VDX L2 Command
VDX L2 Command
VDX L2 Command
28 August 2015
Network OS Layer 2
Switching Configuration Guide
MK-99COM161-00
© 2015, Brocade Communications Systems, Inc. All Rights Reserved.
ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, The Effortless
Network, VCS, VDX, Vplane, and Vyatta are registered trademarks, and Fabric Vision and vADX are trademarks of Brocade
Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be
trademarks of others.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any
equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document
at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be
currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in
this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the
accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that
accompany it.
The product described by this document may contain open source software covered by the GNU General Public License or other open
source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to
the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
Contents
Preface..................................................................................................................................... 9
Document conventions......................................................................................9
Text formatting conventions.................................................................. 9
Command syntax conventions.............................................................. 9
Notes, cautions, and warnings............................................................ 10
Brocade resources.......................................................................................... 11
Contacting Brocade Technical Support...........................................................11
Document feedback........................................................................................ 12
Edge-Loop Detection...............................................................................................................15
Edge-loop detection overview......................................................................... 15
How ELD detects loops.......................................................................17
Configuring edge-loop detection..................................................................... 18
Setting global ELD parameters for a Brocade VCS Fabric cluster .....19
Setting interface parameters on a port................................................20
Setting the ELD port priority on two port/VLAN pairs.......................... 20
Troubleshooting edge-loop detection..................................................21
AMPP..................................................................................................................................... 23
AMPP overview...............................................................................................23
AMPP over vLAG ............................................................................... 23
AMPP and Switched Port Analyzer ....................................................24
AMPP scalability................................................................................. 25
AMPP port-profiles ............................................................................. 25
Configuring AMPP profiles.............................................................................. 27
Configuring a new port-profile............................................................. 28
Configuring VLAN profiles...................................................................28
Configuring FCoE profiles................................................................... 29
Configuring QoS profiles..................................................................... 29
Configuring security profiles................................................................30
Creating a port-profile-port.................................................................. 31
Deleting a port-profile-port ................................................................. 31
Deleting a port-profile..........................................................................31
Deleting a sub-profile.......................................................................... 31
Creating a new port-profile domain and adding port profiles.............. 32
Monitoring AMPP profiles....................................................................32
FCoE.......................................................................................................................................35
FCoE overview................................................................................................35
FCoE terminology............................................................................... 35
End-to-end FCoE................................................................................ 36
802.1Q VLANs...................................................................................................................... 71
802.1Q VLAN overview.................................................................................71
Ingress VLAN filtering....................................................................... 71
VLAN configuration guidelines and restrictions................................ 73
Configuring and managing 802.1Q VLANs...................................................73
Understanding the default VLAN configuration................................. 73
Configuring interfaces to support VLANs.......................................... 74
Configuring protocol-based VLAN classifier rules.............................77
Displaying VLAN information............................................................ 79
Configuring the MAC address table and conversational MAC
learning........................................................................................79
Private VLANs...............................................................................................81
PVLAN configuration guidelines and restrictions.............................. 82
Associating the primary and secondary VLANs................................ 83
Configuring an interface as a PVLAN promiscuous port...................83
Configuring an interface as a PVLAN host port................................ 83
Configuring an interface as a PVLAN trunk port............................... 84
Displaying PVLAN information.......................................................... 84
Virtual Fabrics.......................................................................................................................93
Virtual Fabrics overview................................................................................ 93
Virtual Fabrics features..................................................................... 94
Virtual Fabrics considerations and limitations................................... 95
Distributed VXLAN gateways overview.............................................96
Virtual Fabrics upgrade and downgrade considerations............................. 101
Virtual Fabrics operations........................................................................... 102
Virtual Fabrics configuration overview........................................................ 103
UDLD....................................................................................................................................163
UDLD overview............................................................................................. 163
UDLD requirements.......................................................................... 163
How UDLD works..............................................................................163
Configuring UDLD......................................................................................... 165
Additional UDLD-related commands.............................................................165
LLDP ..................................................................................................................................181
LLDP overview............................................................................................181
Layer 2 topology mapping...............................................................181
DCBX.............................................................................................. 183
LLDP configuration guidelines and restrictions............................... 184
Configuring and managing LLDP................................................................184
Understanding the default LLDP..................................................... 185
Enabling LLDP globally................................................................... 185
Disabling LLDP globally.................................................................. 185
Resetting LLDP globally..................................................................186
Configuring LLDP global command options....................................186
Configuring LLDP interface-level command options....................... 190
Displaying LLDP-related information...............................................190
Clearing LLDP-related information..................................................191
QoS....................................................................................................................................193
QoS overview..............................................................................................193
QoS features................................................................................... 193
User-priority mapping......................................................................194
Congestion control.......................................................................... 194
Ethernet Pause............................................................................... 197
Multicast rate limiting.......................................................................199
BUM storm control.......................................................................... 199
Scheduling...................................................................................... 200
Data Center Bridging QoS.............................................................. 202
Brocade VCS Fabric QoS............................................................... 204
Port-based Policer...........................................................................205
Configuring QoS..........................................................................................209
Configuring QoS fundamentals....................................................... 209
Configuring traffic class mapping.................................................... 215
Configuring congestion control....................................................... 217
Configuring rate limiting.................................................................. 220
Configuring BUM storm control....................................................... 220
Configuring scheduling....................................................................221
Configuring DCB QoS..................................................................... 221
Configuring Brocade VCS Fabric QoS............................................223
Flow-based QoS............................................................................. 224
Auto QoS.........................................................................................231
IGMP..................................................................................................................................239
IGMP overview............................................................................................239
IGMP snooping overview............................................................................ 239
sFlow ...................................................................................................................................253
sFlow protocol overview................................................................................253
Interface flow samples...................................................................... 253
Packet counter samples....................................................................254
Hardware support matrix for sFlow................................................... 254
Flow-based sFlow............................................................................. 255
Configuring the sFlow protocol......................................................................255
Configuring the sFlow protocol globally............................................ 255
Configuring sFlow for interfaces........................................................256
Specifying the source of sFlow packets............................................ 258
Enabling flow-based sFlow............................................................... 258
Disabling flow-based sFlow on specific interfaces............................ 259
Configuring sFlow for VXLAN overlay gateway tunnels....................259
FlexPort..............................................................................................................................277
FlexPort overview........................................................................................277
Configuring FlexPort................................................................................... 278
FlexPorts and breakout mode..................................................................... 279
Configuring FlexPorts for breakout mode................................................... 279
● Document conventions......................................................................................................9
● Brocade resources.......................................................................................................... 11
● Contacting Brocade Technical Support...........................................................................11
● Document feedback........................................................................................................ 12
Document conventions
The document conventions describe text formatting conventions, command syntax conventions, and
important notice formats used in Brocade technical documentation.
Format Description
bold text Identifies command names
Identifies keywords and operands
Identifies the names of user-manipulated GUI elements
Identifies text to enter at the GUI
Convention Description
bold text Identifies command names, keywords, and command options.
italic text Identifies a variable.
value In Fibre Channel products, a fixed value provided as input to a command
option is printed in plain text, for example, --show WWN.
Convention Description
NOTE
A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference
to related information.
ATTENTION
An Attention statement indicates a stronger note, for example, to alert you when traffic might be
interrupted or the device might reboot.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or
extremely hazardous to you. Safety labels are also attached directly to products to warn of
these conditions or situations.
Brocade resources
Visit the Brocade website to locate related documentation for your product and additional Brocade
resources.
You can download additional publications supporting your product at www.brocade.com. Select the
Brocade Products tab to locate your product, then click the Brocade product name or image to open the
individual product page. The user manuals are available in the resources module at the bottom of the
page under the Documentation category.
To get up-to-the-minute information on Brocade products and resources, go to MyBrocade. You can
register at no cost to obtain a user ID and password.
Release notes are available on MyBrocade under Product Downloads.
White papers, online demonstrations, and data sheets are available through the Brocade website.
Brocade customers
For product support information and the latest information on contacting the Technical Assistance
Center, go to http://www.brocade.com/services-support/index.html.
If you have purchased Brocade product support directly from Brocade, use one of the following methods
to contact the Brocade Technical Assistance Center 24x7.
Preferred method of contact for non- Required for Sev 1-Critical and Sev [email protected]
urgent issues: 2-High issues:
Please include:
• My Cases through MyBrocade • Continental US: 1-800-752-8061
• Problem summary
• Software downloads and licensing • Europe, Middle East, Africa, and
• Serial number
tools Asia Pacific: +800-AT FIBREE
(+800 28 34 27 33) • Installation details
• Knowledge Base
• For areas unable to access toll • Environment description
free number: +1-408-333-6061
• Toll-free numbers are available in
many countries.
• Brocade Supplemental Support augments your existing OEM support contract, providing direct
access to Brocade expertise. For more information, contact Brocade or your OEM.
• For questions regarding service levels and response times, contact your OEM/Solution Provider.
Document feedback
To send feedback and report errors in the documentation you can use the feedback form posted with
the document or you can e-mail the documentation team.
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a topic
needs further development, we want to hear from you. You can provide feedback in two ways:
• Through the online feedback form in the HTML documents posted on www.brocade.com.
• By sending your feedback to [email protected].
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
NOTE
The Brocade VDX 2740 is the equivalent of the Lenovo Flex System EN4023 10Gb Scalable Switch.
This platform is identified in the system as EN4023.
• Brocade VDX 2746
• Brocade VDX 6740
‐ Brocade VDX 6740-48
‐ Brocade VDX 6740-64
• Brocade VDX 6740T
‐ Brocade VDX 6740T-48
‐ Brocade VDX 6740T-64
‐ Brocade VDX 6740T-1G
• Brocade VDX 6940-36Q
• Brocade VDX 6940-144S
• Brocade VDX 8770
‐ Brocade VDX 8770-4
‐ Brocade VDX 8770-8
To obtain information about a Network OS version other than this release, refer to the documentation
specific to that version.
NOTE
For an additional method of detecting and resolving L2 loops, see Resolving Repeated MAC-Moves on
page 293.
The following figure shows an example of a misconfiguration between a Brocade VCS Fabric cluster
and a standalone switch that could cause a Layer 2 loop. In this case, a VLAG is configured on the
edge devices of the Brocade VCS Fabric cluster for the two ISLs that connect the Brocade VCS Fabric
cluster to the standalone switch. In this case, a LAG has not been created on the standalone switch at
the other end of the ISLs. ELD detects and breaks this potential Layer 2 loop.
The following figure shows another example for which ELD could be used to detect and break a Layer
2 loop. In this case, multiple Brocade VCS Fabric clusters are interconnected in a manner that creates
a Layer 2 loop.
With all ELD enabled edge ports sending PDUs at the same rate, VCS1 reaches its pdu-rx-limit first.
Port 2/0/1 has a lower priority (higher priority number) than port 1/0/1, and is therefore selected to be
disabled. If both ports have the same priority, the port with the higher port-ID is disabled.
If the port being shut down by ELD is part of a LAG, all member ports of the LAG are also shut down.
If the port being shut down is part of a vLAG, all member ports of the vLAG on that RBridge are also
shut down.
Once ELD disables a port, normal operation is for the port to remain disabled until any
misconfiguration is repaired. Once the repair is finished, the port can be re-enabled manually.
NOTE
When ELD disables a port, the port is operationally down, but administratively still up. If a port is
disabled by STP or some other Layer 2 protocol, ELD does not process PDUs for that port.
any port before determining that a loop exists. This value is the pdu-rx-limit . You must also set the
interval between sending PDUs by using the hello-interval command The combination of pdu-rx-limit
and hello-interval determines the time it takes for ELD to detect and break a Layer 2 loop.
At the interface level, you must enable ELD on each port you want it to run on and set the port priority.
You should also specify a VLAN on which ELD is enabled
Enter the pdu-rx-limit command to set the limit to a different number on each Brocade VCS Fabric
cluster so that only one Brocade VCS Fabric cluster disables a port. Set this value in the increment of
two to prevent race conditions which might disable ports on two Brocade VCS Fabric clusters that are
incrementally only one apart.
Enter the hello-interval command to set the interval between PDUs. This interval must be set to the
same value on all Brocade VCS Fabric clusters for which ELD is configured, otherwise the results of
edge-loop detection become unpredictable.
Optionally, enter the mac refresh command to flush MAC addresses at a specified interval (in seconds)
on either the entire cluster or on the partner port to remove any MAC inconsistencies in your system. If
two interfaces are present in a Layer 2 loop, each interface learns the same set of MAC addresses.
When ELD detects the Layer 2 loop, it puts the participating interface into an operationally down state.
Consequently, MAC addresses learned on that interface get flushed. However, the same MAC
addresses are present at the interface at the other end of the already detected loop, thereby creating
this MAC inconsistency.
Optionally, enter the shutdown-time command to configure ports to be re-enabled after a specified
period of time (range 10 minutes to 24 hours). A typical use for this feature is in environments in which
reconfiguration is common, such as in a typical lab environment. Typical use is to allow the default
value of zero, which does not allow ports to be re-enabled automatically.
NOTE
Any change to shutdown-time only takes effect for the ports that are disabled by ELD after the
configuration change. Any ports that were already disabled by ELD before the shutdown-time change
continues to follow the old shutdown-time value. These ports start to follow the new shutdown time
after the currently running timer expires and ELD still detects the loop and shuts down the port again.
For each interface on which ELD runs, enter the edge-loop detection command to enable ELD. You
must also enter the edge-loop-detection port-priority command to specify the ELD port priority.
The number variable has a unit of 1 millisecond (ms). It must be in the range from 100 ms to 5000
ms . The default value is 1000 ms.
switch(config-eld)# hello-interval 2000
5. Enter the mac-refresh number command to flush MAC addresses at a specified interval (in
seconds) on either the entire cluster or on the partner port to remove any MAC inconsistencies in
your system.
The number variable must be in the range 60 through 300 (seconds). You must also specify either
all or port, depending on whether you want to flush the entire cluster or only the partner port.
switch(config-eld)# mac refresh 100 all
6. Enter the shutdown-time number command to set the number of minutes after which the shutdown
port is re-enabled.
The number variable must be in the range 10 through 1440 (10 minutes through 24 hours). The
default value is 0, indicating that the port is not automatically re-enabled.
switch(config-eld)# shutdown-time 1440
NOTE
The priority range of values is from 0 through 255. A port with priority 0 means that shutdown for
this port is disabled. The default value port priority is 128
NOTE
If an edge-port becomes an ISL port because a remote port’s VCS ID was changed, a port that
was already shut down by ELD must be cycled with the shutdown and no shutdown
commands to be detected as an ISL port.
• To re-enable all ports disabled by ELD, enter clear edge-loop-detection.
● AMPP overview...............................................................................................................23
● Configuring AMPP profiles.............................................................................................. 27
AMPP overview
Server virtualization infrastructure associates a server-side Virtual Ethernet Bridge (VEB) port-profile
with each Ethernet MAC address used by a virtual machine (VM) to access the network through a VEB
port. The Brocade Auto Migrating Port Profile (AMPP) feature provides advanced controls for
maintaining and migrating these port-profile associations when a VM migrates across physical servers.
If the VM is migrated from one physical server to another, the VEB’s port-profile migrates with it,
providing automated port-profile migration of the server’s VEB ports that are associated with the VM.
For environments where the server’s virtualization infrastructure provides sufficient controls, automated
port-profile migration approaches are fine. An example of such an environment is a high performance
cluster that uses a Layer 2 network that is isolated from external networks through firewalls and security
appliances.
However, there is a gap between the access and Quality of Service (QoS) controls supported in
external Layer 2 switches and the server virtualization infrastructure. External Layer 2 switches have
more advanced controls compared to server VEB implementations.
Some environments prefer the more advanced controls provided by external network switches. An
example of such an environment is a multi-tier data center that has several types of applications, each
with differing advanced network controls, running over the same Layer 2 network. In this type of
environment, the network administrator often prefers the use of advanced access controls available in
external switches.
Layer 2 networks do not provide a mechanism for automatically migrating switch access and traffic
controls associated with an end-point device when that device migrates from one switch to another. The
migration may be physical, such as an operating system image (such as an application, middleware,
operating system, and associated state) that is running BareMetal OS on one system and is migrated to
another system. The migration may be also be virtual, such as an operating system image that is
running over Hypervisor VMware on one system and is migrated to run over Hypervisor VMware on
another system.
The italic text in the following example highlights the vLAG information in the port profile:
switch# show port-profile status
Port-Profile PPID Activated Associated MAC Interface
auto-dvPortGroup 1 Yes None None
auto-dvPortGroup2 2 Yes None None
auto-dvPortGroup3 3 Yes None None
auto-dvPortGroup_4_0 4 Yes 0050.567e.98b0 None
auto-dvPortGroup_vlag 5 Yes 0050.5678.eaed None
auto-for_iscsi 6 Yes 0050.5673.85f9 None
0050.5673.fc6d None
0050.5674.f772 None
0050.5675.d6e0 Te 234/0/54
0050.567a.4288 None
auto-VM_Network 9 Yes 000c.2915.4bdc None
0050.56a0.000d None
0050.56a0.000e None
0050.56a0.000f None
0050.56a0.0010 Po 53
0050.56a0.0011 Po 53
0050.56a0.0012 Po 53
0050.56a0.0013 None
0050.56a0.0025 None
0050.56a0.0026 None
0050.56a0.0027 None
0050.56a0.0028 None
0050.56a0.0029 Po 53
0050.56a0.002a Po 53
0050.56a0.002b Po 53
0050.56a0.002c None
0050.56a0.002d None
0050.56a0.002e None
0050.56a0.002f None
0050.56b3.0001 Po 53
0050.56b3.0002 Po 53
0050.56b3.0004 Po 53
0050.56b3.0005 None
auto-VM_kernel 10 Yes 0050.5671.4d06 None
0050.5672.862f Po 53
0050.5678.37ea None
0050.567a.ddc3 None
auto-VM_NW_1G 11 Yes 0050.56b3.0000 None
0050.56b3.0003 Po 82
0050.56b3.0007 None
0050.56b3.0008 Po 82
0050.56b3.0009 Po 82
auto-VMkernel 12 Yes 0050.567a.fdcf Po 82
0050.567c.c2e3 None
auto-VMkernel_VS 13 Yes 0050.567d.16b9 None
0050.567e.e25b None
auto-Management+Network 14 Yes 5cf3.fc4d.ca88 None
auto-Virtual+Machine+Network 15 Yes 000c.2941.27e2 None
000c.2980.335d None
switch# show port-profile int all
Interface Port-Profile
Gi 234/0/1 None
Gi 234/0/13 None
Gi 234/0/25 None
Gi 234/0/26 None
Te 234/0/54 auto-for_iscsi
Po 82 auto-VM_NW_1G
auto-VMkernel
Po 53 auto-VM_Network
auto-VM_kernel
mutually exclusive. All of the Layer 2 configuration for SPAN is mutually exclusive with regard to the
port-profile-port command for AMPP.
AMPP scalability
The following table describes the Auto Migrating Port Profile (AMPP) scalability values supported by
Network OS 5.0.0 and later.
Number of ACLs in security profiles 1 ingress MAC ACL 1 ingress MAC ACL
1 egress MAC ACL 1 egress MAC ACL
1 ingress IPv4 ACL 1 ingress IPv4 ACL
1 egress IPv4 ACL 1 egress IPv4 ACL
1 ingress IPv6 ACL 1 ingress IPv6 ACL
1 egress IPv6 ACL 1 egress IPv6 ACL
For the number of MAC associations that are supported, refer to the Release Notes. The practical
number of MAC associations and VLANs that are supported will vary depending on the ACL
configuration. In addition, AMPP is subject to the maximum number of vLAGs and LAGs supported on
the switch, which is 1000 in this case.
AMPP port-profiles
As shown in the following figure, the default port-profile contains the entire configuration needed for a
VM to get access to the LAN and SAN.
In addition, all the combinations can be mixed up with some security rules grouped under a security-
profile.
NOTE
A port-profile does not contain some of the interface level configurations, such as LLDP, SPAN, LAG,
and so on.
A port-profile operates as a self-contained configuration container. In other words, if a port-profile is
applied on a completely new switch without any configuration, it is capable of configuring the
interface’s local configuration and starting to carry traffic. Any changes to the policies are immediately
applied to the data plane.
Security profiles are applied to the ACLs based on the profile or PolicyID. Therefore, multiple security
profiles can be applied to the same profiled port.
NOTE
The fcoe-profile is available for both default and nondefault profiles. User-defined port-profiles do not
have access to the fcoe-profile. However, editing of the port-profile is not allowed once the port-profile
is activated. Activation of the port-profile is mandatory when it is applied to a port. Refer to Configuring
FCoE profiles on page 29 for additional details.
Life of a port-profile
A port-profile during creation will go through multiple states. The states of a port-profile are as follows:
• Created —This state specifies that a port-profile is created or modified, but may not be complete.
• Activated —This state specifies that a port-profile is activated and is available for MAC->port-profile
association. If the port-profile created is not complete then the activation fails; you must resolve any
conflicts or dependencies and reactivate the port-profile.
• Associated —This state specifies that one or more MAC addresses have been associated to this
port-profile within the fabric.
• Applied —This state indicates that the port-profile is applied on the profiled port where the
associated MAC address appeared. In the absence of any signaling protocol, the system snoops
the packet to detect if the associated MAC address has appeared on the profiled port. Configuration
of two different port-profiles can co-exist on a profiled port, but if there is a conflict then the
application of the later port-profile fails.
The following table describes the AMPP events and the applicable failure behaviors.
Create port-profile • If the port-profile does not exist, then it is created. If it exists, then it is available
for modification (if it is not yet activated).
Activate port-profile • If the port-profile configuration is not complete, activation fails. Unless the port-
profile is activated, it is not applied on any port-profile-port.
• If all the dependency validations succeed, the port-profile is in the ACTIVE
state and is ready for association.
• A vlan-profile is mandatory for all port-profiles.
De-activate port-profile • This event removes the applied port-profile configuration from all the profiled-
ports.
• De-activation is allowed even if there are MAC addresses associated with the
port-profile.
Associate MAC addresses to • If the MAC is already associated with a port-profile, the port-profile to MAC
a port-profile association fails.
• Otherwise, if the port-profile to MAC association succeeds, when the same
MAC is learned on any of the ports, the port-profile which has the MAC
association is applied to the port.
De-associate MAC addresses • If mapping exists, all the policies configured for a specific MAC address are
from a port-profile removed from that port or switch.
Deleting a port-profile • An IN USE error is generated if the port-profile is in an activated state. AMPP
forces you to de-activate the profile before deleting.
• If the port-profile is in an inactive state, then deletion of profile removes all the
MAC associations as well.
Modifying port-profile content • An IN USE error is generated if the port-profile is already activated.
when in an associated state
Moving the VM MAC and • All policies associated to the port-profile ID are mapped on the MAC address
notifying the fabric and applied to the new port in the fabric.
Unused port-profile • You must manually remove the port-profile to MAC associations.
NOTE
Private VLAN port mode commands are not available for AMPP VLAN profiles.
To configure the VLAN profile, perform the following steps in global configuration mode.
1. AMPP profiles cannot be modified while active. De-activate the port-profile before modifying the
VLAN profile.
switch(config)# no port-profile vm1-port-profile activate
2. Enter VLAN profile configuration mode.
switch(config)# port-profile vm1-port-profile
switch(config-port-profile-vm1-port-profile)# vlan-profile
3. Use the switchport command to change the mode to Layer 2 and set the switching characteristics
to the defaults.
switch(config-pp-vlan)# switchport
NOTE
Before a port profile can be modified, no interfaces can have a port-profile-port configuration.
In the absence of the FCoE profile in the default AMPP profile, you can configure FCoE on a per-
interface basis, based on the profiled ports.
To configure a default FCoE profile globally, perform the following steps in global configuration mode.
1. Enter port-profile configuration mode.
switch(config)# port-profile default
2. Enter FCoE-profile configuration mode.
switch(config-port-profile-default)# fcoe-profile
3. Activate the FCoE port profile.
An FCoE map cannot be applied on interfaces that already have a CEE map applied to it.
switch(config-fcoe-profile)# fcoeport default
1. AMPP profiles cannot be modified while active. Deactivate the port-profile before modifying the
VLAN profile.
switch(config)# no port-profile vm1-port-profile activate
2. Enter QoS profile mode.
switch(config)# port-profile vm1-port-profile
switch(config-port-profile-vm1-port-profile)# qos-profile
switch(config-qos-profile)#
3. Apply the CEE map.
switch(config-qos-profile)# cee default
4. Apply a map to the profile. You can do either of the following:
• Apply the existing CoS-to-CoS mutation map.
switch(config-qos-profile)# qos cos-mutation vm1-cos2cos-map
• Apply the existing CoS-to-Traffic-Class map.
switch(config-qos-profile)# qos cos-traffic-class vm1-cos2traffic-map
5. Enable pause generation for each CoS.
switch(config-qos-profile)# qos flowcontrol tx on rx on
6. Exit QoS profile mode.
switch(config-qos-profile)# exit
7. Activate the profile.
switch(config)# port-profile vm1-port-profile activate
8. Associate the profile to the MAC address for each host.
switch(config)# port-profile vm1-port-profile static 0050.56bf.0001
switch(config)# port-profile vm1-port-profile static 0050.56bf.0002
switch(config)# port-profile vm1-port-profile static 0050.56bf.0003
switch(config)# port-profile vm1-port-profile static 0050.56bf.0004
switch(config)# port-profile vm1-port-profile static 0050.56bf.0005
Creating a port-profile-port
To create a port-profile-port, perform the following steps in global configuration mode.
1. Activate the interface configuration mode for the interface you wish to modify.
The following example activates the mode for the 10-gigabit Ethernet interface in slot 0/port 0.
switch(config)# interface tengigabitethernet 1/0/1
2. Configure port-profile-port on the physical interface.
switch(conf-int-te-1/0/1)# port-profile-port
Deleting a port-profile-port
To delete a port-profile-port, perform the following steps in global configuration mode.
1. Activate the interface configuration mode for the interface you wish to modify.
The following example activates the mode for the 10-gigabit Ethernet interface in slot 0/port 0.
switch(config)# interface tengigabitethernet 1/0/1
2. Unconfigure port-profile-port on the physical interface.
switch(conf-int-te-1/0/1)# no port-profile-port
switch(conf-int-te-1/0/1)# no shutdown
Deleting a port-profile
To delete a port-profile, perform the following steps in privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
2. Deactivate the port-profile.
switch(config)# no port-profile vm1-port-profile activate
3. Use the no form of the port-profile command to delete the custom profile.
You cannot delete the default port-profile.
switch(config)# no port-profile vm1-port-profile
Deleting a sub-profile
To delete a sub-profile, perform the following steps in privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
2. Deactivate the port-profile.
switch(config)# no port-profile vm1-port-profile activate
vlan-profile
switchport
switchport mode access
switchport access vlan 1
!
qos-profile
!
!
port-profile pp1 activate
port-profile pp1 static 1000.0000.0001
3. Use the show port-profile command to display the current port-profile configuration.
switch# show port-profile
port-profile default
ppid 0
vlan-profile
switchport
switchport mode trunk
switchport trunk native-vlan 1
port-profile UpgradedVlanProfile
ppid 1
vlan-profile
switchport
switchport mode trunk
switchport trunk allowed vlan all
4. Use the show port-profile status command to display the current status of all AMPP profiles.
switch# show port-profile status applied
Port-Profile PPID Activated Associated MAC Interface
auto-for_iscsi 6 Yes 0050.5675.d6e0 Te 9/0/54
auto-VM_Network 9 Yes 0050.56b3.0001 Te 9/0/53
0050.56b3.0002 Te 9/0/53
0050.56b3.0004 Te 9/0/53
0050.56b3.0014 Te 9/0/53
switch# show port-profile status activated
Port-Profile PPID Activated Associated MAC Interface
auto-dvPortGroup 1 Yes None None
auto-dvPortGroup2 2 Yes None None
auto-dvPortGroup3 3 Yes None None
auto-dvPortGroup_4_0 4 Yes 0050.567e.98b0 None
auto-dvPortGroup_vlag 5 Yes 0050.5678.eaed None
auto-for_iscsi 6 Yes 0050.5673.85f9 None
switch# show port-profile status associated
Port-Profile PPID Activated Associated MAC Interface
auto-dvPortGroup_4_0 4 Yes 0050.567e.98b0 None
auto-dvPortGroup_vlag 5 Yes 0050.5678.eaed None
auto-for_iscsi 6 Yes 0050.5673.85f9 None
5. Use show port-profile interface all to display profile and applied interface information.
switch# show port-profile interface all
Port-profile Interface
auto-VM_Network Te 9/0/53
auto-for_iscsi Te 9/0/54
● FCoE overview................................................................................................................35
● FCoE logical SAN overview............................................................................................ 47
● Configuring FCoE............................................................................................................56
FCoE overview
Fibre Channel over Ethernet (FCoE) enables you to transport FC protocols and frames over Data
Center Bridging (DCB) networks. DCB is an enhanced Ethernet network that enables the convergence
of various applications in data centers (LAN, SAN, and HPC) onto a single interconnect technology.
FCoE provides a method of encapsulating the Fibre Channel (FC) traffic over a physical Ethernet link.
FCoE frames use a unique EtherType [FCoE uses 0x8906 and FCoE Initialization Protocol (FIP) uses
0x8914] that enables FCoE SAN traffic and legacy LAN Ethernet traffic to be carried on the same link.
FC frames are encapsulated in an Ethernet frame and sent from one FCoE-aware device across an
Ethernet network to a second FCoE-aware device. The FCoE-aware devices may be FCoE end nodes
(ENodes) such as servers, storage arrays, or tape drives on one end and FCoE Forwarders on the
other end. FCoE Forwarders (FCFs) are switches providing SAN fabric services and may also provide
FCoE-to-FC bridging.
The motivation behind using DCB networks as a transport mechanism for FC arises from the desire to
simplify host protocol stacks and consolidate network interfaces in data center environments. FC
standards allow for building highly reliable, high-performance fabrics for shared storage, and these
characteristics are what DCB brings to data centers. Therefore, it is logical to consider transporting FC
protocols over a reliable DCB network in such a way that it is completely transparent to the applications.
The underlying DCB fabric is highly reliable and high performing, the same as the FC SAN.
In FCoE, ENodes discover FCFs and initialize the FCoE connection through the FCoE Initialization
Protocol (FIP). FIP has a separate EtherType from FCoE. FIP includes a discovery phase in which
ENodes discover VLANs supporting FCoE, solicit FCFs on those VLANs, and FCFs respond to the
solicitations with advertisements of their own. At this point, the ENodes know enough about the FCFs to
log in to them. The virtual link establishment and fabric login (FLOGI/FDISC) for VN-to-VF port
connections is also part of FIP.
Network OS supports the following:
• 100-Gbps blades
• 40-Gbps breakout Inter-Switch Links (ISLs)
• Changes to the way in which the number of FCoE interfaces are created, through the fcoe-enodes
command
• FCoE logical SANs
• FCoE troubleshooting commands
FCoE terminology
The following table lists and describes the FCoE terminology used in this document.
Term Description
ENode An FCoE device that supports FCoE VN_Ports (servers and target devices)
End-to-end FCoE
The Brocade VCS Fabric is a convergence-ready fabric. This means it is capable of providing lossless
service and other features expected of a CEE-capable network. This includes support for multi-hop
FCoE, where an FCoE initiator can communicate with an FCoE target that is a number of hops away.
FCoE operations
Each switch in the Brocade VCS Fabric cluster acts as a fully functional FCoE Forwarder (FCF). All
Fibre Channel (FC) services required to support a Virtual Network (VN) must run on every Brocade
VCS Fabric cluster switch, and each switch in the fabric acts as if it were a separate domain in an FC
SAN.
For all practical purposes, a Brocade VCS Fabric operates similarly to an FC fabric because all the
FCoE initiators and targets are connected to the Brocade VCS Fabric. Each switch in the cluster gets
a domain ID, and once the fabric forms, all the FC services (such as Name Server, Login Controller,
Domain Controller) are available on each individual cluster switch.
Network OS 4.0.0 and later supports FCR/LSAN zoning. A combination of 2000 FCoE devices and
1000 FC routed devices (for a total maximum of 3000 devices) is the fabric limit. Because open zoning
floods all the State Change Notifications (SCNs) to every device, it should be used only when the
fabric has 300 total devices or fewer. Fabrics with higher device counts should have user-defined
zoning configurations, with a maximum of 255 devices per zone.
FCoE traffic forwarding across the fabric follows the same equal-cost multi-path (ECMP) routing rules
as does LAN traffic forwarding.
1. VN1 and VN2 discover VF1 and VF2 through FIP Discovery Protocol and perform a Fabric Login
(FLOGI) to their respective VF ports. That is, VN1 performs an FIP FLOGI to VF1 and VN2 performs
a FIP FLOGI to VF2. This works like IP in that all communication between the end-station and the
network happens to the router’s MAC address at Layer 2. This means VN1 is always communicating
with VF1 at Layer 2.
2. In a Brocade VCS Fabric implementation, all FC services are available on every cluster unit. This
means there is Fibre Channel Network Switch (FCNS) available on both FCF1 and FCF2. The FCNS
service functions identically as it does in an FC SAN. As a result, VN1 discovers VN2.
3. VN1 attempts an N_Port Login (PLOGI) to VN2, with the frame information shown at point 1 in the
following figure. The Layer 2 header contains VF1 as the destination MAC address. The Layer 3
header (in this case, the FC header) contains the actual DID and SID of the initiator and the target
respectively.
In this example, because VN1 is connected to the FCF with a Domain ID of 1, its PID is 010100.
Similarly, because VN2 is connected to FCF3, its FC address is 030100.
4. When FCF-A receives the frame on VF1, it performs a Layer 3 lookup. It looks up the DID in the FC
header and determines that the frame is destined to a non-local domain. FCF-A decodes the next
hop needed to reach the destination domain of 3, based on Fabric Shortest Path First (FSPF). It is
at this point that it does something different than a normal IP router.
5. FCF-A now knows that it needs to reach FCF-C. Each FCF in the Brocade VCS Fabric is assigned
an FCF MAC address. FCF-A constructs the Layer 2 header based on this information. So, the
original MAC header is now transformed as follows: the DA is changed from VF1 to FCF-C and the
SA is changed from VN1 to FCF-A. This occurs at point 2 in the above figure.
6. The frame gets a Transparent Interconnection of Lots of Links (TRILL) header and traverses across
the fabric to reach FCF-C. The TRILL header indicates that the source is RBridge 1 and the
destination is RBridge 3. This occurs at point 2 in the above figure.
7. The outer MAC header is a link level header that gets the frame from FCF-A to FCF-B. FCF-B
receives the frame. FCF-B scans the TRILL header, decodes the destination RBridge ID in the
frame, and forwards the frame. FCF-B only modifies the Layer 2 header. It neither looks up nor
modifies anything in the FC header or the inner MAC header. This occurs at point 3 in the above
figure.
8. FCF-C receives the frame. FCF-C scans the TRILL header and decodes the destination RBridge
ID. FCF-C promotes the frame to Layer 3 lookup, because the FCF-C is the DA in the inner MAC
header. FCF-C then scans the FC header and does something similar to an area route lookup in FC
SAN. This lookup yields the MAC address of VN2 and the VF interface (in this case, VF2)
information that it needs to use to forward the frame to VN2. This is occurs at point 4 in the above
figure.
9. VN2 receives the PLOGI. The PLOGI response from VN2 traverses back to VN1 in similar fashion.
NOTE
It is assumed that both VN1 and VN2 are configured to be in the same FCoE VLAN, and FCoE
forwarding is enabled on this VLAN in the Brocade VCS Fabric. Network OS v4.0.0 and later
supports only one FCoE VLAN for all FCoE devices connected to the fabric.
Layer 2 forwarding
Layer 2 Ethernet frames are forwarded on the DCB ports. 802.1Q VLAN support is used to tag incoming
frames to specific VLANs, and 802.3ac VLAN tagging support is used to accept VLAN tagged frames
from external devices.
Network OS uses the following 802.1D bridging protocols between Layer 2 switches and to maintain a
loop-free network environment:
• Spanning Tree Protocol (STP)
• Rapid Spanning Tree Protocol (RSTP)
• Multiple Spanning Tree Protocol (MSTP)
• Per-VLAN Spanning Tree (PVST+)
• Rapid Per-VLAN Spanning Tree (RPVST+)
For detailed information on configuring these protocols, refer to STP-Type Protocols on page 139.
The Brocade VDX hardware handles Ethernet frames as follows:
• When the destination MAC address is not in the lookup table, the frame is flooded on all ports in the
same VLAN, except the ingress port.
• When the destination MAC address is present in the lookup table, the frame is switched only to the
correct egress port.
• When the destination MAC address is present in the lookup table, and the egress port is the same as
the ingress port, the frame is dropped.
• If the Ethernet Frame Check Sequence (FCS) is incorrect, because the switch is in cut-through
mode, a correctly formatted Ethernet frame is sent out with an incorrect FCS.
• If the Ethernet frame is too short, the frame is discarded and the error counter is incremented.
• If the Ethernet frame is too long, the frame is truncated and the error counter is incremented. The
truncated frame is sent out with an incorrect FCS.
• Frames sent to a broadcast destination MAC address are flooded on all ports in the same VLAN,
except the ingress port.
• When MAC address entries in the lookup table time out, they are removed. In this event, frame
forwarding changes from unicast to flood.
• An existing MAC address entry in the lookup table is discarded when a device is moved to a new
location. When a device is moved, the ingress frame from the new port causes the old lookup table
entry to be discarded and the new entry to be inserted into the lookup table. Frame forwarding
remains unicast to the new port.
• When the lookup table is full, new entries replace the oldest MAC addresses after the oldest MAC
addresses reach a certain age and time out. MAC addresses that still have traffic running are not
timed out.
• If the port is receiving jumbo frame packets and the port is not configured with the required MTU
size to support jumbo frames, then the port discards those frames and increments the over-sized
packet error counter.
• If the port is receiving valid multicast frames and the port is not part of a VLAN that is enabled for
IGMP snooping, then the frames are treated as broadcast frames.
• If the port is receiving multicast frames with a destination MAC address (multicast MAC address)
and destination IP address (multicast IP address) belonging to different group addresses or not
pointing to the same group, the frames are silently discarded by the port.
NOTE
New entries start replacing older entries when the lookup table reaches 90 percent of its 32Kb
capacity.
NOTE
Only a single switch-wide VLAN is capable of forwarding FCoE traffic.
For detailed information on configuring VLANs, refer to 802.1Q VLANs on page 71.
(customer tags) for future support. A C-TAG used to classify an FCoE frame is the same as the VLAN
ID and is system wide.
NOTE
Currently, FCoE VLANs can be only 802.1Q VLANs. They cannot be classified or used as C-TAGs for
other VLAN classification. All tenant FCoE traffic rides on the same default FCoE VLAN (1002) as in the
previous Network OS releases.
For details of the Virtual Fabrics feature, refer to Virtual Fabrics on page 93.
large frames, link utilization will not be able to reach 100 percent. When RED is enabled, link
utilization approaches 100 percent.
• Classification — Setting user priority.
‐ Inbound frames — Inbound frames are tagged with the user priority set for the inbound port. The
tag is visible when examining the frames on the outbound port. By default, all frames are tagged
to priority zero.
‐ Externally tagged Layer 2 frames — When the port is set to accept externally tagged Layer 2
frames, the user priority is set to the Layer 2 CoS of the inbound frames.
• Queuing
‐ Input queuing — Input queuing optimizes the traffic flow in the following way. A DCB port has
inbound traffic that is tagged with several priority values, and traffic from different priority settings
is switched to different outbound ports. Some outbound ports are already congested with
background traffic while others are uncongested. With input queuing, the traffic rate of the traffic
streams switched to uncongested ports should remain high.
‐ Output queuing — Output queuing optimizes the traffic flow in the following way. Several ports
carry inbound traffic with different priority settings. Traffic from all ports is switched to the same
outbound port. If the inbound ports have different traffic rates, some outbound priority groups will
be congested while others can remain uncongested. With output queuing, the traffic rate of the
traffic streams that are uncongested should remain high.
‐ Multicast rate limit — A typical multicast rate limiting example is where several ports carry
multicast inbound traffic that is tagged with several priority values. Traffic with different priority
settings is switched to different outbound ports. The multicast rate limit is set so that the total
multicast traffic rate on output ports is less than the specified set rate limit. Multicast rate-limiting
commands are not supported on the Brocade VDX 6740 or VDX 8770. On the latter platforms,
use BUM storm control instead.
‐ Multicast input queuing — A typical multicast input queuing example is where several ports carry
multicast inbound traffic that is tagged with several priority values. Traffic with different priority
settings is switched to different outbound ports. Some outbound ports are already congested with
background traffic while others are uncongested. The traffic rate of the traffic streams switched to
the uncongested ports should remain high. All outbound ports should carry some multicast
frames from all inbound ports. This enables multicast traffic distribution relative to the set
threshold values.
‐ Multicast output queuing — A typical multicast output queuing example is where several ports
carry multicast inbound traffic. Each port has a different priority setting. Traffic from all ports is
switched to the same outbound port. If the inbound ports have varying traffic rates, some
outbound priority groups will be congested while others remain uncongested. The traffic rate of
the traffic streams that are uncongested remains high. The outbound ports should carry some
multicast frames from all the inbound ports.
• Scheduling — A typical example of scheduling policy (using Strict Priority 0 and Strict Priority 1
modes) is where ports 0 through 7 carry inbound traffic, each port has a unique priority level, port 0
has priority 0, port 1 has priority 1, and so on. All traffic is switched to the same outbound port. In
Strict Priority 0 mode, all ports have DWRR scheduling; therefore, the frames per second (FPS) on
all ports should correspond to the DWRR settings. In Strict Priority 1 mode, priority 7 traffic uses
Strict Priority; therefore, priority 7 can achieve a higher FPS. Frames from input ports with the same
priority level should be scheduled in a round robin manner to the output port.
When setting the scheduling policy, each priority group that is using DWRR scheduling can be set
to use a percentage of the total bandwidth by setting the PG_Percentage parameter.
For detailed information on configuring QoS, refer to QoS on page 193.
Access control
Access Control Lists (ACLs) are used for Layer 2 switching security. Standard ACLs inspect the
source address for the inbound ports. Extended ACLs provide filtering by source and destination
addresses and protocol. ACLs can be applied to the DCB ports or to VLANs.
Trunking
NOTE
The term "trunking" in an Ethernet network refers to the use of multiple network links (ports) in parallel
to increase the link speed beyond the limits of any one single link or port, and to increase the
redundancy for higher availability.
802.1ab Link Layer Discovery Protocol (LLDP) is used to detect links to connected switches or hosts.
Trunks can then be configured between an adjacent switch or host and the Brocade VDX hardware.
The Data Center Bridging Capability Exchange Protocol (DCBX) extension is used to identify a DCB-
capable port on an adjacent switch or host. For detailed information on configuring LLDP and DCBX,
refer to LLDP on page 181.
The 802.3ad Link Aggregation Control Protocol (LACP) is used to combine multiple links to create a
trunk with the combined bandwidth of all the individual links. For detailed information on configuring
LACP, refer to Link Aggregation on page 167.
Flow control
802.3x Ethernet pause and Ethernet Priority-based Flow Control (PFC) are used to prevent dropped
frames by slowing traffic at the source end of a link. When a port on a switch or host is not ready to
receive more traffic from the source, perhaps due to congestion, it sends pause frames to the source to
pause the traffic flow. When the congestion has been cleared, it stops requesting the source to pause
traffic flow, and traffic resumes without any frame drop.
NOTE
Ethernet pause differs from PFC in that the former is applied to all traffic streams irrespective of their
COS values, whereas the latter is always applied to a specific COS or priority value.
When Ethernet pause is enabled, pause frames are sent to the traffic source. Similarly, when PFC is
enabled, there is no frame drop; pause frames are sent to the source switch.
For detailed information on configuring Ethernet pause and PFC, refer to Configuring QoS on page
209.
FIP discovery
NOTE
ANSI INCITS 462-2010 Fibre Channel - Backbone - 5 (FC-BB-5) / 13-May-2010 is supported.
The Brocade VDX hardware FIP discovery phase operates as follows:
• The Brocade VDX hardware uses the FCoE Initialization Protocol (FIP). ENodes discover VLANs
supporting FCoE, FCFs, and then initialize the FCoE connection through the FIP.
• VF_Port configuration — An FCoE port accepts ENode requests when it is configured as a VF_Port
and enabled. An FCoE port does not accept ENode requests when disabled.
• Solicited advertisements — A typical scenario is where a Brocade VDX hardware receives a FIP
solicitation from an ENode. Replies to the original FIP solicitation are sent to the MAC address
embedded in the original FIP solicitation. After being accepted, the ENode is added to the VN_Port
table.
• VLAN 1 — The Brocade VDX hardware should not forward FIP frames on VLAN 1 because it is
reserved for management traffic only.
• A fabric-provided MAC address is supported.
NOTE
In the fabric-provided MAC address format, VN_Port MAC addresses are based on a 48-bit fabric-
supplied value. The first three bytes of this value are referred to as the FCMAP. The next three bytes
are the FC ID, which is assigned by the switch when the ENode logs in to the switch.
FIP login
FIP login operates as follows:
• ENodes can log in to the Brocade VDX hardware using FIP, Fabric login (FLOGI) or fabric
discovery (FDISC).
• Brocade VDX hardware in the fabric maintains the MAC address, World Wide Name (WWN), and
PID mappings per login. Each ENode port should have a unique MAC address and WWN.
• FIP FLOGI — The Brocade VDX hardware accepts the FIP FLOGI from the ENode. The FIP FLOGI
acceptance (ACC) is sent to the ENode if the ENode MAC address or WWN matches the VN_Port
table on the Brocade VDX hardware. The FIP FLOGI request is rejected if the ENode MAC address
or WWN does not match. The ENode login is added to the VN_Port table. Fabric Provided MAC
Addressing (FPMA) is supported.
• FIP FDISC — The Brocade VDX hardware accepts FIP FDISC from the ENode. FIP FDISC
acceptance (ACC) is sent to the ENode if the ENode MAC address or WWN matches the VN_Port
table on the Brocade VDX hardware. The FIP FDISC request is rejected if the ENode MAC address
or WWN does not match. The ENode login is added to the VN_Port table. FPMA is supported.
• Maximum logins per VF_Port (logical FCoE port) — The Brocade VDX hardware supports a
maximum of 64 logins. The VF_Port rejects further logins after the maximum is reached.
• Maximum logins per switch — The Brocade VDX hardware accepts a maximum of 1000 logins per
switch.
• Maximum logins per VCS cluster — 3000.
FIP logout
FIP logout operates as follows:
• ENodes and VN_Ports can log out from the Brocade VDX hardware using FIP. The Brocade VDX
hardware in the fabric updates the MAC address, WWN, and PID mappings upon logout. The
Brocade VDX hardware also handles scenarios of implicit logout where the ENode has left the fabric
without explicitly logging out.
• FIP logout (LOGO) — The Brocade VDX hardware accepts a FIP LOGO from the ENode. The FIP
LOGO acceptance (ACC) should be sent to the ENode if the ENode MAC address and the VN_Port
MAC address matches the VN_Port table data on the switch. The LOGO is ignored (not rejected) if
the ENode MAC address does not match. The ENode logout is updated in the VN_Port table.
• Implicit logout — With the ENode directly connected to a DCB port, if the port that the ENode is
attached to goes offline, the Brocade VDX hardware implicitly logs out that ENode. ENode logout is
updated in the VN_Port table. The Brocade VDX hardware sends an FIP Clear Virtual Links (CVL) to
the ENode.
The FIP Virtual Link Maintenance protocols provide a mechanism to detect reachability loss to an
Enode or any VN_Port instantiated on that ENode. This is accomplished by the periodic transmission
of FIP Keep-Alive (FKA) messages from the ENode.
If FKA timeouts are enabled on the switch, all VN_Ports associated with an ENode will be implicitly
logged out in the event of an ENode FKA timeout.
If FKA timeouts are enabled on the switch, the VN_Port will be implicitly logged out in the event of a
VN_Port FKA timeout.
• RSCN events generated in the FC fabric are forwarded to the ENodes. RSCN events generated on
the FCoE side are forwarded to the FC devices. DCB is not aware of RSCN events.
• Device RSCN — An RSCN is generated to all registered and affected members when an ENode
either logs in or logs out of an FCF through any means. An RSCN is generated when an FC N_Port
device either logs in or logs out of the FC fabric.
NOTE
When transmitting an RSCN, zoning rules still apply for FCoE devices as the devices are treated as
regular FC N_Ports.
• VF_Port RSCN — An RSCN is generated to all registered members when a VF_Port goes online or
offline, causing ENode or FC devices to be added or removed.
• Domain RSCN — An RSCN is generated to all registered and affected members when an FC
switch port goes online or offline, causing ENode or FC devices to be added or removed. An RSCN
is generated when two FC switches merge or segment, causing ENode or FC devices to be added
or removed. When FC switches merge or segment, an RSCN is propagated to ENodes.
• Zoning RSCN — An RSCN is generated to all registered and affected members when a zoning
exchange occurs in the FC fabric.
FCoE queuing
The QoS configuration controls the FCoE traffic distribution.
NOTE
Changing these settings requires changes on both the Brocade VDX hardware and the Converged
Network Adapter (CNA); therefore, the link must be taken offline and put back online after a change is
made.
Traffic scheduler configuration changes affect FCoE traffic distribution as follows:
• Changing the priority group for a port causes the FCoE traffic distribution to be updated. The priority
group and bandwidth are updated.
• Changing the priority table for a port causes the FCoE traffic distribution to be updated. The CoS-to-
priority group mapping is updated.
• Changing the class map for a port causes the FCoE traffic distribution to be updated.
• Changing the policy map for a port causes FCoE traffic distribution to be updated.
• Changing the DCB map for a port causes the FCoE traffic distribution to be updated.
• The FCMAP-to-VLAN mapping determines the FCoE VLAN allowed for the FCoE session.
Modifying this mapping causes the existing sessions to terminate.
NOTE
Only one FCoE VLAN is supported in Network OS 4.0.0 and later releases.
FIGURE 7 Use case 1: One remote SAN and a default FCoE VLAN SAN with a single FIF
FIGURE 8 Use case 2: One remote logical SAN and one local logical SAN with a single FIF
NOTE
FC ports provisioned in a local logical SAN can be in E_Port mode connecting to the EX end of an FC
SAN through FCR, or can be in F_Port mode connecting to an FC end device.
• Ethernet ports can be provisioned for either local or remote logical SANs by means of the respective
fabric maps for FCoE provisioning.
The following summarizes the configuration process:
• The user creates a fabric map by means of the fabric-map command, which in turn does the
following automatically: san-mode is set to remote, one of the available VLANs is selected, and one
of the available FCMAPs from the range 0E:FC:00 through 0E:FC:FF is selected. The user can
change the VLAN and the FCMAP.
• Under the fabric-map command, the user uses the fcf-group command to create a group name and
enter FCF group configuration mode. This mode allows the user to configure values for FCF and FIF
RBridge IDs, set by the keywords fcf-rbid and fif-rbid, respectively. (A default fabric map does not
contain an FCF group.)
• When the user attempts to configure an FCF RBridge, this is allowed only if the RBridge is enabled
as an Access Gateway.
• In the case of fabric maps for local logical SANs, the user sets san-mode to local and uses the
fcport-group command and the fcport-group-id subcommand to add RBridge IDs as appropriate.
An "fcport-group" configuration can be part of a local fabric map only, and all FC ports in an attached
RBridge are part of the local logical SAN.
• FCoE provisioning on interfaces is as before. The user uses the fcoeport command to configure
physical interfaces for either local or remote logical SANs, as well as for the default FCoE logical
SAN.
• The user applies FCoE provisioning on multiple ports by means of port profiles. The FCoE
configuration is added to the FCoE subprofile of a port profile, and this profile is applied to ports as
appropriate. (The FCoE subprofile configuration is applied like a VLAN subprofile and does not
trigger MAC address learning on an interface.)
• The user associates each logical SAN to a port-profile domain, with each domain containing only one
profile with the FCoE configuration. (Nondefault port profiles can have FCoE provisioning for only the
nondefault fabric map.)
• Port-profile domains are configured only in Virtual Fabrics-enabled mode, and therefore port-profile
support for logical SANs is provided only if Virtual Fabrics is enabled for all participating switches.
NOTE
FCoE provisioning for a logical SAN is not allowed on an Ethernet interface if the RBridge on which the
interface is present is not part of the FCF group configuration, whether as an FCF RBridge ID or an FIF
RBridge ID.
ATTENTION
The FCoE SAN configuration is global, and therefore must be done on the principal switch in logical
chassis cluster mode. However, it is the user's responsibility to ensure that the configuration is the same
on all participating switches and does not conflict with other switches in fabric cluster mode.
would form a connecting point in the VCS Fabric for a virtual machine (VM). (These are all ports to
which a VM could be moved.) All ports that would support a particular VM must be configured with the
fcoeport configuration for the appropriate SAN, so that the VM could boot from that FCoE SAN. This is
achieved by mapping the logical SAN to one or more domains, so that each domain can have an
FCoE configuration for only a particular SAN.
Prior to Network OS 6.0.0, FCoE profiles were supported only under the default port profile. Now the
FCoE profile is supported under nondefault port profiles as well. Now the default port profile is
provided only for backward compatibility, as well as for use cases in which the user wants to retain the
default SAN and not use a logical SAN.
ATTENTION
It is recommended that only the domain-based application of port profiles (by means of the port-profile-
port domain command) be used. A VCS Fabric can have port profiles with the default fcoe-map or the
nondefault fcoe-map, but not both.
AMPP configurations
There are two Auto Migrating Port Profile (AMPP) configurations: global and interface level. These are
discussed below with respect to the FCoE logical SANs feature.
Global port profiles
Global port profiles are configured by the port-profile command. The FCoE profile is configured by
the fcoeport command, with the fabric map defined by the fabric-map-name variable. Nondefault
maps are now supported. However, as these maps can be applied only through domains, Virtual
Fabrics must be enabled to configure port profiles for nondefault SANs. As an FCoE port profile is
applied during configuration and is not associated with any MAC address that must be learned, it is
recommended that FCoE port profiles be kept separate from other port profiles.
The following is an example global port-profile configuration.
device(config)# port-profile A
device(config-port-profile-A)# fcoe-profile
device(config-fcoe-profile)# fcoeport sanA
device(config)# port-profile B
device(config-port-profile-B)# fcoe-profile
device(config-fcoe-profile)# fcoeport sanB
device(config)# port-profile C
device(config-port-profile-C)# fcoe-profile
device(config-fcoe-profile)# fcoeport sanA
NOTE
The default port profile can contain only the default FCoE map, and nondefault port profiles cannot
contain the default FCoE map. Port-profile domains can contain many port profiles. However, only one
port profile with an FCoE subprofile can be part of a domain. The same port profile can be part of
multiple domains.
device(config)# port-profile-domain D2
device(config-port-profile-domain-D2)# port-profile A
device(config-port-profile-domain-D2)# port-profile E
Interface-level port profiles are configured by the port-profile-port command. The default FCoE port
fabric map is automatically applied on an interface for default profiles where FCoE logical SANs are not
enabled and the user wants to maintain a configuration created prior to Network OS6.0.1. In previous
releases, the default port profile is applied on all port-profile ports, irrespective of the port-profile
domain. This behavior continues unless nondefault port profiles are configured.
The fabric map configured by the fcoeport command is automatically applied on an interface where
fabric-map-name is the fabric map under the profile with the FCoE subprofile that is part of the domain.
The following are example interface-level port-profile configurations.
Three logical SANs:
fabric-map sana
fabric-map sanb
fabric-map sanc
NOTE
These support various VMs identified by MAC address, and are applied when the associated MAC
addresses are learned.
Port-profile-domain DD1
Port-profile ProfileSanA
Port-profile PP1
Port-profile PP2
Port-profile PP3
Port-profile-domain DD2
Port-profile ProfileSanB
Port-profile PP1
Port-profile PP4
Port-profile PP5
Port-profile-domain DD3
Port-profile ProfileSanC
Port-profile PP6
Port-profile PP7
Port-profile-domain DD4
Port-profile ProfileSanA
Port-profile PP5
Port-profile PP3
Port-profile PP7
Port-profile-domain DD5
Port-profile ProfileSanB
Port-profile PP4
Port-profile PP6
• Changing a fabric map or an FCF group is not allowed if the fabric map contains a port-profile-port
configuration.
• FCoE configuration by means of the fcoeport and port-profile-port commands can coexist, but
only if the FCoE map configurations that are inside the port-profile domain and also are applied
directly on an interface are not in conflict.
• Changing an FCoE port profile is not allowed when either (a) the port profile is activated or (b) the
FCoE map conflicts with the map applied on any interface.
• Adding a port profile to a port-profile domain is not allowed when either (a) the port-profile domain
already has an FCoE map or (b) the port-profile domain is applied on at least one interface for
which there is an conflicting FCoE map.
For additional details related to this feature, see FCoE logical SAN behavior and provisioning model on
page 50.
Configuring FCoE
This section presents the tasks necessary to configure FCoE interfaces and logical SANs.
NOTE
Brocade VDX switches support FCoE multi-hops for as many as nine hops.
When the FCoE logical port is automatically bound to a 10-gigabit Ethernet LAG port, this is referred to
as dynamic binding. This binding is valid only until the FLOGI session is valid. The binding is
automatically removed when CNA logs out. To create a persistent binding between the logical FCoE
port and an interface that can be used for static binding (FortyGigabitEthernet,
HundredGigabitEthernet, Port-channel, TenGigabitEthernet, mac-address), use the bind command.
This is stored in the configuration and retained across reboots.
NOTE
Only one type of binding can be used for each physical port, so the LAG binding configurations will
overwrite each other.
To create additional logical FCoE ports, perform the following steps in RBridge ID configuration mode.
1. Enter FCoE configuration mode on an RBridge.
device(config-rbridge-id-1)# fcoe
device(config-rbridge-fcoe)#
2. Enter the fcoe-enodes command to set the maximum number of logins allowed on the switch.
device(config-rbridge-fcoe)# fcoe-enodes 384
To bind the logical FCoE ports to a physical port, perform the following steps:
3. Enter interface subtype configuration mode on the RBridge.
device(config-rbridge-id-1)# interface fcoe 1/1/55
device(config-if-fcoe-1/1/55)#
4. Bind the logical port to the physical port.
device(conf-if-fcoe-1/1/55)# bind tengigabitethernet 1/0/1
5. In privileged EXEC mode, verify the FCoE ENode configuration, by using the show fcoe fcoe-
enodes command.
device# show fcoe fcoe-enodes
=================================================
Rbridge-id Fcoe-enodes
=================================================
1 384
2 64[D]
6 0
NOTE
This is not supported for remote or local FCoE logical SANs.
NOTE
A fabric map can be edited even if it is associated with an interface. However, the VLAN of the fabric
map cannot be edited. All other parameters, such as the FCMAP, priority, and advertisement interval,
can be modified.
NOTE
Brocade does not support non-FCoE traffic over an FCoE VLAN. The FCoE VLAN should not carry
any mixed traffic.
NOTE
The first free unprovisioned VLANs are assigned to the fabric map.
NOTE
It is also possible to map multiple local FCoE ports to a specified VLAN and fabric map, as well as to
specified RBridge IDs,
For the configurations of the remaining use cases, refer to FCoE logical SANs configuration examples
on page 66.
NOTE
Values for VLAN, priority, and FCMAP are selected automatically from available values.
3. Change the VLAN from the default.
device(config-fcoe-fabric-map-SanA)# vlan 1003
4. Change the priority from the default.
device(config-fcoe-fabric-map-SanA)# priority 3
NOTE
The priority should be the same for all fabric maps.
5. Change the fabric-provided MAC address (FPMA) FCoE MAC address prefix (FCMAP) from the
default.
device(config-fcoe-fabric-map-SanA)# fcmap 0e:fc:10
NOTE
With multiple fabric maps, each has its own FCMAP value. Values must be unique across all fabric
maps. The no fcmap command does not allow reversion to the default FCMAP value for a particular
fabric map.
6. (Optional) Change the advertisement (FCoE keep-alive, or FKA) interval from the default of 8000.
device(config-fcoe-fabric-map-SanA)# advertisement interval 10000
7. Repeat the above for SanB, SanC, and SanD with appropriate values.
Use the show fcoe fabric-map command to confirm the current status of the FCoE fabric map, as in
the following example.
device# show fcoe fabric-map SanA
=====================================================================
Fabric-Map VLAN VFID Pri FCMAP FKA Timeout
=====================================================================
SanA 1004 128[D] 4 0x0efc01 10000 Enabled[D]
Total number of Fabric Maps = 1
NOTE
Use the add keyword to add multiple RBridge IDs. Alternatively, use the remove keyword to
remove RBridge IDs. Ranging (with a hyphen) is also allowed.
device(config-fcoe-fabric-map-SanA)# fcf-group rack-1
sw0(config-fabric-map-fcf-group-rack-1)# fcf-rbid 6
sw0(config-fabric-map-fcf-group-rack-1)# fif-rbid add 5
sw0(config-fabric-map-fcf-group-rack-1)# fif-rbid add 10-15
sw0(config-fabric-map-fcf-group-rack-1)# fif-rbid add 28-30,35
sw0(config-fabric-map-fcf-group-rack-1)# fif-rbid remove 28-30,12
4. You can verify the FCF map configuration by viewing the running configuration, or by entering the
show fcoe fcf-group command as in the following examples:
device(config-fabric-map-fcf-group-rack-2)# do show running-config fcoe fabric-
map fcf-group
fcoe
fabric-map sanA
fcf-group rack-1
fcf-rbid 100
fif-rbid add 5,10-11,13-15,35
!
fcf-group rack-2
fcf-rbid 150
fif-rbid add 180
!
!
fabric-map sanB
fcf-group rack-3
fcf-rbid 200
fif-rbid add 220, 221
NOTE
Ranging and comma delimiters are allowed for multiple RBridge ID entries. Use the remove keyword
to remove one or more RBridge IDs.
5. To confirm the configuration, use the show runnng-config-fcoe command.
device(config-fabric-map-fcport-group-SanA)# do show running-config fcoe
fcoe
fabric-map default
vlan 1002
san-mode local
priority 3
virtual-fabric 128
fcmap 0E:FC:00
advertisement interval 8000
keep-alive timeout
!
fabric-map SanA
vlan 4
san-mode local
priority 3
virtual-fabric 128
fcmap 0E:FC:03
advertisement interval 8000
keep-alive timeout
fcport-group
fcport-group-rbid add 29
!
NOTE
The fabric map can be applied irrespective of whether or not the interface is in "switchport" mode.
However, the fabric map cannot be applied on an interface if the same interface already has a CEE
map assigned to it.
Do the following to assign a fabric map onto an interface.
1. Activate interface subtype configuration mode for the interface to be modified.
device(config)# interface tengigabitethernet 1/0/1
device(conf-if-te-1/0/1)#
2. Apply the current fabric map to the interface by using the fcoeport command and entering "default"
as the map name.
device(conf-if-te-1/0/1)# fcoeport default
NOTE
The default configuration continues to be supported. However, beginning with Network OS 6.0.0,
user-specified map names are allowed to support FCoE logical SANs.
3. Return to privileged EXEC mode by using the end command.
device(conf-if-te-1/0/1)# end
4. Confirm the changes to the interface by using the show running-config command.
device# show running-config interface tengigabitethernet 1/0/1
interface TenGigabitEthernet 1/0/1
fcoeport default
no shutdown
5. Use the fcoe fabric-map default command to confirm the current status of the fabric map.
device# show fcoe fabric-map
=====================================================================
Fabric-Map VLAN VFID Pri FCMAP FKA Timeout
=====================================================================
default 1002[D] 128[D] 3[D] 0xefc00[D] 8000[D] Enabled[D]
Total number of Fabric Maps = 1
6. Repeat this procedure for any additional interfaces as appropriate.
The fcoeport command is used under interface subtype configuration mode to provision a port to be
an FCoE port. This puts the port in Layer 2 mode, but only for FCoE VLANs. In Network OS 4.0.0 and
later, the fcoeport default command is supported for LAG member ports where FCoE provisioning is
applied to individual Ethernet ports.
You must apply the fcoeport default command on the LAG member interface. Once this command is
applied, and if the member port of the LAG is CEE-capable, the port carries FCoE traffic only.
NOTE
Note the following conditions:
• FCoE provisioning is allowed on a LAG member only if the LAG is not FCoE provisioned.
• The default configuration continues to be supported. However, beginning with Network OS 6.0.0,
user-specified fabric maps are allowed to support multiple FCoE logical SANs.
To assign the FCoE fabric map onto a LAG member, perform the following steps.
1. Activate interface subtype configuration mode for the interface to be modified.
NOTE
FCoE over LAG supports standard LAGs only; vLAGs are not supported.
Additionally, Network OS 4.0.0 and later supports multiple logins per port. This feature allows multiple
ENodes to log in to a single 10-gigabit Ethernet port or a LAG.
switch(config-Port-channel-10)#
NOTE
The default configuration continues to be supported. (The keyword "default" must be entered
manually.) However, beginning with Network OS 6.0.0, user-specified fabric maps are allowed to
support multiple FCoE logical SANs.
show fcoe fabric-map Displays the FCoE fabric-map configuration globally in a fabric, or on a single
RBridge.
show fcoe fcport-group Displays RBridge IDs and FCoE port connector groups associated with a fabric map.
fcoe
fabric-map default
vlan 1002
san-mode local
priority 3
virtual-fabric 128
fcmap 0E:FC:00
advertisement interval 8000
keep-alive timeout
!
fabric-map sanA
vlan 1003
san-mode remote
priority 3
virtual-fabric 128
fcmap 0e:fc:10
advertisement interval 8000
keep-alive timeout
fcf-group sanA
fcf-rbid 1
fif-rbid add 2
!
!
fabric-map sanB
vlan 1004
san-mode remote
priority 3
virtual-fabric 128
fcmap 0e:fc:20
advertisement interval 8000
keep-alive timeout
fcf-group sanB
fcf-rbid 3
fif-rbid add 4
!
!
fabric-map sanC
vlan 1005
san-mode local
priority 3
virtual-fabric 128
fcmap 0e:fc:30
advertisement interval 8000
keep-alive timeout
!
fabric-map sanD
vlan 1006
san-mode local
priority 3
virtual-fabric 128
fcmap 0e:fc:40
advertisement interval 8000
keep-alive timeout
fcoe
fabric-map default
vlan 1002
san-mode local
priority 3
virtual-fabric 128
fcmap 0E:FC:00
advertisement interval 8000
keep-alive timeout
!
fabric-map sanA
vlan 1003
san-mode local
priority 3
virtual-fabric 128
fcmap 0e:fc:10
advertisement interval 8000
keep-alive timeout
!
fabric-map sanB
vlan 1004
san-mode local
priority 3
virtual-fabric 128
fcmap 0e:fc:20
advertisement interval 8000
keep-alive timeout
!
fabric-map sanC
vlan 1005
san-mode local
priority 3
virtual-fabric 128
fcmap 0e:fc:30
advertisement interval 8000
keep-alive timeout
!
fabric-map sanD
vlan 1006
san-mode local
priority 3
virtual-fabric 128
fcmap 0e:fc:40
advertisement interval 8000
keep-alive timeout
!
NOTE
This feature is not available on a device that is configured for Access Gateway mode.
The keywords below enable the following options:
Keyword Description
new-login Allows the "new" device to log in and cleans up the "old"
(previous) login.
old-login Allows the "old" device to retain the login and rejects the
"new" login. This is the default.
NOTE
For reasons noted above, the concepts "old" and "new" are relative and not necessarily literal. The
methods required to correct actual duplicate WWPN conditions within a fabric are beyond the scope of
this feature.
To view the current configuration of this feature, use the show fabric login-policy command to view
the login policy for a local node, a specific RBridge, or all RBridges in the fabric.
NOTE
This chapter addresses the use of standard Virtual LANs (VLANs) as defined by IEEE 802.1Q. Those
VLANs have VLAN IDs that range from 1 through 4096. To support multitenancy by means of classified
VLANs, the ID range has been extended through 8191. For details on this feature, refer to Virtual
Fabrics on page 93.
IEEE 802.1Q VLANs provide the capability to overlay the physical network with multiple virtual
networks. VLANs allow you to isolate network traffic between virtual networks and reduce the size of
administrative and broadcast domains.
A VLAN contains end stations that have a common set of requirements that are independent of physical
location. You can group end stations in a VLAN even if they are not physically located in the same LAN
segment. VLANs are typically associated with IP subnetworks and all the end stations in a particular IP
subnet belong to the same VLAN. Traffic between VLANs must be routed. VLAN membership is
configurable on a per-interface basis.
The VLAN used for carrying FCoE traffic needs to be explicitly designated as the FCoE VLAN. FCoE
VLANs are configured through the Network OS CLI (refer to Configuring an interface port as a Layer 2
switch port on page 75 for details).
NOTE
Currently only one VLAN can be configured as the FCoE VLAN at a time.
‐ Any tagged frames coming with a VLAN tag equal to the configured native VLAN are processed.
‐ For ingress and egress, non-native VLAN tagged frames are processed according to the allowed
VLAN user specifications. This is called trunk mode.
NOTE
Ingress VLAN filtering is enabled by default on all Layer 2 interfaces. This ensures that VLANs are
filtered on the incoming port (depending on the user configuration).
The following illustrates the frame-processing logic for an incoming frame.
There are important facts you should know about Ingress VLAN filtering:
• Ingress VLAN filtering is based on port VLAN membership.
• Port VLAN membership is configured through the Network OS CLI.
• Dynamic VLAN registration is not supported.
• The Brocade VDX hardware does VLAN filtering at both the ingress and egress ports.
• The VLAN filtering behavior on logical Layer 2 interfaces such as LAG interfaces is the same as on
port interfaces.
• The VLAN filtering database (FDB) determines the forwarding of an incoming frame.
Additionally, there are important facts you should know about the VLAN FDB:
• The VLAN FDB contains information that helps determine the forwarding of an arriving frame based
on MAC address and VLAN ID data. The FDB contains both statically configured data and dynamic
data that is learned by the switch.
• The dynamic updating of FDB entries using learning is supported (if the port state permits).
• Dynamic FDB entries are not created for multicast group addresses.
• Dynamic FDB entries are aged out based on the aging time configured per Brocade VDX hardware.
The aging time is between 60 and 1000000 seconds. The default is 300 seconds.
• You can add static MAC address entries specifying a VLAN ID. Static entries are not aged out.
• A static FDB entry overwrites an existing dynamically learned FDB entry and disables learning of the
entry going forward.
NOTE
For more information on frame handling for Brocade VDX hardware, refer to FCoE and Layer 2 Ethernet
on page 38.
NOTE
Enter the copy running-config startup-config command to save your configuration changes.
NOTE
DCB interfaces are enabled by default in Brocade VCS Fabric mode.
NOTE
DCB interfaces do not support auto-negotiation of Ethernet link speeds. The DCB interfaces support
10-gigabit Ethernet and 1-gigabit Ethernet.
To enable and disable an interface port, perform the following steps from privileged EXEC mode.
1. Enter the configure terminal command to access global configuration mode.
2. Enter the interface command to specify the interface port.
switch(config)# interface tengigabitethernet 1/0/1
NOTE
The entire fabric acts like a single switch. Therefore, MTU is applicable only on the edge-ports, and
not on ISL.
To configure the maximum transmission unit (MTU) on an interface port, perform the following steps
from privileged EXEC mode.
1. Enter the configure terminal command to access global configuration mode.
2. Enter the interface command to specify the interface port.
switch(config)# interface tengigabitethernet 1/0/1
3. Enter the mtu command to specify the MTU value on the interface port.
switch(conf-if-te-0/1)# mtu 4200
Creating a VLAN
On Brocade VDX hardware, VLANs are treated as interfaces from a configuration point of view.
By default all the DCB ports are assigned to VLAN 1 (VLAN ID equals 1). The vlan_ID value can be 1
through 4095. Refer to VLAN configuration guidelines and restrictions on page 73 for additional
information.
To create a VLAN interface, perform the following steps from privileged EXEC mode.
1. Enter the configure terminal command to access global configuration mode.
2. Enter the interface vlan command to assign the VLAN interface number.
switch(config)# interface vlan 1010
4. Enter the do show command to confirm the status of the DCB interface.
switch(conf-if-te-1/0/1)# do show interface tengigabitethernet 1/0/1
5. Enter the do show command to confirm the status of the DCB interface running configuration.
switch(conf-if-te-1/0/1)# do show running-config interface
tengigabitethernet 1/0/1
Allowing only one VLAN to transmit or receive through the DCB interface
This example allows VLAN 30 to transmit or receive through the DCB interface.
switch(conf-if-te-1/0/19)# switchport trunk allowed vlan add 30
NOTE
Multiple VLAN classifier rules can be applied per interface, provided that the resulting VLAN IDs are
unique for the different rules.
802.1Q protocol-based VLANs apply only to untagged frames, or frames with priority tagging.
With both Ethernet-II and 802.2 SNAP encapsulated frames, the following protocol types are supported:
• Ethernet hexadecimal (0x0000 through 0xffff)
• Address Resolution Protocol (ARP)
• Fibre Channel over Ethernet (FCoE)
• FCoE Initialization Protocol (FIP)
• IP version 4 (IPv4)
• IP version 6 (IPv6)
NOTE
For complete information on all available VLAN classifier rule options, refer to the Network OS
Command Reference.
NOTE
Refer to the Network OS Command Reference for complete information on all the protocols
available for the vlan classifier rule command.
NOTE
This example assumes that VLAN 2 was already created.
NOTE
The show vlan brief command displays the VLAN as inactive if there are no member ports associated
to that VLAN, or if the ports associated are in an admin down state.
To display VLAN information, perform one or both the following steps from privileged EXEC mode.
1. To display the configuration and status of the specified interface, enter the show interface
command.
switch# show interface tengigabitethernet 3/0/10
2. To display the specified VLAN information, enter the show vlan command.
For example, this syntax displays the status of VLAN 20 for all interfaces, including static and
dynamic:
switch# show vlan 20
Layer 2 switches use forwarding tables to direct traffic to specific ports, based on the VLAN number and
destination MAC address of the frame. When there is no entry corresponding to the destination MAC
address in the incoming VLAN, the frame is sent to all forwarding ports within the respective VLAN,
which causes flooding. MAC address learning is an essential Layer 2 feature whereby the source MAC
addresses of each received packet is stored so that future packets destined for that address can be
forwarded only to the bridge interface on which the address is located.
Prior to Network OS v5.0.0, each node in the VCS Fabric stores in its hardware table the Layer 2
addresses of all end stations that are learned, without consideration for actual conversations. This
poses a considerable unnecessary burden on system memory. Beginning with Network OS v5.0.0, the
global mac-address-table command has been enhanced with a conversational keyword, allowing the
user to enable conversational MAC (address) learning, or CML, globally on a switch.
NOTE
To disable the aging time for MAC addresses, enter an aging time value of 0.
To specify an aging time or disable the aging time for MAC addresses, perform the following steps
from privileged EXEC mode.
1. Enter the config command to access global configuration mode.
2. Enter the appropriate command based on whether you want to specify an aging time or disable the
aging time for MAC addresses:
switch(config)# mac-address-table aging-time 600
You can disable dynamic MAC address learning on a switch, and enable CML, by means of the mac-
address-table learning-mode conversational command.
NOTE
The ability to disable source MAC address learning on a per-port, per-VLAN basis constrains traffic
flooding to only the ports that are part of a VLAN. Disabling traditional dynamic MAC learning prevents
the MAC address table from being saturated. For example, when a device is being attacked by many
packets with different source MAC address, the updating of the MAC address table is significantly
impaired.
Do the following in global configuration mode to disable dynamic MAC learning and enable CML
globally on an RBridge.
switch(config)# mac-address-table learning-mode conversational
Do the following to configure the destination MAC address aging interval to 60 seconds.
switch(config)# mac-address-table aging-time conversational 60
You can disable legacy dynamic MAC address learning on one or more VLANs on an interface. (CML is
disabled by default.) VLANs range from 1 through 4090 for 802.1Q VLANs, and from 4096 through
8191 for VLANs in a Virtual Fabrics context.
To disable MAC learning for VLANs 2000, 3000, and 3001 on the interface:
switch(conf-if-te-4/0/5)# mac-learning disable vlan 2000, 3000, 3001
To view the status of the VLANs, use the show interface switchport command, as in the following
example:
switch# show interface tengigabitethernet 4/0/5 switchport
Private VLANs
A private VLAN (PVLAN) domain is built with at least one pair of VLAN IDs; one (and only one) primary
VLAN ID plus one or more secondary VLAN IDs. A primary VLAN is the unique and common VLAN
identifier of the whole private VLAN domain and of all its VLAN ID pairs. Secondary VLANs can be
configured as one of two types: either isolated VLANs or community VLANs. Up to 24 isolated or
community VLANs can be part of a PVLAN domain.
An isolated VLAN is a secondary VLAN whose distinctive characteristic is that all hosts connected to
its ports are isolated at Layer 2. A community VLAN is a secondary VLAN that is associated to a group
of ports that connect to a designated community of end devices with mutual trust relationships.
A PVLAN is often used to isolate networks from security attacks, or to simplify IP address
assignments.
Within the private VLAN, ports can be assigned port types. A port can be assigned to only one kind of
port type at a time. The types of ports available for private VLANs are described in the following table.
Term Description
Isolated port An isolated port cannot talk to any other port in the private VLAN domain except for promiscuous
ports and traffic ports. If a customer device needs to have access only to a gateway router, then
it should be attached to an isolated port.
Community A community port is part of a group of ports that have Layer 2 communications with one another,
port and can also talk to any promiscuous port. For example, if you have two devices that you want to
be isolated from other devices, but still be able to communicate between themselves, then
community ports should be used. You cannot configure multiple community VLANs on a single
port.
Promiscuous A promiscuous port can talk to all other types of ports. A promiscuous port can talk to isolated
port ports as well as community ports. Layer 3 gateways, DHCP servers, and other trusted devices
that need to communicate with the customer endpoints are typically connected using
promiscuous ports.
Trunk port A trunk port connects two switches and carries two or more VLANs.
Promiscuous A promiscuous trunk port carries multiple primary and normal VLANs. Packets are received and
trunk port transmitted with primary or regular VLAN tags. Otherwise, the port operates as a promiscuous
port.
Secondary A VLAN used to implement PVLANs. Secondary VLANs are associated with a primary VLAN,
VLAN and carry traffic from hosts to other allowed hosts or routers.
Community A secondary VLAN that carries upstream traffic from the community ports to the promiscuous
VLAN port gateways, and to other host ports in the same community. Multiple community VLANs are
permitted in a PVLAN.
Primary VLAN A PVLAN has only one primary VLAN. Every port in a PVLAN is a member of the primary VLAN.
The primary VLAN carries unidirectional traffic downstream from the promiscuous ports to the
isolated and community ports and to other promiscuous ports.
• For private VLANs, egress ACLs on the primary VLAN are applied only for the traffic that ingresses
and egresses from the primary VLAN, and not for the traffic that gets translated from the
secondary VLAN to the primary VLAN.
• For private VLANs, egress ACLs on the primary VLAN are also applied to the traffic that gets
translated to the secondary VLAN.
• STP is not supported on private VLAN host ports.
NOTE
Multiple PVLAN pairs can be specified by means of the switchport private-vlan association trunk
command, so that a PVLAN trunk port can carry multiple secondary VLANs. If an association is
specified for the existing primary VLAN, the existing association is replaced. If there is no trunk
association, any packets received on secondary VLANs are dropped.
5. Configure a normal VLAN on the PVLAN trunk port.
switch(conf-if-te-0/1)# switchport private-vlan trunk allowed vlan 400
6. Configure a VLAN to which untagged packets (as in IEEE 802.1Q tagging) are assigned on a
PVLAN trunk port. If there is no native VLAN configured, all untagged packets are dropped. If the
native VLAN is a secondary VLAN and the port does not have the association for the secondary
VLAN, the untagged packets are dropped.
switch(conf-if-te-0/1)# switchport private-vlan trunk native vlan 600
In the initial phase, the VXLAN-aware world consists of virtual networks that are managed by a third-
party system known as the VMware NSX Controller. The NSX Controller is a highly available distributed
system that manages, or orchestrates, all network components and connections in a virtual network.
The VXLAN overlay gateway must communicate with the NSX Controller to create tunnels with VXLAN-
aware end devices. The NSX Controller function can comprise a cluster of controllers. The orchestrator
function resides most commonly at top of rack (ToR); however, it can also be deployed as an
aggregator.
From Network OS v5.0.0, MAC, IPv4, and IPv6 ingress ACLs are supported, as well as sFlow
configurations.
NOTE
Note the following conditions for this feature:
• VXLAN overlay gateways are supported only on the Brocade VDX 2740, VDX 6740, VDX 6740T,
VDX 6740T-1G, and VDX 6940-36Q.
• VXLAN gateways must be in logical chassis cluster mode. This allows the virtual cluster switch to
present itself as a single device to the NSX Controller, in conjunction with a VMware Hypervisor.
FIGURE 11 High-level communication for VXLAN overlay gateway with NSX Controller
A maximum of eight RBridges are supported in a VXLAN-enabled VCS Cluster. The VXLAN Gateway
option should be enabled on all the RBridges of the cluster.
In the example topology shown above, RBridge 1 and RBridge 2 make up a two-node cluster with the
VXLAN gateway function enabled on both RBridges. The RBridges in the VCS cluster are connected
to a VXLAN-capable hypervisor through a Layer 2 device. The VXLAN tunnel traffic is transported over
VLAN 10 between the VCS and the VXLAN-capable hypervisor. Additionally, there are two physical
servers connected to the VCS cluster. The VXLAN gateway-enabled RBridges transmit the VXLAN
traffic from the hypervisor, as well as the VLAN-based traffic from the physical servers.
For the control communication, the principal switch of the VXLAN overlay gateway communicates with
the NSX Controller. This communication occurs over the management interface (depicted by the red
line in the illustration above). In this example, RBridge 1 is the principal RBridge for the VCS cluster.
NOTE
VRRP-E is necessary as the VXLAN tunnel termination and redundancy are related to the VRRP-E
vMAC on the Brocade VDX 6740.
In the example shown in shown in Figure 11 on page 86, the VRRP-E functionality is configured on the
VE interface for transport VLAN 10, which carries the VXLAN traffic between the VCS cluster and the
VXLAN-capable hypervisor on each of the RBridges in the VCS cluster.
NOTE
The existence of a VTEP for VXLAN bridging does not affect any configured routing and switching
performed by the RBridges in the VCS cluster for non-VXLAN traffic.
1. Enter global configuration mode:
switch# config
2. Enter RBridge ID configuration mode for the first RBridge in the logical chassis cluster (this example
uses RBridge ID 1, as in the example topology).
switch(config)# rbridge-id 1
3. Enable VRRP-E for this RBridge.
switch(config-rbridge-id-1)# protocol vrrp-extended
4. Enter the interface ve command to configure a virtual Ethernet (VE) interface for RBridge 1 (for
example, 10) that corresponds to an already created VLAN, and enter the IP address and mask for
the interface (for example, 10.60.60.3/24).
switch(config-rbridge-id-2)# interface ve 10
5. Enter the IP address and mask for the interface (for example, 10.60.60.3/24).
switch(config-Ve-10)# ip address 10.60.60.3/24
6. Enter the no shutdown command to enable the interface.
switch(config-Ve-10)# no shutdown
7. Enter the vrrp-extended-group command for the group ID (100 in this example) of the VRRP-E
group.
switch(config-Ve-10)# vrrp-extended-group 100
8. Assign a virtual MAC address by entering the virtual-mac command.
switch(config-vrrp-extended-group-100)# virtual-mac 02e0.5200.00xx
19.Enter a virtual IP address for the VRRP-E group, as in the following example.
switch(config-vrrp-extended-group-100)# virtual-ip 10.10.10.230
NOTE
You must manually configure distinct router IDs, by means of the ip router-id command, for use by
routing protocols.
1. Enter VXLAN overlay gateway configuration mode.
switch(config)# overlay-gateway gateway1
2. Use the ip interface command to specify a loopback interface.
switch(config-overlay-gw-gateway1)# ip interface loopback 25
NOTE
When a VXLAN gateway is active (as configured by means of the activate command in VXLAN
overlay gateway configuration mode), the loopback interface cannot be deleted. You must first use the
no activate command.
NOTE
A tunnel will not be created if there is not an active VM on the Hypervisor. If the tunnel is not created,
check the VM connectivity on the Hypervisor.
1. The following substeps create a VXLAN Network Identifier (VNI) tunnel endpoint (VTEP).
a) Enter global configuration mode, then enter the overlay-gateway name type nsx command.
NOTE
The type nsx keywords are required to specify that this deployment uses an NSX Controller. The
name "gateway1" is only an example; this can be a name of your choice.
switch# config
switch(config)# overlay-gateway gateway1
b) Enter the attach rbridge-id command to attach existing RBridge IDs to this VXLAN gateway
instance. You can specify a range of RBridge IDs up to a maximum of four.
switch(config-overlay-gw-gateway1)# attach rbridge-id add 1-2
c) Enter the ip interface ve veid vrrp-extended-group group-ID command to set the IP address of
the VXLAN overlay gateway, as shown in the following example.
switch(config-overlay-gw-gateway1)# ip interface ve 10 vrrp-extended-group
100
The command accepts the VE interface ID and VRPP-E group ID, then sets the VXLAN overlay
gateway's IP address as identical to the already configured VRRP-E virtual IP address. Tunnels
that form use this IP address as the source IP address for outgoing packets.
d) Enter the attach vlan vlan_id command to export the desired VLANs (these are VLANs that can
be mapped to VXLAN domains), as shown in the following example.
switch(config-overlay-gw-gateway1)# attach vlan 5,14-17
NOTE
Virtual Fabrics cannot be attached when the overlay gateway type is "nsx" and Virtual Fabrics
cannot be extended.
All the MAC addresses that the VXLAN overlay gateway learns on these VLANs are shared with
the NSX Controller. When a MAC address ages out in VCS, the MAC address is removed from
the NSX Controller.
NOTE
There is also an option to list specific MAC addresses. In this case, other MAC addresses that
are learned for the VLAN are not shared with the NSX Controller. For more information, refer to
the attach vlan command in the Network OS Command Reference.
e) Optional: (Optional) You can enter the enable statistics direction command to enable statistics
collection for tunnels you specify, as shown in the following example.
switch(config-overlay-gw-gateway1)# enable statistics direction both vlan
add 14-17
This example command enables statistics collection for tunnels in both directions (transmitting
and receiving) for the specified VLANs.
f) Optional: If you have created a SPAN destination outside of the VXLAN overlay gateway (as a
monitor session), you can enter the monitor session command to monitor session traffic, as
shown in the following examples.
switch(config-overlay-gw-gateway1)# monitor session 1 direction both
remote-endpoint 1.2.3.4 vlan add 41-43
switch(config-overlay-gw-gateway1)# monitor session 1 direction both
remote-endpoint any vlan add 41-43
g) Enter the activate command to activate this gateway instance.
switch(config-overlay-gw-gateway1)# activate
This enables all tunnels associated with this gateway. VXLAN tunnels are not user configurable.
h) Return to privileged EXEC mode.
switch(config-overlay-gw-gateway1)# end
switch(config)# end
switch#
2. Generate the security certificate for the VXLAN overlkay gateway by entering the nsx-controller
client-cert generate command.
NOTE
Certificate generation is a one-time-only action.
switch# nsx-controller client-cert generate
3. In privileged EXEC mode, display the certificate by entering the show nsx-controller client-cert
command, then provide the certificate to the NSX administrator.
4. The following substeps configure the management interface (depicted by the red line in Figure 11
on page 86), which allows communication between the VXLAN gateway and the NSX Controller:
a) Enter global configuration mode.
switch# config
b) Enter the vcs virtual ip address command and assign an IP address and mask.
switch(config)# vcs virtual ip address
192.168.0.78/24
c) Enter the nsx-controller name command to specify a name for a new NSX Controller
connection profile:
switch(config)# nsx-controller profile1
d) Enter the ip address command to set the IP address of the controller, the port, and connection-
method settings for an NSX Controller connection profile as shown in this example.
switch(config-nsx-controller-profile1)# ip address 10.21.83.188
e) Optional: You can change the reconnect interval between the NSX Controller and the VCS Fabric
in case the connection is lost. The default is 10 seconds, meaning that a reconnection is
attempted every 10 seconds. To change this interval to 40 seconds, for example, use the
reconnect-interval command:
switch(config-nsx-controller-profile1)# reconnect-interval 40
f) Finally, enter the activate command to activate the NSX Controller profile.
switch(config-nsx-controller-profile1)# activate
This command initiates the connection between the NSX Controller and the VCS Fabric.
NOTE
The following rules apply to a VXLAN packet entering an interface on a VTEP-enabled Brocade
VDX switch for that packet to be a candidate for VXLAN-to-VLAN bridging:
•
•
•
For complete information on the those commands as well as other VXLAN overlay-gateway commands
and commands related to the NSX Controller, refer to the Network OS Command Reference.
Some additional supporting commands are listed in the following table:
show overlay-gateway Displays status and statistics for the VXLAN overlay-
gateway instance.
NOTE
A service VF is defined on the basis of the encapsulation classification of the ingress frame, with frames
classified at the edge port according to the 802.1Q VLAN ID or MAC address. For the same service VF,
the 802.1Q classification rule at each interface is a link-local configuration; the rule may be different at
each interface.
A service VF thus represents a virtualized, normalized VLAN domain, where different link-protocol
VLAN identifiers (port number, MAC address, and customer VLAN ID, or C-VID) are mapped to the
same VLAN. In other words, VMs on the same service VF belong to the same forwarding domain,
even though the attachment interfaces use different classification rules. When a VM moves among
these interfaces, the Layer 2 forwarding domain does not change.
Extending a service VF among VCS data centers makes it possible to migrate VMs across those data
centers.
This chapter also presents an overview of the role of the Brocade VDX 6940 in supporting distributed
VXLAN gateways, made available in Network OS 6.0.1. ""Distributed" means that the gateway can be
deployed anywhere in the VCS Fabric and coexist with other non-gateway RBridges, subject to the
topology constraints and other limitations as noted in the distributed VXLAN gateways section. Only
the VDX 6940 supports this capability, and no special configuration is required. Using Fabric-Virtual-
Gateway is one of many ways to configure the gateway IP address.
NOTE
Only Layer 2 extension gateways are supported. NSX Controller gateways are not supported.
NOTE
Network OS 5.0.0 added support for conversational MAC learning (CML) on classified VLANs as well as
on 802.1Q VLANs. For an overview and applicable configuration examples, refer to Conversational
MAC learning on page 79. As noted above, Network OS6.0.1 added support for distributed VXLAN
gateways on the Brocade VDX 6940 series for Layer 2 extension only.
STP support
The correct configuration of xSTP is the responsibility of the user. Much as the user must ensure that
VLAN configurations and VLAN instance mappings are consistent on all switch ports, so also the user
must understand whether a specific protocol, whether RSTP, MSTP, or PVST, is applicable to the
underlying physical topology when 802.1Q VLANs and VFs coexist in the fabric.
NOTE
Existing VRRP-E implementations cannot support more than four RBridges in a session. As a result,
VRRP-E-based VXLAN gateways are also limited to a maximum of four RBridges.
The following sections present various use cases, both supported and unsupported, and their
corresponding topologies. Refer to the following legend for those topologies.
NOTE
In the initial release, this feature supports only Virtual Fabrics Extension deployments, not NSX
Controller deployments.
A Brocade VDX 6940 at the aggregation layer provides gateway functions for a VXLAN hypervisor at
top of rack (ToR) or in the core.
A distributed VXLAN gateway makes it possible to connect to a hypervisor through a TRILL fabric, as
the Brocade VDX 6940 supports TRILL-plus-VXLAN encapsulation. Refer to the following figure.
In this topology, bridging a physical server and VXLAN servers that are located in the same rack
requires interaction with an aggregation gateway, introducing an extra hop. The gateway supports
VXLAN Network Identifier (VNI) classification for both east-west and north-south traffic. Note the
following considerations:
• The number of overlay networks that are supported in the fabric is limited by ASIC resources for the
VNI classifications.
• The Brocade VDX 6940 is not supported at top of rack. This prevents VLAN-to-VXLAN traffic from
"tromboning" in case the ToR gateway that does the VXLAN encapsulation is not in the same rack
that holds the VXLAN server.
In a Brocade VDX 6740-based fabric, the gateway functionality is distributed across every VDX 6740
RBridge.
This topology is not recommended because of the following limitations:
• It requires a direct attachment between the gateway and a VXLAN-enabled rack, because the
VDX-6740 cannot support TRILL-plus-VXLAN encapsulation.
• The number of server racks is limited to eight. This is constrained by the maximum number of
RBridges that are allowed in a gateway.
• The VDX 6740 supports a maximum of 2000 VLANs.
In this topology, a gateway comprises a mix of Brocade VDX 6740 and VDX 6940 RBridges.
The VDX 6740 is placed at top of rack to serve directly connected VXLAN servers. The VDX 6740
gateway handles VNI classifications for east-west traffic, thereby offloading traffic to the VDX 6940
gateway at the aggregation layer to serve other north-south traffic classifications.
Although this topology helps scale out the number of overlay networks supported in the fabric, it has the
same limitations as in the previous topology, where the VDX 6740 is placed at top of rack.
Every RBridge in the fabric can act as a gateway. However, because dynamic virtual RBridge IDs
(VRBs) support a maximum of eight RBridges, a tunnel VRB-ID can represent a maximum of eight
RBridges out of all the gateway RBridges that are specified in the overlay-gateway configuration.
NOTE
With the current release, the maximum number of gateway RBridges deployed at the aggregation
layer is four. If this number is exceeded, the RBridges that are reachable by means of VRBs is
nondeterministic.
ATTENTION
In a downgrade from the current release, any new commands introduced in this release must be
removed from devices before the downgrade is honored. Also, TRILL+VXLAN functionality is lost during
a downgrade, and there is no warning to the user.
The following functions are not supported for distributed VXLAN gateways:
• BUM optimization
• Loop detection that involves both a tunnel and a nontunnel path
• Flow-based load balancing for tunnels over router ports
• Routing protocols over tunnels
• More than one VTEP per fabric
• QoS that is limited to DiffServ tunneling pipe mode
• A SPAN destination that is not a tunnel
NOTE
Also refer to "Distributed VXLAN gateways upgrade/downgrade considerations" above.
NOTE
If the fabric state is VF-incapable, the vcs virtual-fabric enable command will not succeed.
Disabling VFs
To disable VFs in the fabric, the user must first remove all VF configurations in the fabric before
issuing the no vcs virtual-fabric enable command. This command is distributed to all RBridges in the
fabric. Each RBridge reverses the stage execution from what was done to enable the VF. When ISL
encapsulation returns to being C-TAG based, the fabric is in a VF-capable state.
NOTE
Prior to issuing the no vcs virtual-fabric enable command, the user must ensure that all new
commands and enhanced commands that reference VFs (VFs with IDs greater than 4095) in the fabric
are removed from the running configuration. Otherwise, the command will be rejected.
Feature scalability
The scalability numbers of VLAN features remains same as in the previous release. The following lists
VF resource numbers for the Brocade VDX 8770, VDX 6740, and VDX 6940 series platforms.
TABLE 9 VF resource numbers for Brocade VDX 8770, VDX 6740, and VDX 6940 series
Resources VDX 8770 series VDX 6740 series VDX 6940 series
VLAN virtualization
When a cloud computing provider provisions a virtual datacenter by replicating server-rack ports on
demand (PODs) across server ports, different tenant domains exist but with overlapping 802.1Q
VLANs at the server ports. The tenant domains are isolated by mapping the 802.1Q VLAN at each
interface into a different VLAN forwarding domain. This capability allows the switch to support more
than the 4K VLANs permitted by the 802.1Q address space.
In the example VMware topology shown in the following figure, the data center has three PODs,
provided by RBridges RB1, RB2, and RB3. All three PODs (VMware ESXi hypervisors 1 through 3)
have an identical pre-installed configuration. Each POD supports two tenants. The first tenant can
have two applications running on VFs 10 and 20. The other tenant has only one application, running
on VF 30. Here, four tenant applications are provisioned. Tenant 1 and 2 applications run on ESX1
and ESX2. Tenant 3 and 4 applications run on ESX3.
In a VMware-based cloud provider network, a VCS Fabric is connected to multiple vCenters, where
each data center manages its own set of tenant networks. VMware vCloud/OpenStack is responsible
for orchestrating tenant VLAN configuration through the vCenter agent integrated into a VCS RBridge
and its ESXi servers. Each data center connects to the VCS Fabric by means of dedicated edge ports.
The ability of the VCS Fabric to support 802.1Q VLAN virtualization allows each data center to support
more than 4000 tenant VLANs. ESXi servers may use the same 802.1Q VLAN to represent different
tenant VLANs at the edge port, or have them belong to a single VLAN domain. A vCenter agent
running at an RBridge achieves VLAN virtualization by collating information obtained from the ESXi
servers and the vCenter database. AMPP port profiles with service VF classifications are configured
on the respective server ports.
The topology in the figure shows two vCenters. vCenter1 is connected to VCS RBridges1 and2.
Because the VCS Fabric supports VLAN virtualization, the vCenter can assign two tenant networks,
CV5010 and CV5030, that use the same 802.1Q VLAN (VLAN 10) on the ESXi server. Similarly, in
vCenter2, three tenant VLANs —CV5030, CV6020, and CV8010— are configured, each representing
a unique VLAN domain, but all using the same customer classification, C-TAG 10. If a VM application
needs to run across applications, then the same service VF can be configured on both vCenters; this
is illustrated by CV6030, which is configured at all RBridges and uses the same C-TAG (C-TAG 20).
The service VF configuration at each edge port can be done as part of an AMPP configuration or
automatically through vCenter orchestration. (Refer to VMware documentation for details of the
vCenter Orchestrator.)
• The show running-config command or the show port-profile domain command shows the port-
profiles in the default-profile-domain.
• The user is not allowed to edit the default port-profile domain.
The following rules apply after service VFs are enabled in the fabric.
• The user can edit the UpgradedVlanProfile just like any other port-profile.
• The newly created port-profile is not automatically added to the default domain. It can only be
explicitly added to or removed from the default profile-domain.
• vCenter-managed auto-profiles continue to be added to or deleted automatically from the default
port-profile domain.
NOTE
In Network OS 4.1.1 and later, the vCenter auto-profile does not support service VF classification.
• The show running-config command or the show port-profile domain command shows the port-
profiles in the port-profile domain.
• The user is allowed to edit the default port-profile domain.
• The user is not allowed to delete the default port-profile-domain.
The following table compares the results of a show running-config command before and after an
upgrade from Network OS 4.0.0 to Network OS 4.1.1 and later.
STP-with-service-VFs topology
The following illustrates an example VCS Fabric that is connected to three vDCs. There must not be
any external physical connectivity among the vDCs.
• MSTP
‐ The VCS Fabric and the attached vDCs belong to the same MSTP region.
‐ VLAN-to-instance mapping must be the same in the VCS Fabric and for each vDC.
‐ An MSTP instance topology is formed by the VCS Fabric (which appears as a single logical
switch) and all attached vDCs.
‐ Service VF configuration is allowed. Service VFs (VLAN IDs greater than 4095) are not assigned
to any instance and are always in a forwarding state.
‐ A topology change in one MSTP instance for a vDC affects the topology of the same instance in
other vDCs.
‐ Data loops between the VCS Fabric and individual vDCs are detected by each MSTP topology.
STP participation
The default state for all VLANs (802.1Q or service VFs) is "no spanning-tree shutdown."
For RSTP, there is one RSTP instance in the VCS fabric; the protocol is still VLAN-unaware. This
RSTP instance consists of switch ports that have identical VLAN configurations. The VLAN
configuration may consist of 802.1Q VLANs or classified VLANs. The STP port state applies to all
VLANs (802.1Q and classified) on a port. For switch ports that cannot participate in the same RSTP
instance, it is the user’s responsibility to shut down spanning tree on these ports. This is the case
where ports have overlapping C-TAG classifications and these C-TAGs represent different service
VFs.
For MSTP, the VCS Fabric is a single MSTP region. The VLAN-to-instance mapping is applicable only
to 802.1Q VLANs. The MSTP VLAN digest calculation is based on 802.1Q VLANs alone. The MSTP
state is applied on a port-instance basis (as in previous releases). For switch ports that cannot
participate in the same MSTP instance, it is the user’s responsibility to shut down spanning tree on
these ports. This is the case where ports have overlapping C-TAG classifications.
Service VFs can participate only in MST instance 0 and cannot be assigned to another MST instance.
When a service VF is shut down, it is assigned to an internal instance (instance 255) that is always in
the forwarding state. The default state for all 802.1Q VLAN and service VFs is “no spanning-tree
shutdown.”
For PVST, the STP instance is on a per-service-VF basis. PVST can be enabled only on a service VF
that has a classification tag. The classification tag identifies the default 802.1Q VLAN in the attached
network and is carried in the PVST BPDU; it is also used to form the root RBridge ID. The service VF
must have the same C-TAG classification and a nonconflicting classification with other VFs on all
RBridge interfaces. This is to ensure the uniqueness of the root RBridge ID for each PVST instance.
Consequently, note the following conditions:
• PVST cannot be enabled on a service VF with a VLAN ID greater than 4095 on an access port.
• PVST cannot be enabled on a trunk-mode native VLAN that has no C-TAG classification.
For edge-loop detection (ELD), the protocol instance is on a per-service-VF basis. The user can use
the CLI to enable ELD for any service VF on a switch port. Because an ELD configuration applies on a
port, the classification for that service VF must exist before the ELD configuration can be accepted.
STP tunneling
BPDU tunneling can be controlled on a per-port basis by means of the existing bpdu-drop command.
In a multitenancy environment, where a VCS Fabric could be connected to multiple STP-enabled
networks, the fabric should tunnel only one instance of the STP BPDU. It is the user’s responsibility to
enable tunneling on ports that belong to the same STP instance. Other switch ports should have
tunneling disabled.
Currently, the bpdu drop command controls BPDU forwarding only on the ingress port; the forwarding
decision must be applied on the egress port as well. Nontagged BPDUs are tunneled on VCS control
VLAN 4095. At the egress RBridge, switch ports that have BPDU tunnels disabled should be removed
from the flood membership of the VLAN. For tagged BPDUs (as in PVST), a BPDU is tunneled on its
own service-VF flood domain.
is, the classification of a primary VLAN is done at a promiscuous port, that of a community VLAN at a
community port, and that of an isolated VLAN at an isolated port.
The service VF classification is required only if a port operates in trunk mode. An access port does not
require classification rules. The validation that is done for the service VF corresponds to the port type.
Transport VFs
Transport service enables a cloud provider to offer service applicability on a VLAN group level, rather
than at a per-individual tenant VLAN level.
The cloud-based service provider needs to provide different service-level agreements (SLAs) to support
tenant needs and changes. Transport VFs enable the provider to offer services applicability on a VLAN
group level, rather than at a per-individual tenant VLAN level, where the VLAN group represents a
specific tenant application. Accordingly, the service offered can be associated only with a single
transparent VLAN that collectively represents all the VLANs in the group that participate in supporting a
given application. With transport VFs, all VLANs that support the application share the same Layer 2
forwarding domain (individual VLAN isolation is not maintained), and all end stations that participate in a
given application or transport VF instance must use unique MAC addresses.
Transport VF topology
The following figure shows four transport VF instances on the respective transparent VLANs (TVLANs)
5000, 6000, 7000 and 8000. Each transport VF carries 101 VLANs in that application. Across the
transport VFs, overlapping service VFs among tenants can be supported. The transport VFs can also
be extended to another VCS Fabric over a VPLS network.
The transport VFs that can extend outside of the VCS Fabric are numbered up through 4095, bound
by the 802.1Q interface. Because the extension port cannot support QinQ encapsulation, transport
VFs that have overlapping C-TAGs cannot be configured on the same port. In the initial release of this
feature, no Layer 2 or Layer 3 configuration is supported.
Transport VFs are created by configuring a transparent VLAN that is classified by a set of VLANs at a
trunk interface. The operational model is similar to the implementation of SVL (shared VLAN learning).
The forwarding behavior is that all service VFs in the transport VF instance are mapped to the
transparent LAN forwarding domain (individual VLAN isolation is not maintained), and all end stations
participating in the transport VF must have unique MAC addresses.
‐ Untagged control traffic is not subject to transport VF classification rules. It is handled according to
the respective protocol configuration (that is, trapped, dropped, forwarded).
‐ Tagged control traffic received on a transport VF is forwarded on the transport VF domain as is
data traffic. (PVST cannot be established on a transport VF and is always in the shutdown state.)
‐ Tagged control traffic received on a service VF is governed by its respective protocol
configuration.
• Transport VF classification can be based on any of the following:
‐ A C-TAG range
‐ The native VLAN
‐ Default traffic (any nonmatching data traffic)
• A vXLAN VNI cannot be mapped to a transport VF.
• Layer 2/Layer 3 configurations are not supported on a transport VF. This means that AMPP/xSTP/
PVLAN/RSPAN/ACL/VE configurations are not allowed on a transparent VLAN.
FCoE VLAN Yes Yes Yes An FCoE VLAN defined in the FCoE
(1002) fabric-map configuration can be
used as a classification C-TAG if the
port is not configured as an FCoE
port.
Reserved VLAN Yes Yes Yes Each platform has a certain VLAN
range that is reserved for internal
operations. A VLAN in this range
can be used as a service or
transport C-TAG if the VLAN ID is
not internally configured on an edge
port. (VLAN 4095 is an internal
VLAN and cannot be used.)
When a port is configured in normal trunk mode, a default native VLAN exists. Consequently, the
native VLAN complies with the existing native VLAN configuration and forwarding behavior in this
mode. The normal behavior for the existing native VLAN is as follows:
• Default native VLAN 1 exists when the port first enters this mode.
• The default native VLAN always exists (either as VLAN 1 or any 802.1Q VLAN ID) and cannot be
deleted.
• A tagged native VLAN is always forwarded and cannot be discarded, unless it is blocked by STP.
• Egress tagging behavior depends on acceptable ingress frame types:
‐ Tagged egress is enabled only if the acceptable ingress frame type is tagged only.
‐ Untagged egress is enabled only if the acceptable ingress frame type includes untagged frames.
‐ Egress tagging cannot preserve ingress frame encapsulation.
The following commands are applicable to native VLANs (802.1Q VLANs or service VFs):
• [no] switchport trunk native vlan vid [ctag ctag]
• [no] dot1q tag native (global configuration mode)
• [no] switchport trunk tag native-vlan (interface subtype configuration mode)
The first command is used to define a native 802.1Q VLAN or a native service or transport VF. The
last two commands are used to control the ingress acceptable frame and egress tagged behavior. The
802.1Q native VLAN classifications and the role of the respective commands are summarized in the
following table.
The service VF classification rules are similar to those for native VLAN classification, but with the
following exceptions:
Tagged only N/A Yes switchport trunk native vlan vid ctag cvid,
switchport trunk tag native-vlan
Untagged and tagged Yes No switchport trunk native vlan vid ctag cvid,
no switchport trunk tag native-vlan
The following illustrates configurations that are valid or invalid in regular trunk mode.
Another set of native VLAN classifications for service and transport VFs is available in trunk mode
without the implicit creation of a default VLAN. The purpose of this trunk mode is to provide flexibility
that is not available in default VLAN trunk mode and do the following:
• Provide a raw Layer 2 switchport with no VLAN configuration.
• Allow native VLAN configuration when it is needed.
• Allow the mapping of a native VLAN to a service or transport VF.
• Allow the independent specification of ingress acceptable frame type and egress tagging options.
This trunk mode differs from the default-VLAN trunk mode in the following ways:
VLAN configuration similar to that of regular trunk mode can be achieved explicitly after VLAN 1 is
configured as a tagged VLAN.
switch(config-if-te-1/0/1)# switchport trunk allow vlan add 1
The following creates native VLAN 10. All service and transport VFs can continue to coexist on the
same port.
switch(config-if-te-1/0/1)# switchport trunk native-vlan-untagged 10
switch(config-if-te-1/0/1)# switchport trunk allow vlan 6000 ctag 100-200
switch(config-if-te-1/0/1)# switchport trunk default-vlan 7000
The following accepts ingress tagged or untagged frames, but egress frames must be tagged only.
This is not allowed in default-VLAN trunk mode.
switch(config-if-te-1/0/1)# switchport trunk native-vlan-xtagged 10 egress tagged
The following classifies VLAN 10 to transport VF 6000. Because this native VLAN is a transport VF,
the option for egress is any.
switch(config-if-te-1/0/1)# switchport trunk native-vlan-xtagged 6000 ctag 10 egress
any
switch(config-if-te-1/0/1)# switchport trunk allow vlan 6000 ctag 100-200
NOTE
Use the no form of this command to disable service VF configuration.
NOTE
Use no interface vlan vlan_id to delete a service VF.
NOTE
VLAN 1 is the default VLAN in this mode.
switch(config)# interface te 2/1/1
switch(config-if-te-2/1/1)# switchport mode trunk
switch(config-if-te-2/1/1)# switchport trunk native-vlan 10
2. Configure untagged native VLAN (service VF) 5000 and transport VLAN (transport VF) 6000, and
make VLAN 7000 the default VLAN.
switch(config)# interface te 2/1/1
switch(config-if-te-2/1/1)# switchport mode trunk
switch(config-if-te-2/1/1)# no switchport trunk tag native
switch(config-if-te-2/1/1)# switchport trunk native-vlan 5000
switch(config-if-te-2/1/1)# switchport trunk allow vlan add 6000 ctag 100-200
switch(config-if-te-2/1/1)# switchport trunk default-vlan 7000
3. Configure transport VLAN 6000 to accept the C-TAG range 100 through 200, as well as tagged or
untagged native VLAN traffic.
switch(config)# interface te 2/1/1
switch(config-if-te-2/1/1)# switchport mode trunk
switch(config-if-te-2/1/1)# no switchport trunk tag native
switch(config-if-te-2/1/1)# switchport trunk native-vlan 6000 ctag 10
switch(config-if-te-2/1/1)# switchport trunk allow vlan add 6000 ctag 100-200
1. In global configuration mode, use the interface vlan vlan_id command to create VLAN instances that
are greater than 4095, through 8191.
switch(config)# interface vlan 5000
switch(config)# interface vlan 6000
switch(config)# interface vlan 7000
2. In VLAN configuration mode, use the private-vlan command to create the three types of PVLAN.
switch(config)# interface vlan 5000
switch(conf-vlan-5000)# private-vlan primary
switch(config)# interface vlan 6000
switch(conf-vlan-6000)# private-vlan isolated
switch(config)# interface vlan 7000
switch(conf-vlan-7000)# private-vlan community
3. Using the private-vlan association command, associate the secondary PVLANs with the primary
PVLAN.
switch(config)# interface vlan 5000
switch(conf-vlan-5000)# private-vlan association add 6000
switch(conf-vlan-5000)# private-vlan association add 7000
1. Create classification rules for the primary and secondary VLAN at the respective primary and host
ports.
The classification must be done before the primary-to-secondary VLAN associations are specified.
In following example, the same C-TAG is used to classify the primary and secondary VLANs.
Interface te 1/0/1 is a primary trunk port.
switch(config)# interface te 1/0/1
switch(conf-if-te-1/0/1)# switchport mode private-vlan trunk promiscuous
switch(conf-if-te-1/0/1)# switchport trunk allow vlan add 5000 ctag 10
The trunk port can have both PVLAN and regular VF configurations. The following configures
PVLAN VFs.
switch(conf-if-te-1/4/1)# switchport trunk allowed vlan add 5000 ctag 10
switch(conf-if-te-1/4/1)# switchport trunk allowed vlan add 6000 ctag 10
switch(conf-if-te-1/4/1)# switchport trunk allowed vlan add 6000 ctag 10
switch(conf-if-te-1/4/1)# switchport private-vlan association trunk 5000 6000
switch(conf-if-te-1/4/1)# switchport private-vlan association trunk 5000 7000
The following example conditions, with error messages, that determine the success or failure of a
PVLAN configuration.
• If a PVLAN is a service VF and the classification does not exist for this port, the PVLAN association
executed on this interface will fail. This following commands fail because there is no classification
rule for primary service VF 5000.
switch(config)# interface te 1/0/1
switch(conf-if-te-1/0/1)# switchport mode private-vlan trunk promiscuous
switch(conf-if-te-1/0/1)# switchport private-vlan mapping 5000 add 200
%%ERROR: Primary Vlan should have a ctag associated with it on this port.
switch(config)# interface te 1/0/2
switch(conf-if-te-1/0/2)# switchport mode private-vlan trunk host
switch(conf-if-te-1/0/2)# switchport private-vlan host-association 100 add 6000
%%ERROR: Secondary Vlan should have a ctag associated with it on this port.
• The following command succeeds because the primary port is an access port.
switch(conf-if-te-1/1/1)# switchport mode private-vlan promiscuous
switch(conf-if-te-1/1/1)# switchport private-vlan mapping 5000 add 6000
• The following command succeeds because the secondary port is an access port.
switch(conf-if-te-1/1/2)# switchport mode private-vlan host
switch(conf-if-te-1/1/2)# switchport private-vlan host-association 5000 add 6000
1. In global configuration mode, create a MAC group instance to define the MAC addresses of end
stations, by using the mac-group mac-group-id command.
The value of mac-group-id ranges from 1 through 500.
switch(config)# mac-group 1
2. In MAC group configuration mode, use the mac mac_address command to add a MAC address in
hexadecimal notation.
NOTE
Ranging is not allowed. Leading zeros can be omitted.
switch(config-mac-group 1)# mac 0002.0002.0002
NOTE
Only one MAC address can be deleted at a time.
switch(config)# mac-group 1
switch(config-mac-group 1)# no mac 0004.0004.0004
The following illustrates various options and errors that can occur in configuring an interface for
service VF MAC address access.
1. In interface configuration mode, set switchport mode to access and change the default VLAN to a
service VF.
NOTE
The default VLAN must be unique. It must not be the same as that used for another MAC
classification.
switch(config)# int te 2/0/1
switch(config-if-te-2/0/1)# switchport access vlan 5000
2. Classify the access VLAN by means of a MAC address.
switch(config-if-te-2/0/1)# switchport access vlan 6000 mac 0002.0002.0002
3. Classify another access VLAN on the same interface by means of a MAC address.
switch(config-if-te-2/0/1)# switchport access vlan 7000 mac 0004.0004.0004
NOTE
Frames that do not match 0002.0002.0002 or 0004.0004.0004 are classified into service VF 5000.
4. Create a MAC group to be used to classify a VLAN.
switch(config)# mac-group 1
switch(config-mac-group 1)# mac 0002.0002.0002
switch(config-mac-group 1)# mac 0005.0005.0005
switch(config-mac-group 1)# mac 0008.0008.0008
5. Configure another service VF on the same interface by means of a MAC group.
switch(config-if-te-2/0/1)# switchport access vlan 7000 mac-group 1
Error: mac address is already used in another classification
NOTE
The MAC address cannot be used in another service VF classification.
6. Configure another interface with a third service VF and classify the VLANs by MAC group and MAC
address, respectively.
switch(config-if-te-3/0/1)# switchport mode access
switch(config-if-te-3/0/1)# switchport access vlan 7000 mac-group 1
switch(config-if-te-3/0/1)# switchport access vlan 8000 0008.0008.0008
switch(config-if-te-3/0/1)# %Error: Mac-address/Mac-group is overlapping with
another Mac-address/Mac-group configuration on the same port.
NOTE
The MAC address cannot be used in another service VF classification.
NOTE
BGP is also supported in the appropriate context.
switch(config)# ip vrf VRF_CUST1
a) Use the rd (Route Distinguisher) command to assign an administrative number.
switch(config-vrf-CUST1)# rd 10.1.1.1:1
b) Set the OSPF address family to IPv4.
switch(config-vrf-CUST1)# address-family ipv4
switch(config-vrf-CUST1)# exit
c) Return to config mode.
switch(config-vrf-CUST1)# exit
4. Create the VE interface on the service VF and configure VRF forwarding and VRRP.
a) Configure forwarding for a VRF instance.
switch(config-ve-5000)# ip vrf forwarding VRF_CUST1
b) In RBridge ID configuration mode, create a virtual Ethernet interface, and assign the service VF
and IP address. Be sure to enable the interface.
switch(config)# rbridge-id 3
switch(config-rbridge-id-3)# interface ve 5000
switch(config-ve-5000)# ip address 10.1.1.1/24
switch(config-ve-5000)# no shutdown
c) Create a VRRP group and assign a virtual IP address.
switch(config-ve-5000)# vrrp-group 22
switch(config-vrrp-group-22)# virtual-ip 10.1.1.1
The extension function commonly resides at the aggregation layer, either embodied in the aggregation
node itself, or hanging as a service off the aggregation node in a one-arm topology. This feature resides
in the network spine, with up to four RBridges participating. Tunnels are provided through router ports
and switch ports.
In addition, the user can collect statistics on tunnel and gateway traffic, through the range of attached
VLANs. Both transmit and receive traffic can be monitored for a single tunnel and range of VLANs, or all
tunnels and a range of VLANs. Support is also provided for similar sFlow monitoring.
• Nondefault VRFs
• Fully meshed tunnels between fabrics, with BUM through headend replication
• Multicast (without multicast traffic optimization)
• Split horizon in the data plane for loop avoidance
• MAC address learning on tunnels
• Layer 2 fault domain isolation across fabrics
• Layer 3 protocol isolation controls (off by default)
• MAC, IPv4, and IPv6 ingress ACLs
• sFlow configurations
The following features are not supported:
• VXLAN-to-VLAN routing, and vice versa
• VNI translation (because of a single VNI domain)
• Exposing of ARPs behind the physical network as a unicast map
• VXLAN transit
• BUM optimization (including ARP-related optimization)
• Loop-detection protocols over tunnels. There is no support for STP or tunneling STP BPDUs. (The
user is responsible for avoiding loops over any interfaces.)
• Keepalives on tunnels
• TRILL with VXLAN
• Tunnels as a SPAN destination
• vLAG of tunnels to the same remote VTEP
• PACL on tunnels (VACL is supported)
• Tunnels as profile-ports. (However, a VLAN that spans a tunnel can have a profiled physical port,
as in the previous release.)
• Router port IP addresses or VE IP addresses used as VTEP addresses
• Fabric cluster mode
Note the following considerations with respect to ACLs, SPAN, sFlow, and statistics, as these features
share the ternary content-addressable memory (TCAM) tables for the corresponding features of
nontunnel traffic:
• Ingress statistics and sFLow both need a counting ability. Consequently, if both functions are
enabled and a particular traffic type satisfies both classifiers, then statistics alone takes effect and
sFlow does not.
• Ingress SPAN and sFlow both use the same resources. Consequently, if both functions are enabled
and a particular traffic type satisfies both classifiers, then sFlow takes effect and SPAN does not.
• Ingress statistics and ACLs both use the same resources. Consequently, if both functions are
enabled and a particular traffic type satisfies both classifiers, then ACLs take effect and statistics
does not.
• The scaling limits of the above features are constrained by the profiles applied on the system.
High-level topologies
The following illustrates an example high-level topology for Layer 2 extension at the aggregation layer
only. Note the following restrictions for this topology:
• If a vLAG is deployed, the number of aggregation VDX devices supporting extension is limited to
the size of the vLAG with respect to RBridges and the number of RBridges in a VRRP group. (This
restriction does not apply if router ports are used.)
• A static route must be configured on the upstream device, or VRRP must use the First Hop
Redundancy Protocol (FHRP) gateway.
The following illustrates an example high-level topology that uses VXLAN virtual network interface (VNI)
tunnel endpoints (VTEPs) in separate fabrics with a one-arm VDX deployment. Note the following
restrictions for this topology:
• The fabric must be extended through an 802.1Q port.
• Only vLAG connectivity is supported. Router ports are not supported to the aggregation device.
This overview summarizes the basic steps that are required to extend a Layer 2 VLAN-based
broadcast domain over a Layer 3 network, without the use of an orchestrator such as the NSX
Controller.
The basic provisioning and configuration steps can be summarized as follows:
1. Ensure that the network administrator has created a broadcast domain on the physical side. This
domain consists of 802.1Q VLANs, as well as the service and transport VFs available in a Virtual
Fabrics context.
2. Create a VXLAN tunnel endpoint (VTEP) container with a "type" qualifier that specifies the use of
the VTEP for Layer 2 extension.
NOTE
If you are configuring a loopback interface to serve as a VTEP, you must manually configure distinct
router IDs, by means of the ip router-id command, for use by routing protocols.
3. Create containers for the remote sites. These containers will have the IP addresses of the site. This
leads to the automatic creation of VTEP tunnels to the remote sites. The tunnels refer to VTEP as
the source endpoint, and to the IP addresses of the remote site as the destination endpoint.
(Multiple addresses, corresponding to a LAG of tunnels, are not supported in this release.}
NOTE
A full mesh of tunnels must be created.
4. A VLAN-to-VNI map is created for the VTEP. This provides a global mapping across all sites for the
VTEP. The map can be created automatically, where VLAN-to-VNI mapping is autogenerated, or the
user can specify each map explicitly.
5. In the site container, extend the required VLANs (including service and transport VFs) that must be
extended to a given remote site.
NOTE
Automatic and explicit mappings are mutually exclusive. Also, the VLANs used in the extend vlan
configuration must be a subset of the VLANs used in the map vlan configuration. In other words, a
VLAN must have a VNI mapping for it to be extended across sites.
4. Configure the site, which includes providing a site name and entering VXLAN overlay gateway site
configuration mode, providing an IPv4 address for the VNI tunnel endpoint (VTEP) in that mode,
extending VLANs, and enabling the tunnels administratively.
a) Enter a site name and enter VXLAN overlay gateway site configuration mode.
switch(config-overlay-gw-gateway1)# site mysite1
switch(config-overlay-gw-gateway1-mysite1)#
b) Configure an IPv4 address for the tunnel endpoints.
switch(config-overlay-gw-gateway1-mysite1)# ip address 10.10.10.1
NOTE
Only one IPv4 address is allowed.
c) Extend the VLANs.
switch(config-overlay-gw-gateway1-mysite1)# extend vlan add 10,20-22
d) Enable the tunnels administratively.
switch(config-overlay-gw-gateway1-mysite1)# no shutdown
5. The following substeps attach the RBridge IDs to the VXLAN gateway instance, set the IP address of
the gateway, and activate the instance.
a) Enter the attach rbridge-id command to attach existing RBridge IDs to this VXLAN gateway
instance. You can specify a range of RBridge IDs up to a maximum of four.
switch(config-overlay-gw-gateway1)# attach rbridge-id add 1-2
b) Enter the ip interface ve veid vrrp-extended-group group-ID command to set the IP address of
the VXLAN overlay gateway, as shown in the following example.
switch(config-overlay-gw-gateway1)# ip interface ve 10 vrrp-extended-group
100
The command accepts the VE interface ID and VRPP-E group ID, then sets the VXLAN overlay
gateway's IP address as identical to the already configured VRRP-E virtual IP address. Tunnels
that form use this IP address as the source IP address for outgoing packets.
For complete information on the those commands as well as other VXLAN overlay-gateway
commands and commands related to the NSX Controller, refer to the Network OS Command
Reference.
Some additional supporting commands are listed in the following table:
show overlay-gateway Displays status and statistics for the VXLAN overlay-
gateway instance.
This section provides examples of a variety of show commands that can be used to troubleshoot
VXLAN Layer 2 extension configurations. In general, do the following to confirm the proper operation
of the configuration:
• Confirm that the overlay gateway is up, with a valid VTEP IP address on all RBridges.
• Confirm that the tunnel interface is a member of the VLAN.
• Confirm that the administrative and operational states of the tunnels are up on all RBridges.
• Confirm that there is one multicast-replicator enabled RBridge for every extension tunnel.
• Confirm that only one BUM forwarder is enabled for the next hop for every extension tunnel.
• Confirm that all sites are configured so that the tunnels form a full mesh, and that there are no
VLAN extension inconsistencies across sites.
• Confirm the MAC addresses.
NOTE
In the following examples, items to look for and confirm are highlighted in bold.
Confirm the IP address, loopback ID, and administrative state, by using the show overlay-gateway
command:
sw0(config-overlay-gw-gw121)# do show overlay-gateway
NOTE
Ensure that there are no "Unknown" entries.
NOTE
Ensure that there are no discrepancies in the operational states and source IP addresses across
RBridges.
NOTE
You can also use the rbridge-id keyword. Watch out for discrepancies in the operational states and
source and destination IP addresses across RBridges. The "Active next hops . . . " lines can vary across
participating RBridges. Ensure that BUM forwarding is enabled for the next hop, which carries egress
BUM traffic. There must be only one such next hop for the extension tunnel.
To view tunnel details for the site, you can use the show tunnel site command with the brief keyword:
switch# show tunnel site VCS_2 brief
NOTE
Receive bytes are not available.
switch# show tunnel statistics
Tnl ID RX packets TX packets RX bytes TX bytes
======== =============== =============== =============== ================
61441 123 456 (NA) 4560
61442 567 890 (NA) 8900
NOTE
Only an Active state confirms that the MAC address is getting forwarded locally unto the tunnel.
Session : 10
Description : [None]
State : Enabled
Source Interface : Tu 61442 (Down)
Destination Interface : Te 1/0/48 (Up)
Direction : Both
Confirm all sFlow details by using the show sflow all command:
switch# show sflow all
show vlan brief Displays all classified VLANs that are configured,
provisioned (active) or unprovisioned (inactive).
show overlapping-vlan-resource usage For VDX 6740 and VDX 6940 series only. Displays the
utilization of the hardware table entries that support
classified or transport VLAN classifications that use
overlapping C-TAGs in a Virtual Fabric context.
show virtual-fabric status Displays the status of the Virtual Fabric: VF-capable,
VF-incapable, or VF-enabled.
STP overview
A network topology of bridges typically contains redundant connections to provide alternate paths in
case of link failures. However, because there is no concept of TTL in Ethernet frames, this could result
in the permanent circulation of frames if there are loops in the network. To prevent loops, a spanning
tree connecting all the bridges is formed in real time. The redundant ports are put in a blocking
(nonforwarding) state. They are enabled when required. In order to build a spanning tree for the bridge
topology, the bridges must exchange control frames (BPDUs - Bridge Protocol Data Units). The
protocols define the semantics of the BPDUs and the required state machine. The first Spanning Tree
Protocol (STP) became part of the IEEE 802.1d standard.
The STP interface states for every Layer 2 interface running STP are as follows:
• Blocking — The interface does not forward frames.
• Listening — The interface is identified by the spanning tree as one that should participate in frame
forwarding. This is a transitional state after the blocking state.
• Learning — The interface prepares to participate in frame forwarding.
• Forwarding — The interface forwards frames.
• Disabled — The interface is not participating in spanning tree because of a shutdown port,
no link on the port, or no spanning tree instance running on the port.
A port participating in spanning tree moves through these states:
• From initialization to blocking
• From blocking to listening or to disabled
• From listening to learning or to disabled
• From learning to forwarding, blocking, or disabled
• From forwarding to disabled
The following STP features are considered optional features, although you might use them in your STP
configuration:
• Root guard
• Port fast BPDU guard and BPDU filter
• In the case of STP over VCS (STPoVCS), STP is disabled by default on all ports.
• When a misconfigured local area network running spanning tree has one or more loops, a traffic
storm of spanning tree BPDUs can occur. In certain circumstances, VDX switches can reboot when
subjected to an extended period of traffic storm involving spanning tree BPDUs.
• Additionally, when a misconfigured local area network running spanning tree has one or more
loops, a traffic storm of spanning tree BPDUs can occur. Edge Loop Detection (ELD) protocol
cannot eliminate loops during a traffic storm involving control packets, such as spanning tree
BPDUs.
• Do not force an alternate root path through root path cost with PVST+ or R-PVST+ on legacy
Foundry equipment, such as the Brocade NetIron MLX or Brocade TurboIron. This can cause traffic
issues on the network.
• For load balancing across redundant paths in the network to work, all VLAN-to-instance mapping
assignments must match; otherwise, all traffic flows on a single link.
• Spanning tree topologies must not be enabled on any direct server connections to the front-end 10-
gigabit Ethernet ports that may run FCoE traffic. This may result in lost or dropped FCoE logins.
RSTP
NOTE
Rapid Spanning Tree Protocol is designed to be compatible and interoperate with STP. However, the
advantages of the RSTP fast reconvergence are lost when it interoperates with switches running STP.
The IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) standard is an evolution of the 802.1D STP
standard. It provides rapid reconvergence following the failure of a switch, a switch port, or a LAN. It
provides rapid reconvergence of edge ports, new root ports, and ports connected through point-to-
point links.
The RSTP interface states for every Layer 2 interface running RSTP are as follows:
• Learning — The interface prepares to participate in frame forwarding.
• Forwarding — The interface forwards frames.
• Discarding — The interface discards frames. Note that the 802.1D disabled, blocking, and listening
states are merged into the RSTP discarding state. Ports in the discarding state do not take part in
the active topology and do not learn MAC addresses.
The following table lists the interface state changes between STP and RSTP.
STP interface state RSTP interface state Is the interface included in the Is the interface learning MAC
active topology? addresses?
Disabled Discarding No No
Blocking Discarding No No
With RSTP, the port roles for the interface are also different. RSTP differentiates explicitly between the
state of the port and the role it plays in the topology. RSTP uses the root port and designated port
roles defined by STP, but splits the blocked port role into backup port and alternate port roles:
• Backup port — Provides a backup for the designated port and can only exist where two or more ports
of the switch are connected to the same LAN; the LAN where the bridge serves as a designated
switch.
• Alternate port — Serves as an alternate port for the root port providing a redundant path towards the
root bridge.
Only the root port and the designated ports are part of the active topology; the alternate and backup
ports do not participate in it.
When the network is stable, the root and the designated ports are in the forwarding state, while the
alternate and backup ports are in the discarding state. When there is a topology change, the new RSTP
port roles allow a faster transition of an alternate port into the forwarding state.
MSTP
IEEE 802.1s Multiple STP (MSTP) helps create multiple loop-free active topologies on a single physical
topology. MSTP enables multiple VLANs to be mapped to the same spanning tree instance (forwarding
path), which reduces the number of spanning tree instances needed to support a large number of
VLANs. Each MSTP instance has a spanning tree topology independent of other spanning tree
instances. With MSTP you can have multiple forwarding paths for data traffic. A failure in one instance
does not affect other instances. With MSTP, you are able to more effectively utilize the physical
resources present in the network and achieve better load balancing of VLAN traffic.
NOTE
In MSTP mode, RSTP is automatically enabled to provide rapid convergence.
Multiple switches must be configured consistently with the same MSTP configuration to participate in
multiple spanning tree instances. A group of interconnected switches that have the same MSTP
configuration is called an MSTP region.
NOTE
Brocade supports 32 MSTP instances and one MSTP region.
MSTP introduces a hierarchical way of managing switch domains using regions. Switches that share
common MSTP configuration attributes belong to a region. The MSTP configuration determines the
MSTP region where each switch resides. The common MSTP configuration attributes are as follows:
• Alphanumeric configuration name (32 bytes)
• Configuration revision number (2 bytes)
• 4096-element table that maps each of the VLANs to an MSTP instance
Region boundaries are determined by the above configuration. A multiple spanning tree instance is an
RSTP instance that operates inside an MSTP region and determines the active topology for the set of
VLANs mapping to that instance. Every region has a common internal spanning tree (CIST) that forms a
single spanning tree instance that includes all the switches in the region. The difference between the
CIST instance and the MSTP instance is that the CIST instance operates across the MSTP region and
forms a loop-free topology across regions, while the MSTP instance operates only within a region.
The CIST instance can operate using RSTP if all the switches across the regions support RSTP.
However, if any of the switches operate using 802.1D STP, the CIST instance reverts to 802.1D. Each
region is viewed logically as a single STP/RSTP bridge to other regions.
NOTE
Network OS 4.0 and later supports PVST+ and R-PVST+ only. The PVST and R-PVST protocols are
proprietary to Cisco and are not supported.
The following table lists those switch defaults which apply only to MSTP configurations.
Revision number 0
The following table lists the switch defaults for the 10-gigabit Ethernet DCB interface-specific
configuration.
DCB interface root port Allow the DCB interface to become a root port.
Configuring STP
The process for configuring STP is as follows:
1. Enter global configuration mode.
2. Enable STP by using the global protocol spanning-tree command.
switch(config)# protocol spanning-tree stp
3. Designate the root switch by using the bridge-priority command. The range is 0 through 61440 and
the priority values can be set only in increments of 4096.
switch(conf-stp)# bridge-priority 28672
4. Enable port fast on switch ports by using the spanning-tree portfast command.
ATTENTION
Note the following conditions:
• Port fast only needs to be enabled on ports that connect to workstations or PCs. Repeat these
commands for every port connected to workstations or PCs. Do not enable port fast on ports that
connect to other switches.
• If BPDUs are received on a port fast enabled interface, the interface loses the edge port status
unless it receives a shut/no shut.
• Enabling port fast on ports can cause temporary bridging loops, in both trunking and nontrunking
mode.
switch(config)# interface tengigabitethernet 1/0/10
switch(conf-if-te-1/0/10)# spanning-tree portfast
switch(conf-if-te-1/0/10)# exit
5. To interoperate with non-VDX devices (such as NetIron and FastIron) in PVST+/R-PVST+ mode, you
may need to configure the interface that is connected to that switch by using the spanning-tree
bpdu-mac command.
switch(config)# interface tengigabitethernet 1/0/12
switch(conf-if-te-0/12)# spanning-tree bpdu-mac 0100.0ccc.cccd
6. Specify port priorities by using the spanning-tree priority command to influence the selection of
root/designated ports.
When the spanning tree topology is completed, the network switches send and receive data only on
the ports that are part of the spanning tree. Data received on ports that are not part of the spanning
tree is blocked.
NOTE
Brocade recommends leaving other STP variables at their default values.
Configuring RSTP
The process for configuring RSTP is as follows.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enable RSTP by using the global protocol spanning-tree command.
switch(config)# protocol spanning-tree rstp
3. Designate the root switch by using the bridge-priority command. The range is 0 through 61440
and the priority values can be set only in increments of 4096.
switch(conf-stp)# bridge-priority 28582
4. Configure the bridge forward delay value.
switch(conf-stp)# forward-delay 20
5. Configure the bridge maximum aging time value.
switch(conf-stp)# max-age 25
6. Enable the error-disable-timeout timer.
switch(conf-stp)# error-disable-timeout enable
7. Configure the error-disable-timeout interval value.
switch(conf-stp)# error-disable-timeout interval 60
8. Configure the port-channel path cost.
switch(conf-stp)# port-channel path-cost custom
9. Configure the bridge hello-time value.
switch(conf-stp)# hello-time 5
10.Enable port fast on switch ports by using the spanning-tree portfast command.
NOTE
Port fast only needs to be enabled on ports that connect to workstations or PCs. Repeat these
commands for every port connected to workstations or PCs. Do not enable port fast on ports that
connect to other switches.
NOTE
Enabling port fast on ports can cause temporary bridging loops, in both trunking and nontrunking
mode.
switch(config)# interface tengigabitethernet 1/0/10
switch(conf-if-te-1/0/10)# spanning-tree portfast
11.Specify port priorities by using the spanning-tree priority command to influence the selection of
root/designated ports.
Configuring MSTP
The process for configuring MSTP is as follows.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enable MSTP by using the global protocol spanning-tree command.
switch(config)# protocol spanning-tree mstp
3. Specify the region name by using the region region_name command.
switch(config-mstp)# region brocade1
4. Specify the revision number by using the revision command.
switch(config-mstp)# revision 1
5. Map a VLAN to an MSTP instance by using the instance command.
switch(config-mstp)# instance 1 vlan 2, 3
switch(config-mstp)# instance 2 vlan 4-6
switch(config-mstp)# instance 1 priority 4096
6. Specify the maximum hops for a BPDU to prevent the messages from looping indefinitely on the
interface by using the max-hops hop_count command.
switch(config-mstp)# max-hops 25
7. Return to privileged EXEC mode.
switch(config)# end
8. Enter the copy running-config startup-config command to save the running configuration to the
startup configuration.
switch# copy running-config startup-config
In MSTP mode, use the cisco-interoperability command to enable or disable the ability to interoperate
with certain legacy Cisco switches. If Cisco interoperability is required on any switch in the network,
then all switches in the network must be compatible, and therefore enabled by means of this command.
The default is Cisco interoperability is disabled.
NOTE
The cisco-interoperability command is necessary because the "version 3 length" field in the MSTP
BPDU on some legacy Cisco switches does not conform to current standards.
To enable interoperability with certain legacy Cisco switches, perform the following steps from privileged
EXEC mode.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enter the protocol command to enable MSTP.
switch(config)# protocol spanning-tree mstp
3. Enter the cisco-interoperability enable command to enable interoperability with certain legacy
Cisco switches.
switch(config-mstp)# cisco-interoperability enable
4. (Optional) To disable interoperability with certain legacy Cisco switches, enter the cisco-
interoperability disable command.
switch(config-mstp)# cisco-interoperability disable
In MSTP mode, use the instance command to map a VLAN to an MTSP. You can group a set of
VLANs to an instance. This command can be used only after the VLAN is created. VLAN instance
mapping is removed from the configuration if the underlying VLANs are deleted.
To map a VLAN to an MSTP instance, perform the following steps from privileged EXEC mode.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enter the protocol command to enable MSTP.
switch(config)# protocol spanning-tree mstp
3. Map a VLAN to an MSTP instance.
switch(config-mstp)# instance 5 vlan 300
4. Return to privileged EXEC mode.
switch(config-mstp)# end
5. Enter the copy running-config startup-config command to save the running configuration to the
startup configuration.
switch# copy running-config startup-config
In MSTP mode, use the max-hops command to configure the maximum number of hops for a BPDU
in an MSTP region. Specifying the maximum hops for a BPDU prevents the messages from looping
indefinitely on the interface. When you change the number of hops, it affects all spanning tree
instances. The range is 1 through 40. The default is 20 hops.
To configure the maximum number of hops for a BPDU in an MSTP region, perform the following
steps from privileged EXEC mode.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enter the protocol command to enable MSTP.
switch(config)# protocol spanning-tree mstp
3. Enter the max-hops 30 command to change the maximum number of hops from the default for a
BPDU in an MSTP region.
switch(config-mstp)# max-hops 30
4. Return to privileged EXEC mode.
switch(config-mstp)# end
5. Enter the copy running-config startup-config command to save the running configuration to the
startup configuration.
switch# copy running-config startup-config
In MSTP mode, use the region command to assign a name to an MSTP region. The region name has
a maximum length of 32 characters and is case-sensitive.
To assign a name to an MSTP region, perform the following steps from privileged EXEC mode.
In MSTP mode, use the revision command to specify a revision number for an MSTP configuration.
The range is 0 through 255. The default is 0.
To specify a revision number for an MSTP configuration, perform the following steps from privileged
EXEC mode.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enter the protocol spanning-tree mstp command to enable MSTP.
switch(config)# protocol spanning-tree mstp
3. Enter the revision command to specify a revision number for an MSTP configuration.
switch(config-mstp)# revision 17
4. Return to privileged EXEC mode.
switch(config-mstp)# end
5. Enter the copy running-config startup-config command to save the running configuration to the
startup configuration.
switch# copy running-config startup-config
To disable STP, RSTP, MSTP, PVST+, or R-PVST+, enter the no protocol spanning-tree
command:
switch(config)# no protocol spanning-tree
NOTE
The above command deletes the context and all the configurations defined within the context or
protocol for an interface.
To specify the bridge priority, perform the following steps from privileged EXEC mode.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enter the protocol spanning-tree command to enable PVST+ or R-PVST+.
switch(config)# protocol spanning-tree pvst
3. Specify the bridge priority. The range is 0 through 61440 and the priority values can be set only in
increments of 4096. The default priority is 32678.
switch(conf-stp)# bridge-priority 20480
4. Specify the bridge priority for a specific VLAN.
switch(conf-stp)# bridge-priority 20480 vlan 10
Additionally, you may specify the forward delay for a specific VLAN. If the VLAN parameter is not
provided, the priority value is applied globally for all per-VLAN instances. However, for the VLANs that
have been configured explicitly, the per-VLAN configuration takes precedence over the global
configuration.
To specify the bridge forward delay, perform the following steps from privileged EXEC mode.
1. Enter the config command to change to global configuration mode.
switch# config
2. Enter the protocol spanning-tree command to enable STP, RSTP, MSTP, PVST+, or R-PVST+.
switch(config)# protocol spanning-tree stp
3. Specify the bridge forward delay.
switch(conf-stp)# forward-delay 20
4. Specify the bridge forward delay for a specific VLAN.
switch(conf-stp)# forward-delay 20 vlan 10
Additionally, you may specify the hello time for a specific VLAN. If the VLAN parameter is not
provided, the priority value is applied globally for all per-VLAN instances. However, for the VLANs that
have been configured explicitly, the per-VLAN configuration takes precedence over the global
configuration.
To specify the bridge hello time, perform the following steps from privileged EXEC mode.
1. Enter the config command to change to global configuration mode.
switch# configure terminal
2. Enter the protocol spanning-tree command to enable STP, RSTP, MSTP, PVST+, or R-PVST+.
switch(config)# protocol spanning-tree stp
3. Specify the time range in seconds for the interval between the hello BPDUs sent on an interface.
switch(conf-stp)# hello-time 5
4. (Optional) Specify the time range in seconds for the interval between the hello BPDUs sent on an
interface for a specific VLAN.
switch(conf-stp)# hello-time 5 vlan 10
5. Return to privileged EXEC mode.
switch(config)# end
6. Enter the copy running-config startup-config command to save the running configuration to the
startup configuration.
switch# copy running-config startup-config
NOTE
The show spanning-tree brief command output shows the port state as ERR, not root_inc, when
root guard is in effect.
From the DCB interface, use this command to enable spanning tree on the DCB interface. By default,
spanning tree is disabled.
To enable spanning tree on the DCB interface, run the following steps in privileged EXEC mode.
1. Enter the config command to access global configuration mode.
2. Enter the interface command to specify the DCB interface type and slot/port number.
switch(config)# interface tengigabitethernet 1/0/1
3. Enter the no shutdown command to enable the DCB interface.
switch(conf-if-te-1/0/1)# no shutdown
4. Enter the no spanning-tree shutdown command to enable spanning tree on the DCB interface.
switch(conf-if-te-1/0/1)# no spanning-tree shutdown
From the DCB interface, use the spanning-tree shutdown command to disable spanning tree on the
DCB interface. By default, spanning tree is disabled.
To disable spanning tree on the DCB interface, perform the following steps in privileged EXEC mode.
1. Enter the config command to access global configuration mode.
2. Enter the interface command to specify the DCB interface type and slot/port number.
switch(config)# interface tengigabitethernet 1/0/1
3. Enter the no shutdown command to enable the DCB interface.
switch(conf-if-te-1/0/1)# no shutdown
4. Enter the spanning-tree shutdown command to disable spanning tree on the DCB interface.
switch(conf-if-te-1/0/1)# spanning-tree shutdown
root port. The range is 1 through 200000000. The default path cost is 2000 for a 10-gigabit Ethernet
interface.
Additionally, you may specify the spanning tree cost for a specific VLAN. If the VLAN parameter is not
provided, the priority value is applied globally for all per-VLAN instances. However, for the VLANs that
have been configured explicitly, the per-VLAN configuration takes precedence over the global
configuration.
To configure the path cost for spanning tree calculations on the DCB interface, perform the following
steps from privileged EXEC mode.
1. Enter the config command to access global configuration mode.
2. Enter the interface command to specify the DCB interface type and slot/port number.
switch(config)# interface tengigabitethernet 1/0/1
3. Enter the no shutdown command to enable the DCB interface.
switch(conf-if-te-1/0/1)# no shutdown
4. Enter the spanning-tree cost command to configure the path cost for spanning tree calculations on
the DCB interface.
switch(conf-if-te-1/0/1)# spanning-tree cost 10000
5. Enter the spanning-tree vlan command to configure the path cost for spanning tree calculations on
the DCB interface.
switch(conf-if-te-1/0/1)# spanning-tree vlan 10 cost 10000
6. Return to privileged EXEC mode.
switch(conf-if-te-1/0/1)# end
7. Enter the copy running-config startup-config command to save the running configuration to the
startup configuration.
switch# copy running-config startup-config
NOTE
The spanning-tree edgeport command is only for RSTP and MSTP. Use the spanning-tree portfast
command for STP (refer to Enabling port fast (DCB) on page 158).
To specify restrictions for an MSTP instance on a DCB interface, perform the following steps.
1. Enter the config command to access global configuration mode from privileged EXEC mode.
2. Enter the interface command to specify the DCB interface type and slot/port number.
The gigabitethernet rbridge-id/slot/port operand is used only for the Brocade VDX 6710, Brocade
VDX 8770-4, and Brocade VDX 8770-8. The prompt for these ports is in the following example
format: switch(config-if-gi-22/0/1)#
switch(config)# interface tengigabitethernet 1/0/1
3. Enter the no shutdown command to enable the DCB interface.
switch(conf-if-te-1/0/1)# no shutdown
4. Enter the spanning-tree instance restricted-tcn command to restrict Topology Change
Notification (TCN) BPDUs for an MSTP instance on a DCB interface.
switch(conf-if-te-1/0/1)# spanning-tree instance 5 restricted-tcn
5. Return to privileged EXEC mode.
switch(conf-if-te-1/0/1)# end
6. Enter the copy running-config startup-config command to save the running configuration to the
startup configuration.
switch# copy running-config startup-config
NOTE
If you enable the portfast bpdu-guard option on an interface and the interface receives a BPDU, the
software disables the interface and puts the interface in the ERR_DISABLE state.
CAUTION
Enabling port fast on ports can cause temporary bridging loops, in both trunking and
nontrunking mode.
Use the spanning-tree edgeport command for MSTP, RSTP, and R-PVST+ (refer to Enabling a port
(interface) as an edge port (DCB) on page 156).
To enable port fast on the DCB interface for STP, perform the following steps in privileged EXEC mode.
1. Enter the config command to access global configuration mode.
2. Enter the interface command to specify the DCB interface type and slot/port number.
switch(config)# interface tengigabitethernet 0/1
3. Enter the no shutdown command to enable the DCB interface.
switch(conf-if-te-0/1)# no shutdown
4. Enter the spanning-tree portfast command to enable port fast on the DCB interface.
switch(conf-if-te-0/1)# spanning-tree portfast
To restrict the TCN BPDUs sent on the DCB interface, perform the following steps in privileged EXEC
mode.
1. Enter the config command to access global configuration mode.
2. Enter the interface command to specify the DCB interface type and slot/port number.
switch(config)# interface tengigabitethernet 1/0/1
3. Enter the no shutdown command to enable the DCB interface.
switch(conf-if-te-1/0/1)# no shutdown
4. Enter the spanning-tree restricted-tcn command to restrict the TCN BPDUs sent on the DCB
interface.
switch(conf-if-te-1/0/1)# spanning-tree restricted-tcn
Configuring DiST
By default, spanning tree is disabled at the global and interface configuration levels. With respect to
Distributed STP (DiST), server ports must be configured as an xSTP edge port.
NOTE
DiST is supported on the VCS edge ports only. DiST cannot be enabled on ISL ports participating in
the TRILL-based fabric within VCS. DiST does not update the port state of ISL ports.
xSTP can be enabled on the VCS by means of the protocol spanning-tree command. An interface
begins participating in the spanning tree once it is configured by the spanning-tree enable command.
Refer to Configuring and managing STP and STP variants on page 143.
The following table describes the behavior of interface based on global and interface level
configuration.
Global config Interface config Interface type where STP BPDU is received Action
In the following figure, where the Peer-Switch feature is enabled, the Brocade VDX 1 receives the
BPDU, so it becomes the VLAG master and VDX 2 is set in the non-master state. VDX 1 remains the
VLAG master as long as it receives BPDUs.
When the Peer-Switch functionality is enabled and the the VLAG Master is selected, BPDUs received
on VLAG non-master are dropped unless there is a change in the status of the VLAG master. By
default, the Peer-Switch feature functionality is inactive. To activate this function, refer to the
spanning-protocol peer-feature command in the Network OS Command Reference.
NOTE
The Peer-Switch feature works only when MSTP is enabled on Cisco switches and a Brocade VDX. It
does not work with other flavors of STP. In addition, the Peer-Switch feature is not supported for
PVST/RPVST mode unless a Cisco device sends the same BPDU from both the primary and
secondary vPC nodes. Currently it sends two different BPDUs. Cisco documentation says that the
same BPDU is sent from both primary and secondary nodes of a vPC domain; however, when RPVST
is enabled a message age variable in the BPDU sent from a secondary node is different from that sent
from a primary node.
UDLD overview
The UniDirectional Link Detection (UDLD) protocol is a nonstandard Layer 2 protocol that detects when
a physical link becomes unidirectional by means of the exchange of UDLD protocol data units (PDUs).
A unidirectional loop can lead to the creation of a loop in a network, which the Spanning Tree Protocol
(STP) could inadvertently allow to occur.
UDLD requirements
Note the following requirements for UniDirectional Link Detection:
• Network OS 4.0 or later.
• UDLD runs only on physical ports assigned to a port channel.
• UDLD is supported on directly connected switches only.
• In VCS mode, UDLD applies only to edge ports.
• UDLD can interoperate with Brocade IP products.
In the figure above, STP detects that the port on switch D that is connected to switch C should be put
into a blocked state. Therefore, no data traffic gets transmitted or received on this port. Data traffic
remains blocked as long as switch D receives bridge protocol data units (BPDUs) from both
switches C and B.
If the link between switch C and switch D becomes unidirectional (for reasons such as hardware
failure or incorrect cabling) in the direction from D to C, switch D ages out the status that it was
receiving BPDUs from switch C. This eventually causes STP to put the port in a forwarding state, thus
allowing all data traffic. This creates a loop for all BUM traffic that enters the network. BUM traffic can
go from switch B to switch D to switch C to switch A, and then back to switch B.
To prevent this loop from forming, UDLD can be used to detect that the link between switch C and
switch D has become unidirectional.
The UDLD protocol is disabled by default. To use the UDLD protocol, you must first enable the
protocol globally and then enable UDLD on each desired individual physical port. For a configuration
example, refer to UDLD on page 163.
UDLD determines that a link has become unidirectional if the UDLD daemon stops receiving UDLD
PDUs from the other end of the link. The UDLD daemon then blocks the physical link. The physical
link remains up but the line protocol goes down. During this time, the link continues to transmit and
receive UDLD PDUs.
NOTE
In a VCS environment, the UDLD protocol is applicable only to the edge ports in the VCS.
A configuration command to enable the UDLD protocol on a logical port or a non-edge port will be
rejected.
Configuring UDLD
Follow the steps below to configure basic UDLD on your switch.
1. Enter global configuration mode by entering the configure command from the desired switch:
switch# configure
2. To enable the UDLD protocol, as well as to enter protocol UDLD configuration mode, enter the
protocol udld command.
switch(config)# protocol udld
3. (Optional) You can change the interval at which UDLD PDUs are transmitted from edge ports. The
default interval, in counts of one hundred milliseconds, is 5 (500 milliseconds). To change the interval
to 2,000 milliseconds, enter the hello 20 command:
switch(config-udld)# hello 20
4. You can change the timeout multiplier value to affect the UDLD PDU timeout interval. The UDLD
timeout interval is the product of the hello time interval at the other end of the link and the timeout
multiplier value. To change the timeout multiplier from the default of 5 to the value 8, run the
multiplier 8 command:
switch(config-udld)# multiplier 8
5. Enter interface subconfiguration mode for the edge port on which you want to enable UDLD:
switch(config-udld)# end
switch# configure
switch(config)# interface te 5/0/1
switch(config-int-te-5/0/1)# udld enable
6. Repeat the preceding step for each edge port on which you wish to enable UDLD.
NOTE
When the UDLD protocol is enabled on one end of a link, the timeout period might elapse before the
UDLD protocol is enabled on the other end of the link. In this case, the link becomes temporarily
blocked. When the UDLD protocol is enabled at the other end of the link and a UDLD PDU is
received, UDLD automatically unblocks the link.
NOTE
The LAG or LAG interface is also referred to as a port-channel.
The benefits of link aggregation are summarized as follows:
• Increased bandwidth (The logical bandwidth can be dynamically changed as the demand changes.)
• Increased availability
• Load sharing
• Rapid configuration and reconfiguration
The Brocade VDX family of switches supports the following trunk types:
• Static, standards-based LAG
• Dynamic, standards-based LAG using LACP
• Static, Brocade-proprietary LAG
• Dynamic, Brocade-proprietary LAG using proprietary enhancements to LACP
• Passive mode — LACP responds to Link Aggregation Control Protocol Data Units (LACPDUs)
initiated by its partner system but does not initiate the LACPDU exchange.
• Active mode — LACP initiates the LACPDU exchange regardless of whether the partner system
sends LACPDUs.
Brocade-proprietary aggregation
Brocade-proprietary aggregation is similar to standards-based link aggregation but differs in how the
traffic is distributed. It also has additional rules that member links must meet before they are
aggregated:
• The most important rule requires that there is not a significant difference in the length of the fiber
between the member links, and that all member links are part of the same port-group.
• A maximum of four Brocade LAGs can be created per port-group.
Virtual LAGs
Configuring a virtual LAG (vLAG) is similar to configuring a LAG. Once the Brocade VCS Fabric detects
that the LAG configuration spans multiple switches, the LAG automatically becomes a vLAG.
LACP on the Brocade VCS Fabric emulates a single logical switch by sending the same LACP
system ID and sending the same admin and operational key.
Note these vLAG features :
• Only ports with the same speed are aggregated.
• Brocade proprietary LAGs are not available for vLAGs.
• LACP automatically negotiates and forms the vLAG.
• A port-channel interface is created on all the vLAG members.
• The Brocade VCS Fabric relies on you to consistently configure all nodes in the vLAG.
• Similar to static LAGs, vLAGs are not able to detect configuration errors.
• A zero port vLAG is allowed.
• IGMP snooping fits into the primary link of a vLAG to carry multicast traffic.
• Interface statistics are collected and shown per vLAG member switch. The statistics are not
aggregated across switches participating in a vLAG.
• In order to provide link and node level redundancy, the Brocade VCS Fabric supports static vLAGs.
• A vLAG can be configured within a virtual fabric. For more information about virtual fabrics, refer to
the "Virtual Fabrics" chapter.
A Brocade VCS Fabric vLAG functions with servers that do not implement LACP because it supports
static vLAGs as well.
because of a speed mismatch. Refer to the Network OS Command Reference for information on the
speed command.
The following conditions and requirements should be kept in mind when configuring vLAGs:
• FCoE and DCB capabilities are not supported by vLAG. FCoE traffic is treated similarly to normal
LAN data traffic.
• Static vLAGs are not supported on internal ports.
• Perform this procedure on all member nodes of a vLAG.
Configuring vLAGs
To configure a vLAG, perform the following steps:
1. Change to global configuration mode.
2. Configure a LAG between two switches within the Brocade VCS Fabric.
Refer to LAG distribution process and conditions on page 168 for more information. Once the
Brocade VCS Fabric detects that the LAG configuration spans multiple switches, the LAG
automatically becomes a vLAG.
3. Enter interface port-channel ID on every switch in the vLAG to configure them to treat FCoE MAC
addresses as being multi-homed hosts, similar to LAN traffic.
The default configuration is to treat FCoE traffic as non-vLAG traffic.
switch(config)# interface port-channel 10
4. Enter end to return to privileged EXEC mode.
switch(config-Port-channel-10)# end
switch#
5. Enter the show port-channel detail command to verify the port-channel details.
switch# show port-channel detail
LACP Aggregator: Po 27
Aggregator type: Standard
Ignore-split is disabled
Actor System ID - 0x8000,00-05-33-6f-18-18
Admin Key: 0027 - Oper Key 0027
Receive link count: 4 - Transmit link count: 4
Individual: 0 - Ready: 1
Partner System ID - 0x8000,00-05-1e-cd-6e-9f
Partner Oper Key 0027
Member ports on rbridge-id 231:
Link: Te 231/0/22 (0xE718160201) sync: 1 *
Link: Te 231/0/23 (0xE718170202) sync: 1
Link: Te 231/0/36 (0xE718240305) sync: 1
Link: Te 231/0/37 (0xE718250306) sync: 1
6. Enter the show port port-channel command to verify the port-channel interface details.
switch# show port port-channel tengigabitethernet 1/0/21
LACP link info: te0/21 -0x18150014
Actor System ID: 0x8000,01-e0-52-00-01-00
Actor System ID Mapped Id: 0
Partner System ID: 0x0001,01-80-c2-00-00-01
Actor priority: 0x8000 (32768)
Admin key: 0x000a (10) Operkey: 0x0000 (0)
Receive machine state : Current
Periodic Transmission machine state : Slow periodic
Muxmachine state : Collecting/Distr
Admin state: ACT:1 TIM:0 AGG:1 SYN:0 COL:0 DIS:0 DEF:1 EXP:0
Operstate: ACT:1 TIM:0 AGG:1 SYN:1 COL:1 DIS:1 DEF:0 EXP:0
Partner operstate: ACT:1 TIM:0 AGG:1 SYN:1 COL:1 DIS:1 DEF:0 EXP:0
Partner oper port: 100
NOTE
With ignore-split active, a vLAG node reboot can result in a more than one-second loss while
interoperating with a Linux server/nic-team/CNA, because of premature egress of traffic from the server.
The figure below displays a dual-vLAG configuration with three legs of RB2, RB3, and RB4. If RB2,
RB3, or RB4 reboots while Host-1 is communicating to Host-2 or Host3, a momentary traffic disruption
may occur.
To reduce vLAG failover down time, you must configure ignore-split on all of the legs in the vLAG
(RB2, RB3 and RB4 in this case).
NOTE
By default, vlag ignore-split is already activated in VCS.
Configuring the vLAG ignore-split feature on page 172 walks you through setting up the vLAG ignore-
split feature.
NOTE
The following example is based on the illustration in Configuring vLAGs on page 170.
1. Log in to RB2, the first leg of the vLAG 1.
2. Access the port-channel for the first leg.
switch(config)# interface port-channel 1
3. Activate vLAG ignore split.
switch(config-Port-channel-1)# vlag ignore-split
4. Log in to RB3, the second leg of vLAG 1.
5. Access the port-channel for the second leg.
switch(config)# interface port-channel 2
6. Activate vLAG ignore split.
switch(config-Port-channel-2)# vlag ignore-split
7. Access the port-channel for the third leg.
switch(config)# interface port-channel 3
8. Activate vLAG ignore split.
switch(config-Port-channel-3)# vlag ignore-split
There is no restriction on the membership of the Active or Backup vLAG in the fabric. Either the Active
or the Backup vLAG can coexist in a single RBridge, or they can exist in different RBridges.
Consider the following guidelines and restrictions when configuring a port-channel redundancy group:
• The maximum number of supported port-channel redundancy groups is 255.
• Port-channel redundancy groups are supported only on port-channel interfaces.
• If you designate the active vLAG when configuring the port-channel redundancy group, it will always
resume the active vLAG role after a failure, and the other vLAG will return to the backup role.
• If you do not designate one of the vLAGs as "active" then the system assigns the vLAG that comes
first in the protected group as the active vLAG, and the second becomes the backup vLAG. If the
active vLAG fails and the backup vLAG takes over, the backup vLAG will retain the active role when
the original vLAG resets.
• Brocade Trunks shall not be a member of a protected group.
• Membership in a port-channel redundancy group cannot be altered when the group is in the active
state. To modify the protected group or to change the ‘active’ role, first deactivate the protected
group.
• Port-channel redundancy groups do not support the STP family of protocols.
Flavor Definition
src-dst-mac-vid Source and Destination MAC address and VID-based load balancing.
src-dst-ip-mac-vid Source and Destination IP and MAC address and VID-based load balancing.
src-dst-ip-mac-vid-port Source and Destination IP, MAC address, VID and TCP/UDP port-based load
balancing.
Additionally, an RBridge can be set to a different flavor for different vLAGs present in the cluster. This
feature is available for each RBridge and each VLAG, so different load-balancing flavors can be set for
traffic directed towards different VLAGs. The show running-config rbridge-id rbridgeID command
displays the configuration information.
NOTE
When configuring load balancing on a Brocade VDX 6740, it should be configured consistently for all
port-channels on the switch. These switches support one load-balancing scheme at a time, and apply
the last loaded load-balancing scheme to all port-channels on the switch. This is not required for the
Brocade VDX 8770 platform, as it supports multiple port-channel load-balancing schemes.
The following example sets the flavor to "destination MAC address and VID-based load balancing."
switch(config)# rbridge-id 2
switch(config-rbridge-id-2)# fabric port-channel 20 load-balance dst-mac-vid
switch(config-rbridge-id-2)# end
switch# show running-config rbridge-id 2
rbridge-id 2
interface-nodespecific ns-vlan 10
interface-nodespecific ns-ethernet 100
fabric vlag 10 load-balance src-dst-mac-vid
fabric vlag 20 load-balance dst-mac-vid
no protocol vrrp
switch# show fabric port-channel load-balance 10
Fabric Vlag Load-Balance Information
-------------------------------
Rbridge-Id : 2
Vlag : 10
Load-Balance Flavor : Source and Destination MAC address and VID based load
balancing
To add additional interfaces to an existing LAG, repeat this procedure using the same LAG group
number for the new interfaces.
Enter the copy running-config startup-config command to save your configuration.
To enable LACP on a DCB interface, perform the following steps.
1. Enter the configure terminal command to access global configuration mode.
2. Enter the interface command, specifying the DCB interface type and RBridge/slot/port.
switch(config)# interface tengigabitethernet 5/0/1
3. Enter the no shutdown command to enable the DCB interface.
4. Enter the channel-group command to configure the LACP for the DCB interface.
switch(conf-if-te-5/0/1)# channel-group 4 mode active type standard
Troubleshooting LACP
To troubleshoot problems with your LACP configuration, use the following troubleshooting tips.
If a standard IEEE 802.3ad-based dynamic trunk is configured on a link and the link is not able to join
the LAG, do the following:
• Make sure that both ends of the link are configured as standard for the trunk type.
• Make sure that both ends of the link are not configured for passive mode. They must be configured
as active /active, active /passive, or passive /active.
• Make sure that the port-channel interface is in the administrative "up" state by ensuring that the no
shutdown command was entered on the interface on both ends of the link.
• Make sure the speed parameter is configured to 1000 if the port-channel is using the gigabit
interface.
• Make sure that the links that are part of the LAG are connected to the same neighboring switch.
• Make sure that the system ID of the switches connected by the link is unique. You can verify this by
entering the show lacp sys-id command on both switches.
• You can verify the system ID of the switches in the Brocade VCS Fabric cluster with the show lacp
sys-id command.
• Make sure that LACPDUs are being received and transmitted on both ends of the link and that there
are no error PDUs. You can verify this by entering the show lacp counters number command and
looking at the receive mode (rx) and transmit mode (tx) statistics. The statistics should be
incrementing and should not be at zero or a fixed value. If the PDU rx count is not incrementing,
check the interface for possible CRC errors by entering the show interface link-name command on
the neighboring switch. If the PDU tx count is not incrementing, check the operational status of the
link by entering the show interface link-name command and verifying that the interface status is
"up."
If a Brocade-based dynamic trunk is configured on a link and the link is not able to join the LAG, do the
following:
• Make sure that both ends of the link are configured as Brocade for trunk type.
• Make sure that both ends of the link are not configured for passive mode. They must be configured
as active /active, active /passive, or passive /active.
• Make sure that the port-channel interface is in the administrative "up" state by ensuring that the no
shutdown command was entered on the interface on both ends of the link.
• Make sure that the links that are part of the LAG are connected to the same neighboring switch.
• Make sure that the system ID of the switches connected by the link is unique. This can be verified by
entering the show lacp sys-id command on both switches.
• Make sure that LACPDUs are being received and transmitted on both ends of the link and there are
no error PDUs. This can be verified by entering the show lacp counters number command and
looking at the rx and tx statistics. The statistics should be incrementing and should not be at zero or a
fixed value. If the PDU rx count is not incrementing, check the interface for possible CRC errors by
entering the show interface link-name command on the neighboring switch.
• Make sure that the fiber length of the link has a deskew value of 7 microseconds. If it does not, the
link will not be able to join the LAG and the following RASlog message is generated: Deskew
calculation failed for link <link-name> .
When a link has this problem, the show port-channel command displays the following message:
Mux machine state: Deskew not OK.
If a Brocade-based static trunk is configured on a link and the link is not able to join the LAG, do the
following:
• Make sure that both ends of the link are configured as Brocade for trunk type and verify that the
mode is "on."
• Make sure that the port-channel interface is in the administrative "up" state by ensuring that the no
shutdown command was entered on the interface on both ends of the link.
If a standards-based static trunk is configured on a link and the link is not able to join the LAG, do the
following:
• Make sure that both ends of the link are configured as standard for trunk type and verify that the
mode is "on."
• Make sure that the port-channel interface is in the administrative "up" state by ensuring that the no
shutdown command was entered on the interface on both ends of the link.
LLDP overview
The IEEE 802.1AB Link Layer Discovery Protocol (LLDP) enhances the ability of network management
tools to discover and maintain accurate network topologies and simplify LAN troubleshooting in multi-
vendor environments. To efficiently and effectively operate the various devices in a LAN you must
ensure the correct and valid configuration of the protocols and applications that are enabled on these
devices. With Layer 2 networks expanding dramatically, it is difficult for a network administrator to
statically monitor and configure each device in the network.
Using LLDP, network devices such as routers and switches advertise information about themselves to
other network devices and store the information they discover. Details such as device configuration,
device capabilities, and device identification are advertised. LLDP defines the following:
• A common set of advertisement messages.
• A protocol for transmitting the advertisements.
• A method for storing the information contained in received advertisements.
NOTE
LLDP runs over the data-link layer which allows two devices running different network layer protocols to
learn about each other.
LLDP information is transmitted periodically and stored for a finite period. Every time a device receives
an LLDP advertisement frame, it stores the information and initializes a timer. If the timer reaches the
time to live (TTL) value, the LLDP device deletes the stored information ensuring that only valid and
current LLDP information is stored in network devices and is available to network management
systems.
NOTE
The Brocade LLDP implementation supports up to two neighbors.
The higher level management tools, such as the Brocade Network Advisor, can query the LLDP
information to draw Layer 2 physical topologies. The management tools can continue to query a
neighboring device through the device’s management address provided in the LLDP information
exchange. As this process is repeated, the complete Layer 2 topology is mapped.
In LLDP the link discovery is achieved through the exchange of link-level information between two link
partners. The link-level information is refreshed periodically to reflect any dynamic changes in link-
level parameters. The basic format for exchanging information in LLDP is in the form of a type, length,
value (TLV) field.
LLDP keeps a database for both local and remote configurations. The LLDP standard currently
supports three categories of TLVs. Brocade’s LLDP implementation adds a proprietary Brocade
extension TLV set. The four TLV sets are described as follows:
• Basic management TLV set — This set provides information to map the Layer 2 topology and
includes the following TLVs:
‐ Chassis ID TLV — Provides the ID for the switch or router where the port resides. This is a
mandatory TLV.
‐ Port description TLV — Provides a description of the port in an alphanumeric format. If the LAN
device supports RFC-2863, the port description TLV value equals the "ifDescr" object. This is a
mandatory TLV.
‐ System name TLV — Provides the system-assigned name in an alphanumeric format. If the LAN
device supports RFC-3418, the system name TLV value equals the "sysName" object. This is an
optional TLV.
‐ System description TLV — Provides a description of the network entity in an alphanumeric
format. This includes system name, hardware version, operating system, and supported
networking software. If the LAN device supports RFC-3418, the value equals the "sysDescr"
object. This is an optional TLV.
‐ System capabilities TLV — Indicates the primary functions of the device and whether these
functions are enabled in the device. The capabilities are indicated by two octets. The first octet
indicates Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device, and
Station, respectively. The second octet is reserved. This is an optional TLV.
‐ Management address TLV — Indicates the addresses of the local switch. Remote switches can
use this address to obtain information related to the local switch. This is an optional TLV.
• IEEE 802.1 organizational TLV set — This set provides information to detect mismatched settings
between local and remote devices. A trap or event can be reported once a mismatch is detected.
This is an optional TLV. This set includes the following TLVs:
‐ Port VLANID TLV — Indicates the port VLAN ID (PVID) that is associated with an untagged or
priority tagged data frame received on the VLAN port.
‐ PPVLAN ID TLV — Indicates the port- and protocol-based VLAN ID (PPVID) that is associated
with an untagged or priority tagged data frame received on the VLAN port. The TLV supports a
"flags" field that indicates whether the port is capable of supporting port- and protocol-based
VLANs (PPVLANs) and whether one or more PPVLANs are enabled. The number of PPVLAN ID
TLVs in a Link Layer Discovery Protocol Data Unit (LLDPDU) corresponds to the number of the
PPVLANs enabled on the port.
‐ VLAN name TLV — Indicates the assigned name of any VLAN on the device. If the LAN device
supports RFC-2674, the value equals the "dot1QVLANStaticName" object. The number of VLAN
name TLVs in an LLDPDU corresponds to the number of VLANs enabled on the port.
‐ Protocol identity TLV — Indicates the set of protocols that are accessible at the device's port.
The protocol identity field in the TLV contains a number of octets after the Layer 2 address that
can enable the receiving device to recognize the protocol. For example, a device that wishes to
advertise the spanning tree protocol includes at least eight octets: 802.3 length (two octets), LLC
addresses (two octets), 802.3 control (one octet), protocol ID (two octets), and the protocol
version (one octet).
• IEEE 802.3 organizational TLV set — This is an optional TLV set. This set includes the following
TLVs:
‐ MAC/PHY configuration/status TLV — Indicates duplex and bit rate capabilities and the current
duplex and bit rate settings of the local interface. It also indicates whether the current settings
were configured through auto-negotiation or through manual configuration.
‐ Power through media dependent interface (MDI) TLV — Indicates the power capabilities of the
LAN device.
‐ Link aggregation TLV — Indicates whether the link (associated with the port on which the LLDPDU
is transmitted) can be aggregated. It also indicates whether the link is currently aggregated and
provides the aggregated port identifier if the link is aggregated.
‐ Maximum Ethernet frame size TLV — Indicates the maximum frame size capability of the device’s
MAC and PHY implementation.
DCBX
Storage traffic requires a lossless communication which is provided by DCB. The Data Center Bridging
(DCB) Capability Exchange Protocol (DCBX) is used to exchange DCB-related parameters with
neighbors to achieve more efficient scheduling and a priority-based flow control for link traffic.
DCBX uses LLDP to exchange parameters between two link peers; DCBX is built on the LLDP
infrastructure for the exchange of information. DCBX-exchanged parameters are packaged into
organizationally specific TLVs. The DCBX protocol requires an acknowledgment from the other side of
the link, therefore LLDP is turned on in both transmit and receive directions. DCBX requires version
number checking for both control TLVs and feature TLVs.
DCBX interacts with other protocols and features as follows:
• LLDP — LLDP is run in parallel with other Layer 2 protocols such as RSTP and LACP. DCBX is built
on the LLDP infrastructure to communicate capabilities supported between link partners. The DCBX
protocol and feature TLVs are treated as a superset of the LLDP standard.
• QoS management — DCBX capabilities exchanged with a link partner are passed down to the QoS
management entity to set up the Brocade VDX hardware to control the scheduling and priority-based
flow control in the hardware.
The DCBX QoS standard is subdivided into two features sets, discussed below:
• Enhanced Transmission Selection on page 183
• Priority Flow Control on page 184
7 0 No
6 2 Yes
5 2 Yes
4 2 Yes
TABLE 24 ETS priority grouping of IPC, LAN, and SAN traffic (Continued)
3 1 Yes
2 1 Yes
1 2 Yes
0 2 Yes
NOTE
When PFC is enabled, the Brocade VDX 6740 series platforms support up to three PGIDs with the
execution of cee-map default . By default, PGID 1 (with TC3) and PGID 15.0 (for network control
traffic) are enabled when PFC is enabled.
NOTE
DCBX configuration simply involves configuring DCBX-related TLVs to be advertised. Detailed
information is provided in Configuring and managing LLDP on page 184.
NOTE
The disable command executed in LLDP protocol configuration mode disables LLDP globally. To re-
enable LLDP, refer to Enabling LLDP globally on page 185.
To disable LLDP globally, perform the following steps from global configuration mode.
1. Enter the protocol lldp command to enter protocol configuration mode.
switch(config)# protocol lldp
2. Enter the disable command to disable LLDP globally.
switch(conf-lldp)# disable
NOTE
Brocade recommends you use the operating system version for the description or use the description
from the chassis/entity management information base (MIB). Do not use special characters, such as #
$!@, as part of the system name and description.
To specify an LLDP system description for the Brocade VDX hardware, perform the following steps
from privileged EXEC mode. The system description is seen by neighboring switches.
1. Enter the configure terminal command to access global configuration mode.
2. Enter LLDP configuration mode.
switch(config)# protocol lldp
3. Specify a system description for the Brocade VDX hardware.
switch(conf-lldp)# system-description IT_1.6.2_LLDP_01
NOTE
Brocade recommends against advertising dot1.tlv and dot3.tlv LLDPs if your network contains
CNAs from non-Brocade vendors, as doing so may cause functionality problems.
10.Return to privileged EXEC mode.
switch(conf-lldp-profile-UK_LLDP_IT)# end
11.Enter the copy command to save the running-config file to the startup-config file.
switch(conf-lldp-profile-UK_LLDP_IT)# end
switch# copy running-config startup-config
To configure the iSCSI priority, perform the following steps from privileged EXEC mode.
1. Enter the configure terminal command to access global configuration mode.
2. Enter LLDP configuration mode.
switch(config)# protocol lldp
3. Configure the iSCSI priority.
switch(conf-lldp)# iscsi-priority 4
NOTE
The default iscsi-priority is 4 and does not display unless you change the iscsi-priority to a different
value.
4. Advertise the TLV.
switch (conf-lldp)# advertise dcbx-iscsi-app-tlv
For all PGID values, the PGID value range is 0 through 7 for the DWRR Priority Group, and 15.0
through 15.7 for the Strict Priority Group. The PGID value and the CoS value are equivalent, so that
specifying PGID0 sets the Priority Group ID for all packets with CoS = 0, specifying PGID1 sets the
Priority Group ID for all packets with CoS = 1, all the way through specifying PGID7, which sets the
Priority Group ID for all packets with CoS = 7.
Priority-Table in CEE map configuration requires that PGID 15.0 is dedicated for CoS7. Because of
this restriction, make sure that PGID15.0 is configured only as the last parameter for Priority-Table
configuration.
An explanation of syntax "priority-table 1 2 2 2 2 2 2 15.0" is as follows:
This shows the definition of a CEE Map with Priority to Priority Group mapping of CoS=1, CoS=2,
CoS=3, CoS=4, CoS=5, and CoS=6 to a DWRR Priority Group ID of 2, and CoS=0 to a Priority
Group ID of 1, and CoS=7 to a Strict Priority Group.
This is one way to provision the CEE Priority to Priority Group Table, which maps each of the eight
ingress CoS into a Priority Group.
In VCS mode, traffic classes are either all strict priorities (802.1Q default) or a combination of strict
and DWRR traffic classes.
2. Enter LLDP configuration mode.
switch(conf-ceemap)# protocol lldp
3. Create an LLDP profile for iSCSI.
switch(conf-lldp)# profile iscsi_config
4. Advertise the iSCSI TLV.
switch(conf-lldp-profile-iscsi_config)# advertise dcbx-iscsi-app-tlv
5. Enter configuration mode for the specific interface.
switch (conf-lldp-profile-iscsi_config)# interface te 5/0/1
6. Apply the CEE provisioning map to the interface.
switch(conf-if-te-5/0/1)# cee default
7. Apply the LLDP profile you created for iSCSI.
switch(conf-if-te-5/0/1)# lldp profile iscsi_config
8. Set the iSCSI priority bits for the interface.
switch(conf-if-te-5/0/1)# lldp iscsi-priority 4
9. Repeat steps 5 through 8 for additional interfaces.
MANDATORY TLVs
===============
Local Interface: Te 22/0/1 (Local Interface MAC: 0027.f854.501e)
Remote Interface: TenGigabitEthernet 3/0/1 (Remote Interface MAC: 0005.334b.7198)
Dead Interval: 120 secs
Remaining Life : 117 secs
Chassis ID: 0005.334b.7173
LLDP PDU Transmitted: 1165 Received: 1164
OPTIONAL TLVs
==============
DCBX TLVs
==============
Version : CEE
DCBX Ctrl OperVersion: 0 MaxVersion: 0 SeqNo: 2 AckNo: 2
DCBX ETS OperVersion: 0 MaxVersion: 0 Enabled: 1 Willing: 0 Error: 0
Enhanced Transmission Selection (ETS)
Priority-Group ID Map:
Priority : 0 1 2 3 4 5 6 7
Group ID : 0 0 0 0 0 0 0 0
Group ID Bandwidth Map:
Group ID : 0 1 2 3 4 5 6 7
Percentage: 0 0 0 0 0 0 0 0
Number of Traffic Classes supported: 8
DCBX PFC OperVersion: 0 MaxVersion: 0 Enabled: 1 Willing: 0 Error: 0
Priority-based Flow Control (PFC)
Enabled Priorities: none
Number of Traffic Class PFC supported: 8
FCoE App OperVersion: 0 MaxVersion: 0 Enabled: 1 Willing: 0 Error: 0
FCoE Application Protocol
User Priorities: none
FCoE LLS OperVersion: 0 MaxVersion: 0 Enabled: 1 Willing: 0 Error: 0
FCoE Logic Link Status: Down
LAN LLS OperVersion: 0 MaxVersion: 0 Enabled: 1 Willing: 0 Error: 0
LAN Logic Link Status: Up
● QoS overview................................................................................................................193
● Configuring QoS............................................................................................................209
QoS overview
Quality of Service (QoS) provides you with the capability to control how the traffic is moved from switch
to switch. In a network that has different types of traffic with different needs (specified by Class of
Service, or CoS), the goal of QoS is to provide each traffic type with a virtual pipe. FCoE uses traffic
class mapping, scheduling, and flow control to provide quality of service.
Traffic running through the switches can be classified as either multicast traffic or unicast traffic.
Multicast traffic has a single source but multiple destinations. Unicast traffic has a single source with a
single destination. With all this traffic going through inbound and outbound ports, QoS can be set based
on egress port and priority level of the CoS.
QoS can also be set on interfaces where the end-station knows how to mark traffic with QoS and it lies
with the same trusted interfaces. An untrusted interface occurs when the end-station is untrusted and is
at the administrative boundaries.
QoS features
The principal QoS features are as follows:
• Rewriting. Rewriting or marking a frame allows for overriding header fields such as the priority and
VLAN ID. Refer to Rewriting on page 194 for more information.
• Queueing. Queueing provides temporary storage for frames while waiting for transmission. Queues
are selected based on ingress ports, egress ports, and configured user priority level. Refer to
Queueing on page 194 for more information.
• Congestion control. When queues begin filling up and all buffering is exhausted, frames are dropped.
This has a detrimental effect on application throughput. Congestion control techniques are used to
reduce the risk of queue overruns without adversely affecting network throughput. Congestion control
features include IEEE 802.3x Ethernet Pause, Tail Drop, Ethernet Priority Flow Control (PFC), and
Random Early Discard (RED). Refer to Congestion control on page 194 for more information.
• Multicast rate limiting. Many multicast applications cannot be adapted for congestion control
techniques and the replication of frames by switching devices can exacerbate this problem. Multicast
rate limiting controls frame replication to minimize the impact of multicast traffic. This feature is called
BUM Storm Control on Brocade VDX 8770-4, VDX 8770-8, and later platforms. Refer to Multicast
rate limiting on page 199 for more information.
• BUM_storm_control. A traffic storm occurs when packets flood the LAN, creating excessive traffic
and degrading network performance. BUM storm control on page 199 allows you to limit the amount
of broadcast, unknown unicast, and multicast (BUM) traffic admitted to the system to prevent
disruptions on Layer 2 physical ports. All traffic received at a physical port in excess of a configured
maximum rate for BUM traffic will be discarded. You can also specify whether to shut down an
interface if the maximum rate has been exceeded within a 5-second sampling period and receive a
LOG indication for the disabled interface. This feature is supported on Brocade VDX 8770, VDX
6740, VDX 6740-T, VDX 6940 series, and VDX 2746 platforms.
• Data Center Bridging. DCB describes an enhanced Ethernet that will enable convergence of various
applications in data centers (LAN, SAN, and IPC) onto a single interconnect technology.
Rewriting
Rewriting a frame header field is typically performed by an edge device. Rewriting occurs on frames
as they enter or exit a network because the neighboring device is untrusted, unable to mark the frame,
or is using a different QoS mapping.
The frame rewriting rules set the Ethernet CoS and VLAN ID fields. Egress Ethernet CoS rewriting is
based on the user-priority mapping derived for each frame as described later in the queueing section.
Queueing
Queue selection begins by mapping an incoming frame to a configured user priority, then each user-
priority mapping is assigned to one of the switch’s eight unicast traffic class queues or one of the eight
multicast traffic class queues.
User-priority mapping
There are several ways an incoming frame can be mapped into a user-priority. If the neighboring
devices are untrusted or unable to properly set QoS, then the interface is considered untrusted. All
traffic must be user-priority mapped using explicit policies for the interface to be trusted; if it is not
mapped in this way, the IEEE 802.1Q default-priority mapping is used. If an interface is trusted to have
QoS set then the CoS header field can be interpreted.
NOTE
The user priority mapping discussed in this chapter applies to both unicast and multicast traffic.
Congestion control
Queues can begin filling up for a number of reasons, such as over-subscription of a link or
backpressure from a downstream device. Sustained, large queue buildups generally indicate
congestion in the network and can affect application performance through increased queuing delays
and frame loss.
Congestion control covers features that define how the system responds when congestion occurs or
active measures taken to prevent the network from entering a congested state.
NOTE
You cannot configure CoS thresholds and multicast tail drop on Brocade VDX 8770-4 and VDX 8770-8
platforms. Random Early Discard (RED) is supported only on Brocade VDX 6740, VDX 6940, VDX
8770-4, and VDX 8770-8 platforms.
Tail drop
Tail drop queuing is the most basic form of congestion control. Frames are queued in FIFO order and
queue buildup can continue until all buffer memory is exhausted. This is the default behavior when no
additional QoS has been configured.
The basic tail drop algorithm does not have any knowledge of multiple priorities and per traffic class
drop thresholds can be associated with a queue to address this. When the queue depth breaches a
threshold, then any frame arriving with the associated priority value will be dropped. The figure below
illustrates how you can utilize this feature to ensure that lower-priority traffic cannot totally consume the
full buffer memory.
Thresholds can also be used to bound the maximum queuing delay for each traffic class. Additionally, if
the sum of the thresholds for a port is set below 100 percent of the buffer memory, then you can also
ensure that a single port does not monopolize the entire shared memory pool allocated to the port. The
tail drop algorithm can be extended to support per-priority drop thresholds. When the ingress port CoS
queue depth breaches a threshold, then any frame arriving with the associated priority value will be
dropped.
CoS thresholds
Every port has associated with it a total of 9 CoS thresholds, one for the port tail-drop threshold and the
other eight are thresholds for per priority. To give a fair allocation of buffers for the traffic from all
priorities, the port buffers are allocated among different priorities. That is achieved through per-priority
tail-drop thresholds. The port tail-drop threshold represents the amount of buffers given to the port, and
the per-priority tail-drop threshold (called the CoS tail-drop threshold from here on) represents the
buffers allocated to each CoS.
NOTE
CoS thresholds apply only to multicast traffic.
Whenever the buffers allocated to a priority are fully exhausted, all the traffic coming in on that priority
is dropped. In the absence of per-priority tail-drop thresholds (and with only port tail-drop thresholds),
the buffers would be consumed on a first-come, first-served basis, resulting in an unfair share of
buffers among all the priorities. If you know which priority traffic is most seen, then providing a
sufficient number of buffers for those priorities results in fewer packet drops for those priorities.
Instead of using the standard priority values, you can assign anywhere from 0% through 100% priority
to any threshold, as long as the sum of all eight priorities does not exceed 100%. For example, using
the priorities 5 5 5 5 50 20 2 8 adds up to 100%, as shown in the following example:
switch(conf-if-te-0/1)# qos rcv-queue cos-threshold 5 5 5 5 50 20 2 8
switch(conf-if-te-0/1)# do show qos in te 0/1
Interface TenGigabitEthernet 0/1
CoS-to-Traffic Class map 'default‘
In-CoS: 0 1 2 3 4 5 6 7
-----------------------------------------------------
Out-CoS/TrafficClass: 0/1 1/0 2/2 3/3 4/4 5/5 6/6 7/7
Per-Traffic Class Tail Drop Threshold (bytes)
TC: 0 1 2 3 4 5 6 7
------------------------------------------------------------------
Threshold: 10180 10180 10180 10180 101808 40723 4072 16289
NOTE
Tail drop thresholds are not allowed to collectively exceed 100%, but the sum can be below 100%. For
example, if the tail drop thresholds entered sum to less than 100%, then the buffer allocation is made
on the basis of what has been configured.
NOTE
This feature is only supported on the Brocade VDX 8770 series, VDX 6740 series, VDX 6940 series,
and VDX 2746.
Traditionally, Random Early Discard (RED) is used for TCP traffic streams, which are generally more
aggressive, as well as reactive, to network drops. If RED is not configured, queues build up at the
switch and become full, resulting in tail drop. Tail drop situations can cause head-of-line blocking
issues at the switch, which is not desirable. By configuring RED, you set a probability for dropping
packets before traffic in the queue reaches a specific threshold. This allows congestion to ease more
gradually, avoids retransmit synchronization, resolves "bursty" TCP connections during congestion
conditions, and controls packet latency.
Configure RED using the following parameters:
• RED profile identification (0-384)
• Minimum threshold of a queue (0-100%)
• Maximum threshold of a queue (0-100%)
• Drop probability (0-100%)
NOTE
Beginning with Network OS 5.0.0, the maximum number of RED profiles at the system level is 3 on the
Brocade VDX 8770 series, 16 on the Brocade VDX 6740 series and the VDX 2746, and 15 on the
VDX 6940 series.
The ASIC driver maps the configured minimum and maximum percentages to the actual queue size in
bytes, depending on the bandwidth of the port (buffers are allocated to a port according to port speed).
When buffers in the queue build up to the set minimum threshold, packets being queued are randomly
dropped. The drop probability parameter defines the randomness of the drops. When the queues
exceed the minimum threshold, packets are dropped according to the configured drop probability value.
When the queue buffers exceed the set maximum threshold, packets are dropped with 100%
probability. The higher the probability set, the more likely packets will be dropped when the minimum
percentage is reached.
You can also map a specific CoS priority value (0 through 7) to a specific RED profile.
NOTE
The following drop types are logged:
• Brocade VDX 2746, VDX 6740 series, and VDX 6940 series: random early discard (RED) and tail
drops
• Brocade VDX 8770 (internal port interface ASICs): tail drops only
Ethernet Pause
Ethernet Pause is an IEEE 802.3 standard flow-control mechanism for back pressuring a neighboring
device. Pause messages are sent by utilizing the optional MAC control sublayer. A PAUSE frame
contains a 2-byte pause number, which states the length of the pause in units of 512 bits. When a
device receives a PAUSE frame, it must stop sending any data on the interface for the specified length
of time, once it completes the transmission of any frame in progress. You can use this feature to
reduce Ethernet frame losses by using a standardized mechanism. However, the pause mechanism
does not have the ability to selectively back-pressure data sources multiple hops away, or to exert any
control per VLAN or per priority, so it is disruptive to all traffic on the link.
Rx=off Tx=on Rx=on Tx=on asymmetrical: LOCAL Tx=on –> pause –> REMOTE Rx=on
Rx=on Tx=on Rx=off Tx=on asymmetrical: LOCAL Rx=on <– pause <– REMOTE Tx=on
Rx=on Tx=n/a Rx=on Tx=n/a symmetrical: LOCAL Tx/Rx=on <– pause –> REMOTE Tx/
Rx=on
NOTE
The Brocade VDX 6740 series and VDX 6940 series switches support a maximum of two PFC (lossles)
CoS profiles on an interface. If any of these switches is present in a VCS cluster, the user should not
create more than two lossless CoS profiles in the CEE configuration.
Ethernet Priority Flow Control includes the following features:
• Everything operates exactly as in Ethernet Pause described above, except there are eight high-water
and low-water thresholds for each input port. This means queue levels are tracked per input port plus
priority.
• Pause On/Off can be specified independently for TX and RX directions per priority.
• Pause time programmed into Ethernet MAC is a single value covering all priorities.
• Both ends of a link must be configured identically for Ethernet Pause or Ethernet Priority Flow Control
because they are incompatible.
NOTE
Multicast rate limiting is not supported on the Brocade VDX 2746, VDX 6740 series, VDX 6940 series,
or the Brocade VDX 8770-4 and 8770-8 platforms. For these products, refer to BUM storm control on
page 199.
Scheduling
Scheduling arbitrates among multiple queues waiting to transmit a frame. The Brocade switch
supports both Strict Priority (SP) and Deficit Weighted Round Robin (DWRR) scheduling algorithms.
Also supported is the flexible selection of the number of traffic classes using SP-to-DWRR. When
there are multiple queues for the same traffic class, then scheduling takes these equal-priority queues
into consideration.
queues. In this way, the bandwidth utilization statistically matches the queue weights over longer time
periods.
Deficit Weighted Round Robin (DWRR) is an improved version of WRR. DWRR remembers the excess
used when a queue goes over its bandwidth allocation and reduces the queue’s bandwidth allocation in
the subsequent rounds. This way the actual bandwidth usage is closer to the defined level when
compared to WRR.
Traffic Class SP0 SP1 SP2 SP3 SP4 SP5 SP6 SP8
The figure below shows that extending the frame scheduler to a hybrid SP+WRR system is fairly
straightforward. All SP queues are considered strictly higher priority than WRR so they are serviced
first. Once all SP queues are drained, then the normal WRR scheduling behavior is applied to the non-
empty WRR queues.
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
Unicast ingress and egress queueing utilizes a hybrid scheduler that simultaneously supports SP
+WRR service and multiple physical queues with the same service level. Multicast adds additional
multicast expansion queues. Because multicast traffic classes are equivalent to unicast service levels,
they are treated exactly as their equivalent unicast service policies.
The DCB Priority Group Table defines each Priority Group ID (PGID) and its scheduling policy (Strict
Priority versus DWRR, DWRR weight, relative priority), and partially defines the congestion control
(PFC) configuration. There are 16 rows in the DCB Priority Group Table.
The table below presents the default DCB Priority Group Table configuration.
15.0 – Y
15.1 – N
15.2 – N
15.3 – N
15.4 – N
15.5 – N
15.6 – N
15.7 – N
0 0 N
1 0 Y
2 0 N
3 0 N
4 0 N
5 0 N
6 0 N
7 0 N
NOTE
Only a single CoS can be mapped to a PFC-enabled priority queue. The switch automatically maps the
CoS number to the same TC number when PFC is enabled. The PGID can be anything from 0 through
7. If your configuration violates this restriction an error message displays and the Priority Group Table is
set back to the default values. When the DCB map is applied, and the interface is connected to the
CNA, only one Strict Priority PGID (PGID 15.0 through PGID 15.7) is allowed.
Strict Priority versus DWRR is derived directly from the PGID value. All PGIDs with prefix 15 receive
Strict Priority scheduling policy, and all PGIDs in the range 0 through 7 receive DWRR scheduling
policy. Relative priority between Priority Group is exactly the ordering of entries listed in the table, with
PGID 15.0 being highest priority and PGID 7 being lowest priority. Congestion control configuration is
partially specified by toggling the PFC column On or Off. This provides only partial configuration of
congestion control because the set of priorities mapped to the Priority Group is not known, which leads
into the DCB Priority Table.
The DCB Priority Table defines each CoS mapping to Priority Group, and completes PFC
configuration. The table below shows an example of mapping in the DCB Priority Table.
CoS PGID
0 15.6
1 15.7
2 15.5
3 15.4
4 15.3
5 15.2
6 15.1
7 15.0
Port-based Policer
The port-based Policer feature controls the amount of bandwidth consumed by an individual flow or
aggregate of flows by limiting the inbound and outbound traffic rate on an individual port according to
criteria defined by the user. The Policer provides rate control by prioritizing or dropping ingress and
egress packets classified according to a two-rate, three-color marking scheme defined by RFC 4115.
Color-based priority
The following is the color-based priority mapping scheme for limiting traffic rate:
• Traffic flagged to the green or "conform" color priority conforms to the committed information rate
(CIR) as defined by the cir-rate variable for the policy-map (refer to Policing parameters on page
206). This rate can be anything from 40000 to 400000000000 bps.
• Traffic flagged as yellow or "exceed" exceeds the CIR, but conforms to the Excess Information Rate
(EIR) defined by the eir-rate variable for the policy-map (refer to Policing parameters on page 206).
This rate can be set from 0 through 400000000000 bps.
• Traffic flagged as red or "violate" are not compared to CIR or EIR and will be dropped.
Using policing parameters, you can define metering rates, such as CIR and EIR, and actions for traffic
flagged as conforming or exceeding the rates. As a simple example, traffic within the "conform" rate
may be sent at a certain CoS priority, traffic flagged at the "exceed" rate may be sent at a lower
priority, and traffic that violates the set rates can be dropped (default and only option).
Policing parameters
Policing parameters provide values for CIR, CBS, EIR, and EBS, for classifying traffic by a specific
class for color-based priority mapping. They also specify specific actions to perform on traffic with a
color-class priority, such as having packet DSCP priority, traffic class (internal queue assignment), or
traffic class (internal queue assignment) set to specific values.
The Committed Information Rate (CIR) is the maximum number of bits that a port can receive or send
during one-second over an interface. For CIR, there are two parameters that define the available
traffic: CIR and the Committed Burst Size (CBS). The CIR represents a portion of the interface’s total
bandwidth expressed in bits per second (bps). It cannot be larger than the interface’s total bandwidth.
CBS controls the bursty nature of the traffic. Traffic that does not use the configured CIR accumulates
credits until the credits reach the configured CBS. These credits can be used when the rate
temporarily exceeds the configured CIR. When credits are not available, the traffic is either dropped or
subject to the policy set for the Excess Information Rate (EIR). The traffic limited by the CIR can have
its priority, traffic class, and DSCP values changed.
CIR is mandatory policing parameter for configuring a class map.
cir cir-rate
The cir command defines the value of the CIR as the rate provided in the cir-rate variable. Acceptable
values are in multiples of 40000 in the range 40000-100000000000 bps.
cbs cbs-size
The cbs command defines the value of the CBS as the rate provided in the cbs-size variable.
Acceptable values are 1250-12500000000 bytes in increments of 1 byte.
The Excess Information Rate (EIR) provides an option for traffic that has exceeded the CIR. For EIR,
there are two parameters that define the available traffic: the EIR and the Excess Burst Size (EBS).
The EIR and EBS operate exactly like the CIR and CBS, except that they act only upon traffic that has
been passed to the EIR because it could not be accommodated by the CIR. Like the CIR, the EIR
provides an initial bandwidth allocation to accommodate inbound and outbound traffic. Like the CBS,
the bandwidth available for burst traffic from the EBS is subject to the amount of bandwidth that is
accumulated during periods when traffic allocated by the EIR policy is not used. When inbound or
outbound traffic exceeds the bandwidth available (accumulated credits or tokens), it is be dropped.
The traffic rate limited by the EIR can have its priority, traffic class, and DSCP values changed.
EIR and EBS parameters are optional policing parameters. If not set, they are considered disabled.
eir eir-rate
The eir parameter defines the value of the EIR as the rate provided in the eir-rate variable. Acceptable
values are in multiples of 40000 in the range 0-100000000000 bps.
ebs ebs-size
The ebs parameter defines the value of the EBS as the rate provided in the ebs-size variable.
Acceptable values are 1250-12500000000 bytes in increments of 1 byte.
Following are policing parameters that apply actions to conform or exceed color traffic:
• conform-set-dscp dscp-num.
The conform-set-dscp parameter specifies that traffic with bandwidth requirements within the rate
configured for CIR will have its packet DSCP priority set to the value specified in the dscp-num
variable. Acceptable values for dscp-num are 0–63.
• conform-set-prec prec-num.
The conform-set-prec parameter specifies that traffic with bandwidth requirements within the rate
configured for CIR will have its packet IP precedence value (first 3 bits of DSCP) set to the value in
the prec-num variable. Acceptable values for prec-num are 0–7.
• conform-set-tc trafficlass.
The conform-set-tc parameter specifies that traffic with bandwidth requirements within the rate
configured for CIR will have its traffic class (internal queue assignment) set to the value in the
trafficlass variable. Acceptable values for trafficclass are 0–7.
• exceed-set-dscp dscp-num.
The exceed-set-dscp parameter specifies that traffic with bandwidth requirements that exceeds the
rate configured for CIR and sent to the EIR bucket will have its packet DSCP priority set to the value
in the dscp-num variable. Acceptable values for dscp-num are 0–63.
• exceed-set-prec prec-num.
The exceed-set-prec parameter specifies that traffic with bandwidth requirements that exceed the
rate configured for CIR and sent to the EIR bucket will have its packet IP precedence set to the value
in the prec-num variable. Acceptable values for prec-num are 0–7.
• exceed-set-tc trafficclass.
The exceed-set-tc parameter specifies that traffic with bandwidth requirements that exceed the rate
configured for CIR and is in the limit of what is configured for EIR will have its traffic class (internal
queue assignment) set to the value in the trafficlass variable. Acceptable values for trafficlass are 0–
7.
• set-priority priority-mapname.
The set-priority parameter specifies the mapping used for setting QoS priority (802.1p priority) in
the packet. The priority-mapname name variable should be same as configured for the priority-map
(police-priority-map), which will have a set priority and color type (conform or exceed).
Follow these best practices when configuring the port-based Policer feature:
• Avoid mapping lossy priority to lossless priority in conform and exceed CoS maps.
• Configure rate (CIR or EIR) and burst size (CBS or EBS) based on interface speed.
• Set conform and exceed token count (Tc) to the same values to avoid any reordering issues.
The following are rules for configuring maps and using policing parameters for the Policer feature:
• A policy-map, class map, priority-map name must be unique among all maps of that type.
• A policy-map is not supported on an ISL port.
• A Policer name must begin with a-z, or A-Z. You can use underscore, hyphen, and numeric values
0-9 except as the first character.
• You cannot delete a policy-map, class map, or priority-map if is active on the interface.
• You cannot delete a class map from a policy-map when the policy-map is active on the interface.
• Configure CIR and EIR in multiples of 40000 bps.
• Percentage as a rate limit is not supported,
• Policer actions are applicable only to data traffic. Control traffic, FCoE, and internal VLAN traffic is
not subjected to policing.
• The egress Policer can overwrite ingress Policer results such as CoS mapping and DSCP mapping.
• If a policy-map is applied to an interface and no Policer attributes are present in that policy-map,
then ingress and egress packets on that interface is marked as green (conforming).
• If the configured CBS value is less than 2*MTU value, then 2*MTU is programmed as the CBS in
the hardware. For example, if you configure CBS at 4000 bytes and the MTU on an interface is
3000 bytes, when a policy-map is applied on this interface, the CBS programmed in the hardware is
2*MTU (6000 bytes).
• If CBS and EBS values are not configured, then these values are derived from CIR and EIR values,
respectively. Burst size calculation is as follows: Burst size (cbs or ebs) =
1.2*information rate (CIR/EIR)/8
• If you do not configure EIR and EBS, then the single-rate, two-color scheme is applied (packets are
marked as either green or red).
• You must configure rate limit threshold values on an interface based on interface speed. No
validation is performed for user-configured values against interface speed.
• The incremental step size for CIR or EIR is set to 40000 bps.
• The Policer operates in color-blind mode. In other words, color is evaluated at ingress and egress
Policers independently. This may result in packets that are marked as yellow in the inbound Policer
to be evaluated as green at the outbound Policer, depending on Policer settings.
• Because inbound queue scheduling is performed before outbound policing, setting traffic class (set-
conform-tc or set-exceed-tc) based on policing results does not affect packet forwarding at the
outbound side.
• Packets drops caused by any action other than ACLs are included in Policer counters.
• Layer 3 control packets are policed at the outbound side.
• Policing is enabled on lossless priorities at the outbound side.
• Policing is not enabled for control traffic that is trapped or dropped.
Because a virtual link aggregation group (vLAG) spans multiple switches, it is not possible to associate
flows on each LAG member port to a common Policer. Instead, apply the same policy-map on
individual member ports so that traffic flow on member ports is controlled by a Policer configured on
that member port. The total rate-limit threshold value on a vLAG consists of the cumulative values of
rate-limit thresholds on all member ports.
• Policing is applicable only for lossy traffic. Lossless traffic should not get policed. For port-based
policing, apply a policy-map to an interface even if PFC is configured on that interface. The CoS
value (priority) on which PFC is applied is excluded from being policed.
• Remapped priority values should not include lossless priorities. Do not remap lossy traffic priorities to
lossless traffic priorities and vice-versa.
• Policer attributes conform-set-tc and exceed-set-tc should not be set to a lossless traffic class.
Configuring QoS
The following sections discuss configuring QoS, including fundamentals, traffic class mapping,
congestion control, rate limiting, BUM storm control, scheduling, DCB QoS, Brocade VCS Fabric QoS,
policer functions, and Auto QoS.
NOTE
Refer to User-priority mapping on page 194.
NOTE
Nontagged Ethernet frames are interpreted as having an incoming CoS value of 0 (zero).
You can override the default user-priority mapping by applying explicit user-priority mappings.
When neighboring devices are trusted and able to properly set QoS, then Layer 2 QoS trust can be set
to CoS and the IEEE 802.1Q default-priority mapping is applied.
The following table presents the Layer 2 CoS user-priority generation table conforming to 802.1Q
default mapping. You can override this default user-priority table per port if you want to change
(mutate) the CoS value.
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
To configure user-priority mappings, perform the following steps from privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Specify the Ethernet interface.
switch(config)# interface tengigabitethernet 1/2/2
3. Configure the interface to priority 3.
switch(conf-if-te-1/2/2)# qos cos 3
4. Return to privileged EXEC mode.
switch(conf-if-te-1/2/2)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
To create a CoS-to-CoS mutation, perform the following steps from privileged EXEC mode.
To apply a CoS-to-CoS mutation QoS map, perform the following steps from privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Specify the Ethernet interface.
switch(config)# interface tengigabitethernet 2/1/2
3. Activate or apply changes made to the CoS-to-CoS mutation QoS map. In this example, "test" is the
map name.
switch(conf-if-te-2/1/2)# qos cos-mutation test
NOTE
To deactivate the mutation map from an interface, enter no qos cos-mutation name.
4. Return to privileged EXEC mode.
switch(conf-if-te-2/1/2)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
To verify applied QoS maps, you can use one or both of the following options from global configuration
mode.
• Verify the CoS mutation mapping for a specific map by using the do show qos maps qos-mutation
command and the map name.
switch(config)# do show qos maps cos-mutation test
• Verify all QoS mapping by using the do show qos maps command with just the cos-mutation
parameter only.
switch(config)# do show qos maps cos-mutation
• Verify the interface QoS mapping by using the do show qos interface command.
switch(config)# do show qos interface te 2/1/2
Like QoS trust mode, the Differentiated Services Code Point (DSCP) trust mode controls the user-
priority mapping of incoming traffic. The user priority is based on the incoming DSCP value. When this
feature is not enabled, DSCP values in the packet are ignored.
When DSCP trust is enabled, the following table shows default mapping of DSCP values to user
priority.
0–7 0
8–15 1
16–23 2
24–31 3
32–39 4
40–47 5
48–55 6
56–63 7
NOTE
Note the restrictions for using this feature in VCS mode under Restrictions for Layer 3 features in VCS
mode on page 204.
To configure DSCP trust mode, perform the following steps from privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Specify the Ethernet interface.
switch(config)# interface tengigabitethernet 10/0/2
3. Set the interface mode to QoS DSCP trust.
switch(conf-if-te-10/0/2)# qos trust dscp
NOTE
To deactivate the DSCP trust mode from an interface, enter no qos trust dscp.
4. Return to privileged EXEC mode.
switch(conf-if-te-10/0/2)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
To verify applied DSCP trust, you can enter the following command from global configuration mode,
where tengigabitethernet 10/0/2 is the interface name.
switch(config)# do show qos interface tengigabitethernet 10/0/2
NOTE
This feature is only supported on Brocade VDX 8770-4, VDX 8770-8, VDX 6740, VDX 6740T, and VDX
6740T-1G.
To create a DSCP mutation map and re-map the incoming DSCP value of the ingress packet to egress
DSCP values, perform the following steps from privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Create the DSCP mutation map by specifying a map name. The following command uses "test" as
the map name and places the system in DSCP mutation mode so that you can map to traffic classes.
switch(config)# qos map dscp-mutation test
3. Once the system is in DSCP mutation mode for the configured map (in this case dscp-mutation-test),
you can map ingress DSCP values to egress DSCP values by using the mark command as in the
following examples:
switch(dscp-mutation-test)# mark 1,3,5,7 to 9
switch(dscp-mutation-test)# mark 11,13,15,17 to 19
switch(dscp-mutation-test)# mark 12,14,16,18 to 20
switch(dscp-mutation-test)# mark 2,4,6,8 to 10
To apply a configured DSCP mutation map to an interface, perform the following steps from privileged
EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Specify the Ethernet interface.
switch(config)# interface tengigabitethernet 3/1/2
3. Activate or apply changes made to the DSCP mutation map to the interface. In this example "test" is
the map name.
switch(conf-if-te-3/1/2)# qos dscp-mutation test
NOTE
To deactivate a map from an interface, enter no qos dscp-mutation name.
4. Specify the DSCP trust mode for incoming traffic.
switch(conf-if-te-2/1/2)# qos dscp-cos test
switch(conf-if-te-2/1/2)# qos dscp-traffic-class test
5. Return to privileged EXEC mode.
switch(conf-if-te-3/1/2)# end
6. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
To verify applied DSCP maps, you can use one or both of the following options from global
configuration mode.
• Verify DSCP mapping for a specific map using the do show qos maps dscp-mutation command
and the map name.
switch(config)# do show qos maps dscp-mutation test
• Verify all DSCP mapping by using the do show qos maps command with the dscp-mutation
operand only.
switch(config)# do show qos maps dscp-mutation
• Verify DSCP mutation mapping for an interface by using the show qos interface command and
specifying the interface:
switch(config)# do show qos interface te 3/1/2
You can use the incoming DSCP value of ingress packets to remap the outgoing 802.1P CoS priority
values by configuring a DSCP-to-COS mutation map on the ingress interface. Use the following steps.
NOTE
The restrictions for using this feature in VCS mode are listed at Restrictions for Layer 3 features in
VCS mode on page 204.
1. Enter global configuration mode.
switch# configure terminal
2. Create the DSCP-to-CoS map by specifying a map name. The following command uses "test" as
the map name and places the system in dscp-cos map mode so that you can map DSCP values to
CoS values.
switch(configure)# qos map dscp-cos test
3. Once the system is in dscp-cos map mode for the configured map (in this case dscp-cos-test), you
can map incoming DSCP values to outgoing CoS priority values by using the mark command as in
the following examples:
switch(dscp-cos-test)# mark 1,3,5,7 to 3
switch(dscp-cos-test)# mark 11,13,15,17 to 5
switch(dscp-cos-test)# mark 12,14,16,18 to 6
switch(dscp-cos-test)# mark 2,4,6,8 to 7
To apply a DSCP-to-CoS mutation map to an interface, perform the following steps from privileged
EXEC mode.
NOTE
To deactivate a map from an interface, enter no qos dscp-cos name.
4. Apply the changes made to the DSCP-to-Traffic-Class map to enable DSCP trust on the interface. In
this example, "traffic_test" is the map name.
switch(conf-if-te-1/1/2)# qos dscp-traffic-class traffic_test
5. Return to privileged EXEC mode.
switch(conf-if-te-1/1/2)# end
6. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
To verify applied DSCP-to-CoS maps, you can use one or both of the following options from global
configuration mode.
• Verify DSCP mapping for a specific map using the do show qos maps dscp-cos command and the
map name.
switch(config)# do show qos maps dscp-cos test
• Verify all DSCP mapping by using the do show qos maps command with the dscp-cos operand
only.
switch(config)# do show qos maps dscp-cos
• Verify DSCP-to-CoS mutation mapping for an interface by using the show qos interface command
and specifying the interface:
switch(config)# do show qos interface te 1/1/2
NOTE
For information on user-priority mapping, refer to User-priority mapping on page 194.
The traffic class mapping stage provides some flexibility in queue selection:
• The mapping may be many-to-one, such as mapping one-byte user priority (256 values) to eight
traffic classes.
• There may be a nonlinear ordering between the user priorities and traffic classes.
NOTE
The command qos trust cos is not applicable in VCS mode. However, the show qos interface
command will show trusted ports if the cos-mutation command and the cee default command are
applied.
0 1
1 0
2 2
3 3
4 4
5 5
6 6
7 7
You are allowed to override these default traffic class mappings per port. Once the traffic class
mapping has been resolved, it is applied consistently across any queuing incurred on the ingress and
the egress ports.
The Brocade switch supports eight multicast traffic classes for isolation and to control servicing for
different priorities of application data. Traffic classes are numbered from 0 through 7, with higher
values designating higher priorities. The traffic class mapping stage provides some flexibility in queue
selection.
The following table displays the Layer 2 default traffic multicast class mapping supported for a CoS-
based user priority to conform to 802.1Q default mapping.
0 1
1 0
2 2
3 3
TABLE 35 Default user priority for multicast traffic class mapping (Continued)
4 4
5 5
6 6
7 7
Once the traffic class mapping has been resolved for inbound traffic, it is applied consistently across all
queuing incurred on the ingress and egress ports.
NOTE
You can configure an interface with a nondefault DSCP-to-traffic class-map. However, configuring an
interface with a nondefault CoS-to-traffic class-map is not supported.
• RED profiles can be enabled on LAG interfaces. However, the profile is configured on the individual
member interfaces of the LAG.
• Because LAG members may belong to different port groups, one of the port groups may not have
enough resources available to support a new RED configuration for the member interface. In this
case, and error log will indicate that the RED application failed on the specific member interface.
When a new member is added to the port-channel, the same error may occur if the new member
belongs to an port groups with all resources used. To apply the RED profile on the failed member
interface, you must remove the RED configuration on other all interfaces in the port group so that
resources are available and remove or add the member interface to the LAG.
To configure an egress RED profile, perform the following steps from privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Configure a RED profile. For the profile ID, 10 is used in this case. The min-threshold, max-
threshold, and drop-probability values are percentages.
switch(config)# qos red-profile 10 min-threshold 10 max-threshold 80 drop-
probability 80
3. Return to privileged EXEC mode.
switch(config)# end
4. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
To map a traffic-class value for a port to the RED profile created under Understanding RED profiles on
page 217, perform the following steps from privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Specify the Ethernet interface.
switch(config)# interface tengigabitethernet 1/2/2
3. Map the profile to use a traffic-class for a port. In the following example, CoS priority 3 is mapped to
RED profile ID 10.
switch(conf-if-te-1/2/2)# qos random-detect traffic-class 3 red-profile-id 10
NOTE
To deactivate the map from an interface, enter no qos random-detect traffic-class value
4. Return to privileged EXEC mode.
switch(conf-if-te-1/2/2)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
Verify a configured RED profiles by using the show qos red profiles command.
switch# show qos red profiles
Red Profile 1
Minimum Threshold: 10
Maximum Threshold: 100
Drop Probability: 100
Red Profile 2
Minimum Threshold: 10
Maximum Threshold: 100
Drop Probability: 100
Red Profile 3
Minimum Threshold: 10
Maximum Threshold: 100
Drop Probability: 100
Examine the applied RED profiles for an interface by using the show qos red statistics interface
interface-name command. This displays the RED profile, as well as all QoS configurations applied to
the interface, such as DSCP trust, DSCP-to-DSCP map, CoS-Traffic Class map, and others.
switch# show qos red statistics interface te 1/2/2
interface TenGigabitEthernet 1/2/2
fabric isl enable
fabric trunk enable
qos random-detect traffic-class 1 red-profile-id 1
qos random-detect traffic-class 2 red-profile-id 2
qos random-detect traffic-class 3 red-profile-id 3
no shutdown
!
Configuring FlowControl
This task configures FlowControl in addition to enabling the Ethernet pause frames. Brocade
recommends that you also configure the flow control parameters on the connecting device, and not
leave the options set to "auto".
Refer to Ethernet Pause on page 197.
To enable Ethernet Pause, perform the following steps from privileged EXEC mode.
1. Enter global configuration mode.
switch# configure terminal
2. Specify the Ethernet interface.
switch(config)# interface tengigabitethernet 3/0/2
3. Enable Ethernet Pause on the interface for both TX and RX traffic.
switch(conf-if-te-3/0/2)# qos flowcontrol tx on rx on
NOTE
To deactivate Ethernet pause on an interface, enter no qos flowcontrol
4. Return to privileged EXEC mode.
switch(conf-if-te-3/0/2)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
6. Verify the Ethernet Pause with the show qos flowcontrol command.
switch# show qos flowcontrol interface all 3/0/2
NOTE
To deactivate storm control from an interface, enter no storm-control ingress followed by the mode
(broadcast, unknown-unicast, or multicast) the limit (limit-bps or limit-percent), rate, and
optionally either monitor or shutdown.
Configuring scheduling
Refer also to Scheduling on page 200.
NOTE
The only map name allowed is "default."
switch(config)# cee-map default
3. Define the DCB map for PGID 0.
switch(config-cee-map-default)# priority-group-table 0 weight 50 pfc on
4. Define the DCB map for PGID 1.
switch(config-cee-map-default)# priority-group-table 1 weight 50 pfc off
5. Return to privileged EXEC mode.
switch(config-cee-map-default)# end
6. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
NOTE
For information about priority-table definitions, refer to the cee-map (configuration) command in
the Network OS Command Reference
4. Return to privileged EXEC mode.
switch(config-cee-map)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
NOTE
To deactivate the map on the interface, enter no cee.
4. Return to privileged EXEC mode.
switch(conf-if-te-101/0/2)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
3. Use the remap fabric priority command to set the fabric priority for Brocade VCS Fabric QoS.
The default FCoE remap fabric priority is set to 0 (zero).
switch(fabric-cee-map-default)# remap fabric-priority priority 2
4. Use the exit command to return to global configuration mode.
switch(config-cee-map)# exit
5. Specify the incoming Ethernet interface.
switch(config)# interface tengigabitethernet 22/0/1
6. Apply the CEE Provisioning map to the interface.
switch(conf-if-te-22/0/1)# cee default
Flow-based QoS
Consider the topics discussed below when configuring the flow-based QoS functions.
NOTE
Flow-based QoS functions only in the ingress direction.
To configure flow-based QoS functions, do the following while the switch is in global configuration
mode:
1. Configure a class-map to classify traffic according to the traffic properties required for your flow-
based QoS needs. Refer to Configuring a class-map on page 224.
2. Configure a policy-map to associate a policy-map with the class-map and also add the QoS action
to be applied on the type of flow determined by the class-map. Refer to Configuring flow-based QoS
actions using policy-map on page 225.
3. Bind the policy-map to a specific interface using the service-policy command, or bind the policy-
map to an Rbridge ID. Refer to Binding the policy-map to an interface on page 228 and Binding
flow-based QoS at the system level on page 229.
Configuring a class-map
The classification map or class-map classifies traffic based on match criteria that you configure using
the class-map command. If traffic matches the criteria, it belongs to the class. Currently, the only
match criterion is "match access-group".
To configure a class-map, use the following steps:
1. Enter global configuration mode.
switch# configure terminal
2. Create an access-list (either a MAC, IP, or VLAN-based ACL) to define the traffic. Refer to the
Network OS Security Guide for details on creating access-lists.
switch(config)# mac access-list standard ACL1
switch(conf-macl-std)# permit host 0000.00aa.aa00
switch(conf-macl-std)# exit
3. Create a class-map by providing a class-map name. This enables class-map configuration mode.
switch(config)# class-map class1
The name for the class-map (in this case class1) can be a character string up to 64 characters.
NOTE
The "default" class-map and "cee" class-map name is reserved and intended to match everything. It
is always created and cannot be removed.
4. Provide match criteria for the class.
switch(config-classmap)# match access-group ACL1
5. Exit the class-map configuration mode.
switch(config-classmap)# exit
6. Return to privileged EXEC mode.
switch(config)# end
7. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
NOTE
Enter the no class-map name command while in global configuration mode to remove the
classification map.
Configure a rate-limit policy-map to associate a policy-map with the class-map and add a QoS action to
be applied to the type of QoS flow defined by the class-map.
To configure a policy-map, add a classification map, and configure QoS policing parameters for the
classification map, use the following steps:
1. Enter the global configuration mode.
switch# configure terminal
2. Configure a policy-map by providing a policy-map name. This enables policy-map configuration
mode.
switch(config)# policy-map pmap1
3. Exit the policy-map configuration mode.
switch(config-policymap)# exit
4. Return to privileged EXEC mode.
switch(config)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
Add color-based priority CoS mapping by configuring a policer priority-map. A policer priority-map
remaps frame class of service CoS values (802.1p priority bits in VLAN tag) to conform or exceed color
values when rates conform to or exceed limits set in a classification map.
The policer priority-map re-marks CoS values according to color-based green (conform), yellow
(exceed), and red (violate) priorities. Creating a policer priority-map is optional. If you do not define
priority mapping for a color, the map defaults to priorities of 0, 1, 2, 3, 4, 5, 6, and 7 (in other words,
nothing is modified). You can configure a maximum of 32 priority-maps (one is reserved as the default),
but only one map can be associated with a policer.
NOTE
You can set a priority-map when creating a policy-map by using appropriate policer attributes.
The name for the priority-map (in this case pmap1) can be a character string up to 64 characters.
3. Create color-based priority mapping. The following example sets the CoS for traffic that conforms to
the CIR set in the policy-map.
switch(config-policepmap)# conform 0 1 1 2 1 2 2 1 1
The following example sets the CoS for traffic that exceeds the CIR setting, but conforms to the EIR
set in the policy-map.
switch(config-policepmap)# exceed 3 3 3 3 4 5 6 7
4. Return to global configuration mode with the exit command.
switch(config-policepmap)# exit
switch(config)#
5. Configure a policy-map by providing a policy-map name. This enables policy-map configuration
mode.
switch(config)# policy-map pmap1
6. Configure a class-map in the policy-map by providing the class-map name. This enables policy
class-map configuration mode. Note that the class-map name in the following example matches the
name provided when you create the class-map by using the class-map command (refer to
Configuring a class-map on page 224).
switch(config-policymap)# class class1
7. Set QoS and policing parameters for the class-map as shown in the following example. For
information on all of the optional parameters for this command, refer to the Network OS Command
Reference.
switch(config-policymap)# police cir 40000 cbs 5000 eir 40000 ebs 3000 set-
priority pmap1 conform-set-dscp 61 conform-set-tc 7 exceed- set-dscp 63 exceed-
set-tc 3
The CIR parameter is mandatory for the QoS policer. All other parameters are optional. Note that
the parameter for set-priority (pmap1) includes the name for the created priority-map (refer to
Configuring QoS policer action). For details on setting QoS and policing parameters, refer to
Policing parameters on page 206.
8. Return to privileged EXEC mode with the end command.
switch (config-policymap)# end
9. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
You can specify the mutation-map to be used on a port. This can lead to possible contradictions if
there are other user-defined classes used in the same policy-map that have a set cos action
configured. In this case-defined cos takes priority over the mutation map.
Perform the following task in global configuration mode.
You can specify the shaping rate per port attached to the policy-map. You can use this command to
smooth out the traffic that egresses an interface. This command is allowed only for the egress direction.
NOTE
The minimum shaping speed on a Brocade VDX 6740is 200,000 Kbps.
You can specify the scheduling attributes along with per TC shape rate. There are total of eight queues
on an interface. The number of DWRR queues present depends on the SP_COUNT value. For
example, if the SP_COUNT is 2, then there are two strict priority queues and six DWRR queues. This
command is allowed only for the egress direction.
Perform the following task in global configuration mode.
1. Select the policy map.
switch(config)# policy-map p1
2. Select the class.
switch(config-policymap)# class class-default
3. Specify the scheduling attributes. For complete information, refer to the Network OS Command
Reference.
switch(config-policyclass)# scheduler strict-priority 3 dwrr 10 10 10 10 60 TC5
35000 TC6 36000 TC7 37000
You can specify the sFlow profile attached to the policy map.
This feature only functions in the the ingress direction. It can be configured both in user-defined class-
maps and in the universal class-map "default". If you use the class-map "default", port-based sFlow is
enabled.
Refer to Configuring an sFlow policy map and binding it to an interface on page 257.
The priority-mapping-table can support features provided by the Cisco Modular Quality of Service
(MQC) provisioning mode to bring partial Converged Enhanced Ethernet (CEE) map content into an
MQC class. MQC does not allow ingress and egress feature to be present in a same policy-map. By
definition, they are two different entities and should be provisioned through two separate policy-maps.
However, a CEE map provisions ingress and egress features in a single provisioning command.
Because of this conflict, only the following features are inherited from a CEE map.
• Priority-Group Table.
• Priority-Mapping Table.
• Priority Flow Control Configuration.
• Lossless Priority Remapping.
• Fabric Priority Remapping.
NOTE
In Brocade switches, the CEE map scheduler configuration is global. Unless an egress scheduling
policy is applied on an interface, the default scheduler is present.
Use the qos service-policy command to bind an existing policy-map to a single Rbridge ID or all
Rbridge IDs to apply policing parameters to the interfaces in a VCS fabric.
Refer to Flow-based QoS on page 224 for information on creating a service policy.
NOTE
The class-maps titled "default" and "cee" can not be bound at the system level.
1. Enable the global configuration mode.
switch# configure terminal
2. Bind the policy-map to inbound traffic.
switch(config)# qos service-policy in pmap1
3. Bind a policy-map to ingress traffic on the Rbridge ID. The Rbridge ID can be a single ID, a range of
IDs, or you may use all to bind the policy-map to all Rbrdge-IDs. The following associates binds
policymap1 to inbound traffic on RBridge ID 14 through 18. Only one policy per interface per direction
is allowed.
switch(config-service-policy)# attach rbridge-id add 14-18
4. Return to privileged EXEC mode.
switch(config-service-policy)# end
5. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
Displaying policy-maps
In the following example, the show policymap command is used to display Policer policies and
parameters set for the 10-gigabit Ethernet interface 4/1 inbound traffic.
switch(conf-if-te-5/1/33)# do show policy-map interface tengigabitethernet 5/1/33
Ingress Direction :
Policy-Map pmap1
Class default
Police cir 43454
Stats:
Operational cir:39944 cbs:6518 eir:0 ebs:0
Conform Byte:0 Exceed Byte:0 Violate Byte:0
Egress Direction :
Policy-Map pmap1
Class default
Police cir 43454
Stats:
Operational cir:39944 cbs:6518 eir:0 ebs:0
Conform Byte:0 Exceed Byte:0 Violate Byte:0
Entering show policymap system rbridge-id displays the policy-map information for the specified
Rbridge ID.
switch(conf-if-te-2/0/11)# do show policy-map system rbridge-id 14
Ingress Direction :
Policy-Map pmap1
Class cmap1
matches 0 packets
Police cir 43454
Stats:
Operational cir:39944 cbs:6518 eir:0 ebs:0
Conform Byte:0 Exceed Byte:0 Violate Byte:0
Entering show policymap without identifying an interface and specify inbound traffic displays policy-
maps bound on all switch interfaces.
switch(conf-if-te-5/1/33)# do show policy-map
Number of policy maps : 1
Policy-Map pmap1
Bound To: Te 5/1/33(in), Te 5/1/33(out)
Rbridges:14,15,16,17,18
The following example displays the running configured policy-map by means of the show running-
config policy-map command.
switch(conf-if-te-5/1/33)# do show running-config interface tengigabitethernet 5/1/33
interface TenGigabitEthernet 5/1/33
service-policy in pmap1
service-policy in pmap1
fabric isl enable
fabric trunk enable
no shutdown
The following example displays the running configured service-policy by means of the show running-
config qos command.
switch(conf-if-te-2/0/11)# do show running-config qos service-policy
qos service-policy in pmap1
attach rbridge-id add 14-18
Displaying class-maps
The following example displays the running configured class-map name and configured match attribute
by means of the show running-config class-map command.
switch(config-classmap)# do show running-config class-map
class-map cee
!
class-map class_map1
match access-group stdacl1
!
class-map default
Auto QoS
Auto QoS automatically classifies traffic based on either a source or a destination IPv4 or IPv6 address.
Once the traffic is identified, it is assigned to a separate priority queue. This allows a minimum
bandwidth guarantee to be provided to the queue so that the identified traffic is less affected by network
traffic congestion than other traffic.
NOTE
As this command was created primarily to benefit Network Attached Storage devices, the commands
used in the following sections use the term “NAS”. However, there is no strict requirement that these
nodes be actual NAS devices, as Auto QoS will prioritize the traffic for any set of specified IP
addresses.
• The source and destination server IP addresses identifying NAS traffic are contained in the NAS
server IP list. Refer to Specifying NAS server IP addresses for Auto QoS on page 235 and
Removing NAS server IP addresses for Auto QoS on page 235 for instructions on adding and
removing NAS server IP addresses.
• Enter more specific entries (those using fewer wild card values) first to have statistics display
properly. For example , if you enter nas server-ip 10.10.0.0/16 followed by nas server-ip
10.10.10.0/24, the number of matched packets will always be zero for the second entry.
In order to provide minimum bandwidth guarantee for NAS traffic across switches in the fabric, the
default CEE map has to be changed to accommodate NAS traffic. By default, the bandwidth division in
the CEE map is 40% for FCoE traffic and 60% for LAN traffic. As NAS traffic has to co-exist with FCoE
traffic, some of the LAN traffic bandwidth allocation is given over to NAS traffic. When Auto QoS is
enabled, the default bandwidth allocations are 40% for FCoE traffic, 20% for NAS traffic and 40% for
LAN traffic. The purpose of using a CEE map is to pass along the scheduler weights to ISLs in the
fabric so that they will treat the NAS traffic accordingly.
When Auto QoS is enabled, the modified CEE map will be similar to the following:
Priority Table
CoS: 0 1 2 3 4 5 6 7
-----------------------------------------------
PGID: 2 2 3 1 2 2 2 15.0
In the example above a PGID with an ID of “3” is defined with a bandwidth allocation of 20 which is then
mapped to a user-configured CoS value. If the CoS value is not configured, the PGID value is mapped
to the default QoS CoS value (2) in the priority table. This shows that when this CEE map is applied to
an interface, the CoS will be allotted 20% of the overall bandwidth.
NOTE
Associating both a VRF and a VLAN value to the same server IP address is strongly discouraged,
as this will cause errors in reporting NAS statistics.
5. Press Enter after you add each address entry.
The following example adds two addresses, one using a VLAN mask, and the other a VRF mask.
switch(config)# nas server-ip 10.192.100.100/32 vlan 100
switch(config)# nas server-ip 10.192.100.101/32 vrf bruce
The following example shows a typical output of this command, showing that Auto-NAS is enabled
on two IP address (one using VLAN, and one using VRF), that it has the values of CoS 2 and DSCP
0, and a Traffic Class of 5.
switch# show system internal nas
Auto-NAS Enabled
Cos 2
Dscp 0
Traffic Class 5
NAS server-ip 10.192.100.100/32 vlan 100
NAS server-ip 10.192.100.101/32 vrf broceliande
NOTE
IPv6 addressing is also supported for Auto QoS for NAS.
To add a NAS address to the NAS server IP list:
1. In configuration mode, enter nas server-ip followed by the IP address with mask and then one of the
following:
• vlan vlan_ID
• vrf vrf_Name
2. Press Enter after you add each address entry.
The following example adds two addresses, one using a VLAN mask, and the other a VRF mask.
switch(config)# nas server-ip 10.192.100.100/32 vlan 100
switch(config)# nas server-ip 10.192.100.101/32 vrf broceliande
The following example removes two addresses, one using a VLAN mask, and the other a VRF mask.
switch(config)# no nas server-ip 10.192.100.100/32 vlan 100
switch(config)# no nas server-ip 10.192.100.101/32 vrf broceliande
RBridge 2
-----------
nas server-ip 10.1.1.1/32 vrf default-vrf
matches 0 packets 0 bytes
2. To display NAS server statistics for a single server, enter: show nas statistics server-ip followed
by the IPv4 address and the appropriate VLAN or VRF mask and RBridge ID.
This command can accept a single IPv4 address (10.192.100.100/32), or an entire sub-net
(10.192.100.0/24 vlan 100) as input. When a subnet is specified, all the servers in the sub-net with
Auto-NAS QoS will be shown. Subnet masks are not supported (for example: 10.192.100.0
255.255.255.0 is not a supported address). The first following example shows the statistics for all
ports using RBridge ID 1; the second example shows the statistics for 10.1.1.0/24 vrf brad.
switch# show nas statistics all rbridge-id 1
RBridge 1
-----------
nas server-ip 10.1.1.1/32 vrf default-vrf
matches 0 packets 0 bytes
switch# show nas statistics server-ip 10.1.1.0/24 vrf brad
nas server-ip 10.1.1.0/24 vrf brad
matches 2000000 packets 40000000 bytes
● IGMP overview..............................................................................................................239
● IGMP snooping overview.............................................................................................. 239
● Configuring IGMP snooping.......................................................................................... 243
IGMP overview
Internet Group Management Protocol (IGMP) is a communications protocol that allows hosts and
routers to establish group memberships, and is an integral part of IP multicast. This chapter does not
address all aspects of IGMP, but rather focuses on the snooping mechanism, as described below. For
additional commands that support basic IGMP configuration, refer to Using additional IGMP commands
on page 244.
NOTE
"Multicast group memberships" means that at least one member of a multicast group on a given
attached network is available.
There are two ways that hosts join multicast routing groups:
Maximum number of IGMP This metric is based on the available hardware resources, such as multicast
groups supported group ID (MGID), configuration replay, and Ethernet Name Server (eNS)
distribution bandwidth.
Maximum number of VLANs This metric is limited by the general-query packet-generation capacity of IGMP
supported with IGMP snooping software processes running on the switch, as well as by eNS distribution
configuration bandwidth.
Maximum IGMP packet- The scalability number described by this metric suggests the upper limit on the
processing rate per switch number of packets that can be processed by IGMP software processes running
on the switch. If the packets are incoming from multiple ports/VLANs, the same
processing bandwidth is shared.
Maximum IGMP packet- This metric specifies the upper limit on the maximum rate of IGMP packets
processing rate per Brocade incoming to a logical Brocade VCS Fabric switch. It is limited by the eNS
VCS Fabric cluster distribution bandwidth and the number of nodes in the Brocade VCS Fabric
cluster.
Maximum number of IGMP groups supported 6000 Join requests are sent on four ports
of the same switch.
Maximum number of IGMP groups supported 6000 Join requests are sent on four ports
of the same switch.
TABLE 38 IGMP snooping: Brocade VDX 8770-4 and VDX 8770-8 cluster metrics
Maximum number of IGMP groups supported 6000 Join requests are sent on four ports
of the same switch.
NOTE
The IGMP snooping configuration must be the same for all switches in the same VCS Fabric cluster.
For example, if you configure ip igmp snooping enable on VLAN 2 on a VDX switch, you must
configure that same command on VLAN 2 on all VDX switches in the cluster.
NOTE
An IGMP snooping querier cannot be configured on the same interface as a multicast router (mrouter)
interface.
Refer to the Network OS Command Reference for complete information about the commands in this
section.
Use the following procedure to configure the IGMP snooping querier.
1. Enter the configure terminal command to access global configuration mode.
2. Enter the interface command to select the VLAN interface number.
switch(config)# interface vlan 25
3. Activate IGMP querier functionality for the VLAN.
The valid range is 1 to 18000 seconds. The default is 125 seconds.
switch(config-vlan-25)# ip igmp query-interval 125
or
switch# show ip igmp snooping mrouter interface vlan 10
5. When you have reviewed the IGMP statistics for the switch, refer to Configuring IGMP snooping on
page 243 or Configuring IGMP snooping querier on page 243 to make any needed corrections.
NOTE
Refer to the Network OS Command Reference for additional information on IGMP CLI commands.
Command Description
ip igmp immediate- Removes a group from the multicast database. Use this command to treat the interface as
leave if it had one multicast client, so that a receipt of a Leave Group request on the interface
causes the group to be immediately removed from the multicast database.
Command Description
ip igmp snooping Deactivates or reactivates on a VLAN the flooding of unregistered multicast data traffic on
restrict-unknown- IPv6 MLDv1 snooping-enabled VLANs.
multicast
ip igmp static- Configures the static group membership entries for a specific interface.
group
NOTE
802.1x port authentication is not supported by LAG (Link Aggregation Group) or interfaces that
participate in a LAG.
NOTE
The EAP-MD5, EAP-TLS, EAP-TTLS and PEAP-v0 protocols are supported by the RADIUS server and
are transparent to the authenticator switch.
Configuring authentication
The radius-server command attempts to connect to the first RADIUS server. If the RADIUS server is
not reachable, the next RADIUS server is contacted. However, if the RADIUS server is contacted and
the authentication fails, the authentication process does not check for the next server in the sequence.
Perform the following steps to configure authentication.
1. Enter the configure command to change to global configuration mode.
switch# configure
2. Use the radius-server command to add RADIUS to the switch as the authentication server. This
command can be repeated for additional servers. However, this command moves the new RADIUS
server to the top of the access list.
switch(config)# radius-server host 10.0.0.5
3. Enable 802.1x authentication globally
switch(config)# dot1x enable
4. Use the interface command to select the interface port to modify.
switch(config)# interface tengigabitethernet 5/1/12
5. Use the dot1x authentication command to enable 802.1x authentication.
switch(conf-if-te-5/1/12)# dot1x authentication
6. Return to privileged EXEC mode.
switch(conf-if-te-5/1/12)# end
7. Enter the copy command to save the running-config file to the startup-config file.
switch# copy running-config startup-config
This example shows how to enable a readiness check on a switch to query a port. It also shows the
response received from the queried port verifying that the device connected to it is 802.1x-capable:
switch# dot1x test eapol-capable interface gigabitethernet 5/0/13
DOT1X_PORT_EAPOL_CAPABLE:DOT1X: MAC 00-01-02-4b-f1-a3 on gigabitethernet5/0/13 is
EAPOL capable.
NOTE
While you are free to modify the timeout values, Brocade recommends that you leave all timeouts set to
their defaults.
To configure 802.1x timeout attributes on a specific interface port, perform the following steps from
privileged EXEC mode. Repeat this task for each interface port you wish to modify.
1. Enter the configure command to change to global configuration mode.
switch# configure
2. Use the interface command to select the interface port to modify.
switch(config)# interface tengigabitethernet 5/1/12
3. Configure the dot1x timeout interval.
switch(conf-if-te-5/1/12)# dot1x timeout supp-timeout 40
4. Return to privileged EXEC mode.
switch(conf-if-te-5/1/12)# end
5. Save the running-config file to the startup-config file.
switch# copy running-config startup-config
NOTE
This type of random sampling provides estimated flow rates, but not perfect accuracy.
sFlow global configurations for All are supported All are supported
enabling sFlow, polling interval,
collector, and sample rate
sFlow data source interface Supports 1-Gbps, 10-Gbps, and 40- Supports 10-Gbps interfaces only
Gbps interfaces
sFlow data source: Front port trunks Not supported Not supported
and VLANs
sFlow scanning for inbound, Supports inbound only Supports inbound only
outbound, or both directions on a port
sFlow counter polling support on per- Supports only per-port counter polling Supports only per-port counter
port, per-VLAN, or per-trunk basis polling
Multiple collector configuration A maximum of five collectors can be A maximum of five collectors can
configured. be configured.
Subagent-ID Filled with slot number of the interface Filled with a zero (0)
Sample rate calculation Dropped packets (such as errors and Dropped packets (such as errors
ACL dropped packets) are not counted and ACL dropped packets) are
for the calculations used for sample counted for the calculations used
generation for sample generation
Flow-based sFlow
Flow-based sFlow is used to analyze a specific type of traffic (flow based on access control lists, or
ACLs). This involves configuring an sFlow policy map and binding it to an interface.
To configure sFlow globally, perform the following steps in global configuration mode.
1. Enter the configure terminal command to change to global configuration mode.
switch# configure terminal
2. Globally enable the sFlow protocol.
switch(config)# sflow enable
3. Designate the IP address (up to five addresses) for the sFlow collector server. Optionally, you can
designate the port number.
NOTE
Both IPv4 and IPv6 addresses are supported. However, each address must be entered individually
by means of a separate sflow collector command.
switch(config)# sflow collector 10.10.138.176 6343
switch(config)# sflow collector fd00::1900:4545:3:200:f8ff:fe21:67cf port 6343
switch(config)# sflow collector fd00::200:f8ff:fe21:67cf
4. Set the sFlow polling interval (in seconds).
switch(config)# sflow polling-interval 35
5. Set the sFlow sample-rate.
switch(config)# sflow sample-rate 4096
6. Return to privileged EXEC mode.
switch(config)# end
7. Confirm the sFlow configuration status by using the show sflow or show sflow all commands.
switch# show sflow
sFlow services are: enabled
Global default sampling rate: 32768 pkts
Global default counter polling interval: 20 secs
Collector server address Number of samples sent
------------------------ --------------------------------
fd00::1900:4545:3:200:f8ff:fe21:67cf 0
fd00::200:f8ff:fe21:67cf 0
10.10.138.176 0
NOTE
When sFlow is enabled on an interface port, it inherits the sampling rate and polling interval from the
global sFlow configuration.
1. Enter the interface command to specify the DCB interface type, the RBridge ID, and the slot/port
number.
switch(config)# interface tengigabitethernet 22/0/16
2. Configure the sFlow polling interval.
switch(conf-if-te-22/0/16)# sflow polling interval 35
3. Use the sflow enable command to enable sFlow on the interface.
switch(conf-if-te-22/0/16)# sflow enable
4. Set the sFlow sample-rate.
switch(conf-if-te-22/0/16)# sflow sample-rate 8192
5. Confirm the sFlow configuration status on the specified interface.
switch# show sflow interface tengigabitethernet 22/0/16
NOTE
Disabling sFlow on the interface port does not completely shut down the network communication on the
interface port.
To disable sFlow on a specific interface, perform the following steps in interface configuration mode.
1. Disable the sFlow interface.
switch(conf-if)# no sflow enable
2. Return to privileged EXEC mode.
switch(conf-if)# end
3. Confirm the sFlow configuration status on the specific interface.
switch# show sflow interface tengigabitethernet 5/0/12
NOTE
The chassis virtual IP address is configured by means of the chassis command in RBridge ID
configuration mode. The IP address of the local Management Module is configured by means of the
interface management command in global configuration mode. By default, sFLow uses the chassis
virtual IP address as the source of sFLow packets.
The following illustrates the use of the sflow source-ip command options.
1. Enter global configuration mode.
device# config
device(config)#
2. Use the chassis-ip keyword to specify the virtual IP address of the chassis as the source of the
sFlow packets.
device(config)# sflow source-ip chassis-ip
3. Alternatively, use the mm-ip keyword to specify the IP address of the local Management Module as
the source of the sFlow packets.
device(config)# sflow source-ip mm-ip
4. Do the following to verify the results of the above command.
device(config)# do show running-config sflfow
sflow enable
sflow source-ip mm-ip
5. Once a source type is specified, you can use the no sflow source-ip command to revert to the
default configuration.
NOTE
Use the do show running-config sflow command in this configuration mode to confirm the
configuration.
device(config)# no sflow source-ip
device(config)# do show running-config sflow
sflow enable
NOTE
The "deny ACL" rule is not supported for flow-based sflow. Only the permit action is supported.
1. Create an sFlow profile. Be sure to specify the sampling-rate as a power of 2.
switch(config)# sflow-profile profile1 sampling-rate 256
2. Create a standard MAC ACL.
switch# mac access-list standard acl1
switch(conf-macl-std)# permit any
3. Create a class map and attach the ACL to the class map.
switch(conf-macl-std)# class-map class1
switch(config-classmap)# match access-group acl1
4. Create a policy map and attach the class map to the policy map.
switch(config-classmap)# policy-map policy1
switch(config-policymap)# class class1
5. Use the map command to add an sFlow profile name.
This example assigns the profile name "profile1."
switch(config-policymap-class)# map sflow profile1
6. Switch to interface configuration mode.
switch(config-policymap-class)# exit
switch(config)# interface ten 1/8/1
switch(conf-if-te-1/8/1)#
7. Bind the policy map to an interface.
switch(conf-if-te-1/8/1)# service-policy in policy1
NOTE
Disabling sFlow on an interface port does not completely shut down the network communication on the
interface port.
1. Disable the sFlow interface.
switch(conf-if)# no sflow enable
2. Return to privileged EXEC mode.
switch(conf-if)# end
3. Switch to interface configuration mode.
switch(config-policymap-class)# exit
switch(config)# interface ten 1/8/1
switch(conf-if-te-1/8/1)#
4. Disable flow-based sFlow by removing the policy map.
switch(conf-if-te-1/8/1)# no service-policy in
5. Confirm the sFlow configuration status on the specific interface.
switch# show sflow interface tengigabitethernet 1/8/1
NOTE
Sampling rates must be a power of 2. The default sampling rate is 32768 packets.
2. In global configuration mode, configure a VXLAN overlay gateway.
switch(config)# overlay-gateway gateway1
switch(config-overlay-gw-gateway1)#
3. In VXLAN overlay-gateway configuration mode, use the sflow remote-endpoint command with the
profile name to specify the IPv4 address of a tunnel endpoint and add a VLAN.
switch(config-overlay-gw-gateway1)# sflow profile1 remote-endpoint 10.10.20.31 any
vlan add 2000
4. Alternatively, you can specify all tunnel endpoints and a range of VLANs.
switch(config-overlay-gw-gateway1)# sflow profile1 remote-endpoint any vlan add
2000-3000
RSPAN
Remote SPAN, or RSPAN, extends SPAN by enabling remote monitoring of multiple switches across
your network. The traffic for each RSPAN session is carried over a user-specified RSPAN VLAN that is
dedicated for that RSPAN session in all participating switches. The SPAN traffic from the sources is
copied onto the RSPAN VLAN and then forwarded over trunk ports that are carrying the RSPAN VLAN
to any RSPAN destination sessions monitoring the RSPAN VLAN.
NOTE
RSPAN is supported only on Brocade VDX 8770, VDX 6740, and VDX 6940 series platforms.
RSPAN consists of an RSPAN source interface and an RSPAN VLAN. The configured source port is
mirrored to the RSPAN VLAN and the ports that are members of this VLAN receive the mirrored traffic.
All participating switches must be trunk-connected at Layer 2, and the remote VLAN must be configured
on all the switches participating in the RSPAN session.
NOTE
A SPAN session consists of either a single egress port, a single ingress port, or both.
VDX 8770 series 8 per port group, 48 per line No sharing needed (8 ports 48 per box, 512 per VCS
card, 48 per chassis support 8 sessions)
Brocade recommends that you be aware of the following additional standard guidelines for and
limitations of SPAN connections:
• If there is congestion at the ingress span queue resulting from bandwidth-related back pressure at
the ISL, the SPAN mirrored packets will be dropped and traffic will be lost.
• FCoE mirroring is not supported.
• For the traffic flowing across the switch, if the source port is in unknown mode (the node is in Layer
2 or Layer 3), then the untagged packets are dropped.
• The mirror port should not be configured to carry normal traffic.
• A port cannot be made a destination port for bidirectional mirroring if a different port supported by
that ASIC is already configured as destination port for any type of mirroring.
• If a port is configured as a destination port for bidirectional mirroring, no other port supported by that
ASIC can be made a destination port for any type of mirroring.
• The destination mirror port can handle from 1 to 40 Gbps (line rate) worth of mirror traffic,
depending on the capability of the destination port. If multiple ports, or both flows on the same port,
are mirrored to the same destination mirror port, then only the destination port’s capacity worth of
mirror traffic is mirrored and the remaining traffic is ignored.
• If the source port receives burst traffic and the destination mirror port cannot handle all the bursts,
some of the burst traffic is not mirrored.
• Mirroring of Inter-Switch Link (ISL) ports is supported, but the destination port should reside on the
same RBridge.
• Mirroring of LAG or port-channel interfaces is not supported, but LAG members can be mirrored.
• TRILL ports cannot be designated as a destination port.
• TRILL ports can be a source port, but mirroring is restricted to the port local to the source node
ports.
• Ethernet Pause frames are not mirrored.
• Mirroring of trunk port is not supported, although the ASIC supports the mirroring of a trunk. To
mirror a trunk, you must individually enable mirroring on all member ports.
• The multicast and broadcast statistics are correctly updated on TX ports for mirrored traffic.
• All commands except for shutdown and no shutdown are blocked on a destination mirror port.
• The interface counters are cleared when a port is successfully designated as a destination mirror
port.
• The show interface command hides the Receive Statistics and Rate Info (Input) information for a
destination mirror port.
• The MTU of a port should be set to the default value of 2500 bytes before it is made a destination
mirror port. When the port is successfully designated as the destination mirror, the MTU of that port is
automatically set to the maximum value of 9216 bytes. When the port becomes a non-destination
mirror, the MTU is restored to the default value.
• Port mirroring is supported on any physical front-end user-configurable port. The source port can be
part of a LAG, VLAG, VLAN, or any other user configuration
• A maximum of 512 mirror sessions are supported in logical chassis cluster and fabric cluster modes.
A mirror session consists of either a single egress port, a single ingress port, or both.
Basic considerations
The following table lists the number of RSPAN sessions with and without a shared destination port, as
well as the number of SPAN sessions for both fabric-wide and VCS SPAN, with no sharing of the
destination port.
VDX 8770 series 8 per port group, 48 per line No sharing needed (8 ports 48 per box, 512 per VCS
card, 48 per chassis support 8 sessions)
Brocade recommends that you be aware of the following additional standard guidelines for and
limitations of RSPAN connections:
• All participating switches must be connected by Layer 2 trunks.
• Inter-Switch Link (ISL) mirroring is not supported on RSPAN.
• The source and destination ports cannot both be TRILL (ISL) ports.
• RSPAN supports multi-hop.
• RSPAN can support both the fabric cluster and logical chassis cluster modes. However, using
RSPAN in logical chassis cluster mode uses unnecessary ISL bandwidth because it floods the traffic
on the ISL as well as the trunk port.
• If the source port is not Layer 2 and untagged traffic is mirrored, it will be dropped for RSPAN
because untagged and unclassified traffic is dropped on an ISL trunk.
• On the Brocade VDX 6740 series platforms, if source port is in unknown mode, that is neither Layer
2 nor Layer 3, the packets are dropped and are not mirrored.
• Ethernet Pause frames are not mirrored.
VLAN considerations
• Before you configure an RSPAN session, you must create the RSPAN VLAN.
• A native VLAN cannot be made the RSPAN VLAN.
• The VLAN used for RSPAN should not be used for other purposes; furthermore, if the VLAN has
ports as its members, it cannot be made an RSPAN VLAN. Only when the session is deconfigured,
and the VLAN is deleted as an RSPAN VLAN, should the VLAN number be used for another
purpose.
• You can configure any VLAN as an RSPAN VLAN as long as all participating network devices
support the configuration of RSPAN VLANs and you use the same RSPAN VLAN for each RSPAN
session in all participating network devices.
• You must configure the RSPAN VLANs on all source, intermediate, and destination network
devices.
• Do not configure any ports in an RSPAN VLAN except the ports selected to carry RSPAN traffic.
However, all configurations are allowed on the RSPAN destination port.
• The vlan-id of the packets marked for RSPAN will change to the RSPAN vlan-id.
• Access ports can be added to an RSPAN VLAN as destination ports.
• MAC address learning is disabled in the RSPAN VLAN.
Configuring SPAN
Refer also to Standard SPAN guidelines and limitations on page 262.
NOTE
If the following error is displayed, use the lldp disable command in interface subtype configuration
mode to disable LLDP on the destination port before preceding: % Error: Destination port
cannot be in L2/L3/Qos/ACL/802.1x/LAG member/Lldp/Port-profile/non-
default-MTU.
3. Optional: Use the description command to add a label to the monitor session.
switch(config-session-1)# description Hello World!
4. Optional: Repeat steps 1 and 2 as needed for additional ports.
A monitor session can have only one source port. For additional ports you must create additional
monitor sessions as needed for additional port mirroring sessions.
NOTE
If the following error is displayed, use the interface no lldp command to disable LLDP on the
destination port before preceding: % Error: Destination port cannot be in
L2/L3/Qos/ACL/802.1x/LAG member/Lldp/Port-profile/non-default-MTU.
3. Optional: Use the description command to add a label to the monitor session.
switch(config-session-1)# description Hello World!
4. Optional: Repeat steps 1 and 2 as needed for additional ports.
A monitor session can have only one source port. For additional ports you must create additional
monitor sessions as needed for additional port mirroring sessions.
NOTE
One of the following error messages may appear. If so, use the interface no lldp command to disable
LLDP on the destination port before preceding.
• % Error: Destination port cannot have LLDP configuration on it.
• % Error: Destination port cannot be in L2/L3/Qos/ACL/802.1x/LAG member/Lldp/Port-profile/non-
default-MTU.
3. Optional: Use the description command to add a label to the monitor session.
switch(config-session-1)# description Hello World!
4. Optional: Repeat steps 1 and 2 as needed for additional ports.
A monitor session can have only one source port. For additional ports you must create additional
monitor sessions as needed for additional port mirroring sessions.
Configuring RSPAN
Refer also to RSPAN guidelines and limitations on page 263.
The principal difference between configuring SPAN and RSPAN is that RSPAN requires a remote
VLAN to be created first, by means of the rspan-vlan command. This example demonstrates the
configuration of a bidirectional RSPAN.
1. Create a remote VLAN on the destination interface.
switch(config)# interface vlan 100
2. Execute the rspan-vlan command to make the VLAN remote.
switch(config-vlan-100)# rspan-vlan
3. Exit the VLAN configuration mode.
switch(config-vlan-100)#end
4. Open a monitor session and assign a session number
switch(config)# monitor session 1
5. Configure the source port and the destination port, with the both parameter for bidirectional port
mirroring.
By modifying the direction parameter, you can control whether this is an ingress, egress, or a
bidirectional SPAN.
In the case of RSPAN, the destination is the VLAN, instead of a destination interface.
switch(config-session-1)# source tengigabitethernet 1/0/15 destination rspan-vlan
100 direction both
6. Optional: Use the description command to add a label to the monitor session.
switch(config-session-1)# description Hello World!
7. Use the switchport command to add a port to the RSPANVLAN to access the mirrored packets.
switch(config-session-1)# exit
switch (config)# interface ten 1/0/15
switch(conf-if-te-1/0/15)# switchport access rspan-vlan 100
8. Display the results of the configuration.
switch(conf-if-te-1/0/15)# do show vlan rspan-vlan
Mac1 will be duplicated and sent to port te1/0/2. No mirroring occurs for traffic originating from source
Mac2.
Consider the following guidelines and restrictions for flow-based SPAN and RSPAN:
• Flow-based SPAN source port cannot be an ISL port.
• Bi-directional association of the service policy cannot be supported with the current infrastructure.
You must apply the service policy in both directions in two separate commands.
• Port-based or VXLAN-based SPAN sessions cannot be specified as the SPAN action.
• Deny rules in an service ACL is a pass through in flow-based QoS. Only permit rules with SPAN
action result in flow-based SPAN.
• If a rule is configured as permit in flow-based ACL with SPAN action and the same rule is configured
as deny in a user policy, the packet is dropped as per the user policy and the same is mirrored to the
SPAN destination port.
• In a class map, if the SPAN action co-exists with any other QoS action (such as DSCP marking
which results in frame editing), the mirrored packet is the original packet and hence does not reflect
the frame editing done, as per the QoS action.
NOTE
Remote ports are supported for RSPAN. Use the rspan vlan_id variable to configure for RSPAN.
switch(config)# destination rspan 100
4. Activate the pre-defined policy map.
switch(config)# policy-map policymap
5. Activate the pre-defined class for the policy map.
switch(config-policymap)# class policyclass
6. Activate the span session and assign it an identifying number.
switch(config-policyclass)# span session 1
7. Return to global configuration mode by executing the exit command twice.
switch(config-policyclass)# exit
switch(config-policymap)# exit
switch(config)#
8. Enter configuration mode for the source interface.
switch(config)#interface ten 1/0/1
9. Bind the policy to the interface.
switch(conf-te-1/0/1)# service-policy in policyclass
10.Confirm the session with the show monitor command.
switch# show monitor
Session : 1
Type : Remote source session
Description : [None]
Session Type: Flow based
The following table lists the ToR platforms that support dynamic breakout only, as well as the breakout-
capable ports and the currently supported configuration.
Te 3/2/1:2
Te 3/2/1:3
Te 3/2/1:4
NOTE
The TX Power Field in the show media command is not supported by the 40G optics.
• LED state
For Brocade VDX 6740 series platforms, the LED state for a breakout interface is deterministic. For
all other supported platforms, the LED state for a breakout interface is not deterministic.
In addition, the 27x40G line card supports nine port groups of three ports each that you can configure
for Performance or Density operating modes. If a port group is configured for Performance mode, the
first two ports in a group are enabled in Performance mode, but the third port is disabled. If a port group
is set for Density mode, all three ports operate in Density mode. Breakout mode can be configured only
on ports enabled for Performance mode.
For more information on these modes, line card port groups, and instructions for configuring
Performance mode on port groups, refer to the following sections in the Brocade VDX 8770-4 Hardware
Reference Manual or Brocade VDX 8770-8 Hardware Reference Manual:
• 27x40 GbE operating modes
• Configuring operating modes on 27x40 GbE line cards
The following sections detail the effects of dynamic breakout and unbreakout, as well as special
considerations for logical chassis cluster and fabric cluster modes.
NOTE
The interface and its current configuration will still exist in the configuration, as revealed by a show
running-config command, but operational commands will not show interfaces on this line card.
2. Enter hardware configuration mode.
device# configure terminal
device(config)# hardware
3. Enter connector configuration mode for the port you wish to break out.
device(config-hardware)# connector 2/2/1
4. Execute the sfp breakout command. For example, to break out a 40G port into four 10G ports you
would use the following example.
device(config-connector-2/2/1)# sfp breakout
NOTE
Existing interfaces under the previous mode are removed, along with their associated configurations.
If the target port is a QSFP, one FortyGigabitEthernet interface is deleted. The configurations of
nontarget ports are not affected.
5. (Optional) You can also apply the command to a range of ports, or apply a comma delimiter, as in the
following example.
device(config-hardware)# connector 2/2/1-3,5
device(config-connector-2/2/1-3,5)# sfp breakout
NOTE
The interfaces under the new mode are not created yet; they are created only when the line card is
powered back on.
6. In fabric cluster mode, copy the running configuration to the startup configuration.
device# copy running-config startup-config
7. Use the power-on linecard command to power the line card back on.
device# power-on linecard 2
NOTE
The SFP interfaces come up under the new mode, with default configurations. Unaffected interfaces
retain the configurations they had before the line card was powered off.
8. Execute the do show running-config hardware connector command to confirm the breakout.
device(config-connector-2/2/1)# do show running-config hardware connector
hardware
connector 2/2/1
sfp breakout
!
9. To unbreakout a connector and revert to the previous configuration, use the no sfp breakout
command as in the following example. You must power off and power on the line card as in the
previous steps.
device(config-connector-2/2/1)# no sfp breakout
NOTE
Four TenGigabitEthernet interfaces are deleted.
NOTE
The interface comes up in the "no shut" state. You do not need to reboot the system.
5. (Optional) You can also apply the command to a range of ports, or apply a comma delimiter, as in
the following example.
device(config-hardware)# connector 2/2/49-50,52
device(config-connector-2/2/49-50,52)# sfp breakout
6. Execute the do show running-config hardware connector command to confirm the breakout.
device(config-connector-2/2/49)# do show running-config hardware connector
hardware
connector 2/2/49
sfp breakout
!
7. You can also confirm the entire configuration by using the show ip interface brief command.
switch# show ip int br
Interface IP-Address Vrf Status
Protocol
========================== ========== ================ =========
=========
FortyGigabitEthernet 2/2/50 unassigned default-vrf up down
FortyGigabitEthernet 2/2/51 unassigned default-vrf up down
FortyGigabitEthernet 2/2/52 unassigned default-vrf up down
TenGigabitEthernet 2/2/1 unassigned default-vrf up up (ISL)
TenGigabitEthernet 2/2/2 unassigned default-vrf up down
TenGigabitEthernet 2/2/3 unassigned default-vrf up down
TenGigabitEthernet 2/2/47 unassigned default-vrf up down
TenGigabitEthernet 2/2/48 unassigned default-vrf up down
TenGigabitEthernet 2/2/49:1 unassigned default-vrf up down(ISL)
TenGigabitEthernet 2/2/49:2 unassigned default-vrf up down(ISL)
TenGigabitEthernet 2/2/49:3 unassigned default-vrf up down(ISL)
TenGigabitEthernet 2/2/49:4 unassigned default-vrf up down(ISL)
Vlan 1 unassigned administratively down down
Vlan 4093 unassigned up down
Vlan 4095 unassigned administratively down down
8. To unbreakout a connector and revert to the previous configuration, first ensure that the breakout
ports are administratively down, and then use the no sfp breakout command on the connector, as
in the following example.
NOTE
Four TenGigabitEthernet interfaces are deleted. The 40G interface is created automatically with a
default configuration in the "no shut" state.
NOTE
You cannot reserve a subinterface.
2. To release the interface, use the release keyword.
device(config)# dpod 2/2/49 release
● FlexPort overview..........................................................................................................277
● Configuring FlexPort..................................................................................................... 278
● FlexPorts and breakout mode....................................................................................... 279
● Configuring FlexPorts for breakout mode..................................................................... 279
FlexPort overview
The FlexPort feature allows up to 32 ports to transmit data as either 10G Ethernet or Fibre Channel,
and to be changed from one type to the other without requiring a reboot. These ports are grouped
together as connector groups.
Connector groups share common speed and protocol type properties. The settings allow any port within
each connector group to operate as either Ethernet or Fibre Channel ports, and support the appropriate
optic transceivers. The Fibre Channel ports must be running any supported 8-Gbps or 16-Gbps
Brocade FC transceivers.
The default setting is for Ethernet, and ports that do not support the Fibre Channel protocol are not
allowed to have their connector group setting changed from the default setting.
Speed combinations allowed per connector-group are:
• LowMixed - 2/4/8G Fibre Channel, and Ethernet speeds (default)
• HighMixed - 16G Fibre Channel, and Ethernet speeds
• FibreChannel - 2/4/8/16G Fibre Channel (Only if all eight ports are already set as Fibre Channel
type)
For the currently supported platforms, the connector-group numbers range from 1 through 6. They are
related directly to the ports as numbered on each platform. The connector-group numbers that are
allowed to be changed and their associated port numbers are shown in the table below. For example,
on a Brocade VDX 2740, ports 43 through 50 belong to connector group 1. Not every connector group
is supported on a switch.
ATTENTION
Changing connector-group speed is disruptive to ports within the same connector-group.
NOTE
For the Brocade VDX 6740T and Brocade VDX 6740T-1G, Ethernet operation is supported on 40-GbE
QSFP ports configured in 40-GbE mode that use qualified 40-GbE transceivers and on 40-GbE ports
in 4x10 GbE breakout mode that use qualified 4x10-GbE QSFP transceivers. Fibre Channel operation
is supported on 40-GbE ports configured in 40-GbE breakout mode that use qualified 4x16 QSFP+
transceivers. FlexPort is not supported on 40-GbE QSFP ports on the Brocade VDX 6740.
Only Brocade-branded SFPs are supported. While all 2/4/8/16G Brocade-branded SFPs are allowed
for Brocade engineering purposes, only the five SFPs listed below are qualified and supported:
• 8G SWL
• 8G LW-10KM
• 8G ELWL-25KM
• 16G-SWL
• 16G-LW-10KM
Configuring FlexPort
The FlexPort feature allows up to 32 ports to transmit either Ethernet or Fibre Channel.
The FlexPort feature is set to Ethernet by default. You should only need to perform this task to switch
to Fibre Channel, or back to Ethernet.
1. Enter hardware configuration mode.
switch(config)#hardware
switch(config-hw)#
2. Enter FlexPort configuration mode for the switch. This command configures FlexPort 5 on RBridge
ID 1. FlexPort 5 is part of connector group 1 on the Brocade VDX 6740.
switch(config-hw)# flexport 1/0/5
switch(conf-hw-flex-1/0/5)#
3. Set the FlexPort type to Fibre Channel.
switch(conf-hw-flex-1/0/5)# type FibreChannel
4. Optionally, you may adjust the speed for the connector group. For example, if you want the
connector group 1 to function at 16Gbps speed:
switch(conf-hw-flex-1/0/5)# connector-group 1/0/1
switch(config-connector-group-1/0/1)# speed HighMixed
5. Repeat these steps for additional switches as needed.
6. Confirm the FlexPort configuration with the show running-config hardware flexport command.
switch# show running-config hardware flexport
Hardware
flexport 1/0/1
type FibreChannel
!
Hardware
flexport 1/0/5
type FibreChannel
!
connector-group 1/0/1
speed HighMixed
!
NOTE
A 40G license is not required to enable breakout Fibre Channel FlexPorts.
FlexPort requires the QSFP port to be configured in breakout mode.
Restrictions on FlexPorts in breakout mode:
• Fibre Channel SFP+ ports can operate at 2G, 4G, 8G and 16G speeds.
• Fibre Channel QSFP+ ports can operate at 4G, 8G and 16G.
type FibreChannel
!
Hardware
flexport 1/0/49:1
type FibreChannel
!
connector-group 1/0/7
speed HighMixed
!
LST overview
Link-state tracking (LST) is a relationship that you can configure and enable for redundant-link
networking topology, to prevent traffic loss between upstream and downstream RBridge links.
Redundant-link topology
In a redundant-link topology, an alternate, standby network path is defined. If the primary, active path
becomes unavailable, network traffic is rerouted to the standby path.
The following is a basic redundant-link topology:
The primary path from the NICs of Server1 to Router1 is through RBridge1, and the alternate path is
through RBridge2.
The primary path from the NICs of Server2 to Router1 is through RBridge2, and the alternate path is
through RBridge1.
Redundant-link topology can include the following options:
• Links can be any of the following types:
‐ Single physical port
‐ Multiple physical ports
‐ Port-channels
• VCS fabrics can be in place of or in addition to the individual RBridges. For more details, refer to
VCS redundant-link topology on page 287.
If an upstream device stops functioning, there is a danger that the RBridge will continue to forward
traffic upstream on the primary path, with ensuing loss of data.
LST operation
When link-state tracking (LST) is enabled, if an upstream link goes down, the downstream link
automatically shuts down. At that point, server traffic is routed through the standby path, with
negligible traffic loss. If the primary upstream link returns, LST restores the primary downstream link
and reroutes the upstream traffic through the primary path.
The following upstream issues are among those that LST can handle:
NOTE
When considering the number of uplinks or downlinks, a port-channel is equivalent to a physical port.
1 n If the number of functioning uplinks < min-link, LST shuts the downlink.
n n If the number of functioning uplinks < min-link, LST shuts all downlinks.
NOTE
If needed, refer also to LST configuration guidelines under VCS on page 288.
3. For each uplink interface that you want to track, enter the track interface command.
device(conf-if-te-3/0/8)# track interface ethernet 3/0/18
device(conf-if-te-3/0/8)# track interface port-channel 1
4. To modify the default behavior (the downlink shuts down if any of the uplinks go down), enter a track
min-link command.
device(conf-if-te-3/0/8)# track min-link 1
In this case, the downlink shuts down only if all of the uplinks are down. If only one of the two uplinks
are down, the downlink stays open.
5. Enter the track enable command to enable tracking.
device(conf-if-te-3/0/8)# track enable
The primary path from the NICs of Server1 to Router1 is through VCS1, and the alternate path is
through VCS2.
The primary path from the NICs of Server2 to Router1 is through VCS2, and the alternate path is
through VCS1.
NOTE
Refer also to General configuration guidelines for LST on page 283.
• In a VCS cluster, only local RBridge uplinks and downlinks are supported for LST; remote ports
(even within the same VCS) are not supported.
• In a VCS cluster, only Ethernet FlexPorts are supported for LST. Fibre channel FlexPorts are not
supported.
1. Log in to the independent RBridge and enter configure to access global configuration mode.
device# configure
2. Enter the interface command to access the downlink interface.
device(config)# interface tengigabitethernet 3/0/1
3. Enter the track interface command for the VCS principal RBridge.
device(conf-if-te-3/0/1)# track interface port-channel 30
4. To enable tracking of the VCS from the independent RBridge, enter the track enable command.
device(conf-if-te-3/0/1)# track enable
5. Log out of the independent RBridge.
device(conf-if-te-3/0/1)# end
device# exit
6. Log in to the VCS principal RBridge and enter configure to access global configuration mode.
device# configure
7. Enter the interface command to access the downlink interface.
device(config)# interface port-channel 1
8. For each uplink interface that you want to track, enter the track interface command.
device(config-port-channel-1)# track interface ethernet 1/0/10
device(config-port-channel-1)# track interface ethernet 2/0/11
9. To modify the default behavior under multiple uplinks on VCS RBridges (the downlink shuts down if
any of the uplinks go down), enter a track min-link command.
device(config-port-channel-1)# track min-link 1
In this case, the downlink vLAG member port on RBridge1 shuts down only if Uplink1 goes down.
Similarly, the downlink vLAG member port on RBridge2 shuts down only if Uplink2 goes down.
10.Enter the track enable command to enable tracking.
device(config-port-channel-1)# track enable
Disabling LST
Use this procedure to disable link-state tracking on an interface, either partially or completely.
1. Enter configure to access global configuration mode.
device# configure
2. Enter the interface command to access the downlink interface.
device(config)# interface tengigabitethernet 1/0/1
3. To disable uplink tracking, perform one of the following:
• To remove a specific uplink from tracking, enter the no track interface command
device(conf-if-te-1/0/1)# no track interface ethernet 1/0/20
• To disable tracking of all uplinks from this interface, enter the no track enable command.
device(conf-if-te-1/0/1)# no track enable
show running-config interface <N>gigabitethernet Displays configuration information about one or all
device interfaces of a specific capacity. Replace
<N>gigabitethernet with the desired operand (for
example, tengigabitethernet). This command also
indicates on which downlinks LST is defined, their
enablement status, and any tracked uplinks.
show track summary Displays LST details for all interfaces on a device.
MAC-move detection
MAC-move detection provides a mechanism to detect too-frequent MAC moves across interfaces in a
device or VCS.
MAC-move detection is disabled by default.
If you enable this feature, you have the option of specifying the MAC-move threshold (the maximum
number of moves allowed within any 10-second window). An interface that exceeds the threshold is
automatically shut down, and a "Repeated MAC-move" RASLog message is generated.
To restore such an interface, you need to enter no shutdown on that interface.
NOTE
For details of MAC-move resolution that does not require entering a restoration command, see
"Administering Edge-Loop Detection."
MAC consistency-check
MAC consistency check provides a mechanism to detect MAC-address inconsistencies across
learning modules and the driver in an RBridge or across RBridges in a VCS.
MAC consistency-check is enabled by default. You have the option of specifying the consistency-
check interval (the number of seconds between consistency checks). If this feature detects MAC-
address inconsistency, it corrects the inconsistent MAC addresses.
NOTE
By default, MAC consistency check is enabled.
1. Enter configure to access global configuration mode.
device# configure
2. To modify the consistency-check interval (default: 300 seconds), enter the mac-address-table
consistency-check interval command.
device(config)# mac-address-table consistency-check interval 500
3. To restore the default consistency-check interval of 300 seconds, enter the no mac-address-table
consistency-check interval command.
device(config)# no mac-address-table consistency-check interval
4. To disable MAC consistency check, enter the mac-address-table consistency-check suppress
command.
device(config)# mac-address-table consistency-check suppress
5. To restore enablement of MAC consistency check, enter the no mac-address-table consistency-
check suppress command.
device(config)# no mac-address-table consistency-check suppress
show ip/ipv6 interface brief Indicates whether an interface was shut down due to
repeated MAC moves.
show mac-address-table consistency-check Displays the operational data for MAC address-table
consistency check.