets.
18 What is the relationship between autonomous systems and areas? a One autonomous systems can contain multiple areas. b One area can contain multiple autonomous systems.
19 What types of networks use an OSPF designated router? a Point-to-Point b Point-to-Multipoint c Broadcast d Asynchronous
63
Configuring OSPF This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
64
Student Objectives
Module Description
This module provides you with the information and skills that the network administrator needs to configure Extreme Networks ExtremeXOS network login feature using MAC-based authentication.
Module Objectives
Upon completion of this module, you will be able to:
Describe network login. Identify the advantages and disadvantages of the network login feature using MAC-based authentication. Configure network login using local MAC-based authentication. Display network login information and terminate a session.
Prerequisites
Before starting this module, the student should have a basic understanding of data networking, Layer 2 addressing, and the ExtremeXOS implementation of VLANs.
Web-Based Authentication
When web-based network login is enabled on a switch port, that port is placed into a non-forwarding state until authentication takes place. To authenticate, a user must open a web browser and provide the appropriate credentials. When credentials approved, the port is placed in forwarding mode. If credentials are not approved, the port remains blocked. The user can logout of the system by submitting a logout request or closing the logout window. Web-based authentication may use HTTP or HTTPS.
MAC-Based Authentication
MAC-based authentication validates the MAC address of the device before it allows traffic from that station to enter the network. MAC address validation may use a local database (one that is located on the switch) or a RADIUS device. The system compares the MAC address of the connecting station against the list of authorized stations in the database. If a matching entry is found, then the station is allowed access to the network.
802.1x Authentication
802.1x authentication is an IEEE standards-based protocol that requires that three components - the accessing network device, the switch, and the RADIUS system - work together to validate the accessing device. This requires support on all three components for the underlying authentication protocols. Once the underlying protocol infrastructure is in place, the system is extremely flexible. Network login allows for multiple web-based, MAC-based, and 802.1X-based supplicants on each port.
Advantages
The advantages of MAC-based authentication are that it:
Works with any operating system or network enabled device. Works silently. The user, client, or device does not know that it gets authenticated. Is easy to implement. A set of devices can easily be grouped by the vendor part of the MAC address.
Disadvantages
The disadvantages of MAC-based authentication are that it:
Relies on the MAC address of the client to determine. This makes the network is more vulnerable to spoofing attacks. MAC address database administration may incur a great deal of overhead.
Local databases are easy to manage while RADIUS is more complex. Local databases require little additional training to use while RADIUS requires more specialized knowledge. Local databases can be implemented with no new hardware or software while RADIUS requires another network device and specialized software. Local databases require a copy of the database on every switch if the authenticating devices are expected to move while RADIUS provides one centralized database that can be used by all switches. Local databases are typically limited in their extensibility while RADIUS implementations tend to provide greater support for other network devices and protocols. The local database can hold up to a recommended 64 user accounts, while a RADIUS can hold a great deal more.
Listing the Steps to Implement Network Login Using Local MAC-Based Authentication
The following list provides the steps that you must execute in order to implement MAC-based network login: 1 Create a network login VLAN. 2 Assign a VLAN to network login. 3 Enable MAC-based network login feature on switch. 4 Enable MAC-based network login feature on port. 5 Configure the authorization database order. 6 Create local MAC-based network login users. 7 Verify configuration. 8 Validate configuration.
10
11
You cannot enable the network login process until a VLAN is assigned to service it.
12
13
14
15
16
17
To view the users that are in the database, enter the following command: show netlogin local-users
18
19
Current VLAN assignment Authentication type MAC address of the device currently attached to the port The authentication status Whether locally authenticated or authenticated through RADIUS The type of process used to authenticate the attached device The name of the user attached to the port, if applicable
20
21
22
23
All unauthenticated MACs will be seeing broadcasts and multicasts sent to the port if even a single MAC is authenticated on that port. The local database is limited to a recommended maximum 64 users. Network login must be disabled on a port before that port can be deleted from a VLAN.
A network login VLAN port should not be a part of following protocols: Ethernet Automatic Protection Switching (EAPS) Extreme Standby Router Protocol (ESRP) Spanning Tree Protocol (STP) Link Aggregation NOTE
Netlogin is a network access control feature. This is an edge feature for PC clients. ExtremeXOS does not have protocols that can block port access running same time on same port. For example, you would not want to have STP in forwarding state, but port is block by netlogin.
24
25
26
27
User initiates logout by using the Logout pop-up window User inactivity for the configured session refresh-interval, if session-refresh is enabled Physical link state change on the users port
The login date and time The user name The type of session
28
29
Summary
You should now be able to:
Describe network login. Identify the advantages and disadvantages of the network login feature using MAC-based authentication. Configure network login using local MAC-based authentication. Display network login information and terminate a session.
30
31
Lab
Turn to the Netlogin using Local MAC Address Authentication Configuration Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
32
33
Review Questions
1 Which of the following is NOT an advantage of using local MAC-based authentication? a Works with any operating system or network enabled device. b Works silently. The user, client, or device does not know that it gets authenticated. c Is easy to implement. A set of devices can easily be grouped by the vendor part of the MAC address.
d MAC address database administration can incur a great deal of overhead. 2 Which of the following scenarios describes when it is appropriate to use MAC-based authentication? a When devices are not aware of authentication protocols b When it is necessary to protect the network from MAC-address spoofing c When authentication needs to be based upon the user regardless of the device they use to log into the network
d When the devices support multiple uses with differing access rights 3 Which of the following most accurately identifies how many ports may be associated with a single MAC address when using MAC-address based authentication? a 1 b 12 c 24 d All of the above 4 Which of the following must occur before the network login feature may be enabled? a All attached network devices must be turned off. b The MAC addresses of all attached devices must be entered into the local database. c A VLAN must be assigned to service the network login feature. d The ports used by the network login VLAN must be removed from the default VLAN. 5 Which of the following command syntax examples identifies the command to assign a VLAN to the network login service? a assign netlogin vlan <vlan_name> b configure netlogin vlan <vlan_name> c netlogn vlan <vlan_name> d configure vlan netlogin add <vlan_name>
34
6 Which of the following commands is used to enable the network login feature using MAC-address based security? a enable netlogin mac b start mac-based netlogin c configure netlogin mac enable d None of the above 7 Which of the following commands activates the network login feature on individual ports? a configure netlogin ports <port_list> mac b enable netlogin ports <port_list> mac c configure ports <port_list> netlogin mac d None of the above 8 Which of the following commands instructs the network login service to only use the local database for authenticating MAC addresses. a configure netlogin database-order local b enable netlogin mac authentication local-only c configure netlogin mac authentication database-order local d None of the above 9 Which of the following rules apply when entering a MAC address into the local database? a Alphabetic characters in the MAC address must be entered in uppercase b Special characters such as colons, dashes, and spaces must be omitted from the MAC address when it is entered into the system c The password that is assigned to the MAC address entry must be identical to the MAC address d All of the above 10 Which of the following commands displays the list of MAC addresses allowed access to this device through the network login service? a display mac-address users b show netlogin local-users c show mac-address users d None of the above 11 Which of the following commands disables the network login service? a disable netlogin b stop netlogin c configure netlogin disable d None of the above
35
Network Login Using Local MAC-Based Authentication 12 Which of the following commands terminates a MAC-address based network login user session? a drop session <number> b clear session <number> c disable session <number> d None of the above
36
This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
37
38
15 Universal Port
Universal Port
Student Objectives
The Universal Port module presents the purpose and function of Universal Port, Universal Port profiles, scripting for Universal Port, and Universal Port Manager. It provides a description of the purpose and underlying technologies used by Universal Portextended CLI scripting, Link Layer Discovery Protocol (LLDP), and Network Login with a RADIUS or other authentication server. It also provides an explanation of Universal Port triggers and profiles. You will learn the steps to configure and verify Universal Port provisioning. Upon completion of this module the successful student will be able to:
Describe the purpose and underlying technologies of Universal Port. List four types of trigger events supported by Universal Port. List three types of authentication supported by Universal Port profiles. List profile rules. List steps to configure and verify Universal Port handset provisioning without authentication and with authentication. List commands used to verify that Universal Port is correctly configured.
Universal Port
Universal Port
Non-persistent CLI mode System defined user and device event variables
Network Policy (which VLAN tag, 802.1p(dot1p), or DSCP, and the phone should use) ECS Location ID (for E911 coordinates or street/building/floor like address), compliant with NENA and TIA-TSB-146 directions. The switch advertises a configurable physical location information to the phone Extended Power-via-MDI (finer grain PoE budget requirement in Watt) Inventory information such as firmware version, serial number, etc. compatibility issues.Underlying Technologies for Universal Port
Universal Port
All three authentication methods can be enabled individually or together in any combination to provide the smooth implementation of a secured network.
802.1x
802.1x is a standards-based protocol that requires a special client be installed on the device accessing the network. 802.1x is designed as a secure protocol, and uses a number of different secure authentication techniques. ExtremeXOS has been tested against a variety of these techniques, including Message Digest Algorithm 5 (MD5), Protected Extensible Authentication Protocol (PEAP), Transport Layer Security (TLS) and Tunnelled Transport Layer Security (TTLS), supporting password as well as certificate based authentication.
Web-based
The web-based method does not require any specific client side software. Web-based authentication uses standard built-in technologies on clients, such as DHCP and a web browse. Therefore it is an easyto-deploy security mechanism for all client devices that support these technologies. When a web browser requests occurs, an Extreme Networks switch with web-based Network Login enabled will redirect this traffic to the Network Login welcome page. You can configure the login welcome page to post a custom greeting or guest login information for internet access via a dedicated guest VLAN.
MAC-based
The MAC-based authentication method is targeted for networked devices that do not support any 802.1x authentication methods. Devices such as older VoIP phones, printers, IP camera or wireless access points can be authenticated using their MAC address allowing for authentication enforcement on all edge ports in the network. With MAC-based authentication, the frames are forwarded only when the sender (MAC address) is authenticated for that port.
Universal Port
The supplicant may send an EAP-start message. The access point sends an EAP-request identity message. The supplicant's EAP-response packet with the supplicant's identity is proxied to the authentication server by the authenticator. The authentication server challenges the client to prove themselves and may send its credentials to prove itself to the client (if using mutual authentication). The supplicant checks the server's credentials (if using mutual authentication) and then sends its credentials to the server to prove itself. The authentication server accepts or rejects the supplicants request for connection. If the end user was accepted, the authenticator changes the virtual port with the end user to an authorized state allowing full network access to that end user. At log-off, the supplicant virtual port is changed back to the unauthorized state.
10
11
Universal Port
NOTE
Web-based Network Login is an excellent way to deploy 802.1x client software and certificates in a secure fashion on a port without opening up the network. Instead of installing 802.1x client software before turning on Network Login, users can log into the network via the web-based login, be redirected to an IT server to receive instructions on downloading and installing an 802.1x client and any additional software. This process dramatically reduces the costs and complexity of a user authentication rollout in an IT network because installation can be off-loaded to the end user.
NOTE
Beginning with ExtremeXOS Release 12.0, web-based Network Login welcome and authentication failure pages are completely user-configurable including custom graphics and advanced features such as JavaScript code. ExtremeXOS Release 12.0 and later supports any web technology that a client browser supports and does not require HTTP server-based actions.
12
13
Universal Port
MAC-Based Authentication
MAC-based Network Login can be used for devices that have no means of performing manual authentication or using certificates. The MAC-based authentication is actually an internal policy processing by the access point. The access point has an internal table of MAC addresses from which the switch allows access to the network. This method provides more flexibility to the Universal Port network login infrastructure. With MACbased Network Login, edge authentication can be turned on at every single port, no matter what connects to the network. Devices such as older VoIP phones, printers, IP camera or wireless access points can be authenticated using their MAC address. This allows for authentication enforcement on all edge ports on the network. MAC-based Network Login can help protect ports that connect devices such as printers or older generation VoIP phones should someone walk up and unplug the device and try to gain access to the network. While not fully secure because of potential MAC spoofing, MAC-based Network Login makes it more complicated for people to hack into the network. In most cases this is sufficient security when combined with physical access restrictions. .
14
15
Universal Port
16
17
Universal Port
18
19
Universal Port
Profile Rules
All profiles have the following restrictions:
Maximum 5000 characters in a profile. Maximum 128 profiles on a switch. Profiles are stored as part of the switch configuration file. Copy and paste is the only method to transfer profile data using the CLI. Unless explicitly stated with the command configure cli mode persistent, configurations set by profiles are non-persistent and cannot be saved to the switch configuration file. NOTE
By keeping the configuration changes invoked by a profile to be non-persistent, you allow the switch to rollback changes. Rolling back changes enables ports to return to their initial state when a config save and then a reboot or power cycle occurs.
Be aware that some commands cannot be run in non-persistent mode, such as those that configure an EAPS ring. These will be saved across a switch reboot even when other commands in the profile are not saved.
20
21
Universal Port
22
23
Universal Port
Device detection based on discovery protocols such as IEEE 802.1ab LLDB and ANSI/TIA-1057 LLDP-MED for Voice-over-IP (VoIP) phone devices and other LLDP devices. User login defined by standards-based authentication such as a network login framework with 802.1x support, web-based login, or MAC-based network login Events triggered at particular time of the day Event Management System (EMS) events: other switch events, such as link up, link down, bandwidth exceeded, etc.
Dynamic profiles create temporary states. Information passed to dynamic profiles can be saved in variables and preserved for future use. When a device appears at an edge port, a triggering event occurs that applies a profile to the port and configures it appropriately. Examples of configuration parameters include VLAN, QoS, ACL, PoE and IP Security. When the device is no longer connected, another triggering event occurs to reverse the configuration parameters currently applied. After a reboot the network device is again detected and the dynamic profile is triggered again. By default, universal port profiles run in non-persistent mode. Profiles that run via event triggers are dynamic, which means the universal port prepends the configure CLI mode non-persistent command to each script. These dynamic profile configurations are not restored across configuration changes or reboots on the system. This temporary state is critical for network security. There is no automatic rollback of dynamic profiles. You can roll back the configuration to any previous state by saving information in variables that are retrievable for accomplishing the rollback. The only method of rollback is done by not saving the configuration and rebooting the switch.
NOTE
There is no profile hierarchy, which means administrators must verify there are no conflicting rules in static and dynamic profiles. This is a normal requirement for ACLs, and is standard when using policy files or dynamic ACLs.
There is no profile hierarchy. You should not configure conflicting profiles that might create different results, based on the sequence of events.
24
25
Universal Port
26
27
Universal Port
NOTE
Variables are not validated for correct syntax.
28
29
Universal Port
30
31
Universal Port
32
33
Universal Port
4 The RADIUS server pushes out user group information via Vendor Specific Attributes (VSAs) and sends the policy name and any additional ExtremeXOS settings or information in the user profile. 5 The switch configures the port according to the triggered profile. The switch moves the port into the correct VLAN (for example an Engineering VLAN) and configures ACLs to specific servers or to specific application types such as enabling CVS access, configuring port interface speed, and/or configuring QoS for that port.
34
35
Universal Port
36
37
Universal Port
You can use the show log components command to display all the components and subcomponents for which you can filter events. If you specify a filter to take action on a component or subcomponent, any event related to that component triggers the profile. You can use the show log events all command to display all the conditions or events for which you can filter events. If you decide that you want to configure a profile to take action on an ACL policy change, you can add a filter for the ACL.Policy.Change event. You can further define an event that triggers a UPM profile by specifying an event severity level and text that must be present in an event message. When a specified event occurs, event information is passed to the UPM profile in the form of variables, which can be used to modify the switch configuration in CLI scripts. EMS-triggered profiles allow you to configure responses for any EMS event listed in the show log components and show log filters all commands. However, you must be careful to select the correct event and corresponding response for each profile. For example, if you attempt to create a UPM log target for a specific event (component.subcomponent.condition) and you accidentally specify a component (component), the profile is applied to all events related to that component. Using EMStriggered profiles is similar to switch programming. They provide more control and more opportunity for misconfiguration.
38
39
Universal Port
Running a Profile
After you create a profile you need to test its functionality. Use the following command with the correct profile name and variables to conduct the test. run upm profile <profile-name> {event <event-name>} {variables <variablestring>} Example: run upm profile afterhours If the variables keyword is not present but an event variable is specified in the profile, the ExtremeXOS prompts for environmental variables appropriate to the event, including the VSA string for user authentication.
NOTE
Variables are not validated for correct syntax.
To view profile history, use the show upm history command. show upm history
40
41
Universal Port
Creating Profiles
Profiles can be created in one of two ways:
With the command line interface (CLI) With EPICenter (GUI interface)
42
43
Universal Port
Avaya phone FW Revision: 2.6 or greater (LLDP device) EXOS version: 11.6.1.9. or greater on the switch DHCP Server TFTP Server Call Server
Configuration Process
The sequence of events that needs to occur is as follows: 1 Create the VLAN for the VoIP network. Assign the IP address/subnet to this VLAN either statically or through the DHCP server configuration. Do not assign any ports to this VLAN. 2 Create the Universal Port profile to be triggered by the DEVICE-DETECT event, using the following command syntax: create upm profile <profile name>. Upon the device detection event, this profile
Adds the detected port to the device profile port list. Adds the detected port to the proper VoIP VLAN. Configures the LLDP options that the phone needs. Configures the PoE limits for the port based on the phone requirement.
3 Create the device-undetect profile on the switch. Upon a device-undetect event (removal of the device), this profile
Removes the port from the profile port list. Deletes the port from the VLAN. Unconfigures the inline-power operator-limit and creates log entry. Port PoE settings are cleared. Creates log entry that port is cleared
4 Assign the device-detect profile to the desired edge ports Profile is linked to specific ports. 5 Assign the device -undetect profile to the desired edge ports. Profile is linked to specific ports. 6 Check that the Universal Port profiles are assigned correctly with the following command show upm profiles The output shows the UPM profiles on the switch, the events that trigger them, whether the profile is enabled or disabled, and the ports where the profile is applied. 7 Enable LLDP on the ports with the following command enable lldp <switch name> <port numbers> This configures the ports on the switch to transmit, receive, and store lldp information. 8 Plug the phone into the network and test. Detail information and examples of the above steps are found in the Chapter 20, Universal Port of the ExtremeEXOS Concepts Guide.
44
45
Universal Port
Avaya phone FW Revision: 2.7 or greater (LLDP device) EXOS version: 11.6.1.9. or greater RADIUS Server DHCP Server TFTP Server Avaya Call Server
Configuration Process
Use the following procedure to configure the universal port for authentication (user login): 1 Configure the RADIUS server for the user ID and password pair. You must edit the users file located at /etc/raddb/users to add the default user and passwords. 2 Define Extreme Networks custom VSAs on the RADIUS server. For FreeRADIUS, edit the dictionary file located at //etc/raddb/dictionary 3 Add the switch as an authorized RADIUS client: For FreeRADIUS, edit the file located at //etc/raddb/clients.conf 4 Create the universal port profile for user-authenticate on the switch that does the following:
Adds the detected port to the device "unauthenticated" profile port list Configures the LLDP options that the phone needs Unconfigures LLDP port Unconfigures the inline-power operator-limit and creates log entry and clears Port PoE settings Creates log entry that port is cleared
5 Create the universal port profile for user-unauthenticate on the switch that does the following:
6 Configure RADIUS on the edge switch. 7 Configure network login on the edge switch. You choose what type of authentication: 802.1x, MAAC-based, or web-based. 8 Assign the user-authenticate profile to the desired edge port. Configure ports where profile will be applied when selected event occurs. 9 Assign the user-unauthenticate profile to the desired edge port. Configure ports where profile will be removed when selected event occurs 10 Check that the correct profiles are assigned to the correct ports: show upm profile This shows the number of UPM profiles on the switch and events that trigger them, whether the profile is enabled or disabled, the ports where the profile is applied, and the event name for each. 11 Enable LLDP message advertisements on the ports. 12 Test the setup. Detail information and examples of the above steps are found in the Chapter 20, Universal Port of the ExtremeEXOS Concepts Guide.
46
47
Universal Port
48
49
Universal Port
ExtremeXOS 11.6 or later (if you are using EPICenter, you need ExtremeXOS 12.0 or later) RADIUS server for user authentication Appropriate firmware for handsets PoE switches for PoE phones
To configure: 1 Download and customize the profile 2 Set variables 3 Deploy the profiles to your switches
Select profile and switches to deploy Select ports Send profiles to switches and enable
Script for device detection for phones with LLDP protocol Script for user authentication Script for Avaya special phones (phones that support 802.1x & LLDP)
50
51
Universal Port
The Network Profiles View; where you can view, enable, disable, edit configuration, run, and delete the profiles deployed on the Extreme devices. You can also change the profile event binding or port binding configuration on switches. The Managed Profiles View; where you can import, export, create, view, edit, save, delete, test, and deploy profiles. The Audit Log View; where you can view the profile actions done on the network devices by EPICenter, and redeploy profiles to the devices on which you had deployed profiles earlier.
The following list includes some of the tasks you can accomplish using EPICenter Universal Port Manager:
Setup an automatic VoIP network. Setup a secured network; where traffic flow, bandwidth, and access control is reinforced dynamically. Do network provisioning.
52
53
Universal Port
54
55
Universal Port
Summary
This Universal Port module provided an overview of the underlying technology of Universal Port, how it interacts with authentication for users and devices accessing the switch, types of profiles and their use, how profiles are activated, how to run a profile, where to find sample scripts, and the steps to configure Universal Port for your access requirements. You should now be able to:
Describe the purpose and underlying technologies of Universal Port. List four types of trigger events supported by Universal Port. List three types of authentication supported by Universal Port profiles. List profile rules. List steps to configure and verify Universal Port handset provisioning without authentication and with authentication. List commands used to verify that Universal Port is correctly configured.
56
57
Universal Port
Lab
Turn to the Universal Port Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
58
59
Universal Port
Review Questions
1 What are the three underlying technologies that Universal Port is built upon? a Extended CLI scripting syntax, LLDP (802.1AB), and Network Authentication through Network Login and a RADIUS server. b LLDP (802.1AB), Network Authentication through Network Login and a RADIUS server, and SNMP. c Extended CLI scripting syntax, Network Authentication through Network Login and a RADIUS server, and SNMP.
2 What protocol enables devices to advertise their capabilities and media specific configuration and learn the same from the devices networked to it? a DHCP b LLDP c RIP d EAPS
3 Which of the Profile rules stated below is NOT true? a Profiles are non-persistent by default b Profiles are stored on the RADIUS server c Profiles cannot exceed 5000 characters d There is a limit of 128 Universal Port profiles per switch
4 What is a benefit of using Universal Port in static mode? a New devices are automatically configured. b You can apply multiple profiles on the same port. c The profile can include system wide configuration changes. d Only a few CLI commands cannot be used.
5 The profile type that is most prone to misconfiguration is a Time-of-day b User-based authenticated c Event Management System d Dynamic device-detect
60
6 What command shows you the Universal Port event triggers and profiles on an Extreme Networks' switch? a show upm profiles b show log match upm c show lldp neighbors d show history
61
Universal Port This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
62
16 Policy-Based QoS
Policy-Based QoS
Student Objectives
Upon completion of this module, you should be able to:
Two major benefits of QoS Five major traffic types Policy-based QoS How to configure QoS profile How to monitor and modify QoS policy IP-based (ACL) Destination MAC address Explicit Class of Service Physical and logical groupings
Policy-Based QoS
NOTE
Policy-based QoS has no impact on switch performance. Using even the most complex traffic groupings has no cost in terms of switch performance.
Policy-Based QoS
NOTE
QoS does not increase the available bandwidth; it ensures that it is used in a controlled manner. The network designer still has to make sure that the network has sufficient capacity and throughput to deliver the service required.
Policy-Based QoS
Desktop Video Conferencing Multicast Streaming Video Real-Time Data Feeds SNA, TN3270
Congestion Management
Another benefit of QoS is its ability to manage the sharing of available bandwidth between different types of traffic. This is typically by allocating a maximum or minimum percentage of the available bandwidth to a specified class of traffic. The example highlights the QoS ability to allocate specific bandwidth to different traffic groups. QoS can only share what is available; the network designer has to ensure that the overall bandwidth is adequate.
Policy-Based QoS
Voice Applications
Voice applications, or voice over IP (VoIP), typically demand small amounts of bandwidth. However, the bandwidth must be constant and predictable because voice applications are typically sensitive to latency (inter-packet delay) and jitter (variation in inter-packet delay). The most important QoS parameter to establish for voice applications is minimum bandwidth, followed by priority.
Video Applications
Video applications are similar in needs to voice applications, with the exception that bandwidth requirements are somewhat larger, depending on the encoding. Key QoS parameters for video applications include minimum bandwidth and priority, and possibly buffering (depending upon the behavior of the application).
NOTE
Full-duplex links should be used when deploying policy-based QoS. Half-duplex operation on links can make delivery of guaranteed minimum bandwidth impossible.
10
11
Policy-Based QoS
Assign different service levels to traffic by specifying bandwidth management and prioritization parameters to hardware queues
Track and enforce minimum and maximum percentage of bandwidth utilization, transmitted on every hardware queue, for every port. Prioritize bandwidth use, when two or more hardware queues on the same physical port are contending for transmission (as long as their respective bandwidth management parameters are satisfied)
12
13
Policy-Based QoS
Traffic groupings transmitting out of the same port that are assigned to a particular QoS profile share the assigned bandwidth and prioritization characteristics, resulting in sharing the class of service. 3 Apply QoS policy. QoS policy The combination that results from assigning a traffic grouping to a QoS profile.
14
15
Policy-Based QoS
Considerations When Configuring QoS on the BlackDiamond 8800, Summit X450, and Summit X250 Switches
The BlackDiamond 8800 series switches, Summit X450, and the Summit X250 switches allow dynamic creation and deletion of QoS queues, with Q1 and Q8 always available.
NOTE
The sFlow application uses QP2 to sample traffic on the BlackDiamond 8800 family of switches and the Summit X450 switch. Any traffic grouping using QP2 may encounter unexpected results when sFlow is enabled.
The following considerations apply only to QoS on the BlackDiamond 8800 family of switches and the Summit X450 and Summit X250 switches:
The BlackDiamond 8800 family of switches and the Summit X450 and Summit X250 switches do not support QoS monitor. The following QoS features share resources on the BlackDiamond 8800 family of switches and the Summit X450 switch and Summit X250:
You may receive an error message when configuring a QoS feature in the above list on the BlackDiamond 8800 family of switches, the Summit X450 switch, and the Summit X250 switch; it is possible that the shared resource is depleted. In this case, unconfigure one of the other QoS features and reconfigure the one you are working on. When a node is operating in stacking mode, QoS profiles QP6 and QP7 are reserved for the stacking function and cannot be created.
16
Figure 10: Considerations When Configuring QoS on the BlackDiamond 8800, Summit X450, and Summit X250 Switches
17
Policy-Based QoS
Creating and Configuring Queues and Profiles on the BlackDiamond 8800 and Summit X450/X250 Switches
The BlackDiamond 8800 family of switches, the Summit X450 switch, and the Summit X250 switch have two default queues, QP1 and QP8. QP1 has the lowest priority, and QP8 has the highest priority. You can configure up to six additional QoS profiles, or queues, on the switch, QP2 through QP7. You can also modify the default parameters of each QoS profile. The names of the QoS profiles, QP1 through QP8, are not configurable. A QoS profile does not alter the behavior of the switch until it is assigned to a traffic grouping. The default QoS profiles, QP1 and QP8, cannot be deleted. The parameters that make up a QoS profile on the BlackDiamond 8800 family of switches, the Summit X450 switch, and the Summit X250 switch include:
BufferThis parameter is the maximum amount of packet buffer memory available to all packets associated with the configured QoS profile within all affected ports. All QoS profiles use 100% of available packet buffer memory by default. You can configure the buffer amount from 1 to 100%, in whole integers. NOTE
Use of all 8 queues on all ports may result in insufficient buffering to sustain 0 packet loss throughput during full-mesh connectivity with large packets.
WeightThis parameter is the relative weighting for each QoS profile; 1 through 16 are the available weight values. The default value for each QoS profile is 1, giving each queue equal weighting. When you configure a QoS profile with a weight of 4, that queue is serviced 4 times as frequently as a queue with a weight of 1. However, if you configure all QoS profiles with a weight of 16, each queue is serviced equally but for a longer period of time.
Finally, you configure the scheduling method that the entire switch will use to empty the queues. The scheduling applies globally to the entire switch, not to each port. You can configure the scheduling to be strict priority, which is the default, or weighted round robin. In the strict priority method, the switch services the higher-priority queues first. As long as a queued packet remains in a higher-priority queue, any lower-priority queues are not serviced. If you configure the switch for weighted-round-robin scheduling, the system services all queues based on the weight assigned to the QoS profile. The hardware services higher-weighted queues more frequently, but lower-weighted queues continue to be serviced at all times. The settings for the default QoS parameters on the BlackDiamond 8800 family of switches, the Summit X450 switch, and the Summit X250 switch are summarized in the following table.
18
Figure 11: Creating and Configuring Queues and Profiles on the BlackDiamond 8800 and Summit X450 / X250 Switches
Table 1: Default BlackDiamond 8800, Summit X450, and Summit X250 Switches - QoS Parameters
Profile name QP1 QP8 Priority Low High Buffer 100% 100% Weight 1 1
19
Policy-Based QoS
Creating a QoS Profile (BlackDiamond 8800, Summit X450, and Summit X250 Switches)
To create a QoS profile, enter the following command: create qosprofile [qp2 | ap3 | qp4 | qp5 | qp6 | qp7] To delete a QoS profile, enter the following command: delete qosprofile [qp2 | ap3 | qp4 | qp5 | qp6 | qp7] You cannot delete the default QoS profiles QP1 and QP8.
20
Figure 12: Creating a QoS Profile and Configuring a Profile Weight (BlackDiamond 8800, Summit X450, and Summit X250 Switches)
21
Policy-Based QoS
Minimum bandwidthThe minimum total link bandwidth that is reserved for use by a hardware queue on a physical port. The minimum bandwidth value is configured either as a percentage of the total link bandwidth or using absolute committed rates in Kbps or Mbps. Bandwidth unused by the queue can be used by other queues. The minimum bandwidth for all queues should add up to less than 100%. The default value on all minimum bandwidth parameters is 0%. Maximum bandwidthThe maximum total link bandwidth that can be transmitted by a hardware queue on a physical port (each physical port has eight hardware queues, corresponding to a QoS profile). The maximum bandwidth value is configured either as an absolute percentage of the total maximum link speed, regardless of the currently configured or negotiated speed or an absolute peak rate in Mbps or Kbps. The default value on all maximum bandwidth parameters is 100%. PriorityThe level of priority assigned to a hardware egress queue on a physical port. There are eight different available priority settings and eight different hardware queues. By default, each of the default QoS profiles is assigned a unique priority. You use prioritization when two or more hardware queues on the same physical port are contending for transmission on the same physical port, only after their respective bandwidth management parameters have been satisfied. If two hardware queues on the same physical port have the same priority, a round-robin algorithm is used for transmission, depending on the available link bandwidth.
A QoS profile does not alter the behavior of the switch until it is assigned to a traffic grouping. QoS profiles on the BlackDiamond 10808 switch are linked to hardware queues. Each physical port has eight hardware queues, one corresponding to each of the eight QoS profiles. By default, a QoS profile links to the identical hardware queue across all the physical ports of the switch.
22
23
Policy-Based QoS
ACL-based information Explicit packet class of service information, such as 802.1p or DiffServ (IP TOS) Physical/Logical configuration (physical source port or VLAN association
24
25
Policy-Based QoS
IP ACL MAC ACL DiffServ (IP TOS) 802.1p Source port VLAN NOTE
Physical/logical groupings
The source port and VLAN QoS apply only to untagged packets, and 802.1p QoS applies only to tagged packets. If you use 802.1p or DiffServ QoS in conjunction with ACLs, you must configure the 802.1p or DiffServ action within the ACL itself. On the BlackDiamond 8800 family of switches, the Summit X450 switch, and the Summit X250 switch, the precedence of IP ACL or MAC ACL depends on specifications in the ACL file itself
26
27
Policy-Based QoS
IP source or destination address IP protocol TCP flag TCP/UDP or other Layer 4 protocol TCP/UDP port information IP fragmentation MAC source or destination address Ethertype
28
29
Policy-Based QoS
Extreme Networks switches support the standard IEEE 802.1p priority bits that are part of a tagged Ethernet packet. The 802.1p priority field is located directly following the 802.1Q type field and preceding the 802.1Q VLAN ID, as shown in Figure 19. When a tagged packet arrives at the switch, the switch examines the 802.1p priority field and maps the packet to a specific queue when transmitting the packet.
IP Differentiated Services (DiffServ) code points, formerly known as IP Type of Service (TOS) bits
Class of service information can be carried through the network infrastructure, without repeating what may be complex traffic grouping policies at each switch location. End stations can perform their own packet marking on an application-specific basis.
Extreme Networks switch products have the capability of observing and manipulating packet marking information with no performance penalty.
30
31
Policy-Based QoS
802.1p Information
802.1p Information on the BlackDiamond 10808 Only
If a port is in more than one virtual router, you cannot use the QoS 802.1p features.
32
33
Policy-Based QoS
VLAN
A VLAN traffic grouping indicates that all intra-VLAN switched traffic and all routed traffic sourced from the named VLAN uses the indicated QoS profile. To configure a VLAN traffic grouping, enter the following command: configure vlan <vlan_name> {qosprofile} <qosprofile> For example, all devices on VLAN servnet require use of the QoS profile QP1. The command to configure this example is as follows: configure vlan servnet qosprofile qp1 NOTE
On the BlackDiamond 10808 switch, this command applies only to untagged packets. On the BlackDiamond 8800 family of switches, the Summit X450 switch, and the Summit X250 switch, this command applies to all packets.
34
35
Policy-Based QoS
BlackDiamond 8800 Family of Switches, Summit X450, and Summit X250 Switches QOS Profile Display
To display which QoS profile, if any, is configured on the BlackDiamond 8800 family of switches, Summit X450, and Summit X250 enter the command:
show ports <port_list> information detail
Figure on the facing page displays a sample output of this command for an BlackDiamond 8810 switch.
NOTE
To ensure that you display the QoS information, you must use the detail variable.
36
37
Policy-Based QoS
The display is slightly different for a 1 Gbps and 10 Gbps port. The figure on the facing page is a sample output of this command for a BlackDiamond 10808 switch 10 Gbps port.
38
39
Policy-Based QoS
Displaying QoS Profile Information on the BlackDiamond 8800 Family of Switches, the Summit X450 Switch, and the Summit X250 Switch
To display QoS information on the BlackDiamond 8800 family of switches, the Summit X450 switch, and the Summit X250 switch, enter the following command: show qosprofile {ports | all | <port_list>]}
show ports <port_list> qosmonitor
40
41
Policy-Based QoS
42
43
Policy-Based QoS
NOTE
You may see slightly different bandwidths because the switch supports granularity down to 62.5 Kbps.
NOTE
Cumulative percentages of minimum bandwidth of the queues on a given port should not exceed 100%.
If you choose a setting not listed in the table, the setting is rounded up to the next value. If the actual bandwidth used is below the minimum bandwidth, the additional bandwidth is not available for other queues on that physical port.
44
Table 4: Maximum committed rates per port for I/0 module on the BlackDiamond 10808 Switch
I/O module 1 Gbps module 10 Gbps module MSM configuration Single MSM Dual MSM Single MSM Dual MSM Maximum committed rate 200 Mbps 400 Mbps 2 Gbps 4 Gbps
45
Policy-Based QoS
For destination MAC-based grouping (other than permanent), you must clear the MAC FDB. To clear the MAC FDB, enter the following command: clear fdb This command should also be issued after a policy is first formed, as the policy must be in place before an entry is made in the MAC FDB.
For permanent destination MAC-based grouping, re-apply the QoS profile to the static FDB entry For physical and logical groupings of a source port or VLAN, re-apply the QoS profile to the source port or VLAN
46
47
Policy-Based QoS
48
49
Policy-Based QoS
Summary
You should now be able to:
Two major benefits of QoS Five major traffic types Policy-based QoS How to configure QoS profile How to monitor and modify QoS policy IP-based (ACL) Destination MAC address Explicit Class of Service Physical and logical groupings
50
51
Policy-Based QoS
Lab
Turn to the Policy-based QoS Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
52
53
Policy-Based QoS
Review Questions
1 Which of the following provides a definition of QoS? a QoS is a set of protocols and mechanisms that facilitate the delivery of delay and bandwidth sensitive material across data networks. b QoS provides a means of securing bandwidth against potential attackers. c QoS provides an absolute guarantee that all high-priority traffic will be delivered to the destination.
d QoS ensures that all voice and video traffic will be sent ahead of non-multimedia traffic.
2 Which one of the following is not a goal of traffic engineering? a Optimize network usage b Ensure user authentication prior to granting network access. c Increase the robustness of the network infrastructure d Optimize network performance
3 Which of the following statements indicates a need for QoS? a OSPF routing is used to connect various parts of the network. b Users should only be allowed access to the network after being authorized. c All traffic must be treated with the same level of priority. d Network traffic needs a guarantee of underlying network performance.
4 Which of the following is another term for latency? a Echo b Speed c Delay d Jitter
5 Which of the following traffic types does not generally require QoS? a Voice b File server c Video d All of the above
54
6 Which of the following QoS profiles are not available when using stacking? a QP6 b QP5 c QP4 d All of the above
7 Which of the following identifies the maximum number of queues that can be configured on any Extreme Networks switch? a 2 b 4 c 6 d 8
8 Which of the follow specifications governs the 802.1p field? a DSCP b RSVP c IEEE d IP
55
Policy-Based QoS This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http://www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
56
17 Switch Diagnostics
Switch Diagnostics
Student Objectives
This module presents switch diagnostics. ExtremeXOS provides show commands and diagnostic commands to verify the operation of the switch software and hardware. Upon completion of this module, the successful student will be able to:
Enable the System Health Check. Run diagnostics and verify diagnostic results. Identify which process is using the most CPU time. Monitor the CPU utilization by a process. Monitor process heartbeats. Terminate and start a process. Monitor the system and a protocols memory use.
Switch Diagnostics
System Diagnostics
ExtremeXOS provides hardware diagnostics to test and validate the operating integrity of Extreme Networks switches. The diagnostic are used to detect, isolate, and treat faults in a system. The Extreme Networks diagnostic software is intended to identify possible hardware faults or software error conditions. A thorough discussion of the diagnostics available on every hardware platform for ExtremeXOS is beyond the scope of this course. Therefore, this section concentrates on the diagnostics available on the Summit X450 switches used in the classroom.
NOTE
For a thorough understanding of the diagnostics in the ExtremeWare e-series, i-series, and Triumph-based switches, refer to the Advanced System Diagnostics and Troubleshooting Guide.
Diagnostics
The ExtremeXOS diagnostics include the following types of tools for use in detecting, isolating, and treating faults in a switch. Each of these diagnostic types is summarized below, but is described in greater detail in later sections of this module.
Power-on self-test (POST)A sequence of hardware tests that run automatically each time the switch is booted, to validate basic system integrity. Switch-wide communication-path packet error health checker. This is an integrated diagnostic subsystem called the system health checker. It consists of a number of different test types operating proactively in the background to detect and respond to packet error problems in modules or on communication paths. On-demand system hardware diagnosticsRuns on demand through user CLI commands; runs in either of two modes:
Normalfaster-running but basic test sequence Extended more thorough, but longer-running test sequence.
Switch Diagnostics
Power-On Self-Test
The Power-on self-test (POST) runs every time the system is booted. It tests hardware components and verifies basic system integrity. The pre-POST test is a bootup process that tests CPU memory, Universal Asynchronous Receiver/ Transmitter (UART) parts, ASIC registers, and memory. For the CPU subsystem, the POST test includes the following:
Register ASICs Memory Loop-back (Includes the ready state initialization, MAC loop-back test, and IP route loop-back test.)
POST LEDs
On the BlackDiamond 10808 the MGMT LED flashes until the switch successfully passes the POST. If the switch fails the POST, the MGMT LED shows a solid yellow light. On the Summit X450 and BlackDiamond 8800 switches the MGMT LED flashes amber until the switch successfully passes the POST. If the switch passes the POST, the MGMT LED shows a blinking green light. On the BlackDiamond 12804 the MSTR LED is blinking green during the POST. If the switch passes the POST, the MSTR LED is solid green (primary) or amber (secondary).
Switch Diagnostics
Switch Diagnostics
You can configure the Master Switch Fabric Modules (MSMs) or I/O modules installed in a BlackDiamond switch to take no action, take ports offline in response to errors, automatically reset, shutdown, or if dual MSMs are installed, failover to the other MSM if the switch detects a hardware fault. To configure module auto-recovery upon detection of hardware problems, enter the following command: configure sys-recovery-level slot <slot_number> [none | reset | shutdown] Where:
none Configures the MSM or I/O module to maintain its current state regardless of the detected fault. The offending MSM or I/O module is not reset. ExtremeXOS logs fault and error messages to the syslog and notifies you that the errors are ignored. This does not guarantee that the module remains operational; however, the switch does not reboot the module. Configures the offending MSM or I/O module to reset upon fault detection. ExtremeXOS logs fault, error, system reset, and system reboot messages to the syslog. If there are redundant MSM modules, the primary MSM fails over to the backup MSM. This is the default setting. Configures the switch to shut down all slots/modules configured for shutdown upon fault detection. On the modules configured for shutdown, all ports in the slot are taken offline in response to the reported errors; however, the MSMs remain operational for debugging purposes only. ExtremeXOS logs fault, error, system reset, system reboot, and system shutdown messages to the syslog.
reset
shutdown
To display the module recovery setting, enter the following command: show slot <slot> NOTE
If you configure one or more slots for shut down and the switch detects a hardware fault on one of those slots, all of the configured slots enter the shutdown state and remain in that state until explicitly cleared.
To restore the I/O modules after a shutdown due to hardware problems, enter the following command: clear sys-recovery-level
10
11
Switch Diagnostics
To display the software recovery setting on the switch, enter the following command: show switch To restore the switch ports after a shutdown due to hardware problems, enter the following command: clear sys-recovery-level After you clear the shutdown state, use the reboot command to bring the switch and ports back online.
12
13
Switch Diagnostics
14
15
Switch Diagnostics
NOTE
Enabling backplane diagnostic packets increases CPU utilization and competes with network traffic for resources.
To verify that the system health check is enabled, enter the following command: show switch To configure the frequency of sending backplane diagnostic packets, use the following command: configure sys-health-check interval <interval> NOTE
Extreme Networks does not recommend configuring an interval of less than the default interval. Doing so can cause excessive CPU utilization.
To disable backplane diagnostic packets, use the following command: disable sys-health-check slot <slot>
16
17
Switch Diagnostics
<slot> A| B
On an I/O module, the extended diagnostic routine can require significantly more time to complete, depending on the number of ports on the module. On a management module, the module is taken offline while the diagnostics test is performed. After the diagnostic test is completed, the MSM reboots, and becomes operational again.
NOTE
Run diagnostics when the switch can be brought off-line. The tests conducted are extensive and affect traffic that must be processed by the system CPU. The diagnostics are processed by the CPU whether you run them on an I/O or a management module.
18
19
Switch Diagnostics
If the results indicate that the diagnostic failed, replace the module with another module of the same type. Use this command to display information from the last diagnostic test run on the switch. The following switch diagnostics information is displayed:
Day, month, date, year, and time of the diagnostic test The slot number or for MSMs, the slot letter. Result of each component tested test (pass/fail/interrupted)
Each type of switch has a different display. On the BlackDiamond 10808 and BlackDiamond 12804 switches the display also includes:
Type of slot. - The slot where the diagnostic test was run: I/O or MSM. Temperature. - The temperature of the module, in celsius, when the test was run. Test data. - More detailed information about the test, which includes the:
Version number of the diagnostic test run. Serial number of the module where the test was run. Type of tests run and if they passed or failed (CPU, register, memory, and system). Diagnostics Pass. The diagnostic test has passed. Diagnostics Fail. One or more diagnostic test has failed.
20
21
Switch Diagnostics
To stop the refresh of the top command display, press Ctrl-c or the q key.
22
23
Switch Diagnostics
The location (MSM A or MSM B) where the process is running on a modular switch. The name of the process. Range of time for each sample in the CPU utilization history. The CPU utilization history goes back 1 hour. Total User/System CPU Usage. - The amount of time that the process spends occupying CPU resources recorded in seconds. The values are cumulative meaning that the values are displayed as long as the system is running.
You can use this information for debugging purposes to see where the process spends the most amount of time: physical memory or virtual memory.
24
25
Switch Diagnostics
Displaying Processes
The show process command displays the status of ExtremeXOS processes on the switch, including how many times a process has been restarted. To display system processes, enter the following command: show process {<name>} {detail} {description} {slot <slotid>} Where: detail - Specifies more detailed process information. description - Provides the name of all of the processes or a description of the specified process. slotid - Specifies the MSM slot. (A or B) name - Specifies the name of the process. When you use this command without the optional keywords it displays summary process information. If you specify the slot keyword, summary information is displayed for that particular slot only. The show process and show process slot <slotid> commands display the following information in a tabular format:
CardThe name of the MSM where the processes are running (BlackDiamond switches only) Process NameThe name of the process VersionThe version number of the process RestartThe number of times the process has been restarted StateThe current state of the process as ready, stopped or no license Start TimeThe date and time the process began
If you specify the detail keyword, more specific and detailed process information is displayed. The show process detail and show process slot <slotid> detail commands display the following information in a multi-tabular format:
Detailed process information Memory usage configurations Recovery policies Process statistics Resource usage
You may find it useful to capture the process information under normal operating conditions to establish a baseline. If you experience a problem, you can use the baseline to identify the problem more easily.
26
27
Switch Diagnostics
CardThe name of the card where the process is running (BlackDiamond switches only) Process NameThe name of the process HelloThe number of hello messages sent to the process HelloAckThe number of hello acknowledgement messages received by the process manager Last Heartbeat TimeThe timestamp of the last health check received by the process manager (Unknown specifies kernel modules which do not participate in heartbeat monitoring)
This status information may be useful for your technical support representative if you have a ExtremeXOS problem. The heartbeat process information can also be displayed for a single process. For example: show heartbeat process tftpd You may find it useful to capture the process information under normal operating conditions to establish a baseline.
28
29
Switch Diagnostics
Terminating a Process
ExtremeXOS has the ability to terminate a process. This is useful if a process is stuck in a loop and is using excessive CPU or memory resources. To terminate a process, enter the following command: terminate process <name> [forceful | graceful] {msm <slot>} Where: name - Specifies the name of the process to terminate. You can terminate the following processes:
exsshd (only available if you have installed the SSH module) bgp eaps lldp - 802.1AB; Station and Media Access Control Connectivity Discover netLogin - Network Login includes MAC, Web-Based and 802.1X authentication ospf - Open Shortest Path First Routing Protocol telnetd - The telnet daemon. tftpd - The TFTP daemon. thttpd - The Web Server daemon. vrrp - Virtual Router Redundancy protocol deamon.
graceful - Specifies a graceful termination. The graceful option terminates the process by allowing it to close all opened connections, notify peers on the network, and other types of process cleanup. After this phase, the process is finally terminated. forceful - Specifies a forceful termination. The forceful option quickly terminates a process on demand. Unlike the graceful option, the process is immediately shutdown without any of the normal process cleanup. slot - Specifies the MSM where the process should be terminated. A specifies the MSM installed in slot A, and B specifies the MSM installed in slot B. For example: terminate process tftpd graceful a To get a description of what each process does, enter the following command: show process description
30
31
Switch Diagnostics
Starting a Process
The start process command can be used to restart a process that has been terminated by the administrator or has failed. To start a system process, enter the following command: start process <name> {msm <slot>} Where: name - Specifies the name of the process to start. You can terminate the following processes:
exsshd (only available if you have installed the SSH module) bgp eaps lldp - 802.1AB; Station and Media Access Control Connectivity Discover netLogin - Network Login includes MAC, Web-Based and 802.1X authentication ospf - Open Shortest Path First Routing Protocol telnetd - The telnet daemon. tftpd - The TFTP daemon. thttpd - The Web Server daemon. vrrp - Virtual Router Redundancy protocol deamon.
slot - Specifies the MSM where the process should be terminated. A specifies the MSM installed in slot A, and B specifies the MSM installed in slot B. For example: start process tftpd
Restarting Processes
To terminate and restart a specified process, enter the following command: restart process [class <cname> | <name> {msm <slot>}] Where: class_name - Specifies the name of a class of processes to restart. With this parameter, you can terminate and restart all instances of the processes associated with a specific routing protocol on all VRs. Supported process classes are OSPF and BGP. name - Specifies the name of a single process to restart. The supported processes are the same as the stop process and start process commands.
32
33
Switch Diagnostics
The total physical memory. The total memory used by the system. The total memory used by user processes. The total free memory. The card letter and slot number of the MSM. (BlackDiamond switches only) The name of each process. Current memory used by the process.
If you issue the command without any parameters, information about all of the MSMs installed in your system is displayed. Examples: show memory show memory slot a show memory process tftpd You may find it useful to capture the memory information under normal operating conditions to establish a baseline. If you observe a continuous decrease in the free memory over an extended period of time, and you have not altered your switch configuration, please contact Extreme Networks Technical Support.
34
35
Switch Diagnostics
36
37
Switch Diagnostics
Summary
You should now be able to:
Enable the System Health Check. Run diagnostics and verify diagnostic results. Identify which process is using the most CPU time. Monitor the CPU utilization by a process. Monitor process heartbeats. Terminate and start a process. Monitor system and a protocols memory.
38
39
Switch Diagnostics
Lab
Turn to the Switch Diagnostics Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
40
41
Switch Diagnostics
Review Questions
1 Which of the following is not included as a part of the ExtremeXOS diagnostic tool set? a Power-on self-test (POST) b Switch-wide communication-path packet error health checker. c On-demand system hardware diagnostics d Oscilloscope
2 Which of the following indicates how often the Power-on self-test (POST) is run? a The Power-on self-test (POST) runs every time the system is booted. b The Power-on self-test (POST) is run on demand by the administrator. c The Power-on self-test (POST) runs whenever a fault is detected by the system. d All of the above
3 Which of the following commands restores the I/O modules after a shutdown due to hardware problems? a reenable slot b clear sys-recovery-level c enable sys-recovery-level d None of the above
4 Which of the following commands invokes the internal diagnostic routines on the switch? a execute diagnostics b start diagnostics c run diagnostics d enable diagnostics
5 Which of the following describes what should be done prior to executing the internal diagnostics routines on the switch. a increase the power budget to the switch as the switch draws more power while in diagnostic mode b obtain special diagnostic software from the Extreme Networks web site c remove and reseat all hardware modules in the switch d take the switch offline
42
6 Which of the commands enable the administrator to begin monitoring CPU activity? a run cpu-monitoring b configure cpu-monitoring enable c enable cpu-monitoring d start cpu-monitoring
7 Which of the following commands displays the status of ExtremeXOS processes? a top 10 b show process c taskman d run process explorer
8 Which of the following commands enables the administrator to end a running process? a terminate process <name> b end process <name> c kill process <name> d delete process <name>
9 Which of the following commands enables the administrator to invoke a new process? a invoke process <name> b start process <name> c run process <name> d launch process <name>
10 Which of the following commands enables the administrator to monitor memory usage? a display memory b show resource-usage memory c show memory d display resource-usage memory
11 Which of the following commands displays memory utilization by the RIP protocol? a display rip memory b show memory rip c display memory rip d show rip memory
43
Switch Diagnostics This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http:// www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
44
18 Network Troubleshooting
Network Troubleshooting
Student Objectives
The Network Troubleshooting module presents a systematic methodology for troubleshooting, how to use the troubleshooting tools provided in Extreme Networks switches, and examples of how to identify common problems. Upon completion of this module, the successful student will be able to:
Identify the network management and maintenance systems that prepare you to troubleshoot. Describe the Layered approach used for troubleshooting. Identify useful commands for finding errors in OSI Layers 1, 2, and 3. Interpret the output of show commands. Use correct to troubleshoot problems at the Physical, Data Link, and Network Layers. List the steps required to perform systematic troubleshooting.
Network Troubleshooting
Overview
Troubleshooting is an important part of managing any network. This module presents a systematic methodology for troubleshooting, how to use the troubleshooting tools provided in Extreme Networks switches, and examples of how to identify common problems. The troubleshooting topics covered are:
Gathering and maintaining the information and tools necessary to troubleshoot the network. Organizing and applying a systematic method of troubleshooting. Identifying which commands to use to systematically troubleshoot a network problem. Describing how to test the operation of the switch.
Figure 2: Overview
Network Troubleshooting
Create an illustration of the physical connectivity of the network and keep it up to date. Create an illustration of the logical connectivity of the network and keep it up to date. Set up a Trivial File Transfer Protocol (TFTP) server and:
Store copies of the active and previous versions of configuration files and images, so that you can access them quickly in case of a problem. Make a backup of each switch configuration file on a regularly scheduled basis. Update the stored configuration files after making any changes.
Maintain a contact list of vendors, service suppliers, and users to inform in case of a problem. Store user names, passwords, and SNMP default community strings in a safe location and change (or remove) the default values. Record network problems, symptoms, and the resolution.
Establish baselines for network response time, and traffic statistics. Test connectivity and response time on a regularly scheduled basis and compare the response time to the baseline. Monitor traffic statistics on a regularly scheduled basis and compare the statistics to the baseline. Use Extreme Networks EPICenter to
Monitor alarms and events. Verify the physical and logical topology. Monitor network, VLAN, and port statistics. Set traffic thresholds. Store a syslog of switch activity.
Provide a clean/conditioned environment (air and power) and provide proper ventilation depending on hardware type. Some switches vent front to rear, others vent side to side. Software maintenance such as installing new software to fix bugs or add functionality.
Network Troubleshooting
Network Troubleshooting
First check the physical connectivity. Is the connector seated properly? Ensure that the physical medium connecting to the interface port is fault free. Isolate the problem by swapping cables with ports. Does the problem follow? Check the status of the LEDs. Use loop back plugs or a loop back cable to verify the link. Be aware of the surrounding environment for potential electro-mechanical interference (EMI).
Verify that the correct cables are being used. Distinguish between:
Media type Length of the cables Crossover cable versus straight cable
Verify that the port settings are configured properly. Common problems in port settings are:
Auto negotiation of speed and duplex is set incorrectly. The port is administratively disabled. Speed and duplex settings do not match the settings of the connected device. Load sharing configuration is set improperly.
10
11
Network Troubleshooting
The description for port LEDs in Table 1 applies to ports on the SummitX450 family of switches, Summit 200, Summit 300, and Summit 400.
The description for port LEDs in Table 2 applies to ports on the BlackDiamond 8800 series, BlackDiamond 10808 series, and non-POE ports on the BlackDiamond 12804 switches.
The description for port LEDs in Table 3 applies to POE ports with power enabled on the BlackDiamond 12804.
12
13
Network Troubleshooting
14
15
Network Troubleshooting
Primary Information
The show ports configuration command output shows:
The port number and virtual router. The port state as enabled (E) or disabled (D). The link status as ready (R), active (A), or not present (NP). If auto negotiation of speed and duplex is enabled (ON) or disabled (OFF). The link speed configured and if auto negotiation is enabled, the actual speed. The duplex mode configured and if auto negotiation is enabled, the actual duplex as half or full. Link media type for the primary and if configured, redundant port. Examples of media types are:
Unshielded Twisted Pair (UTP) Multimode Gigabit Interface Connector (MGBIC) Small Formfactor Pluggable (SFP)
Use this information to verify that the intended ports are enabled and active. Also verify that the speed, duplex and frame size match the other end of the physical connection. If the switch supports user-created virtual routers, verify that the VLAN router interface (RIF) is configured on the correct VR. Commands such as ping and tftp require that the VR be specified. The media type is useful if redundant fiber and copper ports are supported. In this case the port number is the same for both the fiber and copper port.
Secondary Information
The command output also shows:
If Ethernet flow control is enabled symmetrically in both directions (SYM) or asymmetrically in one direction (ASYM). 10Gbps ports can be asymmetrical. The load sharing master port if the port is participating in link aggregation.
Use this information to verify that the port settings and media type match the other end of the physical connection.
16
17
Network Troubleshooting
Transmit Collisions (TX Coll). The total number of collisions seen by the port, regardless of whether a device connected to the port participated in any of the collisions. Transmit Late Collisions (TX Late Coll). The total number of collisions that have occurred after the ports transmit window has expired. This could indicate a duplex setting mismatch. Transmit Deferred Frames (TX Deferred). The total number of frames that were transmitted by the port after the first transmission attempt was deferred by other network traffic. Transmit Errored Frames (TX Errors). The total number of frames that were not completely transmitted by the port because of network errors (such as late collisions or excessive collisions). Transmit Lost Frames (TX Lost). The total number of transmit frames that did not get completely transmitted because of buffer problems (FIFO underflow). Transmit Parity Frames (TX Parity). The bit summation has a parity mismatch.
Receive Bad CRC Frames (RX CRC). The total number of frames received by the port that were of the correct length, but contained a bad FCS value. This could indicate a duplex setting mismatch. Receive Oversize Frames (RX Over). The total number of good frames received by the port greater than the supported maximum length of 1,522 bytes. Receive Undersize Frames (RX Under). The total number of frames received by the port that were less than 64 bytes long. Receive Fragmented Frames (RX Frag). The total number of frames received by the port were of incorrect length and contained a bad FCS value. Receive Jabber Frames (RX Jabber). The total number of frames received by the port that was of greater than the support maximum length and had a Cyclic Redundancy Check (CRC) error. Receive Alignment Errors (RX Align). The total number of frames received by the port that occurs if a frame has a CRC error and does not contain an integral number of octets. In a shared Ethernet environment, alignment errors could be the result of collisions. Receive Frames Lost (RX Lost). The total number of frames received by the port that were lost because of buffer overflow in the switch.
18
19
Network Troubleshooting
Collision statistics for each port. The numbers 1 to 16 represent the number of collisions and subsequent retransmissions encountered prior to successfully transmitting the packet. Collision statistics are applicable only for half-duplex links.
Collisions are primarily a problem for shared Ethernet environments where devices are attached through a hub. If you see collisions, it indicates that someone has connected a hub to the switch port.
20
21
Network Troubleshooting
NOTE
Monitoring port utilization is useful to identify broadcast storms caused by loops in the network. Extreme Networks switches are non-blocking. So, links can be utilized up to 100% when there is a network loop.
Enter the show ports utilization command then toggle the screen using the space bar. The first two screens in the output show transmitted and received port byte and packet counts. Use this information to verify that the ports are passing traffic. The third screen in the show port utilization command output shows:
The port number, link status, and link speed. The current and peak port utilization received as a percentage of the maximum bandwidth. The current and peak port utilization transmitted as a percentage of the maximum bandwidth.
Use this information to verify that there are no Layer 2 forwarding loops. If a Layer 2 forwarding loop exists it causes a broadcast storm. During a broadcast storm the port utilization reaches close to 100%.
NOTE
If a forwarding loop exists it may take a minute of two for the utilization to show the broadcast storm.
To clear the port utilization counters, enter the following command: clear counters ports
22
23
Network Troubleshooting
The EDP interval timers and which ports have EDP enabled.
Use this information to verify that EDP is enabled on the intended ports and that the timers match the other end of the connection. The show edp ports all command output shows:
The SNMP sysname of each EDP neighbor on every active port. The MAC address of each EDP neighbor. The slot and port number of the other end of the connection. The age of the EDP entry. The number of VLANs supported on this link.
Use this information to verify that the ports are physically connected to the intended EDP neighbor on the intended port. You can also use this command for troubleshooting at the Data Link Layer because you get information about the VLANs on all neighboring switches.
24
Figure 13: Displaying Connectivity and Configuration Information for Neighboring EXTR Switches
25
Network Troubleshooting
Port Number Link Status The current status of the link. Options are:
Ready (the port is ready to accept a link) Active (the link is present at this port) Disabled (D): The link is disabled at this port. Not Present (NP): The link is not present at this port.
Transmit Collisions: The total number of collisions seen by the port, regardless of whether a device connected to the port participated in any of the collisions. Transmit Late Collisions: The total number of collisions that have occurred after the ports transmit window has expired. Transmit Deferred Frames: The total number of frames that were transmitted by the port after the first transmission attempt was deferred by other network traffic. Transmit Errored Frames: The total number of frames that were not completely transmitted by the port because of network errors (such as late collisions or excessive collisions). Transmit Parity Frames: The bit summation has a parity mismatch.
26
27
Network Troubleshooting
Switch 1 Symptoms
On a switch running in half duplex mode there are a lot of late collisions. The attached switch, running in full duplex mode, sends frames if there is data. It does not detect if the media is already used or not.
Switch 2 Symptoms
On a switch running in full duplex mode there are a lot of CRC errors. The attached switch, running in half duplex mode stops transmitting data each time it detects a collision. The illustration shows Switch 1, running in half duplex mode and Switch 2, running in full duplex mode. The show ports txerrors command on Switch 1 shows the late collisions. The show ports rxerrors command on Switch 2 shows the CRC errors. The following port receive error information is collected by the system:
Port Number Link Status The current status of the link. Options are:
Ready (the port is ready to accept a link) Active (the link is present at this port) Disabled (D): The link is disabled at this port. Not Present (NP): The link is not present at this port.
Receive Bad CRC Frames (RX CRC)The total number of frames received by the port that were of the correct length, but contained a bad FCS value. Receive Oversize Frames (RX Over)The total number of good frames received by the port greater than the supported maximum length of 1,522 bytes. Ports with jumbo frames enabled do not increment this counter. Receive Undersize Frames (RX Under)The total number of frames received by the port that were less than 64 bytes long. Receive Fragmented Frames (RX Frag)The total number of frames received by the port were of incorrect length and contained a bad frame check sequence (FCS) value. Receive Jabber Frames (RX Jabber)The total number of frames received by the port that were longer than the supported maximum length and had a Cyclic Redundancy Check (CRC) error. Receive Alignment Errors (RX Align)The total number of frames received by the port that have a CRC error and do not contain an integral number of octets. Receive Frames Lost (RX Lost)The total number of frames received by the port that were lost because of buffer overflow in the switch.
28
29
Network Troubleshooting
There might be protocol mismatches because of the different L2 protocols. The Ethernet II, IEEE 802.3, or LLC/SNAP setting causes the mismatch. A wrong driver in the Ethernet card of a server might also cause a mismatch.
Addressing Problems
Start by answering the following questions to identify possible addressing problems. Are there permanent MAC address entries in the Forwarding Database (FDB) which are incorrect? Is there a faulty or misconfigured device that is responding to all ARP requests on a VLAN or network? When troubleshooting spanning tree, answer the following questions:
Which mode of spanning tree are you using? Does your spanning tree domain layout and your VLAN layout work together? Is the VLAN in the correct spanning tree domain? Is spanning tree enabled for the VLAN?
VLAN Problems
When troubleshooting VLAN problems verify the following:
The ports are properly configured on the VLAN. Consistent VLAN tags are used.
If VLAN tags are not properly configured, your 802.1Q link cannot work. Remember that VLAN names are only locally significant but you should use a consistent naming scheme, to prevent confusion and obstruct troubleshooting.
The VLAN name is not a reserved word or the name includes special characters that are not allowed or the switch will not accept the name.
VLAN names consist of alphanumeric characters, must begin with an alphabetical letter, no spaces are allowed, and special characters are only allowed if the VLAN name is enclosed by quotation marks.
The protocol filter is set to ANY or the desired protocol filter when using protocol based VLANs. When the filter is set to NONE, protocol based VLANS will not work. The protocol filter is set to NONE when a special protocol filter is deleted. The port you are adding is not already added to a different VLAN untagged or you will receive an error message.
30
31
Network Troubleshooting
32
33
Network Troubleshooting
Primary Information
The show fdb command output shows:
The Ethernet MAC address of each learned device in the forwarding database. The VLAN where the device is a member. The port where the address is learned.
For troubleshooting Layer 2 and Layer 3, verify that the expected device is physically connected to the port and is being learned. Verify that the entry is not a black hole. Verify that the device is in the right VLAN(s).
Secondary Information
The show fdb command output also shows:
The age of the FDB entry. The FDB statistics on total learned, static, locked, permanent, dynamic, dropped, locked, and locked with a timer. The age timer and VPLS age timer.
If the entry is learned dynamically (d) or configured statically (s). If the entry is permanent (p). If the entry is locked down or locked with a timer (l, L). If the entry is on a port being used as the mirror port (M). If the entry is created by NetLogin (n).
Use the following command to clear dynamic FDB entries: clear fdb {<mac_address> | locked-mac <mac_address> | vlan <vlan name> | ports <portlist>}
34
35
Network Troubleshooting
If the VLAN is enabled or disabled. If the VLAN is tagged and what the tag is. The virtual router where this VLAN is assigned. The IP address and subnetwork mask of the router interface of this VLAN. If loopback mode is enabled. The tagged and untagged ports assigned to this VLAN. Flags indicating if each port is:
active (*). disabled (!). part of a load sharing group (g). blocked for this VLAN (b).
For Layer 1 problems verify that the port is enabled, active, and part of or not part of a load sharing group. For Layer 2 problems verify that the port is:
For Layer 3 related problems, verify that the following are correct:
36
37
Network Troubleshooting
The IPv6 address if one is assigned. The Spanning Tree Protocol Domain (STPD) name if one is assigned. The VLAN protocol filter name if one is assigned. If the NetLogin security feature is enabled. The name of the QOS policy file used to assign quality of service to packets on this VLAN if one is assigned. Flags indicating if each port is authenticated (a) or unauthenticated (u) for this VLAN by Netlogin.
For Layer 1 problems verify the port is authenticated if applicable. For Layer 2 problems verify that the VLAN:
is in the correct Spanning Tree domain. has the correct protocol filter if applicable. is correctly configured for security and QOS features if applicable.
38
39
Network Troubleshooting
40
41
Network Troubleshooting
Every device must have a unique host address. Devices with the same subnetwork address have to be within the same VLAN. When devices are in separate VLANs, those VLANs must have different subnetwork addresses and the devices providing connectivity between them must be configured to forward Layer 3 traffic. Every device involved in Layer 3 forwarding must have a route to reach the network of the destination IP address or have a default route to the right gateway.
Routing Advertisements
Extreme Networks switches do not advertise routes if:
The VLAN does not have an IP address assigned to it. IP Forwarding is not enabled for that VLAN. The VLAN has not been added to the Routing Protocol. The Routing Protocol has not been enabled globally.
Does the switch discover its neighbors and establish adjacencies? Are all routers in the same area? Is OSPF enabled on the VLAN and globally? Are the timers correct? Are the Link State Databases synchronized? Is a link state advertisement (LSA) missing? Is SPF running too often because of flapping links? Is authentication used, ECMP enabled, and the Router ID unique?
In a stable network, the Link State Database (LSDB) does not change much. One way to determine whether the entries in the LSDB are changing is to monitor the checksum and SPF runs. These are indicators of how often the LSDB is changing. Using multiple areas there are issues concerning stub area, NSSA, default routes, ABRs, ASBRs, Virtual Links, Route Summarization and more.
42
43
Network Troubleshooting
The name of the VLAN. The IP address and subnetwork mask of the router interface. If IP forwarding (f) is enabled. If OSPF is enabled on the VLAN (o). If RIP is enabled on the VLAN (r). If the VLAN loopback is enabled (L).
44
45
Network Troubleshooting
The name of the VLAN. The IP address and subnetwork mask of the router interface. If IP forwarding (f) is enabled. If the interface is enabled (E) and active (U).
The interface is up IP forwarding is enabled The interface has the correct IP address and subnetwork mask
46
47
Network Troubleshooting
The destination network. The next hop gateway. The preferred route for unicast and multicast traffic. The duration of time this route has been in the routing table.
Use this information to verify that the destination network is in the routing table. Verify where the packets are being sent for a particular designating network. Also verify if the preferred route is the intended route. If a destination network is unreachable, check the following:
Every router in the path knows the destination network The default gateway is in the correct direction The return path is correct
Verify that directly connected routes are used when IP route sharing is enabled using Equal Cost Multi Paths (ECMP). For IP route sharing directly connected routes should be used instead of other routes even if the cost or relative route priority of the other routes has been manually set. The type of route entry flags show:
The route is Dynamic (D). The route is a Black hole (B). The route is a Gateway (G). The route is a Host Route (H). The route is a Label Distribution Protocol (LDP) Label Switch Path (LSP). The route is an indirect LDP LSP. (i) The route is a multicast (m) or unicast (u) route. The route is a Longest Prefix Match (LPM) route (P). The route is modified (R). The route is a Static route (S). The route is a Resource Reservation Protocol (RSVP) Traffic Engineering (TE) LSP. (T) The route is an indirect RSVP-TE LSP. (t) The route is up (U).
48
49
Network Troubleshooting
Directly connected interfaces (d) Border Gateway Protocol (bg), External BGP (be), or Internal BGP (bi) BootP (bo) Core Based Tree (CBT) multicast routing protocol (ce) Down Interface (df) Distance-vector Multi Routing Protocol (dv) Intermediate System - Intermediate System (ISIS) level-1 external (e1) (ExtremeWare only) Intermediate System - Intermediate System level-2 external (e1) (ExtremeWare only) ISIS level-1 internal (i1) and ISIS level-2 internal (i2) (ExtremeWare only) Hardcoded (h) Internet Control Message Protocol (ICMP) (i) Multicast Border Gateway Protocol (MBGP) (mb), MBGP external (mbe), or MBGP internal (mbi) Multicast Open Shortest Path First (MOSPF) (mo) OSPF external LSA type 1 (o1) and OSPF external LSA type 2 (o2) OSPF intranetwork (oa) and OSPF internetwork (or) OSPF external Autonomous System (oe) Protocol Independent Multicast - Dense Mode (pd), PIM-Sparse Mode (ps) Routing Information Protocol (RIP) (r) Route Advertisement (ra) Static (s) Server Load Balance (SLB) virtual server IP (VIP) (sv) (ExtremeWare only) Unknown (un)
Use this information to determine the source of the routes. This is useful for the following:
When using route redistribution When troubleshooting routing loops When unexpected routes are showing up in the routing table
Directly connected routes have a relative route priority of 10. Relative route priorities cannot be modified for directly connected routes or black hole routes. Redistribution of RIP routes into OSPF results in OSPF external routes with different relative priorities.
50
51
Network Troubleshooting
Each Ethernet MAC address that has been mapped by ARP. The IP address mapped to the MAC address. If the entry is marked incomplete, it means the switch is arping for an IP address that is not responding. The port on which the MAC address is located. The VLAN on which the MAC address is located. The virtual router associated with the VLAN on which the MAC address is located. A list of all duplicate IP addresses detected.
Use this information to verify that each IP address is mapped to a single MAC address. Duplicate IP addresses are a very common misconfiguration and can cause confusing and unpredictable behavior. Also verify that the IP address is in the correct VLAN and subnetwork. To remove dynamic entries in the IP ARP table, enter the following command: clear iparp {<ip address> | vlan <vlan name>}
Secondary Information
The show iparp command output also shows:
If the ARP mapping entry is statically configured. The age of the entry in seconds. Statistics for:
The current number of dynamic and static entries. The current number of pending entries. The ARP request is sent but no response has been received so far. The number of ARP requests received (in request), ARP responses transmitted (out response), ARP requests sent (out request), and ARP responses received (in response). The number of failed requests. A request was sent but no response was ever received. The number of received ARP responses that were rejected due to some protocol error in the packet. For all ARP responses that were rejected what is the count, port, IP address, and interface.
The maximum number of ARP entries and ARP pending replies configured or supported on this switch. Whether ARP address checking and ARP refresh are enabled. Checking checks if the ARP Request source IP address is within the range of the local interface. Disabling ARP refresh stops the sending of any ARP requests before the ARP entry times out. The ARP entry age timeout.
Use this information to verify that ARP is working correctly. Also use this to verify that the proxy ARP server is responding
52
53
Network Troubleshooting
If OSPF is enabled. The router ID and whether it is configured or automatically assigned. If this router is an ASBR or ABR. If the router ID is configured or automatically selected.
Use this information to verify that OSPF is enabled globally on the router. Verify that the router ID is configured correctly. Virtual links are built using the router ID. Verify that the router is acting in the right role: Interior Router, ABR, or ASBR.
54
55
Network Troubleshooting
56
57
Network Troubleshooting
Packet statistics and error statistic for IP. Packet statistics and error statistic for the Internet Control Message Protocol (ICMP). Packet statistics and error statistic for the Internet Group Management Protocol (IGMP).
Use the IP statistics to identify if errors are causing the protocol to fail or converge slowly. Use the ICMP statistics to identify if errors are causing connectivity failures or ping response failures. Use the ICMP statistics to identify if errors are causing problems with multicast routing.
The IP address and network mask of the router interface Packets and Bytes in and out Multicast and Broadcast packets in and out Packets with errors and discarded packets Packets received of a unknown protocol type
58
59
Network Troubleshooting
NOTE
If you ping a router interface that is configured on the switch and is active, the router interface responds with an ICMP echo response even if IP forwarding is not enabled. The router interface may appear to be forwarding packets at Layer 3 even though it is not.
Use the following command to trace the routed path between the switch and a destination end station.: traceroute {vr <vrid>} {ipv4 <host>} {ipv6 <host>} {ttl <number>} {from <from>} {[port <port>] | icmp} Traceroute works by increasing the time-to-live (TTL) value of each successive batch of packets sent. The first three packets have a time-to-live (TTL) value of one (implying that they make a single hop). The next three packets have a TTL value of 2, and so on. The command output shows the IP address of the router interface at each hop along the path and the number of milliseconds it took each packet to receive an ICMP time exceeded packet from that interface. The command continues until the user enters Ctrl-c to abort the command. The traceroute command is useful in determining which route a packet is taking when multiple routes are available. It is also useful in identifying firewalls that may be blocking access to a site. If the trace route cannot reach the destination the command output identifies the reason why. Failures can be due to:
ICMP network unreachable - There is no path. Check the routing table. Make sure you are specifying the correct virtual router. Make sure IP forwarding is enabled. ICMP host unreachable - Make sure you entered the correct address. ICMP fragmentation needed - The packet is too large for one of the routers in the path. Enable fragmentation on the router. ICMP source route failed - Source routing is seldom supported. Transmit error - Check IP statistics for IP errors.
60
61
Network Troubleshooting
NOTE
Part of the output is omitted from the illustration. What is displayed is the overview of the router interfaces because that is what is important.
For the VLAN named noipforwarding, IP forwarding is not enabled. This is the cause of the problem.
62
63
Network Troubleshooting
64
65
Network Troubleshooting
NOTE
This command is very processor intensive and will affect switch performance when run. Use this command only under the guidance of Extreme Networks Technical Support personnel to view your switch configurations and to troubleshoot the switch.
For EXOS switches, you will likely be directly to record the text output from show tech, save it to a file, and then send it to Technical Support. The show tech command displays the output of the following show commands in Table 4 among others:
If you enter the detail keyword, the following show output is displayed, among others:
show log show log configuration show log counters all show process detail
Depending on the software version running on your switch, the configurations running of your switch, and the type of switch you have, additional or different show commands and configuration output might be displayed.
66
67
Network Troubleshooting
A link going down. A user logging in. A command entered on the command line. The software executing a debugging statement.
A timestamp of when the event was logged. The timestamp is in the format yyyy-mm-dd,hh:mm:ss. The sending devices IP Address. The IP Port number used for receiving log messages. 23 in the example. The Syslog Facility number 7 is the default for Extreme Networks devices. The protocol reporting the event. OSPF in this example. The actual log message.
Start Intra area SPF Area 0.0.0.10. (The start of an SPF run for area 0.0.0.10) Start IntraArea Route Table update SPF area 0.0.0.10. (The start of the routing table update) End IntraArea Route Table update area 0.0.0.10. (The end of the routing table update) End IntraArea Spf Area 0.0.0.10. (The end of an SPF run for area 0.0.0.10) NOTE
The syslog facility can be set to different values and the receiver can be programmed to treat different facility levels uniquely.
68
69
Network Troubleshooting
Timestamp - records the month and day of the event, along with the time (hours, minutes, seconds, and hundredths of a second). Severity Level - indicates the urgency of a condition reported in the log. Severities include critical, error, warning, notice, info, debug-summary, debug-verbose, and debug-data. Component, Subcomponent, and Condition Name - describes the subsystem in the software that generates the event. This provides a good indication of where a fault might be. Message - A description of the event occurrence. If the event was caused by a user, the user name is also provided.
Use this information in the same way you use the remote system logging messages. Logging of CLI configuration commands must be enabled. The switch log overwrites existing log messages in a wrap-around memory buffer.
70
71
Network Troubleshooting
Ask questions to clearly define the problem. Gather information about the network. Consider escalating the problem to someone with additional expertise. The goal is to reach a resolution as fast as possible. Determine if the problem can be consistently reproduced or if it is intermittent. Document the history of the problem. Identify when the problem was first noticed and what events preceded the problem occurrence. Locate information about similar problems. This may indicate possible sources of the problem. Develop theories about what could be wrong. Start with simple ideas and advance to more complex issues. Test theories starting with the most inexpensive and simple, then test the more expensive and complex theories until the solution is found. Always document the problem, theories, tests, and end resolution. Retain the problem documentation and make it available for future troubleshooting.
72
73
Network Troubleshooting
What are the symptoms? Is the problem reproducible? How long has the problem been happening? How often does the problem happen? When does the problem happen? Is the issue affecting only one device or a large portion of the network? Is the issue isolated within a VLAN or does it also affect Layer 3 functions? How many users are affected? Which applications are affected? Does the problem seem to be related to the network load? Does the problem seem related to a new network installation or change? Was the network previously operating properly?
How long was the network operational prior to this issue arising?
74
75
Network Troubleshooting
A detailed network diagram with all connected devices, network addresses, and physical media types
You have to know your network in a stable situation, so that you know what to expect when looking at the status of the network.
Availability reports Records of recent changes made to the network Current status of devices and connections Event and error logs
Keep manuals and release notes of implemented equipment ready to use. Make sure that everybody involved in troubleshooting has access to this information.
76
77
Network Troubleshooting
Consider Escalation
Before you escalate a problem to technical support, ask the following:
What is the impact on the users? What is the impact on the resiliency of the network? What is the cost per day of the problem? Does the problem seem to be in an area you have expertise in? How much time has already been spent on troubleshooting? What is covered in your support contract?
Escalating does not mean you have to stop troubleshooting. Escalation is most effective when you provide a good problem description and all relevant network information.
Your company name and the phone number of the contact Serial number(s) of the switch chassis and additional module(s) Service contract number Detailed problem description Output of the following commands:
show version show switch show configuration show tech-support or show diagnostics show log run diagnostics extended
78
79
Network Troubleshooting
Testing Theories
A layered approach gives structure to the troubleshooting process. Use the OSI model to structure tests. Start testing the lowest layers first then work your way up the OSI layers. For example: 1. Use the link Light Emitting Diodes (LEDs), show commands, and physical inspection of the cable to verify the Physical Layer. 2. Use the ping command, verify packet statistics, verify port settings, and verify the Layer 2 forwarding tables to test Layer 2 connectivity. 3. Use an end-to-end ping command, trace route command, verify Layer 3 configuration, and verify Layer 3 route tables to test Layer 3 connectivity. 4. Use telnet, FTP, TFTP, or SNMP to test protocols at the top three layers. If the test results support the theory, go on to implementing a solution. If the test results do not support the theory, go back to test a new theory.
80
81
Network Troubleshooting
Implementing a Solution
After you implement a solution, recheck the status of the problem. If there is still a problem, go back to either gather more information or test different theories. The symptoms of the problem might change as a result of the troubleshooting actions. If you did not improve the situation by your action, consider undoing the actions.
82
83
Network Troubleshooting
The symptoms The time and frequency of the symptom The theories tested The theory that proved to be correct The solution The root cause of the problem Any ideas of how to recognize this same problem in the future How long the network operation was affected
84
85
Network Troubleshooting
Summary
The Network Troubleshooting module presented basic concepts of network troubleshooting and the show commands to use. You should now be able to:
Identify the network management and maintenance systems that prepare you to troubleshoot. Define the steps to perform systematic troubleshooting. Describe the layered approach for troubleshooting. Identify useful commands for finding errors at each layer. Interpret the output of show commands. Troubleshoot problems at the Physical, Data Link, and Network Layers.
86
87
Network Troubleshooting
Lab
Turn to the Troubleshooting Lab in the ExtremeXOS Operations and Configuration - Lab Guide, Rev. 12.1 and complete the hands-on portion of this module.
88
89
Network Troubleshooting
Review Questions
1 Which of the following terms identifies Extreme Networks approach to troubleshooting? a Layered approach b Distributed analysis c Proactive preemption d None of the above 2 Which of the following can effect physical connectivity? a cables b patch panels c connector ports d All of the above 3 Which of the following LED states indicates that the link is down? a Solid green b Green blinking c Off d Solid Amber 4 Which of the following commands is appropriate for troubleshooting Layer-1 connectivity issues? a show ospf configuration b show port configuration c show vlan configuration d All of the above 5 Which of the following commands enables you to reset port statistics values? a clear counters ports b configure port counters reset c disable port counters d zero port counters 6 Which of the following commands enables you to retest the Layer 2 forwarding database? a reset fdb b clear fdb c zero fdb d fdb clear
90
7 Which of the following commands enables you to display the contents of the Layer 2 forwarding database? a fdb show b fdb display c show fdb d display fdb 8 Which of the following commands provides a detailed display of the VLAN configuration? a display vlan configuration detail b display vlan detail c show vlan configuration detail d show vlan detail 9 Which of the following commands enables you to display the contents of the IP routing table? a traceroute b clear iproute c show iproute d show routing table 10 Which of the following commands enables you to display the contents of the ARP table? a show arp b show iparp c arp d iparp
91
Network Troubleshooting This presentation contains forward-looking statements that involve risks and uncertainties, including statements regarding our expectations as to products, trends and our performance. There can be no assurances that any forward-looking statements will be achieved, and actual results could differ materially from forecasts and estimates. For factors that may affect our business and financial results please refer to our filings with the Securities and Exchange Commission, including, without limitation, under the captions: Managements Discussion and Analysis of Financial Condition and Results of Operations, and Risk Factors, which is on file with the Securities and Exchange Commission (http:// www.sec.gov). We undertake no obligation to update the forward-looking information in this release.
92