Avaya Virtual Services Platform 7000 Configuration
Avaya Virtual Services Platform 7000 Configuration
Avaya Virtual Services Platform 7000 Configuration
All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves the right to make changes and corrections to the information in this document without the obligation to notify any person or organization of such changes. Documentation disclaimer Documentation means information published by Avaya in varying mediums which may include product information, operating instructions and performance specifications that Avaya generally makes available to users of its products. Documentation does not include marketing materials. Avaya shall not be responsible for any modifications, additions, or deletions to the original published version of documentation unless such modifications, additions, or deletions were performed by Avaya. End User agrees to indemnify and hold harmless Avaya, Avaya's agents, servants and employees against all claims, lawsuits, demands and judgments arising out of, or in connection with, subsequent modifications, additions or deletions to this documentation, to the extent made by End User. Link disclaimer Avaya is not responsible for the contents or reliability of any linked websites referenced within this site or documentation provided by Avaya. Avaya is not responsible for the accuracy of any information, statement or content provided on these sites and does not necessarily endorse the products, services, or information described or offered within them. Avaya does not guarantee that these links will work all the time and has no control over the availability of the linked pages. Warranty Avaya provides a limited warranty on its hardware and Software (Product(s)). Refer to your sales agreement to establish the terms of the limited warranty. In addition, Avayas standard warranty language, as well as information regarding support for this Product while under warranty is available to Avaya customers and other parties through the Avaya Support website: http://support.avaya.com. Please note that if you acquired the Product(s) from an authorized Avaya reseller outside of the United States and Canada, the warranty is provided to you by said Avaya reseller and not by Avaya. Software means computer programs in object code, provided by Avaya or an Avaya Channel Partner, whether as stand-alone products or pre-installed on hardware products, and any upgrades, updates, bug fixes, or modified versions. Licenses THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA WEBSITE, HTTP://SUPPORT.AVAYA.COM/LICENSEINFO ARE APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER (AS APPLICABLE) UNDER A COMMERCIAL AGREEMENT WITH AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA AFFILIATE OR AN AVAYA AUTHORIZED RESELLER; AVAYA RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE USING OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING, DOWNLOADING OR USING THE SOFTWARE (HEREINAFTER REFERRED TO INTERCHANGEABLY AS YOU AND END USER), AGREE TO THESE TERMS AND CONDITIONS AND CREATE A BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THE APPLICABLE AVAYA AFFILIATE (AVAYA).
Avaya grants you a license within the scope of the license types described below, with the exception of Heritage Nortel Software, for which the scope of the license is detailed below. Where the order documentation does not expressly identify a license type, the applicable license will be a Designated System License. The applicable number of licenses and units of capacity for which the license is granted will be one (1), unless a different number of licenses or units of capacity is specified in the documentation or other materials available to you. Designated Processor means a single stand-alone computing device. Server means a Designated Processor that hosts a software application to be accessed by multiple users. Licence types Designated System(s) License (DS). End User may install and use each copy of the Software only on a number of Designated Processors up to the number indicated in the order. Avaya may require the Designated Processor(s) to be identified in the order by type, serial number, feature key, location or other specific designation, or to be provided by End User to Avaya through electronic means established by Avaya specifically for this purpose. Heritage Nortel Software Heritage Nortel Software means the software that was acquired by Avaya as part of its purchase of the Nortel Enterprise Solutions Business in December 2009. The Heritage Nortel Software currently available for license from Avaya is the software contained within the list of Heritage Nortel Products located at http://support.avaya.com/ LicenseInfo under the link Heritage Nortel Products. For Heritage Nortel Software, Avaya grants Customer a license to use Heritage Nortel Software provided hereunder solely to the extent of the authorized activation or authorized usage level, solely for the purpose specified in the Documentation, and solely as embedded in, for execution on, or (in the event the applicable Documentation permits installation on non-Avaya equipment) for communication with Avaya equipment. Charges for Heritage Nortel Software may be based on extent of activation or use authorized as specified in an order or invoice. Copyright Except where expressly stated otherwise, no use should be made of materials on this site, the Documentation, Software, or hardware provided by Avaya. All content on this site, the documentation and the Product provided by Avaya including the selection, arrangement and design of the content is owned either by Avaya or its licensors and is protected by copyright and other intellectual property laws including the sui generis rights relating to the protection of databases. You may not modify, copy, reproduce, republish, upload, post, transmit or distribute in any way any content, in whole or in part, including any code and software unless expressly authorized by Avaya. Unauthorized reproduction, transmission, dissemination, storage, and or use without the express written consent of Avaya can be a criminal, as well as a civil offense under the applicable law. Third Party Components Third Party Components mean certain software programs or portions thereof included in the Software that may contain software (including open source software) distributed under third party agreements (Third Party Components), which contain terms regarding the rights to use certain portions of the Software (Third Party Terms). Information regarding distributed Linux OS source code (for those Products that have distributed Linux OS source code) and identifying the copyright holders of the Third Party Components and the Third Party Terms that apply is available in the Documentation or on Avayas website at: http:// support.avaya.com/Copyright. You agree to the Third Party Terms for any such Third Party Components. Preventing Toll Fraud Toll Fraud is the unauthorized use of your telecommunications system by an unauthorized party (for example, a person who is not a corporate employee, agent, subcontractor, or is not working on your company's behalf). Be aware that there can be a risk of Toll Fraud
May 2013
associated with your system and that, if Toll Fraud occurs, it can result in substantial additional charges for your telecommunications services. Avaya Toll Fraud intervention If you suspect that you are being victimized by Toll Fraud and you need technical assistance or support, call Technical Service Center Toll Fraud Intervention Hotline at +1-800-643-2353 for the United States and Canada. For additional support telephone numbers, see the Avaya Support website: http://support.avaya.com. Suspected security vulnerabilities with Avaya products should be reported to Avaya by sending mail to: [email protected]. Trademarks The trademarks, logos and service marks (Marks) displayed in this site, the Documentation and Product(s) provided by Avaya are the registered or unregistered Marks of Avaya, its affiliates, or other third parties. Users are not permitted to use such Marks without prior written consent from Avaya or such third party which may own the Mark. Nothing contained in this site, the Documentation and Product(s) should be construed as granting, by implication, estoppel, or otherwise, any license or right in and to the Marks without the express written permission of Avaya or the applicable third party. Avaya is a registered trademark of Avaya Inc. All non-Avaya trademarks are the property of their respective owners, and Linux is a registered trademark of Linus Torvalds. Downloading Documentation For the most current versions of Documentation, see the Avaya Support website: http://support.avaya.com. Contact Avaya Support See the Avaya Support website: http://support.avaya.com for product notices and articles, or to report a problem with your Avaya product. For a list of support telephone numbers and contact addresses, go to the Avaya Support website: http://support.avaya.com, scroll to the bottom of the page, and select Contact Avaya Support.
May 2013
May 2013
May 2013
Displaying the unicast FIB......................................................................................................................... 72 Displaying the multicast FIB...................................................................................................................... 73 Displaying SPBM drop statistics............................................................................................................... 74 Displaying LSP summary information....................................................................................................... 75 Displaying IS-IS adjacencies..................................................................................................................... 75 Configuring IS-IS globally.......................................................................................................................... 77 Configuring system level IS-IS parameters............................................................................................... 79 Configuring IS-IS interfaces...................................................................................................................... 80 Configuring IS-IS interface level parameters............................................................................................ 82 Configuring an IS-IS Manual Area............................................................................................................ 83 Displaying IS-IS system statistics............................................................................................................. 84 Displaying IS-IS interface counters........................................................................................................... 85 Displaying IS-IS interface control packets................................................................................................ 86 Chapter 6: Layer 2 VSN configuration fundamentals...................................................... 89 SPBM L2 VSN........................................................................................................................................... 89 SPBM L2 VSN sample operation.............................................................................................................. 91 Chapter 7: Layer 2 VSN configuration using ACLI.......................................................... 99 Configuring a SPBM Layer 2 VSN C-VLAN.............................................................................................. 99 Configuring a SPBM Layer 2 VSN Switched UNI..................................................................................... 100 Displaying C-VLAN and Switched UNI I-SID information......................................................................... 102 Chapter 8: Layer 2 VSN configuration using EDM........................................................... 107 Configuring SPBM Layer 2 VSN C-VLANs............................................................................................... 107 Displaying the MAC address table for a C-VLAN..................................................................................... 108 Configuring SPBM switched UNIs............................................................................................................. 109 Chapter 9: CFM fundamentals........................................................................................... 111 MD............................................................................................................................................................. 111 MA............................................................................................................................................................. 112 MEP.......................................................................................................................................................... 113 Fault verification........................................................................................................................................ 114 LBM........................................................................................................................................................... 114 Layer 2 ping.............................................................................................................................................. 114 Fault isolation............................................................................................................................................ 115 LTM........................................................................................................................................................... 115 Layer 2 traceroute..................................................................................................................................... 116 Layer 2 tracetree....................................................................................................................................... 117 MIP............................................................................................................................................................ 117 Nodal MPs................................................................................................................................................. 117 Configuration considerations.................................................................................................................... 117 Chapter 10: CFM configuration using ACLI...................................................................... 119 Configuring CFM....................................................................................................................................... 119 Triggering a LBM Layer 2 ping.................................................................................................................. 121 Triggering a LTM Layer 2 traceroute......................................................................................................... 123 Triggering a LTM Layer 2 tracetree........................................................................................................... 124 Chapter 11: CFM configuration using EDM...................................................................... 127 Configuring CFM....................................................................................................................................... 127 Displaying CFM MD.................................................................................................................................. 128 Displaying CFM MA.................................................................................................................................. 129
May 2013
Displaying CFM MEP................................................................................................................................ Configuring Layer 2 ping........................................................................................................................... Initiating a Layer 2 traceroute................................................................................................................... Viewing Layer 2 traceroute results............................................................................................................
Glossary...............................................................................................................................
May 2013
May 2013
Chapter 1: Introduction
Purpose
This document provides instructions to configure Shortest Path Bridging (SPB) on the Avaya Virtual Services Platform 7000 Series. Operations include Shortest Path Bridging MAC (SPBM), Intermediate System to Intermediate System (IS-IS), Layer 2 Virtual Service Networks (VSN) and Connectivity Fault Management (CFM).
Related resources
Documentation
For a list of the documentation for this product, see Avaya Virtual Services Platform 7000 Documentation Roadmap (NN47202103).
May 2013
Introduction
Training
Ongoing product training is available. For more information or to register, see http://avayalearning.com/. Enter the course code in the Search field and click Go to search for the course.
Course code 7D00080W 7D00085V 7D00085I Course title Avaya Stackable ERS and VSP Product Overview Stackable ERS & VSP Installation, Configuration and Maintenance Stackable ERS & VSP Installation, Configuration and Maintenance
Support
Visit the Avaya Support website at http://support.avaya.com for the most up-to-date documentation, product notices, and knowledge articles. You can also search for notices, release notes, downloads, user guides, and resolutions to issues. Use the Web service request system to create a service request. Chat with live agents to get answers to questions. If an issue requires additional expertise, agents can quickly connect you to a support team.
10
May 2013
May 2013
11
12
May 2013
May 2013
13
MAC-in-MAC encapsulation
To forward customer traffic across the core network backbone, SPBM uses IEEE 802.1ah Provider Backbone Bridging (PBB) MAC-in-MAC encapsulation, which hides the customer MAC (C-MAC) addresses in a backbone MAC (B-MAC) address pair. MAC-in-MAC encapsulation defines a BMAC-DA and BMAC-SA to identify the backbone destination and source addresses. The originating node creates a MAC header that is used for delivery from end to end. As the MAC header stays the same across the network, there is no need to swap a label or do a route lookup at each node, allowing the frame to follow the most efficient forwarding path end to end. The encapsulation of customer MAC addresses in backbone MAC addresses greatly improves network scalability, as no end-user MAC learning is required in the backbone, and also significantly improves network robustness, as customer-introduced network loops have no effect on the backbone infrastructure.
I-SID
SPBM introduces a service instance identifier called I-SID. SPBM uses I-SIDs to separate services from the infrastructure. After you create an SPBM infrastructure, you can add additional services (such as VLAN extensions) by provisioning the endpoints only. The SPBM endpoints are Backbone Edge Bridges (BEBs), which mark the boundary between the core MAC-in-MAC SPBM domain and the edge customer 802.1Q domain. I-SIDs are provisioned on the BEBs to be associated with a particular service instance. In the SPBM core, the bridges are Backbone Core Bridges (BCBs). BCBs forward encapsulated traffic based on the BMACDA. The SPBM B-MAC header includes an I-SID. The length of the ISID is 32 bits with a 24bit ID. I-SIDs identify and transmit virtualized traffic in an encapsulated SPBM frame. These ISIDs are used in a VSN for VLANs across the MAC-in-MAC backbone: Note: I-SID configuration is required only for virtual services such as Layer 2 VSN.
14
May 2013
May 2013
15
the customer VLANs (C-VLAN) and the Backbone. Switches B and C are the Backbone Core Bridges (BCB) that form the core of the SPBM network.
SPBM uses IS-IS in the core so that all BEBs and BCBs learn the IS-IS System-ID (B-MAC) of every other switch in the network. For example, BEB-A uses IS-IS to build an SPBM unicast forwarding table containing the B-MAC of switches BCB-B, BCB-C, and BEB-D. The BEBs provide the boundary between the SPBM domain and the virtualized services domain. For a Layer 2 VSN service, the BEBs map a C-VLAN to an I-SID based on local service provisioning. Any BEB in the network that has the same I-SID configured can participate in the same Layer 2 VSN. In this example, BEB A and BEB D are provisioned to associate C-VLAN 20 with I-SID 100. When BEB A receives traffic from C-VLAN 20 that must be forwarded to the far-end location, it performs a lookup and determines that C-VLAN 20 is associated with I-SID 100 and that BEB D is the destination for I-SID 100. BEB A then encapsulates the data and C-MAC header into a new B-MAC header, using its own nodal B-MAC: A as the source address and B-MAC: D as the destination address. BEB A then forwards the encapsulated traffic to BCB B. To forward traffic in the core toward the destination node D, BCB B and BCB C perform Ethernet switching using the B-MAC information only. At BEB D, the node strips off the B-MAC encapsulation, and performs a lookup to determine the destination for traffic with I-SID 100. BEB D identifies the destination on the C-VLAN header as C-VLAN 20 and forwards the packet to the appropriate destination VLAN and port.
16
May 2013
IS-IS
IS-IS
To provide a loop-free network and to learn and distribute network information, SPBM uses the Intermediate-System-to-Intermediate-System (IS-IS) link state routing protocol. IS-IS is designed to find the shortest path from any one destination to any other in a dynamic fashion. IS-IS creates any-to-any connectivity in a network in an optimized, loop-free manner, without the long convergence delay experienced with the Spanning Tree Protocol. IS-IS does not block ports from use, but rather employs a specific path. As such, all links are available for use. IS-IS is a link-state, interior gateway protocol that was developed for the International Organization for Standardization (ISO). ISO terminology refers to routers as Intermediate Systems (IS), hence the name Intermediate System-to-Intermediate System (IS-IS). SPBM eliminates the need for multiple overlay protocols in the core of the network by reducing the core to a single Ethernet-based, link-state protocol (IS-IS). IS-IS provides virtualization services , using a pure Ethernet technology base. SPBM also uses IS-IS to discover and advertise the network topology, which enables it to compute the shortest path to all nodes in the SPBM network. IS-IS dynamically learns the topology of a network and constructs unicast and multicast mesh connectivity. Each node in the network calculates a shortest-path tree to every other network node based on System-IDs (B-MAC addresses). Unlike in an IP Open Shortest Path First (OSPF) environment, the SPBM use of IS-IS does not require transport of any IP addressing for topology calculations. In the SPBM environment for Layer 2 VSNs, IS-IS carries only pure Layer 2 information with no requirement for an underlying IP control plane or forwarding path. IS-IS runs directly over Layer 2. In SPBM networks, IS-IS performs the following functions: Discovers the network topology Builds shortest path trees between the network nodes: - Forwards unicast traffic - Determines the forwarding table for multicast traffic Communicates network information in the control plane: - Service Instance Identifier (I-SID) information SPBM can distribute I-SID service information to all SPBM nodes, as the I-SIDs are created. SPBM includes I-SID information in the IS-IS Link State protocol data units (PDUs). When a new service instance is provisioned on a node, its membership is flooded throughout the topology using an IS-IS advertisement.
May 2013
17
Standard TLVs
IS-IS uses Type-Length-Value (TLV) encoding. SPBM employs IS-IS as the interior gateway protocol and implements additional TLVs to support additional functionality. VSP 7000 Series also supports Sub-TLVs. TLVs exist inside IS-IS packets and Sub-TLVs exist as additional information in TLVs. Avaya VSP 7000 Series supports standard 802.1 aq TLVs. The IEEE ratified the 802.1aq standard that defines SPBM and the Type-Length-Value (TLV) encoding that IS-IS uses to support SPBM services. Avaya is in full compliance with the IEEE 802.1aq standard. The following table lists a the TLVs that the VSP 7000 Series supports.
Figure 2: Standard TLVs TLV 1 Description Area addresses The Area IS-IS area Addresses TLV contains the area addresses to which the IS-IS is connected. Extended IS reachability The Extended IS Reachability TLV contains information about adjacent neighbors. Protocol supported The Protocol supported TLV carries the Network Layer Protocol Identifiers (NLPID) for the Network Layer protocols where the IS-IS can be used. TE IP reachability The Extended IP Reachability TLV 135 is used to distribution IP reachability between IS-IS peers. SPBM link metric Sub TLV (type 29) is carried within this TLV. Usage
22
129
SPBM in addition to existing NLPID (IPV4 0xCC, IPV6 0x*E..), IEEE 802.1aq defined SPBM NLPID as 0xC1.
135
SPBM uses this existing ISIS TLV to carry IP Shortcut routes through the SPBM core.
143
Multi-topology port aware This TLV carries the capability (MT-Portfollowing SPBM Sub TLVs: Capability) TLV MCID Sub TLV: The MCID This TLV carries the SPB is a digest of the VLANs instance ID in a multiple SPB and MSTI. Neighboring instances environment. This SPBM nodes must agree TLV is carried within IS-IS on the MCID to form an Hello Packets (IIH). adjacency. In the current
18
May 2013
IS-IS hierarchies
TLV
Description
Usage release, the MCID is set to all zeros (0). After the VSP 7000 receives a none-zero MCID Sub TLV, it reflects content back to the neighbor. SPB B-VID Sub TLV (type 6): The Sub TLV indicates the mapping between a VLAN and its equal cost tree (ECT) algorithm. To form an adjacency, both nodes must have a matching primary (BVLAN, ECT) pair, and secondary (BVLAN, ECT) pair.
144
Multi-topology Capability This TLV carries the (MT-Capability) TLV. following Sub TLVs: This TLV carries the SPB SPB instance Sub TLV instance ID in a multiple SPB (type 1): This Sub TLV instance environment. This contains a unique TLV is carried within LSPs. SPSourceID (nickname) to identify the SPBM node within this SPB topology. SPB Service ID Sub TLV (type 3): This Sub TLV carries service group membership (I-SIDs) for a particular SPB BVLAN.
184
SPBM IP VPN reachability IP reachability for Layer 3 VSNs IS-IS TLV 184 is used to advertise SPBM L3 VSN route information across the SPBM cloud.
IS-IS hierarchies
IS-IS is a dynamic routing protocol that operates within an autonomous system (or domain). IS-IS provides support for hierarchical routing, which enables you to partition large routing domains into smaller areas. IS-IS uses a two-level hierarchy, dividing the domain into multiple Level 1 areas and one Level 2 area. The Level 2 area serves as backbone of the domain, connecting to all the Level 1 areas.
May 2013
19
Important: The IEEE 802.1aq standard currently only defines the use of one hierarchy, Level 1. Level 2 function is disabled in the current release.
IS-IS PDUs
Intermediate System to Intermediate System Hello (IIH) packets discover IS-IS neighbors and establish and maintain IS-IS adjacencies. An IIH is sent in every Hello-interval to maintain the established adjacency. If a node has not heard IIHs from its neighbor within the adjacency holdtime (hello-interval x hello-multiple) seconds, the node tears down the adjacency. In the current release, IIH carries TLV 143 and SPB-B-VLAN Sub-TLV (among other sub-TLVs). For two nodes to form an adjacency the B-VLAN pairs for primary B-LVAN and secondary B-VLAN must match. Link State Packets (LSP) advertise link state information. The system uses the link state information to compute the shortest path. LSP also advertises MT-capability TLV 144 and SPB instance Sub-TLV, and SPB I-SIDs Sub-TLV. Complete Sequence Number Packets (CSNP) contain the most recent sequence numbers of all LSPs in the database. CSNP notifies neighbors about the local LSDB. After a neighbor receives a CSNP, it compares the LSPs in the CSNP with the LSP in the local LSDB. If the neighbor is missing LSPs, it sends a Partial Sequence Number Packets (PSNP) to request the missing LSPs. This process synchronizes the LSDBs among neighbors. A synchronized LSDB among all nodes in the network is crucial to producing a loop-free shortest path.
20
May 2013
All routers have at least one manual area. Typically, a Level 1 router does not participate in more than one area. The following are the requirements for system IDs: All IS-IS enabled routers must have one manual area and a unique system ID. All routers in the same area must have the same area ID. All routers must have system IDs of the same length (6 bytes). All IS-IS enabled routers must have a unique nickname.
PSNP interval
You can change the PSNP interval rate. A longer interval reduces overhead, while a shorter interval speeds up convergence.
Point-to-point mode
All SPBM links are point-to-point links. VSP 7000 does not support broadcast links.
Password considerations
The passwords for all authentications are saved as cleartext in the configuration file on the Avaya Virtual Services Platform 7000. The passwords for simple and HMAC-MD5 are
May 2013
21
displayed in cleartext through ACLI. The HMAC-MD5 packet is encrypted when transmitted over the network. To reset the authentication password type, you must set the type to none. The current release supports only interface level authentication. The current release does not support area level or domain level authentication.
Hellos
To update the identities of neighboring routers, you can configure the: Interface Hello interval Interface Hello multiplier
Hello multiplier
You can configure the Hello multiplier to specify how many Hellos the Avaya Virtual Services Platform 7000 must miss before it considers the adjacency with a neighboring switch down. The hold (wait) time is the Hello interval multiplied by the Hello multiplier. By default, if the Hello interval is 9 and the Hello multiplier is 3, the hold time is 27. If the Hello multiplier is increased to 10, the hold time is increased to 90.
Link metric
You can configure the link metric to overwrite the default metric value. By configuring the metric, you can specify a preferred path. Low cost reflects high-speed media, and high cost reflects slower media. For the wide metric, the value ranges from 1 to 16,777,215. In this release, only the wide metric is supported. The total cost of a path equals the sum of the cost of each link. The default value for wide metrics is 10.
Disabling IS-IS
You can disable IS-IS globally or at the interface level. If IS-IS is globally disabled, then all ISIS functions stop. If IS-IS is enabled at the global level and disabled at one of the interface levels, then IS-IS continues on all other interfaces.
Overload bit
If the overload bit parameter is configured, the Avaya Virtual Services Platform 7000 sets the overload bit in its LSP. The overload parameter works in conjunction with the overloadon-startup parameter. When the overload-on-startuptimer expires, the SPBM node clears the overload bit and re-advertises its LSP. When an LSP with an overload bit is received, the Avaya Virtual Services Platform 7000 ignores the LSP in its SPF calculation so that the transit traffic will not go through the overloaded node. The overloaded node can still receive traffic that is destined for the node
22
May 2013
SPBM B-VLAN
itself. The overload bit is usually enabled on stub nodes, which are not used for traversing traffic. By default, overload is set to false.
SPBM B-VLAN
Each SPBM network instance is associated with at least one backbone VLAN (B-VLAN) in the core SPBM network. This VLAN is used for both control plane traffic and dataplane traffic. Note: Avaya recommends to always configure two B-VLANs in the core to allow load distribution over both B-VLANs. SPBM alters the behavior of the VLAN. When a B-VLAN is associated with an SPBM network the following VLAN attributes and behaviors are modified for the B-VLAN: Flooding is disabled Broadcasting is disabled Source address learning is disabled Unknown MAC discard is disabled Ports cannot be added to a B-VLAN manually, IS-IS takes care of adding ports to the BVLAN. Essentially the B-MAC addresses are programmed into the B-VLAN Forwarding Information Bases (FIBs) by IS-IS instead of the traditional VLANs flooding and learning approach. Modification of the VLAN behavior is necessary to ensure proper control over the SPBM traffic. Note: When configuring a Vlan ID (VID) for a B-VLAN, some VIDs might be unavailable due to other system features. For example, the STP tagged PBDUs default VID range is 4001 4008. Tagged BPDUs cannot use the same VID as an active B-VLAN. For more information, see Avaya Virtual Services Platform 7000 Series Configuration Layer 2 (NN47202502).
Pre-populated FIB
An Ethernet network usually learns MAC addresses as frames are sent through the switch. This process is called reverse learning and is accomplished through broadcast. SPBM does not allow any broadcast flooding of traffic on the B-VLAN in order to prevent looping accomplished through flooding packets with unknown destinations (although multicast
May 2013
23
traffic is supported). As such, MAC addresses must be distributed within SPBM. This is accomplished by carrying the necessary B-MAC addresses inside the IS-IS link state database. To that end, SPBM supports an IS-IS TLV that advertises the I-SID and B-MAC information across the network. This functionality enables the powerful end-point-provisioning of SPBM. These Backbone MAC addresses are populated into the SPBM VLAN Forwarding Information Base (FIB) to maximize efficiency and to allow Reverse Path Forwarding Check (RPFC) to operate properly.
RPFC
A loop prevention mechanism is required at Layer 2 to stop wayward traffic from crippling the network. Reverse Path Forwarding Check (RPFC) is the chosen method of suppressing loop traffic with SPBM. RPFC was originally designed for IP traffic at Layer 3 where it checks the source address of the packet against the routing entry in the routing table. The source address must match the route for the port it came in on otherwise the packet is illegitimate and therefore dropped. With SPBM, the node matches the source MAC address against the ingress port to establish validity. If the frame is not supposed to come in that port, it is immediately suppressed imposing a guaranteed loop control. If there is no VLAN FDB entry to the source MAC address with the outgoing port as the ingress port, the frame will be dropped.
SPBM FIB
This section describes the SPBM unicast and multicast FIBs.
Unicast FIB
The unicast computation runs a single Dijkstra (unlike all pair Dijkstras for multicast). SPBM produces only one Shortest Path First (SPF) tree and the tree is rooted on the computing node. The unicast computation generates an entry for each node in the network. The Destination Address (DA) for that entry is the system-id of the node. In addition, if a node advertises MAC addresses other than the system-id, each MAC address has an entry in the unicast FIB table, and the shortest path to that MAC should be exactly the same as the path to the node. Unicast FIB entries are installed to the vlan-fdb table. The following text shows an example of the unicast FIB.
7024XLS(config-if)#show isis spbm unicast-fib ================================================================================ SPBM UNICAST FIB ENTRY INFO
24
May 2013
================================================================================ DESTINATION BVLAN SYSID HOST-NAME OUTGOING COST ADDRESS NAME INTERFACE -------------------------------------------------------------------------------00:01:20:00:00:d1 1000 0001.2000.00d1 D1 Port: 37 10 00:01:20:00:00:d1 1001 0001.2000.00d1 D1 Port: 37 10 00:01:20:00:00:d2 1000 0001.2000.00d2 D2 Port: 37 20 00:01:20:00:00:d2 1001 0001.2000.00d2 D2 Port: 37 20 00:01:20:00:00:d3 1000 0001.2000.00d3 D3 Port: 37 20 00:01:20:00:00:d3 1001 0001.2000.00d3 D3 Port: 37 20 00:01:20:00:00:d4 1000 0001.2000.00d4 D4 Port: 37 20 00:01:20:00:00:d4 1001 0001.2000.00d4 D4 Port: 37 20
Multicast FIB
SPBM runs all pair Dijkstras to produce the multicast FIB. The computing node loops through each node to run Dijkstra using that node as the root, and then prunes paths to only keep the shortest paths. The computing node then computes the intersection of the set of I-SIDs for which the root node transmits, with the set of I-SIDs for which the path endpoints receive. The multicast addresses are built out of two pieces: the instance-ID (nickname) and the I-SID ID converted to hexadecimal format to form the multicast MAC address.
|-----------3 bytes ------------|---------------------------------| nickname & 3 hexadecimal I-SID
For example, if the nickname is 0.00.10 and the I-SID is 100 (0x64), the multicast address is 03:00:10:00:00:64. The following text shows an example of the multicast FIB.
7024XLS(config)#show isis spbm multicast-fib ================================================================================ SPBM MULTICAST FIB ENTRY INFO ================================================================================ MCAST DA ISID BVLAN SYSID HOST-NAME OUTGOING -INTERFACES -------------------------------------------------------------------------------03:00:61:00:00:64 100 10 0080.2dc1.37ce 7000-1 4/7 03:00:61:00:00:c8 200 10 0080.2dc1.37ce 7000-1 4/2,4/1 -------------------------------------------------------------------------------Total number of SPBM MULTICAST FIB entries 2 ----------------------------------
May 2013
25
Each VSP 7000 provides an FI-up and FI-down port pair on the rear of the chassis. In each FI port pair there is a top and bottom connector. The top connector provides three 40 Gbps ports, and the bottom connector provides one 40 Gbps port. You can configure rear port mode as on (enabled) or off (disabled). The default is off (disabled). Note: When you enable or disable rear port mode, the switch automatically initiates a reboot. Warning: Enabling rear port mode and answering yes to the confirmation prompt results in a switch configuration reset equivalent to a partial default command. When you enable rear port mode, the switch applies the following default settings to all FI ports on the rear of the chassis: The LACP hashing mode is set to advance. VLAN tagging for rear ports is set to tagAll. The LACP administration key is set to 4095. The LACP operating mode for rear ports is set to active. The LACP rear ports time-out value is set to short. LACP for rear ports is set to enable. Note: Rear port mode allows the VSP 7000 Series to automatically aggregate multiple connections between adjacent units in the FI mesh without additional configuration. LACP mode is disabled on a rear port if you remove the port from the default VLAN (VLAN 1) and the port is not configured for any other VLAN. You can activate LACP mode once you add the port to a VLAN.
The following table provides detailed information about the FI ports and rear port modes:
FI port UP 1 (right top connector) Rear-Ports Mode standard Bandwidth 120 Gbps Port interface 34, 35, 36
26
May 2013
Bandwidth 40 Gbps 120 Gbps 40 Gbps 120 Gbps 40 Gbps 80 Gbps 40 Gbps 33
Port interface
DOWN 2 (left bottom standard connector) UP 1 (right top connector) UP 2 (right bottom connector) DOWN 1 (left top connector) SPB SPB SPB
When you enable rear port Shortest Path Bridging (SPB), the switch configures port 40 as loopback. Port 40 in loopback mode is not accessible by applications, or displayed on the port list. Note: Standard rear port mode does not support a SPB configuration. You must enable SPB rear port mode to support a SPB configuration. Changing between rear port modes results in a reboot and a partial configuration reset. For more information about FI mesh cabling, see Avaya Virtual Services Platform 7000 Series Installation (NN47202300) For more information about configuring rear port mode, see Avaya Virtual Services Platform 7000 Series Getting Started (NN47202303).
May 2013
27
28
May 2013
Procedure
1. Enter Global Configuration mode: enable configure terminal 2. Enable SPBM globally: spbm 3. Log on to the IS-IS Router Configuration mode: router isis 4. Create the SPBM instance (in this release, only one SPBM instance is supported): spbm <1100> 5. Exit IS-IS Router Configuration mode to Global Configuration mode: exit 6. Create the primary SPBM backbone VLAN (B-VLAN): vlan create <24094> type spbm-bvlan 7. Create the secondary SPBM backbone VLAN (B-VLAN): vlan create <24094> type spbm-bvlan 8. Log on to the IS-IS Router Configuration mode: router isis 9. Add the SPBM B-VLANs to the SPBM instance: spbm <1100> b-vid {<vlan-id [-vlan-id][,...]} [primary <1 4094>]
May 2013
29
10. Configure the system nickname (2.5 bytes in the format <x.xx.xx>): spbm <1100> nick-name <x.xx.xx> Note: Although it is not strictly required for SPBM operation, Avaya recommends that you change the IS-IS system ID from the default B-MAC value to a recognizable address to easily identify a switch (Log on to IS-IS Router configuration mode and use the system-id <xxxx.xxxx.xxxx> command) . This helps to recognize source and destination addresses for troubleshooting purposes. 11. Configure an IS-IS manual area (1-13 bytes in the format <xx.xxxx.xxxx...xxxx>. In this release, only one manual area is supported.): manual-area <xx.xxxx.xxxx...xxxx> 12. Exit IS-IS Router Configuration mode to Global Configuration mode: exit 13. Log on to Interface Configuration mode, by specifying the ports that are going to link to the SPBM network: interface {FastEthernet {slot/port [-slot/port][,...]} 14. Create an IS-IS circuit and interface on the selected ports: isis 15. Enable the SPBM instance on the IS-IS interfaces: isis spbm 1 16. Enable the IS-IS circuit/interface on the selected ports: isis enable 17. Exit Interface Configuration mode: exit 18. Remove the selected port for IS-IS from the default VLAN. vlan member remove [vlan-id] [port] Note: By default, all ports are enabled in VLAN 1. Ensure the port for the IS-IS interface is removed from VLAN 1 and all other normal VLANs. 19. Enable IS-IS globally: router isis enable 20. Display the SPBM configurations: show isis spbm 21. Display the global IS-IS configuration: show isis 22. Display the interface IS-IS configuration:
30
May 2013
Example
7024XLS> enable 7024XLS# configure terminal 7024XLS(config)# spbm 7024XLS(config)# router isis 7024XLS(config-isis)# spbm 1 7024XLS(config-isis)# exit 7024XLS(config)# vlan create 1000 type spbm-bvlan 7024XLS(config)# vlan create 2000 type spbm-bvlan 7024XLS(config)# router isis 7024XLS(config-isis)# spbm 1 bvid 1000,2000 primary 1000 7024XLS(config-isis)# spbm 1 nick-name 1.11.16 7024XLS(config-isis)# manual-area c0.2000.0000.0000 7024XLS(config-isis)# exit 7024XLS(config)# interface FastEthernet 3 7024XLS(config-if)# isis 7024XLS(config-if)# isis spbm 1 7024XLS(config-if)# isis enable 7024XLS(config-if)# exit 7024XLS(config)# vlan member remove 1 3 7024XLS(config)# router isis enable 7024XLS(config)# show isis spbm
================================================================================ ISIS SPBM Info ================================================================================ SPBM B-VID PRIMARY NICK LSDB INSTANCE VLAN NAME TRAP -------------------------------------------------------------------------------1 1000,2000 1000 1.11.16 disable ================================================================================
May 2013
31
AdminState RouterType System ID Max LSP Gen Interval Min LSP Gen Metric Overload-on-startup Overload Csnp Interval PSNP Interval Rxmt LSP Interval spf-delay Router Name Num of Interfaces Num of Area Addresses
Variable definitions
Use the data in the following table to use the isis command.
Variable enable Value Enables or disables the IS-IS circuit/interface on the specified port. The default is disabled. Use the no option to disable IS-IS on the specified interface. Enable the SPBM instance on the IS-IS interfaces.
spbm <1100>
Use the data in the following table to use the manual-area command.
Variable <xx.xxxx.xxxx...xxxx> Value Specifies the IS-IS manual-area (113 bytes in the format <xx.xxxx.xxxx...xxxx>. In this release, only one manual area is supported. For IS-IS to operate, you must configure at least one area. Use the no option to delete the manual area.
Use the data in the following table to use the spbm command.
32
May 2013
Value Creates the SPBM instance. In this release, only one SPBM instance is supported. Sets the ISIS SPBM instance data VLANs. Use the no option to remove the specified BVLAN from the SPBM instance. Specifies a nickname for the SPBM instance globally. The value is 2.5 bytes in the format <x.xx.xx>. Use the no or default options to delete the configured nickname. Sets the IS-IS instance primary data VLAN.
nick-name <x.xx.xx>
primary <14094>
Use the data in the following table to use the vlan create command.
Variable <24094> Value Specifies the VLAN ID. Creates an SPBM Backbone VLAN (B-VLAN). You can optionally specifiy a name for the SPBM BVLAN. Specifies the type of VLAN created. ipsubnet-mstprstp Create a VLAN by IP subnet. port-mstprstp Create a VLAN by port. protocol-mstprstp Create a VLAN by protocol. spbm-bvlan Create an SPBM-BVLAN. srcmac-mstprstp Create a VLAN by source MAC address.
Job aid
Important: After you configure the SPBM nickname and enable IS-IS, if you require a change of the system ID, you must also change the nickname. However, for naming convention purposes or configuration purposes, you might not want to change the nickname. To maintain the same nickname with a different system ID, perform the following steps: 1. Disable IS-IS. 2. Change the system ID.
May 2013
33
3. Change the nickname to a temporary one. 4. Enable IS-IS. 5. Disable IS-IS. 6. Change the nickname to the original nickname. 7. Enable IS-IS.
Procedure
1. Log on to ACLI to enter User EXEC mode. 2. At the command prompt, enter the following command: show isis spbm 3. You can also use the following command to identify SPBM VLANs. For spbm-bvlan, the attribute TYPE displays B-VLAN instead of Port. show vlan
Example
================================================================================ ISIS SPBM Info ================================================================================ SPBM B-VID PRIMARY NICK LSDB INSTANCE VLAN NAME TRAP -------------------------------------------------------------------------------1 1000,2000 1000 1.11.16 disable ================================================================================ 7024XLS# show vlan Id Name Type ---- -------------------- -------1 VLAN #1 Port Port Members: ALL 2 VLAN #2 Port Port Members: 15-18 3 VLAN #3 Port Port Members: NONE 4 VLAN #4 B-VLAN Port Members: NONE Protocol PID Active IVL/SVL Mgmt ---------------- ------- ------ ------- ---None 0x0000 Yes IVL Yes None None None 0x0000 0x0000 0x0000 Yes Yes Yes IVL IVL IVL No No No
34
May 2013
Variable definitions
The following table describes the fields in the output for the show isis spbm command.
Parameter SPBM INSTANCE B-VID PRIMARY VLAN NICK NAME LSDB TRAP Description Indicates the SPBM instance identifier. You can only create one SPBM instance. Indicates the SPBM B-VLAN associated with the SPBM instance. Indicates the primary SPBM B-VLAN. Indicates the SPBM node nickname. The nickname is used to calculate the I-SID multicast MAC address. Indicates the status of the IS-IS SPBM LSDB update trap on this SPBM instance. The default is disable.
Procedure
1. Log on to ACLI to enter User EXEC mode. 2. Display IS-IS configuration information: show isis 3. Display the IS-IS system-id: show isis system-id 4. Display IS-IS net info: show isis net
Example
7024XLS#show isis ========================================== ISIS General Info ========================================== AdminState : enabled RouterType : Level 1 System ID : 0000.0000.0000 Max LSP Gen Interval : 900 Min LSP Gen Interval : 30 Metric : wide
May 2013
35
Overload-on-startup : 20 Overload : false Csnp Interval : 10 PSNP Interval : 2 Rxmt LSP Interval : 5 Spf-delay : 100 Num of Interfaces : 2 Num of Area Addresses : 1 7024XLS#show isis system-id ========================================== ISIS System-Id ========================================== SYSTEM-ID ========================================== 0014.c7e1.33df 7024XLS#show isis net ========================================== ISIS Network Entity Title Info ========================================== NET ========================================== c0.2000.0000.0000.14c7.e133.df00
Variable definitions
The following sections describe the fields in the outputs for the global IS-IS show commands.
show isis
The following table describes the fields in the output for the show isis command.
Parameter AdminState RouterType System ID Max LSP Gen Interval Min LSP Gen Interval Metric Overload-on-startup Overload Csnp Interval PSNP Interval Rxmt LSP Interval Description Indicates the administrative state of the router. Indicates the router Level: l1, l2, or l1/2. Indicates the system ID. Indicates the maximum time between LSP updates in seconds. Indicates the minimum time between LSP updates in seconds. Indicates if the metric is narrow or wide. Indicates the overload-on-startup value. Indicates if there is an overload condition. Indicates the interval between CSNP updates in seconds. Indicates the interval between PSNP updates in seconds. Indicates the received LSP time interval.
36
May 2013
Description Indicates the Shortest Path First delay in milliseconds. Indicates the IS-IS name of the router. Indicates the number of interfaces on the router. Indicates the number of area addresses on the router.
Procedure
1. Log on to ACLI to enter User EXEC mode. 2. At the command prompt, enter the following command: show isis manual-area
Example
7024XLS#show isis manual-area ================================================================================ ISIS Manual Area Address ================================================================================
May 2013
37
Variable definitions
The following table describes the fields in the output for the show isis manual-area command.
Parameter AREA ADDRESS Description Shows the manual areas defined. There can only be one area. The manual area can be from 1-13 bytes in length.
Procedure
1. Enter Global Configuration mode: enable configure terminal 2. Configure the SPBM ethertype: spbm ethertype {0x8100 | 0x88a8} 3. Configure the optional link-state database (LSDB) trap global parameter. To configure this parameter, you must globally disable IS-IS on the switch: a. Disable IS-IS on the switch: no router isis enable b. Log on to the IS-IS Router Configuration mode: router isis c. Enable a trap when the SPBM LSDB changes: spbm <1100> lsdb-trap enable d. Enable IS-IS on the switch: router isis enable e. Exit IS-IS Router Configuration mode: exit
38
May 2013
4. Configure the optional SPBM interface parameters. To configure these parameters, you must disable IS-IS on the interface: a. Specify an SPBM interface to configure: interface FastEthernet <port> b. Disable IS-IS on the interface: no isis enable c. Configure SPBM instance interface-type on IS-IS interface. SPBM supports only pt-pt: isis spbm <1100> interface-type {broadcast|pt-pt} d. Configure the SPBM instance level 1 metric on the IS-IS interface: isis spbm <1100> l1-metric <116777215> e. Enable IS-IS on the switch: isis enable
Example
7024XLS> enable 7024XLS# configure terminal 7024XLS(config)# spbm ethertype 0x8100 7024XLS(config-isis)# no router isis enable 7024XLS(config)# router isis 7024XLS(config-isis)# spbm 1 lsdb-trap enable 7024XLS(config-isis)# router isis enable 7024XLS(config-isis)# exit 7024XLS(config)# interface fastethernet 3 7024XLS(config-if)# no isis enable 7024XLS(config-if)# isis spbm 1 interface-type pt-pt 7024XLS(config-if)# isis spbm 1 l1metric 500 7024XLS(config-if)# isis enable
Variable definitions
Use the data in the following table to use the spbm command.
May 2013
39
Value Configures the SPBM ethertype. The default value is 0x8100. Configures whether to enable or disable a trap when the SPBM LSDB changes. The default is disabled. Use the no or default options to disable LSDB traps.
Use the data in the following table to use the isis spbm command.
Variable <1100> interface-type {broadcast|pt-pt} Value Configures the SPBM instance interfacetype on the IS-IS interface located on the specified port or MLT. SPBM only supports the point-to-point (pt-pt) interface type. The default is pt-pt. Use the no or default options to set this parameter to the default value of pt-pt. Configures the SPBM instance l1-metric on the IS-IS interface located on the specified port or MLT. The default value is 10. Use the no or default options to set this parameter to the default.
Procedure
1. Enter IS-IS Router Configuration mode: enable configure terminal router isis 2. Configure optional IS-IS global parameters: a. Specify the Complete Sequence Number Packet (CSNP) interval in seconds: csnp-interval <1600> b. Configure the router type globally: is-type {l1} c. Configure the maximum level, in seconds, between generated LSPs by this Intermediate System:
40
May 2013
d. e. f. g. h. i. j. k.
max-lsp-gen-interval <0900> Configure the IS-IS metric type: metric {wide} Set or clear the overload condition: overload Configure the overload-on-startup value in seconds: overload-on-startup <153600> Configure the Partial Sequence Number Packet (PSNP) in seconds: psnp-interval <1120> Configure the minimum time between retransmission of an LSP: retransmit-lsp-interval <1300> Configure the SPF delay in milliseconds: spf-delay <05000> Configure the name for the system: sys-name WORD <0255> Configure the IS-IS system ID for the switch: system-id <xxxx.xxxx.xxxx>
Example
7024XLS> enable 7024XLS# configure terminal 7024XLS(config)# router isis 7024XLS(config-isis)# csnp-interval 10 7024XLS(config-isis)# is-type l1 7024XLS(config-isis)# max-lsp-gen-interval 800 7024XLS(config-isis)# metric wide 7024XLS(config-isis)# overload 7024XLS(config-isis)# overload-on-startup 30 7024XLS(config-isis)# psnp-interval 10 7024XLS(config-isis)# retransmit-lsp-interval 10 7024XLS(config-isis)# default sys-name 7024XLS(config-isis)# spf-delay 200 7024XLS(config-isis)# default system-id
May 2013
41
Variable definitions
Use the data in the following table to use the csnp-interval command.
Variable <1600> Value Specifies the CSNP interval in seconds. This is a system level parameter that applies for level 1 CSNP generation on all interfaces. A longer interval reduces overhead, while a shorter interval speeds up convergence. The default value is 10. Use the no or default options to set this parameter to the default value of 10.
Use the data in the following table to configure the is-type command.
Variable {l1} Value Sets the router type globally: l1: Level-1 router type The default value is l1. Use the no or default options to set this parameter to the default value of l1.
Use the data in the following table to configure the max-lsp-gen-interval command.
Variable <0900> Value Specifies the maximum interval, in seconds, between generated LSPs by this Intermediate System. The default value is 900 seconds. Use the no or default options to set this parameter to the default value of 900.
Use the data in the following table to configure the metric command.
Variable {wide} Value Specifies the IS-IS metric type. Only wide is supported in this release. The default value is wide. Use the no or default options to set this parameter to the default value of wide.
Use the data in the following table to configure the overload command.
42
May 2013
Variable overload
Value Sets or clears the overload condition. The default value is disabled. Use the no or default options to set this parameter to the default value of disabled.
Use the data in the following table to configure the overload-on-startup command.
Variable <153600> Value Specifies the IS-IS overload-on-startup value in seconds. The overload-on-startup value is used as a timer to control when to send out LSPs with the overload bit cleared after IS-IS startup. The default value is 20. Use the no or default options to set this parameter to the default value of 20.
Use the data in the following table to configure the psnp-interval command.
Variable <1120> Value Specifies the PSNP interval in seconds. This is a system level parameter that applies for level 1 PSNP generation on all interfaces. A longer interval reduces overhead, while a shorter interval speeds up convergence. The default value is 2. Use the no or default options to set this parameter to the default value of 2.
Use the data in the following table to configure the retransmit-lsp-interval command.
Variable <1300> Value Specifies the minimum time between retransmission of an LSP. This defines how fast the switch resends the same LSP. This is a system level parameter that applies for Level1 retransmission of LSPs. The default value is 5 seconds. Use the no or default options to set this parameter to the default value of 5.
Use the data in the following table to configure the spf-delay command.
May 2013
43
Variable <05000>
Value Configures the delay, in milliseconds, to pace successive Shortest Path First (SPF) runs. The timer prevents more than two SPF runs from being scheduled back-to-back. The mechanism for pacing SPF allows two back-to-back SPF runs. The default value is 100 milliseconds. Use the no or default options to set this parameter to the default value of 100 milliseconds.
Use the data in the following table to configure the sys-name command.
Variable WORD<0255> Value Specifies a name for the system. This may be used as the host name for dynamic host name exchange in accordance with RFC 2763. By default, the system name comes from the host name configured at the system level. Use the no or default options to set this parameter to the default value (host name). Note: In this release, no consistency checks appear when you edit sys-name on Virtual Services Platform 7000.
Use the data in the following table to configure the system-id command.
Variable <xxxx.xxxx.xxxx> Value Specifies the IS-IS system ID for the switch. Use the no or default options to set this parameter to the default value (node BMAC).
Job aid
Important: After you configure the SPBM nickname and enable IS-IS, if you require a change of the system ID, you must also change the nickname. However, for naming convention purposes or configuration purposes, you might not want to change the nickname. To maintain the same nickname with a different system ID, perform the following steps:
44
May 2013
1. Disable IS-IS. 2. Change the system ID. 3. Change the nickname to a temporary one. 4. Enable IS-IS. 5. Disable IS-IS. 6. Change the nickname to the original nickname. 7. Enable IS-IS.
Procedure
1. Enter FastEthernet Interface Configuration mode: enable configure terminal interface FastEthernet <port> 2. Configure optional IS-IS interface parameters: a. Specify the authentication type used for IS-IS hello packets on the interface: isis hello-auth type {none|simple|hmac-md5} b. If you select simple as the hello-auth type, you must also specify a key value but the key-id is optional: isis hello-auth type simple key WORD<116> [key-id <1 255>] c. If you select hmac-md5, you must also specify a key value but the key-id is optional: isis hello-auth type hmac-md5 key WORD<116> [key-id <1 255>]] d. Configure the level 1 IS-IS designated router priority: isis [l1-dr-priority <0127>] Note: This parameter is not used for SPBM because SPBM only runs on point-topoint interfaces. This parameter is for designated router election on a broadcast LAN segment, which is not supported. e. Configure the level 1 hello interval: isis [l1-hello-interval <1600>]
May 2013
45
f.
Example
7024XLS> enable 7024XLS# configure terminal 7024XLS(config)# interface fastethernet 3 7024XLS(config-if)# isis 7024XLS(config-if)# isis hello-auth type hmac-md5 key test 7024XLS(config-if)# isis l1dr-priority 100 7024XLS(config-if)# isis l1hello-interval 20 7024XLS(config-if)# isis l1hello-multiplier 10
Variable definitions
Use the data in the following table to configure the isis command.
Variable hello-auth type {none|simple| hmac-md5}][key[key WORD<1 16>] [key-id <1255>] Value Specifies the authentication type used for IS-IS hello packets on the interface. type can be one of the following: none simple: If selected, you must also specify a key value but the key id is optional. Simple password authentication uses a text password in the transmitted packet. The receiving router uses an authentication key (password) to verify the packet. hmac-md5: If selected, you must also specify a key value but the key-id is optional. MD5 authentication creates an encoded checksum in the transmitted packet. The receiving router uses an authentication key (password) to verify the MD5 checksum of the packet. There is an optional key ID. The default is none. Use the no or default options to set the hello-auth type to none. l1-dr-priority <0127> Configures the level 1 IS-IS designated router priority to the specified value. The default value is 64.
46
May 2013
Variable
Value Use the no or default options to set this parameter to the default value of 64. Note: This parameter is not used for SPBM because SPBM only runs on point-to-point interfaces. This parameter is for designated router election on a broadcast LAN segment, which is not supported.
l1-hello-interval <1600>
Configures the level 1 hello interval. The default value is 9 seconds. Use the no or default options to set this parameter to the default value of 9 seconds. Configures the level 1 hello multiplier. The default value is 3 seconds. Use the no or default options to set this parameter to the default value of 3 seconds.
l1-hello-multiplier <1600>
Procedure
1. Log on to ACLI to enter User EXEC mode. 2. Display IS-IS interface configuration and status parameters (including adjacencies): show isis interface [l1] 3. Display IS-IS interface authentication configuration: show isis int-auth 4. Display IS-IS interface timers: show isis int-timers 5. Display IS-IS circuit level parameters: show isis int-ckt-level
Example
7024XLS#show isis interface ================================================================================ ISIS Interfaces ================================================================================ IFIDX TYPE LEVEL OP-STATE ADM-STATE ADJ UP-ADJ SPBM-L1-METRIC --------------------------------------------------------------------------------
May 2013
47
Trunk: 2 Port: 21
pt-pt pt-pt
Level 1 Level 1
UP UP
UP UP
1 1
1 1
10 10
7024XLS#show isis int-auth ================================================================================ ISIS Interface Auth ================================================================================ IFIDX AUTH-TYPE AUTH-KEYID AUTH-KEY -------------------------------------------------------------------------------Trunk: 3 none 0 Port: 21 none 0 7024XLS#show isis int-timers ================================================================================ ISIS Interface Timers ================================================================================ IFIDX LEVEL HELLO HELLO HELLO INTERVAL MULTIPLIER DR -------------------------------------------------------------------------------Trunk: 2 Level 1 9 3 3 Port: 21 Level 1 9 3 3 7024XLS#show isis int-ckt-level ================================================================================ ISIS Circuit level parameters ================================================================================ IFIDX LEVEL DIS CKTID -------------------------------------------------------------------------------Trunk: 2 Level 1 1 Port: 21 Level 1 2
Variable definitions
Use the data in the following table to use the IS-IS interface show command.
Variable [l1] Value Displays the interface information for the specified level: l1.
Job aid
The following sections describe the fields in the outputs for the IS-IS interface show commands.
48
May 2013
Description Indicates the interface index for the Ethernet or MLT interface. Indicates the type of interface configured (in this release, only ptpt is supported). Indicates the level of the IS-IS interface (Level 1 [default] or Level 2). Shows the physical connection state of the interface. Shows the configured state of the interface. Shows how many adjacencies are learned through the interface. Shows how many adjacencies are active through the interface. Indicates the SPBM instance Level 1 metric on the IS-IS interface.
May 2013
49
Description Indicates the interval at which a Hello packet is sent to the IS-IS network. Indicates the multiplier that is used in conjunction with the Hello Interval. Indicates the interval at which a Hello packet is sent to the IS-IS network if the router is a designated router (DIS).
50
May 2013
Procedure
1. Log on to ACLI to enter User EXEC mode. 2. Display the SPBM multicast FIB: show isis spbm multicast-fib [vlan <04094>] [i-sid <1 16777215>] [nick-name <x.xx.xx>] [summary] 3. Display the SPBM unicast FIB: show isis spbm unicast-fib [b-mac <0x00:0x00:0x00:0x00:0x00:0x00>] [vlan <04094>] [summary] 4. Display the SPBM unicast tree: show isis spbm unicast-tree <14094> [destination <xxxx.xxxx.xxxx>]
Example
7024XLS#show isis spbm multicast-fib ================================================================================ SPBM MULTICAST FIB ENTRY INFO ================================================================================ MCAST DA ISID BVLAN SYSID HOST-NAME OUTGOING-INTERFACES -------------------------------------------------------------------------------13:11:16:00:00:c8 200 1000 0014.c7e1.33df SPBM-1 MLT-2,3/21,3/37 13:11:16:00:01:2c 300 1000 0014.c7e1.33df SPBM-1 MLT-2,4/21 13:11:16:00:01:90 400 1000 0014.c7e1.33df SPBM-1 MLT-2,3/21 13:11:16:00:00:c8 200 2000 0014.c7e1.33df SPBM-1 MLT-2,3/21,3/31,3/37 -------------------------------------------------------------------------------Total number of SPBM MULTICAST FIB entries 4 -------------------------------------------------------------------------------7024XLS#show isis spbm unicast-fib ================================================================================ SPBM UNICAST FIB ENTRY INFO ================================================================================ DESTINATION BVLAN SYSID HOST-NAME OUTGOING COST ADDRESS INTERFACE -------------------------------------------------------------------------------00:16:ca:23:73:df 1000 0016.ca23.73df SPBM-1 3/21 10 00:16:ca:23:73:df 2000 0016.ca23.73df SPBM-1 3/21 10 00:18:b0:bb:b3:df 1000 0018.b0bb.b3df SPBM-2 MLT-2 10 00:14:c7:e1:33:e0 1000 0018.b0bb.b3df SPBM-2 MLT-2 10 00:18:b0:bb:b3:df 2000 0018.b0bb.b3df SPBM-2 MLT-2 10 -------------------------------------------------------------------------------Total number of SPBM UNICAST FIB entries 5 -------------------------------------------------------------------------------7024XLS#show isis spbm unicast-tree 1000 Node:0018.b0bb.b3df.00 (7024XLS) -> ROOT Node:0016.ca23.73df.00 (7024XLS) -> ROOT
May 2013
51
Variable definitions
Use the data in the following table to use the show isis spbm multicast-fib command.
Variable vlan <04094> i-sid <116777215> nick-name <x.xx.xx> summary Value Displays the FIB for the specified SPBM VLAN. Displays the FIB for the specified I-SID. Displays the FIB for the specified nickname. Displays a summary of the FIB.
Use the data in the following table to use the show isis spbm unicast-fib command.
Variable b-mac <0x00:0x00:0x00:0x00:0x00:0x00> vlan <04094> summary Value Displays the FIB for the specified BMAC. Displays the FIB for the specified SPBM VLAN. Displays a summary of the FIB.
Use the data in the following table to use the show isis spbm unicast-tree command.
Variable <14094> destination <xxxx.xxxx.xxxx> Value Specifies the SPBM B-VLAN ID. Displays the unicast tree for the specified destination.
Job aid
The following sections describe the fields in the outputs for SPBM multicast FIB, unicast FIB, and unicast tree show commands.
52
May 2013
Description Indicates the multicast destination MAC address of the multicast FIB entry. Indicates the I-SID of the multicast FIB entry. Indicates the B-VLAN of the multicast FIB entry. Indicates the system identifier of the multicast FIB entry. Indicates the host name of the multicast FIB entry. Indicates the outgoing interface of the multicast FIB entry.
Procedure
1. Log on to ACLI to enter User EXEC mode. 2. Display the IS-IS LSDB: show isis lsdb [level {l1|l2|l12}] [sysid <xxxx.xxxx.xxxx>] [lspid <xxxx.xxxx.xxxx.xx-xx>] [tlv <1184>] [detail] 3. Display IS-IS adjacencies: show isis adjacencies 4. Clear IS-IS LSDB:
May 2013
53
Example
7024XLS#show isis lsdb ================================================================================ ISIS LSDB ================================================================================ LSP ID LEVEL LIFETIME SEQNUM CHKSUM HOST-NAME -------------------------------------------------------------------------------0014.c7e1.33df.00-00 1 545 0xb1 0xed28 NewYork 0016.ca23.73df.00-00 1 1119 0x9f 0x9c9d VSP-Lab2 0018.b0bb.b3df.00-00 1 708 0xb9 0xcb1a VSP-Lab1 -------------------------------------------------------------------------------Level-1 : 3 out of 3 Total Num of LSP Entries Level-2 : 0 out of 0 Total Num of LSP Entries 7024XLS# show isis adjacencies ================================================================================ ISIS Adjacencies ================================================================================ INTERFACE L STATE UPTIME PRI HOLDTIME SYSID HOST-NAME -------------------------------------------------------------------------------Mlt2 1 UP 1d 03:57:25 127 20 0018.b0bb.b3df VSP-Lab1 Port3/21 1 UP 1d 03:57:16 127 27 0016.ca23.73df VSP-Lab2 -------------------------------------------------------------------------------2 out of 2 Total Num of Adjacencies -------------------------------------------------------------------------------7024XLS>show isis lsdb detail ================================================================================ ISIS LSDB (DETAIL) ================================================================================ -------------------------------------------------------------------------------Level-1 LspID: 0001.bcb0.0003.00-001 Chksum: 0x32f7 PDU Length: 312 Host_name: C0 Attributes: IS-Type 1 TLV:1 Area Addresses: 1 c1.3000.0000.00 TLV:22 SeqNum: 0x00000522 Lifetime: 1144
Extended IS reachability: Adjacencies: 7 TE Neighbors: 7 0000.beb1.0007.01 (VSP0) Metric:10 SPBM Sub TLV: port id: 640 num_port 1 Metric: 10 0000.beb1.00b1.01 (VSP1) Metric:10 SPBM Sub TLV: port id: 643 num_port 1 Metric: 10 0000.bcb1.0004.01 (C1) SPBM Sub TLV: Metric:10
54
May 2013
port id: 6144 num_port 1 Metric: 10 0000.beb1.00ca.01 (VSP2) SPBM Sub TLV: port id: 6156 num_port 1 Metric: 10 0000.beb1.00a5.01 (VSS0) SPBM Sub TLV: port id: 651 num_port 1 Metric: 10 0000.beb1.00b2.01 (VSS1) SPBM Sub TLV: port id: 645 num_port 1 Metric: 10 0000.beb1.0008.01 (VSP1) SPBM Sub TLV: port id: 652 num_port 1 Metric: 10 TLV:129 Protocol Supported: SPBM TLV:137 Host_name: C0# TLV:144 SUB-TLV 1 SPBM INSTANCE: Instance: 0 bridge_pri: 0 OUI: 00-33-33 num of trees: 2 vid tuple : u-bit 1 m-bit 1 ect-alg 0x80c201 base vid 1000 vid tuple : u-bit 1 m-bit 1 ect-alg 0x80c202 base vid 1001 TLV:144 SUB-TLV 3 ISID: Instance: 0 Metric: 0 B-MAC: 00-00-bc-b1-00-03 BVID:1000 Number of ISID's:8 3001(Both),3002(Rx),3003(Both),3004(Rx),4001(Both),4002( Rx),4003(Both),4004(Rx) Instance: 0 Metric: 0 B-MAC: 00-00-bc-b1-00-03 --More-- (q = quit) Metric:10 Metric:10 Metric:10 Metric:10
May 2013
55
Variable definitions
Use the data in the following table to use the show isis lsdb command.
Variable level {l1|l2|l12}] Value Displays the LSDB for the specified level: l1, l2, or l12. Note: Level 1 is supported in this release. sysid <xxxx.xxxx.xxxx> lspid <xxxx.xxxx.xxxx.xx-xx> tlv <1184> detail Displays the LSDB for the specified system ID. Displays the LSDB for the specified LSP ID. Displays the LSDB by TLV type. Displays detailed information.
Use the data in the following table to use the clear isis command.
Variable lsdb Value Clears the IS-IS Link State Database (LSDB). The command clears learned LSPs only. The command does not clear local generated LSPs. As soon as the platform clears the LSDB the LSP synchronization process starts immediately and the LSDB synchronizes with its neighbors.
Job aid
The following sections describe the fields in the outputs for the IS-IS LSDB and adjacencies show commands.
56
May 2013
Parameter LIFETIME
Description Indicates the maximum age of the LSP. If the max-lsp-geninterval is set to 900 (default) then the lifetime value begins to count down from 1200 seconds and updates after 300 seconds if connectivity remains. If the timer counts down to zero, the counter adds on an additional 60 seconds, then the LSP for that router is lost. This happens because of the zero age lifetime, which is detailed in the RFC standards. Indicates the LSP sequence number. This number changes each time the LSP is updated. Indicates the LSP checksum. This is an error checking mechanism used to verify the validity of the IP packet. Indicates the hostname listed in the LSP. If the host name is not configured, then the system name is displayed.
SYSID HOST-NAME
May 2013
57
Procedure
1. Log on to ACLI to enter User EXEC mode. 2. Display IS-IS system statistics: show isis statistics 3. Display IS-IS interface counters: show isis int-counters 4. Display IS-IS level 1 control packet counters: show isis int-l1-cntl-pkts Note: The current release uses level 1 IS-IS. The current release does not support level 2 IS-IS. The ACLI command show isis int-l2-contl-pkts is not supported in the current release because the IEEE 802.1aq standard currently only defines the use of one hierarchy, Level 1. 5. Clear IS-IS statistics: clear isis stats [error-counters] [packet-counters]
Example
7024XLS# show isis statistics ================================================================================ ISIS System Stats ================================================================================ LEVEL CORR AUTH AREA MAX SEQ SEQ NUM OWN LSP BAD ID PART LSP DB LSPs FAILS DROP EXCEEDED SKIPS PURGE LEN CHANGES OLOAD -------------------------------------------------------------------------------Level-1 0 0 0 0 1 0 0 0 0 7024XLS#show isis int-counters ================================================================================ ISIS Interface Counters ================================================================================ AUTH ADJ INIT REJ ID LEN MAX AREA LAN DIS FAILS CHANGES FAILS ADJ CHANGES -------------------------------------------------------------------------------Mlt2 Level 1 0 1 0 0 0 0 0 Port3/21 Level 1 0 1 0 0 0 0 0 IFIDX 7024XLS#show isis int-l1-cntl-pkts ================================================================================ ISIS L1 Control Packet counters ================================================================================ IFIDX DIRECTION HELLO LSP CSNP PSNP -------------------------------------------------------------------------------Mlt2 Transmitted 13346 231 2 229 Mlt2 Received 13329 230 1 230 Port3/21 Transmitted 13340 227 2 226 LEVEL
58
May 2013
Port3/21
Received
13335
226
227
Variable definitions
Use the data in the following table to use the clear isis stats command.
Job aid
show isis statistics
The following table describes the fields in the output for the show isis statistics command.
Parameter LEVEL CORR LSPs AUTH FAILS AREA DROP MAX SEQ EXCEEDED SEQ NUM SKIPS OWN LSP PURGE BAD ID LEN PART CHANGES LSP DB OLOAD Description Shows the level of the IS-IS interface. Shows the number of corrupted LSPs detected. Shows the number of times authentication has failed on the global level. Shows the number of manual addresses dropped from the area. Shows the number of attempts to exceed the maximum sequence number. Shows the number of times the sequence number was skipped. Shows how many times the local LSP was purged. Shows the number of ID field length mismatches. Shows the number of partition link changes. Show the number of times the Virtual Services Platform 7000 was in the overload state.
May 2013
59
Parameter IFIDX LEVEL AUTH FAILS ADJ CHANGES INIT FAILS REJ ADJ ID LEN MAX AREA LAN DIS CHANGES
Description Shows the interface index for the Ethernet or MLT interface. Shows the level of the IS-IS interface (Level 1 in the current release). Shows the number of times authentication has failed per interface. Shows the number of times the adjacencies have changed. Shows the number of times the adjacency has failed to establish. Shows the number of times the adjacency was rejected by another router. Shows the ID field length mismatches. Shows the maximum area address mismatches. Shows the number of times the DIS has changed.
60
May 2013
Procedure
1. From the navigation tree, select Configuration > VLAN > VLANs. 2. Click the Basic tab. 3. Click Insert. 4. In the Type field, click spbm-bvlan. 5. Click Insert to create the primary B-VLAN. 6. Click Insert. 7. In the Type field, click spbm-bvlan. 8. Click Insert to create the secondary B-VLAN. 9. In the navigation tree, select Configuration > IS-IS > SPBM. 10. From the Globals tab, select enable to enable SPBM globally, and click Apply. 11. Click the SPBM tab. 12. Click Insert to create an SPBM instance (in this release, only one SPBM instance is supported). 13. In the Id field, specify the SPBM instance ID. 14. In the NodeNickName field, specify the node nickname (valid value is 2.5 bytes in the format <x.xx.xx>)
May 2013
61
15. Click Insert. 16. In the Vlans field, specify the IDs of the SPBM B-VLANs to add to the SPBM instance. 17. In the PrimaryVlan field, specify which of the SPBM B-VLANs specified in the previous step is the primary B-VLAN. 18. Click Apply. 19. In the navigation tree, select Configuration > IS-IS > IS-IS. 20. Click the Manual Area tab. 21. In the Manual Area tab, click Insert to add a manual area (in this release, only one manual area is supported). 22. Specify the Manual Area Address (valid value is 113 bytes in the format <xx.xxxx.xxxx...xxxx>). 23. Click Insert. 24. Under the IS-IS tab, click the Globals tab. Note: Although it is not strictly required for SPBM operation, Avaya recommends that you change the IS-IS system ID from the default B-MAC value to a recognizable address to easily identify a switch (using the SystemID field under the IS-IS Globals tab) . This helps to recognize source and destination addresses for troubleshooting purposes. 25. In the AdminState field, click on, and click Apply. 26. Under the IS-IS tab, click the Interfaces tab. 27. Click Insert to create an IS-IS circuit. 28. In the IfIndex field, specify the port or MLT on which to create the IS-IS interface. 29. Click Insert. Note: By default, all ports are enabled in VLAN 1. You can remove the port for the ISIS interface from VLAN 1 at the end of this procedure. 30. Select the newly created IS-IS circuit entry, and click SPBM. 31. In the Interfaces SPBM tab, click Insert. 32. In the Spbmid field, specify a SPBM identifier. 33. In the State field, select enable. 34. Click Insert to enable the SPBM instance on the IS-IS circuit. 35. Under the IS-IS tab, click the Interfaces tab.
62
May 2013
36. In the AdminState field for the IS-IS circuity entry, select on to enable the IS-IS circuit. 37. Click Apply. 38. From the navigation tree, select Configuration > VLAN > VLANs. 39. Click the Basic tab. 40. Select the row for VLAN#1, and double-click the PortMembers cell. 41. Click the port number you specified for the IS-IS interface to remove it from the default VLAN, and click Ok. 42. In the toolbar, click Apply. Note: Ensure to remove the port specified for the IS-IS interface from all non-SPBM VLANs. If a rear-port is specified for the IS-IS interface, you can remove the rearport from a VLAN membership using ACLI.
Use the data in the following table to use the SPBM > SPBM tab.
Name Id Description Specifies the SPBM instance ID. In this release, only one SPBM instance is supported.
May 2013
63
Name NodeNickName
Description Specifies a nickname for the SPBM instance globally. Valid value is 2.5 bytes in the format <x.xx.xx>. Specifies the primary SPBM B-VLANs to add to the SPBM instance. Specifies the SPBM B-VLANs to add to the SPBM instance. Enables or disables LSDB trap for the SPBM instance.
Use the data in the following table to use the VLANs > Basic tab.
Name Type Description Specifies the type of VLAN: byPort byProtocolId spbm-bvlan spbm-switchedUni
Use the data in the following table to use the IS-IS > Manual Area tab.
Name AreaAddr Description Specifies the IS-IS manual area. Valid value is 113 bytes in the format <xx.xxx.xxx...xxx>. In this release, only one manual area is supported. For IS-IS to operate, you must configure at least one manual area.
Use the data in the following table to use the IS-IS > Globals tab.
Name AdminState LevelType Description Specifies the global status of IS-IS on the switch: on or off. The default is off. Sets the router type globally: level1 Level-1 router type level2 Level-2 router type Level1and2 Level1 and Level-2 router type
64
May 2013
Name
ID
Specifies the system ID. Valid value is a 6 byte value in the format <xxxx.xxxx.xxxx> Note: Although it is not strictly required for SPBM operation, Avaya recommends that you change the IS-IS system ID from the default B-MAC value to a recognizable address to easily identify a switch (using the ID field under the IS-IS Globals tab) . This helps to recognize source and destination addresses for troubleshooting purposes.
Use the data in the following table to use the IS-IS > Interfaces tab.
Name IfIndex Description The identifier of this circuit, unique within the Intermediate System. This value is for SNMP Indexing purposes only and need not have any relation to any protocol value. This object cannot be modified after creation. Specifies the administrative state of the circuit: on or off. The default is off.
AdminState
Use the data in the following table to use the SPBM > Interface SPBM tab.
Name State Description Specifies whether the SPBM interface is enabled or disabled.
Job aid
Important: After you configure the SPBM nickname and enable IS-IS, if you require a change of the system ID, you must also change the nickname. However, for naming convention purposes or configuration purposes, you might not want to change the nickname. To maintain the same nickname with a different system ID, perform the following steps:
May 2013
65
1. Disable IS-IS. 2. Change the system ID. 3. Change the nickname to a temporary one. 4. Enable IS-IS. 5. Disable IS-IS. 6. Change the nickname to the original nickname. 7. Enable IS-IS.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the I-SID tab.
Isid NickName
66
May 2013
Description Indicates the host name listed in the LSP, or the system name if the host name is not configured. Indicates the SPBM I-SID type; either configured or discovered.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click IS-IS. 3. Click the L1 Area tab.
May 2013
67
loop free Ethernet topology that creates a shortest path topology from every node to every other node in the network based on node MAC addresses.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the Globals tab. 4. To enable or disable SPBM, click enable or disable in the GlobalEnable field. 5. To configure the global ethertype value, click the desired option in the GlobalEtherType field. 6. Click Apply.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the SPBM tab. 4. To create an SPBM instance, click Insert.
68
May 2013
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the Nick Names tab.
May 2013
69
Procedure
1. In the navigation tree, expand the following folders:Configuration > IS-IS. 2. Click SPBM. 3. Click the Interface SPBM tab. 4. Configure the SPBM interface parameters. 5. Click Apply.
70
May 2013
Description Specifies whether the SPBM interface is enabled or disabled. Configures the SPBM instance interface-type on the IS-IS interface located on the specified port or MLT: ptpt or bcast. In this release, only the point-to-point (ptpt) interface type is supported. Configures the SPBM instance l1-metric on the IS-IS interface located on the specified port or MLT. The default value is 10.
WideL1Metric
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click IS-IS. 3. Click the Interfaces tab. 4. Click the SPBM button. 5. In the Interfaces SPBM tab, click Insert. 6. Click Insert.
May 2013
71
Name
Description this release, only the pt-pt interface type is supported. The default is pt-pt.
WideL1Metric
Configures the SPBM instance l1-metric on the IS-IS interface located on the specified port or MLT. The default value is 10.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the Unicast FIB tab.
72
May 2013
Description Specifies the outgoing port of the unicast FIB entry. Specifies the host name of the node where unicast FIB entry originated. Specifies the cost of the unicast FIB entry.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the Multicast FIB tab.
May 2013
73
Description I-SID of the multicast FIB entry. NNI port of the multicast FIB entry. Host name of the node where the multicast FIB entry originated.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the Drop Stats tab.
74
May 2013
Procedure
1. From the navigation tree, choose Configuration > IS-IS. 2. Click IS-IS. 3. Click the LSP Summary tab.
May 2013
75
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click IS-IS. 3. Click the Adjacency tab.
IfIndex Usage
State
NeighPriority
HoldTimer
76
May 2013
Description Specifies the system ID of the neighboring Intermediate System. Specifies the host name listed in the LSP, or the system name if host name is not configured.
Procedure
1. In the navigation tree, expand the following folders:Configuration > IS-IS. 2. Click IS-IS. 3. From the Globals tab, configure the global IS-IS parameters. 4. Click Apply.
May 2013
77
Name Important:
Description
After you configure the SPBM nickname and enable IS-IS, if you require a change of the system ID, you must also change the nickname. However, for naming convention purposes or configuration purposes, you might not want to change the nickname. To maintain the same nickname with a different system ID, perform the following steps: 1. Disable IS-IS. 2. Change the system ID. 3. Change the nickname to a temporary one. 4. Enable IS-IS. 5. Disable IS-IS. 6. Change the nickname to the original nickname. 7. Enable IS-IS. MaxLspGenInt Specifies the maximum interval, in seconds, between generated LSPs by this Intermediate system. The value must be greater than any value configured for RxmtLspInt. The default value is 900 seconds. Specifies the Complete Sequence Number Packet (CSNP) interval in seconds. This is a system level parameter that applies for L1 CSNP generation on all interfaces. The default value is 10. Specifies the minimum time between retransmission of an LSP. This defines how fast the switch resends the same LSP. This is a system level parameter that applies for L1 retransmission of LSPs. The default value is 5 seconds. Specifies the Partial Sequence Number Packet (PSNP) interval in seconds. This is a system level parameter that applies for L1 PSNP generation on all interfaces. The default value is 2. Specifies the SPF delay in milliseconds. This value is used to pace successive SPF runs. The timer prevents two SPF runs from being scheduled very closely. The default value is 100 milliseconds.
CsnpInt
RxmtLspInt
PSNPInterval
SpfDelay
78
May 2013
Name HostName
Description Specifies a name for the system. This may be used as the host name for dynamic host name exchange in accordance with RFC 2763. By default, the system name comes from the host name configured at the system level.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS > ISIS. 2. Click the System Level tab. 3. Configure the IS-IS system level parameters. 4. Click Apply.
MinLSPGenInt
May 2013
79
Name
SetOverload
Sets or clears the overload condition. The possible values are true or false. The default value is false. Sets the IS-IS overload-on-startup value in seconds. The overload-on-startup value is used as a timer to control when to send out LSPs with the overload bit cleared after IS-IS startup. Note: If you configure SetOverloadUntil to a number other than zero, then the overload bit is set at this level when the AdminState variable goes to the state 'on' for this Intermediate System. After the SetOverloadUntil seconds elapse, the overload flag remains set if the implementation runs out of memory or if you configured it manually using SetOverload to true. If SetOverload is false, the system clears the overload bit after SetOverloadUntil seconds elapse, if the system has not run out of memory. The default value is 20.
SetOverloadUntil
MetricStyle
Specifies the IS-IS metric type. Available values are narrow, wide or both. Only wide is supported in this release.
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click IS-IS. 3. Click the Interfaces tab. 4. Configure the IS-IS interface parameters. 5. Click Apply.
80
May 2013
May 2013
81
Name NumUpAdj
Procedure
1. From the navigation tree, choose Configuration > IS-IS. 2. Click IS-IS. 3. Click the Interfaces Level tab. 4. Configure the IS-IS interface level parameters. 5. Click Apply.
Level
82
May 2013
Name HelloTimer
Description Specifies the level 1 hello interval. Specifies the maximum period, in seconds, between IS-IS Hello Packets (IIH) PDUs on multiaccess networks at this level for LANs. The value at Level1 is used as the period between Hellos on Level1/Level2 point to point circuits. Setting this value at Level 2 on an Level1/Level2 point-to-point circuit results in an error of InconsistentValue. The default value is 9 seconds. Specifies the level 1 hello multiplier. The default value is 3 seconds. Specifies the period, in seconds, between Hello PDUs on multiaccess networks when this Intermediate System is the Designated Intermediate System. The default is 3 seconds.
HelloMultiplier DRHelloTimer
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click IS-IS. 3. Click the Manual Area tab. 4. Click Insert. 5. Specify an Area Address in the AreaAddr field, and click Insert.
May 2013
83
Name
Procedure
1. In the navigation tree, choose Configuration > IS-IS. 2. Click Stats. 3. Click the System Stats tab.
84
May 2013
Name IDFieldLenMismatches
Description Indicates the number of times a PDU is received with a different value for ID field length to that of the receiving system. Indicates partition changes. Displays the counter value. Displays the total value since you opened the Stats tab. Displays the average value for each second. Displays the minimum value for each second. Displays the maximum value for each second. Displays the last value for each second.
Procedure
1. From the navigation tree, choose Configuration > IS-IS. 2. Click Stats. 3. Click the Interface Counters tab.
May 2013
85
Description Shows the number of times an adjacency has been rejected on this circuit. Shows the number of times an IS-IS control PDU with an ID field length different to that for this system has been received. Shows the number of times an IS-IS control PDU with a max area address field different to that for this system has been received.
MaxAreaAddrMismatches
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click Stats. 3. Click the Interface Control Packets tab.
86
May 2013
Name PSNP
Description Indicates the number of IS-IS Partial Sequence Number Packets (PSNP) frames seen in this direction at this level.
May 2013
87
88
May 2013
SPBM L2 VSN
Shortest Path Bridging MAC-in-MAC (SPBM) supports Layer 2 VSN functionality where customer VLANs (C-VLANs) and Switched UNIs are bridged over the SPBM core infrastructure. At the Backbone Edge Bridges (BEBs), customer VLANs (C-VLAN) and Switched UNIs are mapped to I-SIDs based on the local service provisioning. Outgoing frames are encapsulated in a MAC-in-MAC header, and then forwarded across the core to the far-end BEB, which strips off the encapsulation and forwards the frame to the destination network based on the I-SID to C-VLAN or I-SID to Switched UNI provisioning. In the backbone VLAN (B-VLAN), Backbone Core Bridges (BCBs) forward the encapsulated traffic based on the BMAC-DA, using the shortest path topology learned using IS-IS. The following figure shows a sample campus SPBM Layer 2 VSN network.
May 2013
89
One of the key advantages of the SPBM Layer 2 VSN is that you can achieve network virtualization provisioning by configuring only the edge of the network (BEBs). As a result, the intrusive core provisioning that other Layer 2 virtualization technologies require is not needed when you add connectivity services to the SPBM network. For example, when you create new virtual server instances that require their own VLAN instances, you can provision at the network edge only and do not need configure throughout the rest of the network infrastructure. Based on its I-SID scalability, this solution can scale much higher than any 802.1Q tagging based solution. Also, due to the fact that there is no need for Spanning Tree in the core, this solution does not need any core link provisioning for normal operation.
C-VLAN UNI
Customer VLAN (C-VLAN) UNIs are created by the association of VLANs to I-SIDs. A VLAN with an I-SID configured becomes a C-VLAN. All ingress traffic of the VLAN from any member ports belong to the configured I-SID. C-MAC learning occurs inside the I-SID, on both UNI and NNI side (C-MAC + I-SID pointing to UNI port from the UNI side traffic, or C-MAC + I-SID pointing to a remote SPBM node - where the source C-MAC is connected). Broadcast, unknown multicast and unknown unicast traffic in the I-SID is replicated to all local I-SID endpoints, including all C-VLAN member ports along with switched UNIs, and to all remote endpoints carried by the I-SIDs multicast group. For UNI originated broadcast traffic, the originating endpoint is excluded from flooding, and the ingress port for broadcast traffic coming in on an NNI is excluded from flooding.
90
May 2013
C-VLAN UNI summary: C-VLAN UNI is a VLAN associated with I-SIDs. Global significance on the BEB. Performs L2 switching on local VLAN port members and transports over L2VSN for remote end-points. Untagged traffic is assigned to the VLAN corresponding to the PVID configured on the port. Note: On a tagged port, use UntagPVIDOnly mode to force PVID traffic to egress untagged.
Switched UNI
Switched UNI allows association of local endpoints to I-SIDs based on local port and VLAN together. With switched UNI, the same VLAN can be used on one port to create an endpoint to one I-SID, and on another port to create an endpoint to another I-SID. Switched UNI summary: Switched UNI is a VLAN and ports associated with I-SIDs. Local significance on the ports. You can re-use the same VLAN to associate different ports with different I-SIDs. You can use a different VLAN on the same ports, or you can assign different ports to the same I-SID. Supports VLAN mapping on local switch. Untagged traffic cannot be assigned to an I-SID.
May 2013
91
IS-IS runs on all nodes of the SPBM domain. IS-IS is the basis of SPBM, the IS-IS adjacency must be formed first. After the neighboring nodes see hellos from each other, the nodes look for the same Level (Level 1) and the same area (for example, Area 2f.8700.0000.00). After the hellos are confirmed both nodes send Link State Protocol Data Units, which contain connectivity information for the SPBM node. These nodes also send copies of all other LSPs they have in their databases. This establishes a network of connectivity providing the necessary information for each node to find the best and proper path to all destinations in the network. Each node has a system ID, which is used in the topology announcement. This system ID also serves as the switch Backbone MAC address (B-MAC), which is used as the source and destination MAC address in the SPBM network. 2. Each IS-IS node automatically builds trees from itself to all other nodes
92
May 2013
When the network topology is discovered and stored in the IS-IS link state database (LSDB), each node calculates shortest path trees for each source node. A unicast path now exists from every node to every other node With this information, each node populates unicast information received from SPBM into the FIB for forwarding purposes. Multicast FIB is not produced until Layer 2 VSN services are configured and learned. 3. IS-IS advertises new service communities of interest When a new service is provisioned, its membership is flooded throughout the topology with an IS-IS advertisement.
BMAC and I-SID information floods throughout the network to announce new I-SID memberships. In this case, VLAN 20 is mapped to I-SID 100.
May 2013
93
Note: I-SIDs are only used for virtual services (Layer 2 VSNs and Layer 3 VSNs). If IP Shortcuts only is enabled on the BEBs, I-SIDs are never exchanged in the network as IP Shortcuts allow for IP networks to be transported across IS-IS. Each node populates its FDB with the BMAC information derived from the IS-IS shortest path tree calculations. No traditional flooding and learning mechanism in place for the B-VLAN, but FDBs are programmed by the IS-IS protocol. 4. When a node receives notice of a new service AND is on the shortest path, it updates the FDB In this scenario, where there are three source nodes having a membership on I-SID 100, three shortest path trees are calculated (not counting the Equal Cost Trees (ECTs).
94
May 2013
May 2013
95
96
May 2013
The paths between any two nodes are always the shortest paths. Also, the paths in either direction are congruent, therefore a bidirectional communication stream can be monitored easily by mirroring ingress and egress on a link to a network analyzer. VLAN traffic arriving on switch A and VLAN 20 is forwarded following the blue path, traffic arriving on switch B and VLAN 20 the orange path and on switch C VLAN 20 traffic is following the green path. If the destination CMAC is unknown at the SPBM ingress node or the traffic is of type broadcast or multicast, then it floods to all members of the topology which spans VLAN 20. If the destination CMAC is already known, then the traffic is only forwarded as a unicast to the appropriate destination. In the SPBM domain, the traffic is switched on the BMAC header only. The bridge filtering database (FDB) at the VLAN to I-SID boundary (backbone edge bridge BEB), maintains a mapping between CMACs and corresponding BMACs. For example, Switch B learns all CMACs which are on VLAN 20 connected to switch A with the BMAC of A in its FDB and the CMACs that are behind C are learned with the BMAC of C.
May 2013
97
98
May 2013
Procedure
1. Enter Global Configuration mode: enable configure terminal 2. Map a customer VLAN (C-VLAN) to a Service Instance Identifier (I-SID): i-sid <116777215> vlan <14094> Important: When a protocol VLAN is created, all ports are added to the VLAN including SPBM ports. To configure a protocol-based VLAN as a C-VLAN, you must first remove the SPBM-enabled ports from the protocol based VLAN, and then configure the protocol-based VLAN as a C-VLAN. 3. Display C-VLAN information:
May 2013
99
Example
7024XLS> enable 7024XLS# configure terminal 7024XLS(config)# i-sid 200 vlan 200 7024XLS(config)# show i-sid 200
I-SID Vid UNI-type Ports --------- ---- ----------- -----------200 200 C-VLAN 7
Variable definitions
Use the data in the following table to use the i-sid vlan command.
Variable i-sid <116777215> vlan<1 4094> Value Specifies the customer VLAN (CVLAN) to associate with the I-SID. Use the no or default options to remove the I-SID from the specified VLAN. Note: Virtual Services Platform 7000 reserves I-SID 0x00ffffff. Virtual Services Platform 7000 uses this I-SID to advertise the virtual B-MAC in a SMLT dualhoming environment. The platform clears the receive and transmit bit of this I-SID, therefore I-SID 0x00ffffff cannot be used for any other service.
100
May 2013
core to the far-end BEB, which strips off the encapsulation and forwards the frame to the destination network based on the I-SID-to-Switched UNI VLAN provisioning.
Procedure
1. Enter Global Configuration mode: enable configure terminal 2. Create a Switched UNI VLAN: vlan create <24094> type spbm-switchedUni 3. Map a Switched UNI VLAN to a Service Instance Identifier (I-SID): i-sid <116777215> vlan <24094> port <portlist> Note: You can run this command again to map a Switched UNI VLAN to multiple ISIDs. 4. Display the Switched UNI information: show i-sid <116777215> Note: You can verify the Switched UNI VLAN using show i-sid only. The show vlan i-sid command does not display Switched UNI details.
Example
7024XLS> enable 7024XLS# configure terminal 7024XLS(config)# vlan create 100 type spbm-switchedUni 7024XLS(config)# i-sid 100 vlan 100 port 1 7024XLS(config)# show i-sid 100
I-SID Vid UNI-type Ports --------- ---- ----------- -----------100 100 switched 1
May 2013
101
You can map a Switched VLAN UNI to multiple I-SIDs. 7024XLS(config)# i-sid 101 vlan 100 port 2 7024XLS(config)# show i-sid
I-SID --------100 101 Vid ---100 100 UNI-type ----------switched switched Ports -----------1 2
Variable definitions
Use the data in the following table to use the i-sid vlan command to configure a Switched UNI.
Variable i-sid <116777215> vlan<2 4094> port <portlist> Value Specifies the Switched UNI VLAN to associate with the I-SID. and a port. Use the no or default options to remove the I-SID from the specified VLAN. Note: Virtual Services Platform 7000 reserves I-SID 0x00ffffff. Virtual Services Platform 7000 uses this I-SID to advertise the virtual B-MAC in a SMLT dualhoming environment. The platform clears the receive and transmit bit of this I-SID, therefore I-SID 0x00ffffff cannot be used for any other service.
Procedure
1. Enter Privileged EXEC mode: enable 2. Display the C-VLAN to I-SID associations: show vlan i-sid <14094> 3. Display I-SID information and Switched UNI to I-SID associations: show i-sid <116777215> 4. Display the IS-IS SPBM multicast-FIB calculation results by I-SID:
102
May 2013
show isis spbm i-sid {all|config|discover} [vlan <14094>] [id <116777215>] [nick-name <x.xx.xx>]
Example
7024XLS#show vlan i-sid =============================================================================== Vlan I-SID ================================================================================ VLAN_ID I-SID -------------------------------------------------------------------------------1 2 5 5 10 20 7024XLS#show i-sid I-SID Vid UNI-type Ports --------- ---- ----------- -----------5 5 CVLAN 100 100 switched 1
7024XLS#show isis spbm i-sid all ================================================================================ SPBM ISID INFO ================================================================================ ISID SOURCE NAME VLAN SYSID TYPE HOST_NAME -------------------------------------------------------------------------------200 1.11.16 1000 0014.c7e1.33df config VSP-7000 300 1.11.16 1000 0014.c7e1.33df config VSP-7000 400 1.11.16 1000 0014.c7e1.33df config VSP-7000 200 1.11.16 2000 0014.c7e1.33df config VSP-7000 300 1.11.16 2000 0014.c7e1.33df config VSP-7000 400 1.11.16 2000 0014.c7e1.33df config VSP-7000 200 1.12.45 1000 0016.ca23.73df discover VSP-9001 300 1.12.45 1000 0016.ca23.73df discover VSP-9001 -------------------------------------------------------------------------------Total number of SPBM ISID entries configed: 6 -------------------------------------------------------------------------------Total number of SPBM ISID entries discovered: 2 -------------------------------------------------------------------------------Total number of SPBM ISID entries: 8 --------------------------------------------------------------------------------
Variable definitions
Use the data in the following table to use the show vlan i-sid commands.
Variable <14094><116777215> Value Displays I-SID information for the specified C-VLAN. You can specify the VLAN ID and I-SID ID.
May 2013
103
Use the data in the following table to use the show i-sid commands
Variable <116777215> Value Displays I-SID information. You can specify the I-SID ID.
Use the data in the following table to use the show isis commands.
Variable spbm i-sid {all|config|discover} Value all: displays all I-SID entries config: displays configured I-SID entries discover: displayes discovered I-SID entries vlan <14094> id <116777215> nick-name <x.xx.xx> Displays I-SID information for the specified SPBM VLAN. Displays I-SID information for the specified I-SID. Displays I-SID information for the specified nickname.
Job aid
The following sections describe the fields in the outputs for the C-VLAN I-SID show commands.
show i-sid
The following table describes the fields in the output for the show i-sid command.
Parameter I-SID Vid UNI-type Description Indicates the I-SID IDs. Indicates the VLAN IDs. Indicates the UNI-type as CVLAN or Switched
104
May 2013
Parameter Ports
Description Indicates ports associated with the specific ISIDs and VLANs.
May 2013
105
106
May 2013
Procedure
1. In the navigation tree, expand the following folders: Configuration > VLAN. 2. Click VLANs. 3. Click the Basic tab. 4. To map a C-VLAN to a Service instance identifier (I-SID), in the I-sid column, specify the I-SID to associate with the specified VLAN. 5. Click Apply. Important: When a protocol VLAN is created, all ports are added to the VLAN including SPBM ports. To configure a protocol-based VLAN as a C-VLAN, you must first
May 2013
107
remove the SPBM-enabled ports from the protocol based VLAN, and then configure the protocol-based VLAN as a C-VLAN.
Procedure
1. In the navigation tree, expand the following folders: ISIS > SPBM. 2. In the work area, click the MAC Addresses tab.
108
May 2013
Description
Procedure
1. In the navigation tree, expand the following folders: Configuration > IS-IS. 2. Click SPBM. 3. Click the Switched UNIs tab. 4. To create a Switched UNI, click Insert. 5. Configure the Switched UNI parameters. 6. Click Apply.
May 2013
109
110
May 2013
MD
A Maintenance Domain (MD) is the part of a network that is controlled by a single administrator. For example, a customer can engage the services of a service provider, who, in turn, can engage the services of several operators. In this scenario, there can be one MD associated with the customer, one MD associated with the service provider, and one MD associated with each of the operators. You assign one of the following eight levels to the MD: 02 (operator levels) 34 (provider levels) 57 (customer levels)
May 2013
111
CFM fundamentals
The levels separate MDs from each other and provide different areas of functionality to different devices using the network. An MD is characterized by a level and an MD name (optional). A single MD can contain several Maintenance Associations (MA). Note: Avaya VSP 7000 Series supports one global MD, named spbm. The spbm MD has a default maintenance level of 4.
MA
A Maintenance Association (MA) A represents a logical grouping of monitored entities within its Domain. It can therefore represent a set of Maintenance association End Points (MEPs), each configured with the same Maintenance Association ID (MAID) and MD Level, established to verify the integrity of a single service instance. The following figure shows MD level assignment in accordance with the 802.1ag standard. As shown in the figure, MIPs can be associated with MEPs. However, MIPs can also function independently of MEPs.
112
May 2013
MEP
MEP
A Maintenance Endpoint (MEP) represents a managed CFM entity, associated with a specific Domain Service Access Point (DoSAP) of a service instance, which can generate and receive CFM Protocol Data Units (PDU) and track any responses. A MEP is created by MEP ID under the context of an MA. MEP functionality can be divided into the following functions: Fault Detection Fault Verification
May 2013
113
CFM fundamentals
Fault Isolation Fault Notification Fault detection and notification are achieved through the use of Continuity Check Messages (CCM). CCM messages are not supported in the current release.
Fault verification
Fault verification is achieved through the use of Loopback Messages (LBM). An LBM is a unicast message triggered by the operator issuing an operational command. LBM can be addressed to either a MEP or Maintenance Intermediate Point (MIP) but only a MEP can initiate an LBM. The destination MP can be addressed by its MAC address. The receiving MP responds with a Loopback Response (LBR). LBM can contain an arbitrary amount of data that can be used to diagnose faults as well as performance measurements. The receiving MP copies the data to the LBR.
LBM
The Loopback Message (LBM) packet is often compared to a ping. A MEP transmits the LBM packet. This packet can be addressed to another MEP or to the MAC address of the MP; in the case of SPBM, this is the SPBM system ID. Only the MP for which the packet is addressed responds with an LBR message. You can trigger an LBM with the l2ping command. Provides ICMP ping like functionality natively at Layer 2. DA is the MAC address of the target. Includes a transaction identifier that allows the corresponding LBR to be identified when more than one LBM request is waiting for a response. Only the target (MIP or MEP) responds. Initiator can choose the size and contents data portion of the LBM frame. Can be used to check the ability of the network to forward different sized frames.
Layer 2 ping
The l2ping command is a proprietary command that allows a user to trigger an LBM message. For B-VLANs, specify either the destination MAC address or node name.
114
May 2013
Fault isolation
The l2ping command provides a ping equivalent at Layer 2 for use with nodes on the SPBM B-VLAN in the customer domain. Note: Layer 2 ping supports B-VLANs only.
Fault isolation
Fault isolation is achieved through the use of Linktrace Messages (LTM). LTM is intercepted by all the MPs on the way to the destination MP. VSP 7000 supports two types of LTM. The first type, the unicast LTM, can be addressed to either MEP or MIP MAC address. Each MP on the way decrements the TTL field in the LTM frame, sends Linktrace Reply (LTR), and forwards the original LTM to the destination. The LTM forwards until it reaches the destination or the TTL value is decremented to zero. LTR is a unicast message addressed to the originating MEP. The second type, the proprietary LTM, is used to map the MAC addresses of the SPBM network; in this case the target MAC is a service instance identifier (I-SID), not an MP.
LTM
CFM offers Linktrace message (LTM) for fault isolation. LTM allow operators, service providers and customers to verify the connectivity that they provide or use and to debug systems.
May 2013
115
CFM fundamentals
MIP that is on the path to the target - Forwards the LTM after decrementing the TTL and replacing the SA with its own address. - Sends an LTR to the originator. - Identifies itself in the forwarded LTM and LTR by modifying TLV information. If the MIP or MEP is a target - Sends an LTR to the originator. - Identifies itself in the forwarded LTM and LTR by modifying TLV information. A MEP that is not the target but is on the path to the target - Generates a reply as described above. - It also sets one of the flags fields in the reply to indicate that it is the terminal MEP.
Layer 2 traceroute
The l2traceroute command is a proprietary command that allows a user to trigger an LTM message. For B-VLANs, specify either the destination MAC address or node name. The l2 traceroute command provides a trace equivalent at Layer 2 for use with nodes on the SPBM B-VLAN in the customer domain. Note: Layer 2 traceroute supports B-VLANs only.
116
May 2013
Layer 2 tracetree
Layer 2 tracetree
The l2tracetree command is a proprietary command that allows you to trigger a multicast LTM by specifying the B-VLAN and I-SID. Layer 2 tracetree allows you to view a multicast tree on the SPBM B-VLAN from the source node to the destination nodes for a particular I-SID.
MIP
Maintenance domain intermediate points (MIPs) do not initialize any CFM messages. MIPs passively receive CFM messages, process the messages received and respond back to the originating MEP. By responding to received CFM messages, MIPs can support discovery of hop-by-hop path among MEPs, allow connection failures to be isolated to smaller segments of the network to help discover location of faults along the paths. MIP functionality can be summarized as: Respond to Loopback (ping) messages at the same level as itself and addressed to it. Respond to Linktrace (traceroute) messages. Forward Linktrace messages after decrementing the TTL.
Nodal MPs
Nodal MPs provide both MEP and MIP functionality for SPBM deployments. Nodal MPs are associated with a B-VLAN and are VLAN encapsulated packets. The Nodal MEP provides traceability and troubleshooting at the system level for a given B-VLAN. Each switch has a given MAC address and communicates with other switches. The SPBM instance MAC address is used as the MAC address of the Nodal MP. The Nodal B-VLAN MPs supports eight levels of CFM.
Configuration considerations
When you configure CFM, be aware of the following configuration considerations: The Maintenance level for MEPs and MIPs on a given B-VID (in a network) must be configured to the same level for them to respond to a given CFM command. CFM is supported only on B-VLANs.
May 2013
117
CFM fundamentals
118
May 2013
Configuring CFM
Use this procedure to configure auto-generated CFM Maintenance End Points (MEPs) and Maintenance Intermediate Point (MIP) level for every SPBM B-VLAN on the VSP 7000. This procedure automatically configures a Maintenance Domain (MD) , Maintenance Associations (MAs), MEP ID, and also associates the MEPs and MIP level to the SPBM VLANs.
Procedure
1. Enter Global Configuration mode: enable configure terminal 2. Configure the maintenance level for every CFM MEP and MIP level on all SPBM VLANs:
May 2013
119
Note: You can change the level before or after CFM is enabled. The default level is 4. cfm spbm [level <07>] 3. Assign a global CFM MEP ID for all CFM SPBM MEPs: Note: You can change the MEP ID only when CFM is disabled. cfm spbm mepid <18191> 4. Enable the CFM: cfm spbm enable 5. Display the global CFM SPBM configuration: show cfm spbm 6. If you want to default the CFM MD level, use the following command: default cfm spbm level 7. If you want to default the MEP identifier, use the following command: default cfm spbm mepid 8. If you want to disable CFM, use one of the following commands: no cfm spbm enable default cfm spbm enable
Example
7024XLS> enable 7024XLS# configure terminal 7024XLS(config)# cfm spbm level 4 7024XLS(config)# cfm spbm mepid 200 7024XLS(config)# cfm spbm enable 7024XLS(config)# show cfm spbm
CFM Admin State: Enabled CFM Spbm Level: 4 CFM Mep Id: 200
120
May 2013
Variable definitions
Use the data in the following table to use the cfm spbm commands.
Variable cfm spbm level <07> cfm spbm mepid <18191> Value Specifies the CFM MD level. The default is 4. Specifies the MEP ID. The default is 1. Note: You can only modify the MEP ID when CFM is disabled. cfm spbm enable no cfm spbm enable default cfm spbm level default cfm spbm mepid default cfm spbm enable show cfm spbm Enables CFM globally. Disables CFM globally. Defaults the CFM MD level. Defaults the CFM MEP ID. Defaults CFM. Default is globally disabled. Displays the current CFM configuration.
Procedure
1. Enter Privileged EXEC mode: enable 2. Trigger a Layer 2 ping: l2ping {vlan <14094> routernodename WORD<0255> | vlan <1 4094> mac <0x00:0x00:0x00:0x00:0x00:0x00>} [burst-count <1 200>] [data-tlv-size <0400>] [frame-size <641500>]
May 2013
121
Example
7024XLS# l2ping vlan 500 mac 00.14.0d.bf.a3.df
Please wait for l2ping to complete or press any key to abort ----00:14:0d:bf:a3:df L2 PING Statistics---- 0(68) bytes of data 1 packets transmitted, 0 packets received, 100.00% packet loss
Variable definitions
Use the data in the following table to configure the l2ping parameters.
Variable vlan <14094> routernodename WORD<0255> vlan <14094> mac <0x00:0x00:0x00:0x00:0x00:0x00 > Value Specifies the destination for the L2 ping: <14094> Specifies the VLAN ID. WORD<0255> Specifies the Router node name. <XX:XX:XX:XX:XX:XX> Specifies the MAC address. burst-count <1200> data-tlv-size <0400> frame-size <641500> testfill-pattern <all-zero|all-zerocrc|pseudo-random-bit-sequence| pseudo-random-bit-sequencecrc> Specifies the burst count. Specifies the data TLV size. The default is 0. Specifies the frame size. The default is 0. Specifies the testfill pattern: all-zero null signal without cyclic redundancy check all-zero-crc null signal with cyclic redundancy check with 32-bit polynomial pseudo-random-bit-sequence pseudo-randombit-sequence without cyclic redundancy check pseudo-random-bit-sequence-crc pseudorandom-bit-sequence with cyclic redundancy check with 32-bit polynomial.
122
May 2013
Variable
Value A cyclic redundancy check is a code that detects errors. The default is all-zero.
Specifies the priority. The default is 7. Specifies the interval in seconds. The default is 3.
Procedure
1. Enter Privileged EXEC mode: enable 2. Trigger a Layer 2 traceroute: l2traceroute {<vlan <14094> routernodename WORD<0255> | <vlan <14094> mac <0x00:0x00:0x00:0x00:0x00:0x00>} [priority <07>] [ttl <1255>]
Example
7024XLS# l2traceroute vlan 500 routernodename VSP-MONTIO
Please wait for l2traceroute to complete or press any key to abort
May 2013
123
vlan 500
Variable definitions
Use the data in the following table to use the l2traceroute command.
Variable vlan <14094> routernodename WORD<0255>} vlan <14094> mac <0x00:0x00:0x00:0x00:0x00:0x00 >} Value Specifies the destination for the L2 traceroute: <14094> Specifies the VLAN ID WORD<0255> Specifies the Router Node Name <XX:XX:XX:XX:XX:XX> Specifies the MAC address Specifies the TTL value. The default is 64. Specifies the priority. The default is 7.
Procedure
1. Enter Privileged EXEC mode: enable 2. Trigger a Layer 2 tracetree: l2tracetree vlan <14094> isid <116777215> [routernodename WORD<0255> | mac <0x00:0x00:0x00:0x00:0x00:0x00>] [priority <07>] [ttl <1255>]
Example
7024XLS# l2tracetree vlan 2 isid 1 mac 53:55:10:00:00:01
Please wait for l2tracetree to complete or press any key to abort
124
May 2013
l2tracetree to 53:55:10:00:00:01, vlan 2 i-sid 1 nickname 5.55.10 hops 64 1 VSP-PETER4 00:15:9b:11:33:df -> VSP-MONTI0 00:14:0d:a2:b3:df 2 VSP-MONTI0 00:14:0d:a2:b3:df -> VSP-LEE2 00:15:e8:b8:a3:df
Variable definitions
Use the data in the following table to use the l2tracetree command.
Variable vlan<14094>isid <116777215> Value <14094> Specifies the VLAN ID. <116777215> Specifies the I-SID. routernodename WORD<0255> mac <0x00:0x00:0x00:0x00:0x00:0x00 > ttl <1255> priority <07> WORD<0255> Specifies the Router Node Name. <0x00:0x00:0x00:0x00:0x00:0x00> Specifies the MAC address. Specifies the TTL value. The default is 64. Specifies the priority value. The default is 7.
May 2013
125
126
May 2013
Configuring CFM
Use this procedure to configure auto-generated CFM Maintenance End Points (MEPs) and Maintenance Intermediate Point (MIP) level for every SPBM B-VLAN on the VSP 7000. This procedure automatically configures a Maintenance Domain (MD), Maintenance Associations (MAs), MEP ID, and also associates the MEPs and MIP level to the SPBM VLANs.
Procedure
1. From the navigation tree, expand the following folders: Configuration > Edit > Diagnostics. 2. Click CFM. 3. Click the Globals tab. 4. In the SpbmAdminState field, click a radio button to enable or disable CFM. specify an index value, name, and level for the MD. 5. In the SpbmLevel field, configure the maintenance level for every CFM MEP and MIP level on all the SPBM VLANs. 6. In the SpbmMepId field, assign a global CFM MEP ID for all CFM SPBM MEPs.
May 2013
127
Displaying CFM MD
Use this procedure to display the Connectivity Fault Management (CFM) Maintenance Domain (MD). An MD is the part of a network that is controlled by a single administrator. A single MD can contain several Maintenance Associations (MA).
Procedure
1. From the navigation tree, expand the following folders: Configuration > Edit > Diagnostics. 2. Click CFM. 3. Click the MD tab. 4. On the toolbar, click Refresh to display the current MD configuration.
MD field descriptions
Use the data in the following table to use the MD tab.
Name Index Description Specifies a maintenance domain entry index.
128
May 2013
Displaying CFM MA
Description Specifies the MD name. Indicates the number of MAs that belong to this maintenance domain. Specifies the MD maintenance level. The default is 4. Indicates the number of MIPs that belong to this maintenance domain Indicates the type of domain.
Displaying CFM MA
Use this procedure to display a CFM Maintenance Association (MA). An MA represents a logical grouping of monitored entities within its Domain. It can therefore represent a set of Maintenance Endpoints (MEPs), each configured with the same Maintenance Association ID (MAID) and MD Level, established to verify the integrity of a single service instance.
Procedure
1. In the navigation tree, expand the following folders: Configuration > Edit > Diagnostics. 2. Click CFM. 3. Click the MD tab. 4. Select an existing MD. 5. On the toolbar, click MaintenanceAssociation.
MA field descriptions
Use the data in the following table to use the MA tab.
Name DomainIndex Description Specifies the maintenance domain entry index.
May 2013
129
Description Specifies a maintenance association entry index. Specifies the MD name. Specifies the MA name. Indicates the number of MEPs that belong to this maintenance association.
Procedure
1. In the navigation tree, expand the following folders: Configuration > Edit > Diagnostics. 2. Click CFM. 3. Click the MD tab. 4. Select an existing MD, and then click MaintenanceAssociation. 5. In the MA tab, select an existing MA, and then click MaintenanceEndpoint.
130
May 2013
Description Specifies the administrative state of the MEP. The default is disable. Specifies the MEP type: trunk sg endpt vlan port endptClient nodal remotetrunk remotesg remoteendpt remoteVlan remotePort remoteEndptClient
ServiceDescription
Procedure
1. In the navigation tree, expand the following folders: Configuration > Edit > Diagnostics. 2. Click L2Ping/L2Trace Route. 3. From the L2Ping tab, configure the Layer 2 ping properties. 4. To initiate a Layer 2 ping, highlight an entry and click the Start button.
May 2013
131
5. To update a Layer 2 ping, click the Refresh button. 6. To stop the Layer 2 ping, click the Stop button.
132
May 2013
Description Specifies the interval to wait for an L2Ping time-out. The default value is 3 seconds. Specifies the test pattern to use in the L2Ping PDU: allZero: null signal without cyclic redundancy check allZeroCrc: null signal with cyclic redundancy check with 32-bit polynomial pseudoRandomBitSequence: pseudorandom-bit-sequence without cyclic redundancy check pseudoRandomBitSequenceCrc: pseudorandom-bit-sequence with cyclic redundancy check with 32-bit polynomial. A cyclic redundancy check is a code that detects errors. The default value is allZero.
DataSize
Specifies an arbitrary amount of data to be included in the data TLV, if the data size is selected to be sent. The default is 0. Specifies the frame size. If the frame size is specified then the data size is internally calculated and the calculated data size is included in the data TLV. The default is 0. Specifies the source modes of the transmit loopback service: nodal smltVirtual The default is nodal.
FrameSize
SourceMode
SeqNumber
The transaction identifier/sequence number of the first loopback message (to be) sent. The default is 0. Displays the Layer 2 Ping result.
Result
May 2013
133
If you configure IsTraceTree to false then EDM performs Traceroute on the unicast path. If you configure IsTraceTree to true then EDM performs TraceTree on the multicast tree. Important: The MAC address must be learned before you can trace a route to a MAC address. For B-VLANs, IS-IS learns the MAC address and populates the FDB table. Linktrace traces the path up to the closest device to that MAC address that supports CFM.
Procedure
1. In the navigation tree, expand the following folders: Configuration > Edit > Diagnostics. 2. Click L2Ping/L2Trace Route. 3. Click the L2 Traceroute/TraceTree tab. 4. To configure the traceroute or tracetree, highlight an entry and populate the required column fields. 5. To start the traceroute, click the Start button. 6. To update the traceroute, click the Refresh button. 7. To stop the traceroute, click the Stop button.
DestMacAddress HostName
134
May 2013
Name DestIsHostName
Description Specifies whether the host name is (true) or is not (false) used for the L2Trace transmission. Specifies the Service Instance Identifier (ISID). Specifies whether the multicast tree or unicast path is traced. If you configure IsTraceTree to false then EDM performs Traceroute on the unicast path. If you configure IsTraceTree to true then EDM performs TraceTree on the multicast tree. Indicates the status of the transmit loopback service: ready: the service is available. transmit: the service is transmitting, or about to transmit, the L2Trace messages. abort: the service aborted or is about to abort the L2Trace messages. This field is also used to avoid concurrency or race condition problems that can occur if two or more management entities try to use the service at the same time. The default is ready.
Isid IsTraceTree
Status
ResultOk
Indicates the result of the operation: true: the L2Trace messages will be (or have been) sent. false: the L2Trace messages will not be sent. The default is true.
Ttl
Specifies the number of hops remaining to this L2Trace. This value is decremented by 1 by each Bridge that handles the L2Trace. The decremented value is returned in the L2Trace. If 0 on output, the L2Trace is not transmitted to the next hop. The value of the time-to-live (TTL) field in the L2Trace is defined by the originating MEP. The default value is 64. Specifies the source mode of the transmit loopback service. The default is nodal.
SourceMode
May 2013
135
Name SeqNumber
Description Specifies the transaction identifier/sequence number of the first loopback message (to be) sent. The default is 0. L2Trace result flag indicating L2Trace status or error code: none (1): No error internalError (2): L2Trace internal error invalidMac (3): Invalid MAC address mepDisabled (4): MEP must be enabled in order to perform L2Trace noL2TraceResponse (5): No L2Trace response received l2TraceToOwnMepMac (6): L2Trace to own MEP MAC is not sent l2TraceComplete (7): L2Trace completed l2TraceLookupFailure (8): Lookup failure for L2Trace l2TraceLeafNode (9): On a leaf node in the I-SID tree l2TraceNotInTree (10): Not in the I-SID tree
Flag
Procedure
1. In the navigation tree, expand the following folders: Configuration > Edit > Diagnostics. 2. Click L2Ping/L2Trace Route. 3. Click the L2Traceroute/TraceTree tab.
136
May 2013
4. Click the Refresh button to update the results. 5. To view the traceroute results, highlight an entry, and then click Result.
Hop ReceiveOrder
May 2013
137
138
May 2013
Glossary
Autonomous System (AS) autonomous system border router (ASBR) Autonomous System Number (ASN) Avaya command line interface (ACLI) Backbone Core Bridge (BCB) Backbone Edge Bridge (BEB) A set of routers under a single technical administration, using a single IGP and common metrics to route packets within the AS, and using an EGP to route packets to other ASs. A router attached at the edge of an OSPF network. An ASBR uses one or more interfaces that run an interdomain routing protocol such as BGP. In addition, a router distributing static routes or Routing Information Protocol (RIP) routes into OSPF is considered an ASBR. A two-byte number that is used to identify a specific AS.
A textual user interface. When you use ACLI, you respond to a prompt by typing a command. After you enter the command, you receive a system response. Backbone Core Bridges (BCB) form the core of the SPBM network. Backbone Core Bridges (BCBs) forward encapsulated traffic based on the Backbone MAC Destination Address (BMAC-DA). Backbone Edge Bridge (BEB) handle the boundary between the core MAC-in-MAC Shortest Bath Bridging MAC (SPBM) domain and the edge customer 802.1Q domain. I-SIDs are provisioned on the BEBs to be associated with a particular service instance. In the SPBM core, the bridges are referred to as Backbone Core Bridges (BCBs). BCBs forward encapsulated traffic based on the Backbone MAC Destination Address (BMAC-DA). In Provider Backbone Bridging (PBB) MAC-in-MAC encapsulation, customer MAC addresses are encapsulated in Backbone MAC (BMAC) addresses. MAC-in-MAC encapsulation defines a BMAC-DA and BMAC-SA to identify the backbone source and destination addresses. The originating node creates a MAC header that is used for delivery from end to end. As the MAC header stays the same across the network, there is no need to swap a label or do a route lookup at each node, allowing the frame to follow the most efficient forwarding path end to end. In Shortest Path Bridging MAC (SPBM), each node has a System ID, which is used in the topology announcement. This same System ID also serves as the switch Backbone MAC address (B-MAC), which is used as the source and destination MAC address in the SPBM network.
May 2013
139
Backbone VLAN identifier (B-VID) Border Gateway Protocol (BGP) Circuitless IP (CLIP) Complete Sequence Number Packets (CSNP) Connectivity Fault Management (CFM)
The Backbone VLAN identifier (B-VID) indicates the Shortest Path Bridging MAC (SPBM) B-VLAN associated with the SPBM instance. An inter-domain routing protocol that provides loop-free inter-domain routing between Autonomous Systems (AS) or within an AS. A virtual interface that does not map to any physical interface. This interface is often called a loopback. Complete Sequence Number Packets (CSNP) contain the most recent sequence numbers of all Link State Packets (LSPs) in the database. When all routers update their LSP database, synchronization is complete. Connectivity Fault Management is a mechanism to debug connectivity issues and to isolate faults within the Shortest Path Bridging-MAC (SPBM) network. CFM operates at Layer 2 and provides the equivalent of ping and traceroute. IEEE 802.1ag Connectivity Fault Management (CFM) divides or separates a network into administrative domains called Maintenance Domains (MD). Each MD is further subdivided into logical groupings called Maintenance Associations (MA). Each MA is defined by a set of Maintenance Points (MP). An MP is a demarcation point on an interface that participates in CFM within an MD. The Control Processor module is responsible for running all high level protocols (BGP, OSPF) and distributing the results (routing updates) to the rest of the system, managing and configuring the IO and Switch Fabric modules, and maintaining and monitoring the health of the chassis. For customer MAC (C-MAC) addresses, which is customer traffic, to be forwarded across the service provider back, SPBM uses IEEE 802.1ah Provider Backbone Bridging MAC-in-MAC encapsulation. The C-MAC addresses are hidden in a backbone MAC (B-MAC) address pair made up of a BMAC destination address (BMAC-DA) and a BMAC source address (BMAC-SA). A Designated Intermediate System (DIS) is the designated router in Intermediate System to Intermediate System (IS-IS) terminology. You can modify the priority to affect the likelihood of a router being elected the designated router. The higher the priority, the more likely the router is to be elected as the DIS. If two routers have the same priority, the router with the highest MAC address (Sequence Number Packet [SNP] address) is elected as the DIS. A Web-based embedded management system to support single-element management. EDM provides complete configuration management
140
May 2013
functionality for the supported devices and is supplied to the customer as embedded software in the device. equal cost multipath (ECMP) graphical user interface (GUI) Institute of Electrical and Electronics Engineers (IEEE) IEEE 802.1aq Distributes routing traffic among multiple equal-cost routes. A graphical (rather than textual) computer interface. An international professional society that issues standards and is a member of the American National Standards Institute, the International Standards Institute, and the International Standards Organization. IEEE 802.1aq is the standard for Shortest Path Bridging MAC (SPBM). SPBM makes network virtualization much easier to deploy within, reducing the complexity of the network while at the same time providing greater scalability. SPBM eliminates the need for multiple overlay protocols in the core of the network by reducing the core to a single Ethernet based link state protocol which can provide virtualization services, both layer 2 and layer 3, using a pure Ethernet technology base. Distributes routing information between routers that belong to a single Autonomous System (AS). Intermediate System to Intermediate System( IS-IS) is a link-state, interior gateway protocol that was developed for the International Organization for Standardization (ISO). ISO terminology refers to routers as Intermediate Systems (IS), hence the name Intermediate System-toIntermediate System (IS-IS). IS-IS operation is similar to Open Shortest Path First (OSPF). Both protocols divide large domains into smaller areas, and both use the shortest path first (SPF) algorithm and link state information to determine the best path to a destination. In Shortest Path Bridging-MAC (SPBM) networks, IS-IS discovers network topology and builds shortest path trees between network nodes that are used for forwarding unicast traffic and determining the forwarding table for multicast traffic. In SPBM networks, IS-IS also communicates information in the control plane, which is instance service indentifier (ISID) information. SPBM employs IS-IS as the interior gateway protocol and implements additional Type-Length-Values (TLVs) to support additional functionality. interswitch trunking (IST) A feature that uses one or more parallel point-to-point links to connect two aggregation switches. The two aggregation switches use this channel to share information and operate as a single logical switch. Only
May 2013
141
one interswitch trunk can exist on each Split Multilink Trunking (SMLT) aggregation switch. IS-IS Hello packets Intermediate System to Intermediate System (IS-IS) uses Hello packets to initialize and maintain adjacencies between neighboring routers. ISIS Hello packets contain the IP address of the interface over which the Hello is transmitted. These packets are broadcast to discover the identities of neighboring IS-IS systems and to determine whether the neighbor is a Level 1 router. The technology foundation for audio and video streaming, push applications, software distribution, multipoint conferencing, and proxy and caching solutions. The Physical Layer of the Open System Interconnection (OSI) model. Layer 1 interfaces with the MAC sublayer of Layer 2, and performs character encoding, transmission, reception, and character decoding. The Data Link Layer of the OSI model. Examples of Layer 2 protocols are Ethernet and Frame Relay. The Network Layer of the OSI model. Example of a Layer 3 protocol is Internet Protocol (IP). The Transport Layer of the OSI model. An example of a Layer 4 protocol is Transfer Control Protocol (TCP). Layer 2 Virtual Services Network (L2 VSN) feature provides IP connectivity over SPBM for VLANs. Layer 2 virtualization is handled by the Backbone Edge Bridges (BEBs) where the end-user VLAN is mapped into a Backbone Service Instance Identifier (I-SID) by local provisioning. Any BEB that has the same I-SID configured can participate in the same Layer 2 Virtual Services Network (VSN). IS-IS within the SPBM backbone is used as the Layer 2 routing protocol to forward traffic between the BEB and Provider Backbone Core Bridges (BCBs). Only the BEB has knowledge of the Layer 2 VSN and corresponding MAC addresses. The BCB only has knowledge of each Backbone MAC address (B-MAC) used to send traffic across an SPBM network. The Layer 3 Virtual Services Network (L3 VSN) feature provides IP connectivity over SPBM for VRFs. Layer 3 virtualized routing is handled by the Backbone Edge Bridges (BEBs) where the end-user IP enabled VLAN or VLANs are mapped to a Virtualized Routing and Forwarding (VRF) instance. The VRF in turn is mapped into a Backbone Service Instance Identifier (I-SID) by local provisioning. Any BEB that has the same I-SID configured can participate in the same Layer 3 Virtual Service Network (VSN). IS-IS within the SPBM backbone is used as the Layer 2 routing protocol to forward traffic between the BEB and Backbone Core
142
May 2013
Bridges (BCB). Only the BEB has knowledge of the Layer 3 VSN and corresponding IP/ARP/MAC addresses. The BCB only has knowledge of each Backbone MAC address (B-MAC) used send traffic across an SPBM network. Link Layer Discovery Protocol (LLDP) link-state database (LSDB) Link State Packets (LSP) Link Layer Discovery Protocol is used by network devices to advertise their identities. Devices send LLDP information at fixed intervals in the form of Ethernet frames, with each frame having one Link Layer Discovery Protocol Data Unit. A database built by each OSPF router to store LSA information. The router uses the LSDB to calculate the shortest path to each destination in the Autonomous System (AS), with itself at the root of each path. Link State Packets (LSP) contain information about the state of adjacencies or defined and distributed static routes. Intermediate System to Intermediate System (IS-IS) exchanges this information with neighboring IS-IS routers at periodic intervals. Every router in the domain has an identical link state database and each runs shortest path first to calculate routes. Link State Protocol Data Unit is similar to a Link State Advertisement in Open Shortest Path First (OSPF). Intermediate System to Intermediate System (IS-IS) runs on all nodes of Shortest Path Bridging-MAC (SPBM). Since IS-IS is the basis of SPBM, the IS-IS adjacency must be formed first by first sending out hellos and then Link State Protocol Data Units. After the hellos are confirmed both nodes sends Link State Protocol Data Units (LSPDUs) that contain connectivity information for the SPBM node. These nodes also send copies of all other LSPDUs they have in their databases. This establishes a network of connectivity providing the necessary information for each node to find the best and proper path to all destinations in the network. The link trace message (LTM) is often compared to traceroute. A MEP transmits the LTM packet. This packet specifies the target MAC address of an MP which is the SPBM system id or the virtual SMLT MAC. MPs on the path to the target address respond with an LTR. LTM contains: Time to live (TTL) Transaction Identifier Originator MAC address Target MAC address Local Area Network (LAN) A data communications system that lies within a limited spatial area, uses a specific user group and topology, and can connect to a public switched telecommunications network (but is not one).
May 2013
143
A Loopback Message (LBM) is a unicast message triggered by the operator issuing an operational command. LBM can be addressed to either a Maintenance End Point (MEP) or Maintenance Intermediate Point (MIP), but only a MEP can initiate an LBM. The destination MP can be addressed by its MAC address. The receiving MP responds with a Loopback Response (LBR). LBM can contain an arbitrary amount of data that can be used to diagnose faults as well as performance measurements. The receiving MP copies the data to the LBR. Fault verification is achieved through the use of Loopback Messages (LBM). Loopback Response (LBR) is the response from a Maintenance Point (MP). MAC-in-MAC encapsulation defines a BMAC-DA and BMAC-SA to identify the backbone source and destination addresses. The originating node creates a MAC header that is used for delivery from end to end. As the MAC header stays the same across the network, there is no need to swap a label or do a route lookup at each node, allowing the frame to follow the most efficient forwarding path end to end. Maintenance Domains (MD) are administrative domains that a network is divided by the 802.1ag Connectivity Fault Management (CFM) feature. Each MD is further subdivided into logical groupings called Maintenance Associations (MA). Connectivity Fault Management is a mechanism to debug connectivity issues and to isolate faults within the Shortest Path Bridging MAC (SPBM) Network. Maintenance Associations (MA) are administrative associations in a network that is divided by the 802.1ag Connectivity Fault Management (CFM) feature. MAs are grouped within Maintenance Domains. Each MA is defined by a set of Maintenance Points (MP). An MP is a demarcation point on an interface that participates in CFM within an MD. Connectivity Fault Management is a mechanism to debug connectivity issues and to isolate faults within the Shortest Path Bridging MAC (SPBM) Network. Maintenance Points (MP) are a demarcation point on an interface that participates in Connectivity Fault Management (CFM) within a Maintenance Domain (MD). There are two types of MP: Maintenance End Point (MEP) and Maintenance Intermediate Point (MIP). Connectivity Fault Management is a mechanism to debug connectivity issues and to isolate faults within the Shortest Path Bridging MAC (SPBM) Network. Arbitrates access to and from a shared medium.
144
May 2013
MD5 authentication creates an encoded checksum in the transmitted packet. The receiving router uses an authentication key (password) to verify the packets MD5 checksum. There is an optional key ID. The multicast group ID (MGID) is a hardware mechanism the switch uses to send data to several ports simultaneously. Instead of sending the data to a specific port number, the data is directed to an MGID. The switch maintains a table that maps MGIDs to their member ports. Both virtual LAN (VLAN) and IP multicast (IPMC) use MGIDs. A method of link aggregation that uses multiple Ethernet trunks aggregated to provide a single logical trunk. A multilink trunk provides the combined bandwidth of multiple links and the physical layer protection against the failure of a single link. The Network Entity Title (NET) is the combination of all three global parameters: Manual area, System ID and NSEL. Manual area The manual area or area ID is up to 13 bytes long. The first byte of the area number (for example, 49) is the Authority and Format Indicator (AFI). The next bytes are the assigned domain (area) identifier, which is up to 12 bytes (for example, 49.0102.0304.0506.0708.0910.1112). System ID The system ID is any 6 bytes that are unique in a given area or level. The system ID defaults to the node BMAC. NSEL The last byte (00) is the n-selector. In the Avaya Ethernet Routing Switch 8800/8600 implementation, this part is automatically attached. There is no user input accepted.
Open Shortest Path First (OSPF) Packet Capture Tool (PCAP) Partial Sequence Number Packets (PSNP) port Protocol Data Units (PDUs)
A link-state routing protocol used as an Interior Gateway Protocol (IGP). A data packet capture tool that captures ingress and egress (on Ethernet modules only) packets on selected ports. You can analyze captured packets for troubleshooting purposes. Partial Sequence Number Packets (PSNP) are requests for missing Link State Packets (LSPs). When a receiving router detects that it is missing an LSP, it sends a PSNP to the router that sent the Complete Sequence Number Packets (CSNP). A physical interface that transmits and receives data. A unit of data that is specified in a protocol of a given layer and that consists of protocol-control information of the given layer and possibly user data of that layer.
May 2013
145
To forward customer traffic across the service provider backbone, SPBM uses IEEE 802.1ah Provider Backbone Bridging (PBB) MAC-in-MAC encapsulation, which hides the customer MAC (C-MAC) addresses in a backbone MAC (B-MAC) address pair. MAC-in-MAC encapsulation defines a BMAC-DA and BMAC-SA to identify the backbone source and destination addresses. Prevents packet forwarding for incoming IP packets with incorrect or forged (spoofed) IP addresses. Prevents a packet from forging its source IP address. Typically, the system examines and validates the source address of each packet. A distance vector protocol in the IP suite, used by IP network-layer protocol, that enables routers in the same AS to exchange routing information by means of periodic updates. The RIP is most often used as a very simple IGP within small networks. The SPBM B-MAC header includes a Service Instance Identifier (I-SID) with a length of 24 bits. This I-SID can be used to identify and transmit any virtualized traffic in an encapsulated SPBM frame. These I-SIDs are used to virtualize VLANs (Layer 2 Virtual Services Network [VSN]) or VRFs (Layer 3 Virtual Services Network [VSN]) across the MAC-in-MAC backbone. With Layer 2 VSN, the I-SID is associated with a customer VLAN, which is then virtualized across the backbone. With Layer 3 VSN, the I-SID is associated with a customer VRF, which is also virtualized across the backbone. Shortest Path Bridging is a control Link State Protocol that provides a loop free Ethernet topology. There are two versions of Shortest Path Bridge: Shortest Path Bridging VLAN and Shortest Path Bridging MAC. Shortest Path Bridging VLAN uses the Q-in-Q frame format and encapsulates the source bridge ID into the VLAN header. Shortest Path Bridging MAC uses the 802.1 ah MAC-in-MAC frame format and encapsulates the source bridge identifier into the B-MAC header. Shortest Path Bridging MAC (SPBM) uses the Intermediate-System-toIntermediate-System (IS-IS) link state routing protocol to provide a loop free Ethernet topology that creates a shortest path topology from every node to every other node in the network based on node MAC addresses. SPBM uses the 802.1ah MAC-in-MAC frame format and encapsulates the source bridge identifier into the B-MAC header. SPBM eliminates the need for multiple overlay protocols in the core of the network by reducing the core to a single Ethernet based link state protocol which can provide virtualization services, both layer 2 and layer 3, using a pure Ethernet technology base.
reverse path checking (RPC) reverse path forwarding (RPF) Routing Information Protocol (RIP) Service Instance Identifier (I-SID)
146
May 2013
An Avaya extension to IEEE 802.1AX (link aggregation), provides nodal and link failure protection and flexible bandwidth scaling to improve on the level of Layer 2 resiliency. The field in a packet used to determine the valid duration for the packet; the TTL determines the packet lifetime. The system discards a packet with a TTL of zero. A Top of Rack (TOR) switch refers to a switch that sits at the top or near the top of a rack often found in data centers. Virtual Link Aggregation Control Protocol (VLACP) is a Layer 2 handshaking protocol that can detect end-to-end failure between two physical Ethernet interfaces. A Virtual Local Area Network is a group of hosts that communicate as if they are attached to the same broadcast domain regardless of their physical location. VLANs are layer 2 constructs. A Virtual Private Network (VPN) requires remote users to be authenticated and ensures private information is not accessible to unauthorized parties. A VPN can allow users to access network resources or to share data. VLAN Identifier (VID) is a data field in IEEE 802.1Q VLAN tagging.
Top of Rack (TOR) Virtual Link Aggregation Control Protocol (VLACP) Virtual Local Area Network (VLAN) Virtual Private Network (VPN)
May 2013
147
148
May 2013