Ale Switch Cheatsheet
Ale Switch Cheatsheet
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch AOS R8
Bootcamp
DT00CTE220EN
Agenda
1
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Topics
Administration – Class schedule
Course agenda
2
Administration – Class schedule
3
Agenda
Day 1
• Course introduction • Virtual Chassis
‐ Training course agenda & Access to remote lab ‐ Overview
‐ Lab: Virtual chassis (6900 & 6360)
• OmniSwitch R8 - Portfolio Description
‐ Overview • VLANs Management
‐Overview
• AOS OmniSwitch Management ‐Labs : VLAN
‐ Log into the switch
‐ Managing Files/Directories • Basic Switch Management & Diagnostic
‐ Labs :
‐ Overview
‐ Working/Running/Certified Directory
‐ Lab: Switch maintenance and Diagnostics tools
4 ‐ Remote Switch Access
Agenda
Day 2
• Link Aggregation Groups • VRRP
‐ Overview
‐ Overview
‐ Lab : Virtual router redundancy Protocol
‐ Lab : Link Aggregation and 802.1Q
Day 3
• IP interfaces • Graceful Restart
‐ Overview
‐ Overview
6
Agenda
Day 4
• Quality of Service
‐ Overview • Security Network
‐ Lab : Quality of Service ‐Overview Access Guardian
‐Lab : Access Guardian Implementation
• OmniVista 2500 NMS
‐ Overview • Link Layer Discovery Protocol (LLDP)
‐ Lab :Access to the OmniVista 2500 NMS server ‐ Overview
‐Lab : LLDP Implementation
• Flow Based Filtering (ACL)
‐ Overview • Power over Ethernet (PoE)
‐ Lab : Security Network Access Control ‐Overview
7
Agenda
Day 5
• Multicast Introduction
‐ Overview • Ethernet Ring Protection
‐ Lab: IP Multicast switching ‐ Lab - Ethernet Ring Protection
8
AOS – Technical Documentations
OmniSwitch xxxx Series Hardware Users Guide
• Switch hardware components and basic switch hardware
OmniSwitch AOS Switch Management Guide
• Describes basic attributes of the switch and basic switch administration tasks
OmniSwitch AOS Network Configuration Guide
• Describes how to set up and monitor software features that will allow the switch to operate in a live network
environment
OmniSwitch AOS Advanced Routing Configuration Guide
• Describes how to set up and monitor advanced routing protocols for operation in a live network environment
OmniSwitch CLI Reference Guide
• Comprehensive resource to all Command Line Interface (CLI) commands available on the OmniSwitch products
OmniSwitch Transceivers Guide
• Provides specifications and compatibility information SFP/XFP/QSFP/… transceivers supported on the OmniSwitch
switches
9
Internet Ressources
• Alcatel-Lucent Enterprise Web Site
https://www.al-enterprise.com/en
10
Internet Resources
Partners Website ALE Network Equipment
• MyPortal • www.al-enterprise.com/en/products/switches
Spacewalkers Community
• www.spacewalkers.com
11
Datasheets
OmniSwitch Switches (LAN) NMS Solutions
• OmniSwitch 2260 WebSmart switch: datasheet • OmniVista 2500 (on premises) datasheet
• OmniSwitch 2360 WebSmart switch: datasheet • OmniVista Cirrus (cloud) datasheet
• OmniSwitch 6360 LAN switch: datasheet
• OmniSwitch 6465 L2+ Hardened LAN Switch datasheet
• OmniSwitch 6560 L2+ Multigig LAN switch: datasheet
• OmniSwitch 6860 L3 LAN switch with multigig and DPI option datasheet
• OmniSwitch 6865 L3 Hardened Switch datasheet
• OmniSwitch 6900 L3 core switch datasheet
• OmniSwitch 9900 Chassis core switch datasheet
The status switches usually the next Monday after the session has ended.
14
Reach the session evaluation
Directly from the Home page / My Recent Learning activity;
•if “Evaluate” option is viewable, please click on it.
•if “Evaluate” is not proposed, click on “Open Curriculum” and after, on “Evaluate”
15
OmniSwitch R8
Remote lab Connection
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Connection to the Remote-Labs (R-Labs)
Introduction
At the end of this module, you will be able to:
• Describe Remote-Labs (R-Labs) topology
• Connect to a Remote-Lab (R-Lab)
Remote Desktop Connection
2
3
3 1
4
Virtual Machines
• 10 VM (Clients)
• Podx_OV<ov_release>
• OmniVista 2500: 192.168.100.107
• Firewall/NAT server
• Podx_pfSense : 192.168.100.108
DHCP Server
• A DHCP server is running with an IP address of 192.168.100.102 and has the following scopes
(where x stands for the switch number) :
OmniVista 2500 & Internet Access
An OmniVista 2500 server is configured with the IP address 192.168.100.107/24.
https://10.4.pod#.208:8443
WiFi5
AP1201 AP1201H AP122X AP123X AP1251
OmniVista Cirrus
LAN OmniSwitch WAN
OS9900
Core
IP/MPLS
OS6900
7750 SR 7705 SAR
ESR
Access
= hardened / outdoor AP
OmniSwitch LAN Family
Edge
Aggregation
Advanced stackable L2-L3
⚫ Virtual chassis ⚫ Advanced
⚫ 10/100/1000, routing
Routing OmniSwitch 6860E OmniSwitch 6865
10Gig ⚫ Energy
Green energy
Efficient OmniSwitch 6865
⚫ IPv4/IPv6 OmniSwitch 6860N AOS Advanced L3
AOS advanced L3
⚫ PoE, Copper & AOS Advanced L3
fiber
Fiber
Core
High end modular core, aggregation,
Data center switches L2-L3
⚫ High Availability ⚫ VRF
⚫ High ⚫ MPLS, VPLS
Virtual Chassis OmniSwitch 6900
Performance ⚫ Virtualenergy
Green Chassis AOS Advanced L2-L3
OmniSwitch 9900
⚫ 10Gig high ⚫ MC-LAG Modular Chassis
Aggregation/Core
density ⚫ Green energy AOS Advanced L3 10/40 GE
DC TOR 10/25/40/100 GE
⚫ I.S.S.U
Campus Switch Description
OmniSwitch 6360
MAIN CHARACTERISTICS OMNISWITCH 6360
Gigabit Ethernet LAN switch OS6360-(P)10
10, 24, 48 port models (PoE/non-PoE) Model OS6360-(P)10
1G user port models: 8 fixed 10/100/1000 Base-T ports
POE: IEEE 802.2at
Increased Uplink\VFL speeds 2 fixed RJ45 (1G) uplink ports
10GBaseT ports 2 SFP (1G) uplink ports
OS6360-(P)48, (P48X)
Model OS6360-(P)48,
TYPICAL DEPLOYMENT (P48X)
48 fixed 10/100/1000 Base-T ports
POE: IEEE 802.2at
Gigabit Ethernet switch in small networks (P)48 2 RJ45/SFP (1G) combo ports
Provides integrated Voice/Data/Wi-Fi solution P48X 2 RJ45/SFP+ (1/10G) combo
ports
For networks with 1Gig access and 1Gig & 10Gig uplinks 2 SFP+ (1/10G) ports
OmniSwitch 6465
OMNISWITCH 6465
MAIN CHARACTERISTICS Model OS6465-P6 OS6465-P6
4 fixed 10/100/1000 Base-T ports
Compact Hardened Value LAN switch POE+: IEEE 802.2at
HPoE 60W : up to 2 ports
Virtual Chassis: Up to 4 switches in a local or remote stack (up to 10km) 2 x SFP ports
Industrial PoE with HPoE (60W) on all models Stacking ports (2 x SFP)
Supports Cat 5E/6 cabling standards DIN AC Power supplies
Hot-swappable, fully redundant power supplies (AC+AC, AC+DC or DC+DC) OS6465-BPN-H(180W)
Switch Backup & Restore OS6465-BPN (75W)
OS6465-P12
IEEE 1588v2 PTP support Model OS6465(T)-P12
MACSec Support 8 fixed 10/100/1000 Base-T ports
POE+: IEEE 802.2at
Auto-fabric technology HPoE 60W : up to 4 ports
Fanless 2 x SFP ports
Alarm relay Input/Output Stacking ports (2 x SFP)
OS6465T-P12 Extended Temp Ethernet
Basic L3 routing: IPv4 and IPv6 Switch
Operating Temperature -10 to +60 ℃
OS6465T-(P12) Extended Temperature Ethernet Switches DIN AC Power supplies
OS6465-BPN-H(180W)
Perpetual PoE and Fast PoE are now supported on 6465P-12 (8.8R1) OS6465-BPN (75W)
OS6465-P28
Model OS6465-P28
TYPICAL DEPLOYMENT 22 fixed 10/100/1000 Base-T ports
POE+: IEEE 802.2at
HPoE 60W : up to 8 ports
Ruggedized Access switch for: 2 x SFP ports
OS6465T-(P)12
Transportation 4 x SFP+ ports
Traffic control systems Stacking ports (2 x SFP+)
Utilities DIN DC Power supply
IP surveillance systems OS6465-BPRD(180W)
Outdoor installations DIN AC Power supply
OS6465-BPR(180W)
Model OS6560-X10
8 x 10/100/1G Base-X ports
OmniSwitch 6560
2 x QSFP+ 20G stacking ports
Model OS6560-24X4
24 x 10/100/1G Base-T ports
2 x SFP 1G ports
4 x SFP+ 1/10G ports
Model OS6560-P24X4
24 x 10/100/1G Base-T POE+ ports
Model OS6560-48X4
48 x 10/100/1000 Base-T ports OS6560-48X4
Access switch in 10 gigabit converged campus networks 2 x SFP ports
OS6560-P48X4
POE (802.3af/at/bt)
Aggregation for wired and wireless access 4 x SFP+ 10G ports (Stacking/Uplinks)
Carrier and Service Provider Ethernet Access Model OS6560-P48X4
48 x 10/100/1000 Base-T ports
POE (802.3af/at) (Up to 30W on a port)
2 x SFP ports
POE (802.3af/at/bt)
4 x SFP+ 10G ports (Stacking/Uplinks)
OmniSwitch 6860E
Stackable Gigabit Ethernet LAN switch
MAIN CHARACTERISTICS OMNISWITCH 6860E
Stackable Gigabit Ethernet LAN switch Models OS6860(E)-(P)24/48
OS6860(E)-(P)24 (D)
24-port and 48-port models
Up to 264 Gb/s of wire-rate capacity RJ45 and/or PoE+/++ and SFP ports
Advanced L3 routing*: VRF, Multicast, IPv4 and IPv6 4 fixed SFP+ (1G/10G) ports
Up to eight switches in a virtual chassis (local or remote stacking) 2 VFL QSFP+ stacking ports (20G each)
AC power supply
Optional choice of standard or advanced backup power OS6860(E)-(P)48 (D)
Universal Network Profiles: Policy based access Models OS6860(E)-(P)24/48D
Network Analytics and Control (signature based) Same as OS6860(E)-P24/48
Application monitoring enforcement With a DC power supply
RESTful API and OpenFlow for SDN
Models OS6860E-U28
28 x 100/1000 Base-X SFP ports OS6860E-U28 (D)
4 fixed SFP+ (1G/10G)
2 VFL QSFP+ ports (20G each)
AC power supply
Models OS6860E-U28D
TYPICAL DEPLOYMENT Same as OS6860-U28
With a DC power supply
OS6860E-P24Z8
Converged campus networks
Access switch Models OS6860E-P24Z8
Multi-Gig Advanced Access 16 x 100/1000 Base-T POE+ ports
High capacity & high-density wired and wireless access 8 x 2.5G Multi-Gigabit HPoE ports
Distribution switch 4 fixed SFP+ (1G/10G) ports
Data Center 2 VFL QSFP+ ports (20G each)
Top of Rack switch AC power supply
Carrier and Service Provider Ethernet Access
OmniSwitch 6860N OMNISWITCH 6860N
Stackable Gigabit Ethernet LAN switch
OS6860N-P24M
MAIN CHARACTERISTICS OmniSwitch 6860N-P24M
NEW in
R8.8
24 x 100/1/2.5/5/10G, MACec
Secure virtual networks All ports 95W 802.3bt PoE
• SPB, VxLAN*, MPLS* VPNs VC 2 x 20/40/100G
OS6860N-P24Z
• 256-bit MACsec NEW in
• Native Inline routing OmniSwitch 6860N-P24Z
R8.8
12 x 100/1/2.5/5
WiFi 6 Ready 12 x 10/100/1G OS6860N-P48M
PoE 802.3bt 60W, 12 x 1G; 95W 12 x 5G m-gig
• Full Multi-gig Support VC 2 x 20/40/100G
• 95W PoE (802.3bt)
OmniSwitch 6860N-P48M
Next-Gen HW 36 100/1G/2.5G BaseT bt PoE OS6860N-P48Z
• Hi-speed uplinks 12 100/1G/2.5G/5G/10G BaseT bt PoE
2 QSFP28 VFL ports
• 2 x 100G Stacking 1 expansion slot
L2 L2
Features
Non Stackable Stackable
10M/100M/1G 10M/100M/1G
User ports
802.3at support 802.3at support
Stacking No Yes
Traffic Analysis No No
10M/100M/1G/2.5G
10M/100M/1G
User ports 802.3at/bt
802.3at support
95W POE (1 port)
Advanced Security AG, UNP, CP, BYOD AG, UNP, CP, BYOD
AOS L2 & Adv. L3 AOS L2 & Adv. L3 AOS L2 & Basic L3 Chassis with 5
Features
Virtual Chassis, SPB-M Virtual Chassis, SPB-M Stackable line card slots
Static, OSPFv2, OSPFv3, IS-IS Static, OSPFv2, OSPFv3, IS-IS
Routing Full, advanced IP Routing Full, advanced IP Routing
RIP/RIPng, BGP IPv4, IS-IS, RIP/RIPng, BGP
10M/100M/1G/2.5G
10M/100M/1G/2.5G/5G 10M/100M/1G/2.5G/10G
802.3at support 10M/100M/1G/2.5G/10G
User ports 802.3bt support 40G/100G
60W POE+ on 4 ports (E) 40G/100G
60W POE+ on 4 ports (E) 802.3at/bt
75W HPOE 8 ports (P24Z8)
Uplinks 10 Gbps 10 Gbps 10/40/100 Gbps 10/40/100 Gbps
Stacking 80 Gbps links 100 Gbps links 10/40/100 Gbps links 2x40 Gbps links
Advanced Security AG, UNP, CP, BYOD AG, UNP, CP, BYOD MACsec AG, UNP, CP, BYOD AG, UNP, CP, BYOD, MACsec
Management OmniVista™ 2500 NMS OmniVista™ 2500 NMS OmniVista™ 2500 NMS OmniVista™ 2500 NMS
Mac Table 48K 64K 228K 128K
Routing Table 12K 12K 128K 128K
Multicast Full IP Multicast routing Full IP Multicast routing Full IP Multicast routing Full IP Multicast routing
OmniSwitch -Product Data sheets
OmniSwitch Details - Product Data sheets
LAN Switches
• OmniSwitch 2200 WebSmart switch: datasheet
• OmniSwitch 2260 WebSmart switch: datasheet
• OmniSwitch 2360 WebSmart switch: datasheet
• OmniSwitch 6360 LAN switch: datasheet
• OmniSwitch 6465 L2+ Hardened LAN Switch datasheet
• OmniSwitch 6560 L2+ Multigig LAN switch: datasheet
• OmniSwitch 6860 L3 LAN switch with multigig and DPI option datasheet
• OmniSwitch 6865 L3 Hardened Switch datasheet Management Platform
• OmniSwitch 6900 L3 core switch datasheet • OmniVista 2500 (on premises) datasheet
• OmniSwitch 9900 Chassis core switch datasheet • OmniVista Cirrus (cloud) datasheet
Stellar WLAN
• OmniAccess Stellar AP1101 802.11ac AP: datasheet
• OmniAccess Stellar AP1201 entry-level 802.11ac wave 2 AP: datasheet
• OmniAccess Stellar AP1201H resident 802.11ac wave 2 AP: datasheet
• OmniAccess Stellar AP1220 high performance wave 2 AP: datasheet
• OmniAccess Stellar AP1230 ultra high performance wave 2 AP: datasheet
• OmniAccess Stellar AP1251 hardened wave 2 AP: datasheet
• OmniAccess Stellar AP1301 entry level Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1311 high performance Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1320 high performance Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1351 premium high-end Wi-Fi 6 AP: datasheet
• OmniAccess Stellar AP1360 hardened outdoor Wi-Fi 6 AP: datasheet
OmniSwitch LAN Campus
Software Current Releases
LAN Campus
Current Software Releases
AOS
R8
OmniSwitch 6860E
OmniSwitch 9900 OmniSwitch 6900
OmniSwitch 6860N
AOS R8
OS6560
OS6465
OS6465
OS6360
AOS 8.8
▪ OS6900-C32E
▪ OS6860N-P24Z
▪ OS6860N-P24M
▪ OS6465E-P12
OmniVista NMS & Cirrus Software Releases evolution
OV2500 & OVC
4.6 New features
▪ AWOS 4.0.3 Stellar Support
▪ New Stellar AP1301
▪ New Stellar AP1351E
▪ Monitoring the RAPVA Health
▪ Heartbeat & Test check
▪ Local UPAM support
▪ New Omniswitch support (8.7R2 & 8.8.R1)
▪ New OS2X60 Series
▪ New OS6465-P12
▪ New OS6900 Models: OS6900-C32E, OS6900-X24C2,
OS6900T24C2
▪ New OS6860 Models: OS6860N-P24M, OS6860N-P24Z
▪ AMS Support
▪ KVM Support by OV2500 VMM
▪ Stellar Operational Improvements: Show Neighbor AP by Name,
AP Uplink Health, Link speed and Duplex Status
▪ High Availability Improvement
▪ Hypervisor Certification: VmWare Esxi, MS Hyper-V, Linux KVM
LAN Campus - AOS Software Highlights
Quality of Service
Traffic prioritization
System / Management Flow-based QoSClassification on L1/L2/L3/L4
8 internal priorities
CLI/WebView/OMniVista 2500
802.1p/ToS/DiffServ marking
SNMP v1/2/3
Local and remote server logging Per COS Max bandwidth Resiliency and High Availability
Policy and Port-based mirroring Statistics (# of pkt, # of byte) Virtual Chassis
Remote port mirroring Ingress Policing / Egress Shaping VC Split Protection
Local port monitoring Multi-actions support Shortest Path Bridging (SPB)
IPv4/IPv6 Routing over SPB
sFlow v5 and RMON Traffic prioritization: Flow-based QoS Loopback Detection
UDLD and DDM Flow-based bandwidth management Smart continuous switching technology
USB Disaster recovery / Auto-copy Queue management ISSU
File upload using USB, TFTP, FTP, SFTP, or SCP Configurable scheduling algorithm ITU-T G.8032 Ethernet Ring Protection (ERPv2)
Auto-configuration BFD
BOOTP/DHCP client with option 60 DiffServ Architecture IEEE 802.1s Multiple Spanning Tree
RFC 1588 v2 – Precision Time Protocol Virtual Output Queues Per-VLAN Spanning Tree (PVST+)
IEEE 802.1AB LLDP with MED extensions LLDP PoE Power Negotiation Alcatel-Lucent 1x1 STP mode
Application Fingerprinting IEEE 802.3ad Link Aggregation
Network Time Protocol C/S Control Protocol (LACP) and static
Multiple VLAN registration Protocol (MVRP) Application Monitoring and Enforcement ECMP (v4 & v6)
Port mirroring (many-to-one) High Availability VLANs
Remote port mirroring Server Load Balancing
Policy based mirroring
Jumbo frames (9K)
BootP/DHCP Relay
Multinetting
AOS
Proxy ARP / Ext Proxy ARP
License Manager
Application Visibility
Analytics
Intelligent Fabric
RESTful API
Open Northbound / Southbound Interfaces – SDN APIs
OpenFlow™ 1.0/1.3
OpenStack® neutron plugin Metro Ethernet Access Services
DHCP Option 82 configurable / DHCP Snooping
Advanced Security IP Anti-Spoofing based on DHCP snooping
Dynamic ARP Inspection
ALE Secured Code Multicast TV VLAN
Switching/Routing Unified Access Ethernet services support
IEEE 802.1ad Provider Bridges
Multiple virtual routing and forwarding (VRF) Access Guardian IEEE 802.1aq Shortest Path Bridging (SPB-M))
VRF Route Leaking Captive Portal Multipoint Ethernet VPN (EVPN) over I-SID service virtualization
Protocol (RIP) v1/v2 User Network Profiles (UNP) or
Open Shortest Path First (OSPF) v2 BYOD Q-in-Q tunnels
Border Gateway Protocol (BGP) v4 MACsec Service Access Point (SAP) profile identification
IS-IS LLDP security for rogue device restriction Service VLAN (SVLAN) and Customer VLAN (CVLAN) support
GRE tunneling Authentication priority VLAN translation and mapping including CVLAN to SVLAN
VRRP v2 Loop Guard C-tag to S-tag priority mapping
BGP v4 ETHOAM (802.1ag) Connectivity layer
Multicast routing Learned Port Security Service Assurance Agent (SAA)
DVMRP, PIM-DM, PIM-SM, PIM-DIR, M-ISIS Dynamic ARP inspection Port Mapping (Private VLANs)
Graceful restart extensions for OSPF and BGP Private VLAN
NDP (neighbor discovery protocol ) Web Cache Coordination Protocol (WCCP)
Bi-Directional Forwarding Detection (BFD) sFlow ® , RMON (4 groups)
IPv6 routing SSH, SSL, Radius, LDAP
RIPng, OSPFv3, VRRPv3, BGP, ISIS Traffic Anomaly Detection
Auto negotiation of POE class limit
ALE secured code
LAN Campus - Hardened AOS Software
ALE diversified AOS ALE
Secured
● Increasing security at network devices Code
● Same functionality and performance
as the normal release
Network Protection
● Intrinsic vulnerabilities
● Code exploits Secure Diversified Code
● Embedded malware ● Independent verification & validation of OS
● Potential back doors ● Automatic diversification on bootup
Follow us on…
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniSwitch R8
Connecting to the switch
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Connecting to the switch
EMP (Outbound IP
interface) Local User -> no aaa authentication http
Login via console
port -> show aaa authentication
Service type = Default
1rst authentication server = local
Service type = Console
1rst authentication server = local
Service type = Telnet
• How it works Authentication = Use Default,
1rst authentication server = local
Service type = Ftp
• Allow or deny access available management Authentication = Use Default,
1rst authentication server = local
Service type = Http
- on Console, Telnet, HTTP, HTTPS, FTP, SSH, and SNMP Authentication = denied
Service type = Snmp
AOS OmniSwitch
Authentication Server Local User
RADIUS or LDAP Login via console
port
• How it works
AOS OmniSwitch
* USB Adapter with Bluetooth Technology supported on an OS6465, 6560, 6860, 6865, 6900-V72 /C32
USB adapters supported are listed on release note
Connecting to the switch: Access via the console port
• CLI: COMMAND LINE INTERFACE
• USE SOFTWARE LIKE TERA TERM, PUTTY, HYPERTERMINAL …
Default settings
OS6860N
HTTP 4
• HOW IT WORKS
• The WebView application is embedded in the switch and is accessible via a web browser.
Connecting to the switch: Access via WebView
• WEBVIEW CONFIGURATION
- webview force-ssl enable – Forces SSL connection between browser and switch (default=enabled)
- webview http(s) port - Changes the port number for the embedded Web server
- aaa authentication http local – Checks the local database for HTTP authentication
• Main Applications to
OmniVista 2500 Series
Manage and Supervize Infrastructure
- Discovery
Analytics
- Topology Displays Application Traffic Patterns
How to
✓ Administrate the OmniSwitches remotely
Contents
1 Accessing to the Switch Remotely .......................................................... 2
2 Authenticating to the Switch ................................................................ 4
2.1. Enabling the SSH connection ...................................................................... 4
2.2. Testing the SSH connection ....................................................................... 4
2.2.1. Configuring the OmniSwitch .............................................................................. 5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Remote Switch Access
Implementation
- If the switch has an EMP interface (OS6900, OS6860E), an IP address will be assigned to it.
- If the switch doesn’t have an EMP interface (OS6560, OS6360), one of its interfaces is configured in an
administration VLAN (4001) and this VLAN is configured with an IP address.
- For example, check the IP interface of one switch which has an EMP interface (ex. 6900-A):
sw1 (6900-A) -> show ip interface
Total 3 interfaces
Flags (D=Directly-bound)
- For example, check the IP interface of one switch which doesn’t have an EMP interface and uses the
administration VLAN 4001 (ex. 6360-A):
sw5 (6360-A) -> show vlan 4001 members
- From your Windows Desktop, open a console and try to ping the 8 switches:
C:\>ping 10.4.Pod#.1
C:\>ping 10.4.Pod#.2
C:\>ping 10.4.Pod#.3
C:\>ping 10.4.Pod#.4
C:\>ping 10.4.Pod#.5
C:\>ping 10.4.Pod#.6
C:\>ping 10.4.Pod#+100.7
C:\>ping 10.4.Pod#+100.8
4
Remote Switch Access
Tips
If the SSH service type has Authentication = denied, type the command:
-> aaa authentication ssh local
- As you can see here, HTTP authentication is enabled, and the first authentication server to be polled is
the local database.
Notes
By default, the WebView is enabled on the OmniSwitch but you are not allowed to authenticate. On the
Remote-Lab, the WebView access has already been enabled.
Tips
SSL is forced by default in Release 8. It means that you can’t connect with plain HTTP on R8 OmniSwitches, you
will be automatically redirected to an HTTPS connection.
7
Remote Switch Access
Change the value to "45 for the CLI interface and “15” for the Webview" then click on Apply at the
bottom of the page
- From the CLI, check that the modification has been taken into account:
sw3 (6560-A) -> show session config
Cli Default Prompt = sw3 (6560-A) ->,
Cli Banner File Name = ,
Cli Inactivity Timer in minutes = 45,
Ftp Banner File Name = ,
Ftp Inactivity Timer in minutes = 4,
Http Inactivity Timer in minutes = 15,
Http Banner File Name = ,
Login Timer in seconds = 55,
Maximum number of Login Attempts = 3,
- Return to the Webview application. In the horizontal icon bar at the top of the page, select the third
icon from the left (write memory).
- You can hover with your mouse over the ports to get more information By clicking on a port you will be
redirected to the chassis port configuration page.
- Select Layer 2 > VLAN in the VLAN management column or in the left menu.
- Click on the "+" icon to create a new VLAN
- The table of the vlan created on the switch is displayed.
Vlan : 59
Description : Student
10
Remote Switch Access
- Connect to the OmniSwitch 6560-A and verify that the VLAN has been created on the OmniSwitch :
- Click on yes
- In the CLI of the OmniSwitch 6560-A, verify that the VLANs have been deleted and save it on flash
running directory
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Managing Files/Directories
AOS RELEASE 8
HARDENED SWICTHES
OMNISWITCH 6465
OR =
RAM
≠ DIFFERENT CONTENT
≠ DIFFERENT CONTENT
RAM RAM
BOOT FROM THE WORKING WORKING
DIRECTORY OR FROM THE
USER
DEFINED DIRECTORY OR CERTIFIED CERTIFIED
RUNNING CONFIGURATION
USER. DIR.
RUNNING CONFIGURATION RUNNING CONFIGURATION
Command to force reboot from WORKING directory or user defined directory: Command to force reboot from CERTIFIED directory:
-> reload from working no rollback-timeout -> reload all
-> reload from <userdefined> no rollback-timeout
R8
AOS Managing Files/Directories
• Configuration Rollback Directory which the switch booted from and
where the configuration changes will be
saved
* Except when the Running directory is the Certified directory
1 1
≠ DIFFERENT CONTENT
≠ DIFFERENT CONTENT
RAM RAM
5
2 2
CERTIFIED CERTIFIED
• The configuration backup command creates a .tar file where are stored the collected files
- The tar file name is “configuration_backup.tar” and will be placed in “/flash/config-backup-recovery” folder
• Configuration Restore
• When the “restore” option is used, the switch:
- Selects the “configuration_backup.tar” file in “/flash/config-backup-recovery” folder
- Extract the .tar file to get the userTable, session banner, and vcboot.cfg files.
R8
AOS Managing Files/Directories
• USB Backup and Restore
- If a USB drive is plugged in, switch will store image files, power supply and system configuration files to USB
storage drive automatically upon user commands “write memory” or “copy running-certified” “copy flash-
synchro” if USB backup is enabled on switch.
- The USB drive can be used to restore images and config (power supply and system) from the USB drive on a
switch with usb auto-copy command enabled.
- If the user configures a password at the time of enabling the back-up and restore then the corresponding back-
up and restore content will be encrypted and decrypted.
usb auto-copy <enable | disable> copy-config <enable| disable> from <directory-path> [key <> |
hash-key<>]
R8
Thin Client Omniswitch
• No configuration is stored on the switch. It will contact Omnivista 2500 to retrieve the config.
• Thin-client mode is configured through the activation process.
• Switch boots up normally and registers to OV 2500 as part of the activation process.
- Thin-client mode must be configured as part of the activation response message.
• In thin-client mode, no configuration is saved in the ‘running’ directory
- But there will be vcboot.cfg with the minimal network reachability configuration.
• ‘write memory’ can be executed but configurations will not be saved to the vcboot,cfg file.
- All configuration changes should be done in OV 2500.
Sends Config
R8
CLI – Help > Quick Walkthrough
• Command Line Interface (CLI) specifications
Online Help
A ‘?’ can be used to get a
list of all possible
commands
or
-> v?
VIEW VI
-> vlan ?
Directory management
commands Built-in Filtering
-> show vlans | more
pwd – shows current directory. -> show mac-learning | grep 00:20:da:55:56:76
cd – changes directory. -> show ip ospf routes | egrep "^10\.10.*" | sort |
mkdir – creates a new less
directory.
CLI Line Editor and
ls – lists contents of a directory. History
dir – lists contents of a -> history
directory. 1 write memory Completion
mv – moves a file. 2 show running-directory Recognize partial keywords to CLI command
cp – copies a file. 3 ls /flash/working syntax..
rm – removes a file. 4 show microcode working Eg : sh vl for show vlan
5 show microcode certified
6 ls /flash/working
OmniSwitch AOS R8
OmniSwitches Directories Content (R8)
How to
✓ Manage the OmniSwitches R8 main directories content
Contents
1 Introduction .................................................................................... 2
2 Viewing the Image & Configuration Files .................................................. 2
3 Checking the working and certified Directories .......................................... 2
3.1. Displaying the working and certified directories content .................................... 2
3.2. Displaying the microcode version ................................................................ 3
4 Booting behavior in Release 8 ............................................................... 3
5 Determining from which directory the switch was loaded? ............................. 3
6 Synchronizing RAM and Running Directory ................................................. 4
7 Saving the Running Configuration to Working Directory ................................. 5
8 Creating a User-Defined Directory .......................................................... 7
9 Changing the User Directory ................................................................. 8
10 Annex: USB Backup & Restore ............................................................... 9
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
OmniSwitches Directories Content (R8)
1 Introduction
In Release 8, the management of an OmniSwitch is controlled by 2 types of files:
- Images files, which are proprietary code developed by Alcatel-Lucent Enterprise to run the hardware.
- A configuration files, named vcboot.cfg and vcsetup.cfg, in text format, sets and controls the
configurable functions.
The directory structure that store the image and configuration files is divided in several parts:
- The certified directory contains files that have been certified by an authorized user as the default files
for the switch.
- The working directory is a holding place for new files. Files in the working directory must be tested
before committing them to the certified directory.
- The user-defined directories are created by the user and are like the working directory in that they can
contain image and configuration files.
- The running directory is the directory where the configuration changes will be saved.
- The running configuration, stored in the RAM, contains the current operating parameters of the
OmniSwitch obtained from the image and configuration files.
- If the running directory is the certified directory, you will not be able to save any changes made to the
running directory. If the switch reboots, any configuration changes will be lost. In order to save
configuration changes, the running directory cannot be the certified directory.
To check from which directory the OmniSwitch is running, and the content comparison between the WORKING
and CERTIFIED directories:
sw3 (6560-A) -> show running-directory
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Running configuration: WORKING > the OmniSwitch is running from the working directory.
- Certify/Restore Status: CERTIFIED > the working directory content matches the certified directory
content.
- Running Configuration: SYNCHRONIZED > the running configuration matches the WORKING configuration.
4
OmniSwitches Directories Content (R8)
- 3 new VLANs are now created. Changes are made to the configuration file in RAM. These changes take
effect immediately but are not written permanently; they will be lost if the OmniSwitch reboots.
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : NOT SYNCHRONIZED
- Running configuration: WORKING > the OmniSwitch is running from the WORKING directory.
- Certify/Restore Status: CERTIFIED > the working directory content matches the certified directory
content.
- Running Configuration: NOT SYNCHRONIZED > the running configuration does not match the
configuration of the working directory.
IN OUR CASE, THE VLAN 2, 3 AND 99 WILL BE LOST, AS THEY ARE NOW STORED IN THE RUNNING
CONFIGURATION.
5
OmniSwitches Directories Content (R8)
- To check that:
sw3 (6560-A) -> show running-directory
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Running configuration: WORKING > the OmniSwitch is running from the working directory.
- Certify/Restore Status: CERTIFY NEEDED > the WORKING directory does not match the CERTIFIED
directory.
- Running Configuration: SYNCHRONIZED > the running configuration matches the configuration of the
working directory.
HOWEVER, SINCE THE CONFIGURATION FILE WAS SAVED TO THE WORKING DIRECTORY, THAT FILE IS STILL IN
THE WORKING DIRECTORY AND CAN BE RETRIEVED.
SINCE THE WORKING AND CERTIFIED DIRECTORIES ARE NOT THE SAME, THE OMNISWITCH WILL BE RUNNING
FROM THE CERTIFIED DIRECTORY.
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : CERTIFIED,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Note that when an OmniSwitch is running from the CERTIFIED directory, it is not possible to manipulate
files in the directory structure (i.e. a configuration will be applied in the running configuration, but it
will not be possible to save it neither in the working nor the certify directory):
sw3 (6560-A) -> vlan 4
sw3 (6560-A) -> write memory
ERROR: Write memory is not permitted when switch is running in certified mode
- Let’s reboot the OmniSwitch on Working directory where vlan have been recorded:
sw3 (6560-A) -> reload from working no rollback-timeout
Confirm Activate (Y/N) : y
This operation will verify and copy images before reloading.
It may take several minutes to complete...
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Create a user defined directory and copy the contents of the WORKING directory to it:
Tips
The lab directory may have been already created, ignore error and proceed on.
During the copy; it tries to copy the boot.md5 file but a “permission denied” message is displayed. This file is
auto generated so ignore this error and proceed.
- Now let’s see what files are stored in the newly created directory:
sw3 (6560-A) -> ls lab
Nos.img cspbroker.conf vcboot.cfg.sav
cloudagent.cfg vcboot.cfg vcsetup.cfg
- Once the switch boots, verify that it booted from the lab directory:
sw3 (6560-A) -> show running-directory
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS MONO CMM,
Current CMM Slot : CHASSIS-1 A,
Running configuration : lab,
Certify/Restore Status : CERTIFY NEEDED
SYNCHRONIZATION STATUS
Running Configuration : SYNCHRONIZED
- Running configuration: lab > the OmniSwitch is running from the user-defined lab.
- Certify/Restore Status: CERTIFY NEEDED > the running directory (“lab”) does not match the CERTIFIED
directory.
- Running Configuration: SYNCHRONIZED > the running configuration matches the configuration stored in
the running directory (here the user-defined “lab” directory)
- Overwrite the contents of the certified directory with the configuration from the running directory
(“lab” directory here):
sw3 (6560-A) -> copy running certified
Wed Apr 2 04:22:40 : flashManager FlashMgr Main INFO message:
+++ Verifying image directory lab on CMM flash
Wed Apr 2 04:23:04 : ChassisSupervisor MipMgr INFO message:
+++ Copy running to certified succeeded
8
OmniSwitches Directories Content (R8)
Notes
The copy running certified command should only be done if the running configuration has been verified.
- Running configuration: lab > the OmniSwitch is running from the user-defined lab.
- Certify/Restore Status: CERTIFIED > the running directory (“lab”) matches the CERTIFIED directory.
- Running Configuration: SYNCHRONIZED > the running configuration matches the configuration stored in
the running directory (here the user-defined “lab” directory)
Warning > What if the OmniSwitch reboots now?
IF THE OMNISWITCH IS REBOOTED (IF THE POWER TO THE OMNISWITCH IS INTERRUPTED), THE OMNISWITCH
WILL BOOT FROM THE “LAB” DIRECTORY, SINCE THE RUNNING (LAB) AND CERTIFIED DIRECTORIES ARE THE SAME
(Certify/Restore Status: CERTIFIED).
- When this command is enabled, the images and configuration from certified and running directories are
copied into /uflash/6560/certified and /uflash/6560/running directories.
- When write memory is executed and backup is enabled, the configuration files and images from
/flash/<running-directory> are copied to /uflash/6560/<running-directory name> (ex. lab)
- When usb backup admin-state is enabled and copy running certified and write memory flash-synchro
commands are executed, the configuration and images from /flash/certified will be copied to
/uflash/6560/certified:
sw3 (6560-A) -> write memory flash-synchro
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Virtual Chassis
1 2
• Goal 8 3
3
• Virtual Chassis = Group of switches which 6
Master
VFL
4 5 8 5
• Key Points
• Single Point of management
• Single Logical Switch
• Redundancy and resiliency supported across
the switches
• No STP/VRRP between Access and Core
switches
• Optimized bandwidth usage • How It Works?
• Upgrade via ISSU (to minimize network impact) • Switches inter-connected via dedicated or optional
SFP+, QSFP ports
• No license needed
• Mesh or Ring topology
Virtual Chassis - Topologies
4 x OS6465 8 x OS6560
4 x OS6360
OS6900-V72 / OS6900-C32
up to 16 VFL member ports
up to 2 VFL member ports
for 10Gbps
Support of 2,3,.. up to 6 in Partial or fully Mesh topology 10G SFP+ with 4X10G direct-attach splitter cable
For 25Gbps
Native QSFP28 ports
for 40Gbps
OS6900-X20/X40 Native 40G QSFP
For 100Gbps
up to 16 VFL member ports Native QSFP28 ports
10G SFP+ or 40G QSFP
Needs optional module for 40Gbps OS6900-Q32 / OS6900-X72
OS-QNI-U3, OS-HNI-U6 up to 16 VFL member ports
Slave
Slave
3 6
OK, chassis-2 is type X.
Then all work in X mode.
4 5
Slave Slave
Roles and Elections
• Master and slaves communicate to ensure that the slaves have up-to date copies of the master’s image
files and configuration files.
• Reboot required after a slave update (new images and configuration files).
Master/Slave election
based on virtual chassis
protocol (ISIS-VC)
IS-IS VC
Master Slave
2
Highest chassis priority value 1
Slave Slave
Longest chassis uptime 3 6
(if difference in uptime >10 mn)
4 5
4 5 4 5 4 5
Slave Slave Slave Slave Slave Slave
Virtual Chassis Specifications
• Default set of auto VFL eligible ports Default set of auto Auto VFL process
VFL eligible ports runs only on port
explicitly configured
Swith Model Auto VFL eligible ports (First bootup of brand new as auto VFL port
chassis from factory)
OS9900 Static VFL only
OS6900 X and T Last 5 ports of each chassis (including ports in expansion slots) regardless of
SFP/QSFP presence on those ports.
OS6560-24X4/-P24X4/-48X4/-P48X4 Dedicated VFL ports and last two 10G SFP+ ports on (P)24X4/(P)48X4. * Auto VFL detection process will run only on auto VFL ports. Both
ends of the link must be auto VFL ports for an auto VFL port to be
OS6360-24 - OS6360-48 OS6360-24 ports models - Ports 27/28. able to become VFL.
OS6360-48 ports models - Ports 51/52.
Virtual Chassis - Split Chassis
• Failures on VFL links cause potential MAC/IP • RCD protocol will detect this split topology.
duplication
• 2 mechanisms Virtual Chassis
Virtual Chassis The Slave's chassis status will be modified from Running to Split-Topology to indicate this
Reboot with all second pseudo-master chassis is not operational at this point
Master Master
Slave Interfaces
down
If the VFL comes back up, the former Slave chassis will reboot and rejoin the virtual chassis
EMP
port
EMP
port
topology assuming its Slave role again
OS6860E
RCD OS6900
protocol OS9900
Management network
Potential
OS6860
duplicate MAC/IP
MASTER MASTER
SLAVE
ACCESS
VSCP
Building Building
Link Aggregation
1 2
Platforms Supported in R8
MASTER SLAVE
ACCESS
Extract from C os8_cli_87R2-revA
Building 1 Building 2
Use the virtual-chassis split-protection admin-state and virtual-chassis split-
• Requires an upstream or downstream device to act as helper switch protection linkagg commands to enable VCSP and create the VCSP link aggregate on
the VC.
• Proprietary protocol called “VC Split Protocol”
Use the virtual-chassis split-protection helper admin-state and virtual-chassis split-
• VCSP LAG towards the helper switch protection helper linkagg commands to enable the VCSP helper and create the VCSP
helper link aggregate on the helper switch
• Every VC member switch recommended to have one port as part of the VCSP LAG
to the helper device Extract from OmniSwitch AOS Release 8 Switch Management Guide
In Service Software Upgrade (ISSU)
• GOAL
• Used to upgrade the software on a VC with minimal
network disruption 3
1
• Each element is upgraded individually Master – Chassis ID 1
Slave – Chassis ID = 2
- The image and configuration files are then copied to all of Slave – Chassis ID = 3
code
the Slaves 2
- The Slaves are then reloaded from the ISSU directory in order Issu_dir Directory
from lowest to highest chassis ID
vcboot.cfg vcsetup.cfg code
Virtual Chassis - Configuration
Virtual Chassis Configuration
• Step by Step
Switch Bootup
vcsetup.cfg exists?
Disable Auto
configuration Y
on boot
VC Mode
AUTO-VC Auto Vcsetup VFL : AUTO or
created Static
Management
Auto VC consists of the following: VC created automatically
1. Auto VFL • Chassis ID and Group ID
2. Auto Chassis ID Assignment (Start in certified mode)
Virtual Chassis Configuration
• Step by Step
Assign a Chassis ID
Chassis 1 Chassis 2
1 2
Define a Priority
Between 0 to 255, switch with the highest priority is elected Master
1 2
Virtual Chassis Configuration
• Step by Step Configure Auto VFL mode Configure Static VFL link & ports
Reload both chassis from the directory containing the vcsetup.cfg & vcboot.cfg files
RAM
SYNCHRONIZATION STATUS
Flash Between CMMs : NOT SYNCHRONIZED, WORKING CERTIFIED
Running Configuration : SYNCHRONIZED SLAVE
Virtual Chassis Synchronization - Example
• -> copy running certified
RAM
… …
WORKING CERTIFIED
SLAVE
Virtual Chassis Synchronization - Example
• -> copy flash-synchro
1 2
RAM
CONFIGURATION STATUS
Running CMM : MASTER-PRIMARY,
CMM Mode : VIRTUAL-CHASSIS
MONO CMM,
WORKING CERTIFIED WORKING CERTIFIED Current CMM Slot : CHASSIS-1 A,
Running configuration : WORKING,
Certify/Restore Status : CERTIFIED
SYNCHRONIZATION STATUS
Flash Between CMMs : SYNCHRONIZED,
… Running Configuration : SYNCHRONIZED
• -> write memory flash-synchro : This command can also be used to synchronize the virtual chassis
OmniSwitch AOS R6/R8
Virtual Chassis
How to
✓ This lab is designed to familiarize you with the Virtual Chassis feature (VC)
and its configuration.
Contents
1 Configure a Virtual Chassis of two switches ............................................... 2
2 Virtual Chassis Monitoring.................................................................... 5
2
Virtual Chassis
Assign a globally unique chassis identifier to the switch and enable the switch to operate in virtual chassis
mode, on both 6900:
6900-A -> show virtual-chassis topology
6900-A -> virtual-chassis chassis-group 1
6900-A -> show virtual-chassis topology
6900-A -> show configuration vcm-snapshot chassis-id 1
6900-A -> write memory
Notes:
A reload is mandatory to take account the new chassis -id
The command write memory is protected by issuing a warning to prevent or warn purging the configuration of
the elements that are missing. Chassis id has been changed in this case.
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 2
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
2 Master Running 2 100 1 2c:fa:a2:05:cd:71
Force the 6900-A to be the master chassis, assign a highest chassis priority to it:
! IP:
ip interface local chassis-id 1 emp address 10.4.20.1 mask 255.255.255.0
! IP:
ip interface local chassis-id 2 emp address 10.4.20.2 mask 255.255.255.0
VFL is an aggregate of high-speed ports used, between the peers, for inter-chassis traffic and control data
through the IPC-VLAN
Notes:
On the 6900b, INTERFACE 2/2/1 and INTERFACE 2/2/2 automatically LINK UP and the switch Reboot.
5
Virtual Chassis
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 1 2c:fa:a2:05:cd:a9
2 Slave Running+ 2 100 1 2c:fa:a2:05:cd:71
Notes:
Notice that the chassis priority does not changed. In fact, a reboot of the switch is required to update this
parameter.
If the status of the OS6900 is not “Running”, check that the System Ready is set to Yes with the command:
(6900-A) -> debug show virtual-chassis topology
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 1
Oper Config Oper System
Chas Role Status Chas ID Pri Group MAC-Address Ready
-----+------------+-------------------+--------+-----+------+------------------+-------
1 Master Running 1 200 1 2c:fa:a2:05:cd:a9 Yes
2 Slave Running+ 2 100 1 2c:fa:a2:05:cd:71 Yes
Notes:
suffix “+”, if any VC element is detected as “Running” but not configuration saved
Once the system reboots, you should see the following messages:
...
Fri Feb 13 16:29:41 : vcmCmm port_mgr info message:
+++ CMM:vcmCMM_client_rx_pm@1485: VFL link 1/0 up (pri 1/2/1:0x28) [L2]
Notes:
The chassis role determines which switch is the master of the Virtual Chassis.
The Master and Slave roles are only active when the operational status of the virtual-chassis feature is up for
both chassis.
6
Virtual Chassis
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 2c:fa:a2:05:cd:a9
2 Slave Running 2 100 1 2c:fa:a2:05:cd:71
Notes:
The “Is Primary” field defines the primary port of the virtual fabric link.
Verify the consistency of system-level mandatory parameters between the two chassis:
6900-A -> show virtual-chassis consistency
Legend: * - denotes mandatory consistency which will affect chassis status
licenses-info - A: Advanced; B: Data Center;
Notes:
The two chassis in the same Virtual-Chassis group must maintain identical configuration and operational
parameters.
OmniSwitch AOS R8
Virtual Chassis-6360
How to
✓ This lab is designed to familiarize you with the Virtual Chassis feature (VC)
and its configuration.
Contents
1 Configure a Virtual Chassis of two switches ............................................... 2
1.1. Objective ............................................................................................ 2
1.2. Management ......................................................................................... 3
2 Virtual Chassis Monitoring.................................................................... 7
2
Virtual Chassis-6360
1.1. Objective
3
Virtual Chassis-6360
1.2. Management
- Assign a globally unique chassis identifier to the switch 6360A and enable the switch to operate in virtual
chassis mode
sw5 (6360-A) -> show virtual-chassis topology
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 0 94:24:e1:7c:82:1d
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 1 94:24:e1:7c:82:1d
- Force the 6360-A to be the master chassis, assign a highest chassis priority to it:
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 1 94:24:e1:7c:82:1d
Notes:
A reload is mandatory to take account the chassis priority
Notes:
Wait until complete restart.
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 94:24:e1:7c:82:1d
- Assign a globally unique chassis identifier to the switch 6360B and enable the switch to operate in virtual
chassis mode
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 0 94:24:e1:7c:79:65
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 2 100 1 94:24:e1:7c:79:65
Notes:
A reload is mandatory to take account the new chassis -id
The command write memory is protected by issuing a warning to prevent or warn purging the configuration of
the elements that are missing. Chassis id has been changed in this case.
Notes:
Wait until complete restart.
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 2
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
2 Master Running 2 100 1 94:24:e1:7c:79:65
VFL is an aggregate of high-speed ports used, between the peers, for inter-chassis traffic and control data
through the IPC-VLAN
7
Virtual Chassis-6360
Notes:
On the 6360-B, INTERFACE 2/1/27 and INTERFACE 2/1/28 automatically LINK UP and the switch Reboot.
Legend: Status suffix "+" means an added unit after last saved topology
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 94:24:e1:7c:82:1d
2 Slave Running+ 2 100 1 94:24:e1:7c:79:65
Notes:
suffix “+”, if any VC element is detected as “Running” but not configuration saved
- Save the configuration and Check the virtual-chassis topology and Copy running to certified:
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 200 1 94:24:e1:7c:82:1d
2 Slave Running 2 100 1 94:24:e1:7c:79:65
! IP:
!
Notes:
The “Is Primary” field defines the primary port of the virtual fabric link.
- Verify the consistency of system-level mandatory parameters between the two chassis:
9
Virtual Chassis-6360
Notes:
The two chassis in the same Virtual-Chassis group must maintain identical configuration and operational
parameters.
- As you can see here, HTTP authentication is enabled, and the first authentication server to be polled is
the local database. If it is not, enable it via the command : aaa authentication http
Notes
By default, the WebView is enabled on the OmniSwitch but you are not allowed to authenticate. On the
Remote-Lab, the WebView access has already been enabled.
Tips
SSL is forced by default in Release 8. It means that you can’t connect with plain HTTP on R8 OmniSwitches, you
will be automatically redirected to an HTTPS connection.
10
Virtual Chassis-6360
- Opening the WebView From the Windows Desktop, open a Web Browser (ex. Firefox, Chrome)
- In the URL area, type : https://10.4.pod#.5
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
VLAN Management
• HOW IT WORKS
Vlan 50
• Ports become members of VLANs by : Vlan10 Vlan 60
- Static Configuration
- Mobility/with or without Authentication *
- 802.1q
- Mobile Tag
VLAN 4
VLAN 5
1/1/4
VLAN 6
1/1/6
VLAN Management - Static VLAN Membership
• CONFIGURATION –STEP BY STEP
Defining a VLAN
-> vlan 2
Optional commands
Monitoring
VLAN 3
VLAN 4
VLAN 5
VLAN 6
Classification
Rules
6. MAC address
7. MAC-OUI + VLAN tag
8. MAC-OUI
9. MAC address range + VLAN tag
10. MAC address range
11. LLDP
12. Auth-type + VLAN tag
13. Auth-type
14. IP address + VLAN tag
15. IP address
16. VLAN tag
VLAN Management - Dynamic VLAN Membership
• Device oriented : VLAN according to traffic criteria (MAC@,
etc…)
UNP profile
Enabling a mobile port
VLAN ID
Configure UNP profile * Policy list, location and period will be seen in
Location
* the following chapter (Access Guardian)
-> unp profile employee Period
- When classification is enabled but authentication is disabled or fails,UNP classification rules are appliedto the traffic received on the
UNP port.
UNP Port classification rules
Port
• MAC Address rule 1.
2. Port + VLAN tag
3. Domain + VLAN tag
unp classification mac-address mac_address profile1 profile_name 4. Domain
5. MAC address + VLAN
tag
Eg: -> unp classification mac-address 00:11:22:33:44:55 profile1 employee 6. MAC address
7. MAC-OUI + VLAN tag
• Ip adress rule 8. MAC-OUI
9. MAC address range +
VLAN tag
unp classification ip-address ip_address mask mask profile1 profile_name 10. MAC address range
11. LLDP
Eg: -> unp classification ip-address 10.0.0.20 mask 255.255.0.0 profile1 employee 12. Auth-type + VLAN tag
13. Auth-type
14. IP address + VLAN tag
P address
• Mac range rule 15.
Eg : Binding rule that combines a MAC address rule, an IP address rule, and a port rule
-> unp classification mac-address 00:11:22:33:44:55 ip-address 10.0.0.20 mask 255.255.0.0 port 1/1/1 profile1 employee
• List of individual rules and assigns the list a name and a precedence value. A device must match all of the rules specified in the extended rule list.
• ext-r1” rule combines a port rule and vlan tag type rule
VLAN Management - Dynamic VLAN Membership
• Example of Device oriented : unp according to traffic criteria (MAC@ range)
No Auth ⚫ Create the required UNP profile and map the profile to VLAN 20
-> unp profile corporate
-> unp profile corporate map vlan 20
Classification
Rules
⚫ Create another UNP profile that will serve as a default profile and map the profile to VLAN 10
⚫ Create a MAC range classification rule and associate the rule to the “corporate” UNP profile
UNP Profile
-> unp classification-rule rule1 mac-address-range 08:00:27:00:98:0A 08:00:27:00:98:FF
-> unp classification-rule rule1 profile1 corporate
Default ⚫ Enable UNP on the user port that will connect to user device
UNP Profile
-> unp port 1/1/1 port-type bridge
1/1/2
VLAN 20
Virtual Router
The operational status of a
VLAN remains inactive as long
as no active port is associated
with this VLAN
1/1/6
VLAN 60
1/1/2
VLAN 20 -> show ip interface
Total 2 interfaces
Name IP Address Subnet Mask Status Forward Device
Virtual Router
--------------+-------------+----------------+--------+--------+--------
Data 10.1.20.254 255.255.255.0 UP NO vlan 20
Voice 10.1.60.254 255.255.255.0 UP NO vlan 60
Tagged Frames
IEEE 802.1Q – Tagged VLANs
• VLAN Tag • 802.1P
- 802.3 MAC header change - Three-bit field within 802.1Q header
- 4096 unique VLAN Tags (addresses) - Allows up to 8 different priorities
- VLAN ID == GID == VLAN Tag - Feature must be implemented in hardware
4 Bytes
802.1Q - Configuration
-> vlan 2-3
VLAN 3
VLAN 3
VLAN 2
VLAN 2
VLAN 278 VLAN 278
1/1/24 1/1/24
- Successful login : The client is associated with the RADIUS Access-Accept + UNP name
correct UNP
UNP R8
VLAN INTERNET VLAN ID
30 ONLY
Policy List
ACL QoS
GUEST
* 802.1X and Mac authentication will Restrict the network access
MEDIUM LOW based on the location of the
be seen in more details in the BWDTH PRIORITY
following chapter (Access Guardian) user/device
Location
Period Chassis/Slot/Port on which the
user is attached Switch Name on
which the user is attached
VLAN NO HR, Switch Location String,
20 FINANCE DB identifying a group of Switches
EMPLOYEE
VLANs
How to
✓ Manage VLANs on the OmniSwitches
Contents
1 Topology ........................................................................................ 2
2 Creating a VLAN ............................................................................... 2
3 Creating Additional VLANs ................................................................... 7
4 Deleting VLANs & IP interfaces ............................................................ 11
2
VLANs
1 Topology
Below the topology that will be used during this lab:
2 Creating a VLAN
VLANs provide the ability to segregate a network into multiple broadcast domains. Additionally, Virtual Router
ports (or IP Interfaces) can be assigned to VLANs to allow traffic to be switched at Layer 3.
- In its default configuration, the switch has only one VLAN, the VLAN 1. This is the default VLAN and all
ports are initially associated with it. This VLAN CANNOT be deleted, but it can be disabled if desired.
- Let’s run the command to see the VLANs that exist on the switch as well as information on a single VLAN
(ex. 6360-A):
sw5 (OS6360-A) -> show vlan
stree mble src
vlan type admin oper 1x1 flat auth ip tag lrn name
-----+-----+------+------+------+------+----+-----+-----+------+----------
1 std on off on on off off off on VLAN 1
2 std on off on on off off off on VLAN 2
4001 std on on on on off on off on Administration
3
VLANs
- Notice the VLAN‘s Administrative State is enabled, however its Operational State is disabled. Without
members the VLAN will be Operationally down.
Notes
You can also list the ports and their associated VLAN (notice that the status of all the ports is “inactive”, so the
Vlan is operationally down):
-> show vlan members
- In order to have IP connectivity to a VLAN interface (not required for connectivity to other
clients/servers within a VLAN), an IP address (IP interface) must be assigned to a Virtual Router port and
associated to that VLAN. This IP address can then be used for IP connectivity as well as Layer 3
switching.
4
VLANs
- To create the IP interface (ex. int_1 = IP interface name, 192.168.10.5 = IP@ of the IP Interface):
sw5 (6360-A) -> ip interface int_1 address 192.168.10.5/24
- The Device status is unbound. It is because the IP interface has not been associated to a VLAN yet.
- To bind the IP Interface (ex. int 1) to a VLAN (ex. VLAN 1):
sw5 (6360-A) -> ip interface int_1 vlan 1
Notes
The last 2 commands can be merged into a single command:
-> ip interface int_1 address 192.168.10.5/24 vlan 1
- If Status = DOWN, it indicates no active ports or devices have been associated with the VLAN that the IP
interface has been assigned to. If an IP interface is DOWN, it cannot be connected to, will not reply to
PING requests nor will it be advertised in any router updates. This will not affect the Layer 2 broadcast
domain, however.
- Let’s activate a port in VLAN 1 to change the status to enable:
sw5 (6360-A) -> interfaces 1/1/1 admin-state enable
Tips
The equipment connected to the port 1/1/1 of the 6360-A is the Client 5 virtual machine:
- By default, all ports (including the port 1/1/1) belong to VLAN 1, so the VLAN 1 will become active.
- Run the command to check that the status of the IP interface is UP:
sw5 (6360-A) -> show ip interface
Total 3 interfaces
Flags (D=Directly-bound)
Now that the VLAN has an active port, let’s modify the IP information of the Client 5, and ping the IP
interface associated with VLAN 1.
Windows Desktop
Double-click on VMware
vSphere
- IP address: 192.168.10.105
- Subnet mask:
255.255.255.0
- Default gateway:
192.168.10.5 (The IP address
of VLAN 1 virtual router)
- From Client 5, open a command prompt and ping the switch’s VLAN 1 Virtual Router IP address. You
should now have IP connectivity:
7
VLANs
- To begin, let’s create a new VLAN and assign an IP address to that VLAN as done previously:
sw5 (6360-A) -> vlan 50
sw5 (6360-A) -> ip interface int_50 address 192.168.50.5/24 vlan 50
Windows Desktop
Double-click on VMware
vSphere
- IP address: 192.168.50.55
- Subnet mask:
255.255.255.0
- Default gateway:
192.168.50.5 (The IP address
of VLAN 50 virtual router)
10
VLANs
By default, the switch will route packets between VLAN 1 and VLAN 50 using the IP interfaces that you have
created.
- From client 9, open a command prompt and ping the client 5. You should now have IP connectivity:
11
VLANs
Notes
VLAN 1 cannot be deleted. It is only possible to deactivate.
- Check that the VLAN 50 and the IP interfaces have been correctly deleted:
sw5 (6360-A) -> show vlan
vlan type admin oper ip mtu name
------+-------+-------+------+------+------+------------------
1 std Ena Ena Dis 1500 VLAN 1
4001 std Ena Ena Ena 1500 Admin
4094 vcm Ena Dis Dis 1500 VCM IPC
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Diagnostic Tools
- Configurable default file size 1250 Kbytes swlog output socket console enable
- Multiple remote devices (syslog) 12 max When this command is enabled, syslog server will be
-> swlog output socket ipaddr 168.23.9.100 restarted and allowing send Console log to remote
Loopback0 have to be configured Syslog servers
Switch Logging files
• Switch logging are stored in /flash directory
sw1 (6900-A) -> ls -l
• Up to 7 Swlog logs files can be stored in the drwxr-xr-x 2 admin user 4096 Jun 7 09:15 app-signature
drwxr-xr-x 2 admin user 4096 Jun 7 07:57 certified
/flash directory starting (from swlog_chassis1 to 1.6) -rw-r--r-- 1 admin user
-drwxr-xr-x 2 admin user
255 Jun 7 09:11 hwinfo
16384 Dec 18 2013 lost+found
drwxr-xr-x 2 admin user 4096 Feb 10 2016 network
drwxr-xr-x 3 admin user 4096 Apr 23 2015 pmd
• An Swlog archive can store up to 40 files drwxr-xr-x 7 admin user
drwxr-xr-x 2 admin user
4096 Jun 7 07:57 switch
4096 Jun 8 10:53 swlog_archive
-rw-r--r-- 1 root root 560111 Jun 10 12:50 swlog_chassis1
-rw-r--r-- 1 root root 1280031 Jun 10 12:44 swlog_chassis1.0
-rw-r--r-- 1 root root 1280067 Jun 10 12:28 swlog_chassis1.1
• Configuring the Switch Logging File Size -rw-r--r-- 1 root root 1280027 Jun 10 12:12 swlog_chassis1.2
-rw-r--r-- 1 root root 1280041 Jun 10 11:56 swlog_chassis1.3
- -> swlog output flash file-size 500000 (in bytes) -rw-r--r-- 1 root root 1280094 Jun 10 11:41 swlog_chassis1.4
-rw-r--r-- 1 root root 1280125 Jun 10 11:26 swlog_chassis1.5
-rw-r--r-- 1 root root 1280100 Jun 10 11:12 swlog_chassis1.6
Displaying Switch Logging Records
• Clear the log files contents
• -> swlog clear
• Clear both the log files contents and event logs
• -> swlog clear all
2017 Jun 10 10:43:59 Pod18sw1 swlogd: ospf_0 AREA debug2(7) (11654):(3254):[curTime=251171s] Flooding area 0.0.0.0
2017 Jun 10 10:43:59 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 172.16.17.1, curTime = 251171, helloTimer = 251497, deadTimer = 75447
2017 Jun 10 10:43:59 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 172.16.18.1, curTime = 251171, helloTimer = 251180, deadTimer = 66940
2017 Jun 10 10:43:59 Pod18sw1 swlogd: ospf_0 TIME debug2(7) (11654):(1259):Intf addr 192.168.110.1, curTime = 251171, helloTimer = 251180, deadTimer = 66940
• Application
• Must be enabled
-> command-log enable/disable
-> swlog remote command-log enable/disable
Example
-> show command-log
Command : vlan 68 router ip 168.14.12.120
UserName : admin
Date : MON APR 28 01:42:24
Ip Addr : 128.251.19.240
Result : SUCCESS
• Ports supported
- Ethernet, Fast/ Gigabit Ethernet, 10/ 40 Gigabit Ethernet
• Sessions supported
- 2 per standalone switch and per stack
sFlow
sFlow
sFlow
How to
✓ This lab is designed to familiarize you with some basic troubleshooting and
debugging tools on an OmniSwitch.
Contents
1 Switch Logging ................................................................................. 2
2 Readable Customer Event Logs.............................................................. 3
3 Command Logging ............................................................................. 4
4 Port Mirroring .................................................................................. 5
5 Port Monitoring ................................................................................ 5
6 Health ........................................................................................... 7
7 RMON............................................................................................ 7
2
Switch maintenance and Diagnostics tools
1 Switch Logging
Switch Logging can be used to track informational or debugging messages from the switch. This is
dependent upon the severity level set for a particular process. Logging can be configured to send its output
to flash, console, or an external server. By default, switch logging is enabled
- On the 6860-A, type the following:
sw7 (6860-A) -> show swlog
Operational Status : Running,
File Size per file : 1250 Kbytes,
Log Device 1 : console flash,
Syslog FacilityID : local0(16),
Hash Table entries age limit : 60 seconds,
Switch Log Preamble : Enabled,
Switch Log Debug : Disabled,
Switch Log Duplicate Detection : Enabled,
Console Display Level : info
- You should see that logging is running and sending its output to both flash and the console. It does not
mean that all messages will be displayed on the console, only messages matching the severity level, by
default, informational (6). Logging can be disabled if desired.
- Type the following:
sw7 (6860-A) -> swlog disable
- The logging feature has a number of application IDs. These IDs are used to determine which process
generated the logging message and at what severity level. Consult the user guide for a list of processes
and associated severity levels. By default all processes are set to a severity level of 6, which is
informational, as indicated above. All logging messages are stored in the swlog*.log files and can be
viewed right on the switch.
sw7 (6860-A) -> show log swlog
Notes
Use CTRL+C keys to stop the display of the file.
You may also use show log swlog | grep “string to find” or show log swlog timestamp mm/dd/yy
hh:mm:ss to find specific information on the log file.
3
Switch maintenance and Diagnostics tools
AOS is now designed to provide Readable Customer Event information about important events on the
OmniSwitch in a user-friendly, consistent and customer readable format. A new set of CLI commands are
introduced to view Readable Customer Events. Unlike AOS Syslog, Readable Customer Event feature provides
logs for the most significant switch events
sw7 (6860-A) -> swlog appid all subapp all level event
- Compare the output of this command with the show log swlog from the previous section
Notice the difference in the output of both commands
The show log events command has the following output:
3 Command Logging
Like switch logging, commands entered on the OmniSwitch can captured to a log file. These can then be
reviewed later to see what changes have been made. This is a very valuable tool, especially when modifying
the switch configuration.
- Type the following:
sw7 (6860-A) -> show command-log
- You should now see the commands you entered displayed on the screen with information about the time
and where they were entered from, such as a console or TELNET session.
- To disable it enter :
sw7 (6860-A) -> command-log disable
5
Switch maintenance and Diagnostics tools
4 Port Mirroring
Port mirroring can be configured to copy traffic from one or multiple ports to another. The destination port
would normally have a traffic analyzer connected.
- Let’s create a mirroring session to copy traffic from one port to another.
sw7 (6860-A) -> port-mirroring 1 source port 1/1/1 destination port 1/1/10
5 Port Monitoring
Port Monitoring makes it possible to capture traffic being sent to and from a port and store it in /flash in
".enc" (or Sniffer) format. The data is stored in a file named pmonitor.enc by default, but this can be
modified. The file can then be transferred off the switch and viewed in detail using a traffic analyzer. It is
also possible to display the output directly to the console or to a telnet session.
- Start a port monitoring session :
sw7 (6860-A) -> interfaces 1/1/1 admin-state enable
sw7 (6860-A) -> port-monitoring 1 source port 1/1/1 enable
- You should now see a message indicating that it has finished writing the capture file. The data is stored in
a file called pmonitor.enc in the /flash directory.
sw7 (6860-A) -> ls -l
total 7948
-rw-r--r-- 1 admin user 4053444 Jan 1 2021 UAppSig.upgrade_kit
drwxr-xr-x 2 admin user 4096 Jan 5 2021 bootflash
drwxr-xr-x 2 admin user 4096 Jan 1 00:06 certified
-rw-r--r-- 1 admin user 66402 Feb 11 03:54 command.log
drwxr-xr-x 2 admin user 4096 Dec 4 17:20 diags
-rw-r--r-- 1 admin user 526184 Dec 4 17:20 eeprom
drwxr-xr-x 5 admin user 4096 Jan 1 00:04 externalCPU
drwxr-xr-x 2 admin user 4096 Feb 8 01:19 foss
-rw-r--r-- 1 admin user 239 Feb 8 01:20 hwinfo
drwxr-xr-x 2 admin user 4096 Jan 1 2021 labinit
drwxr-xr-x 2 admin user 16384 Dec 4 17:21 lost+found
drwxr-xr-x 2 admin user 4096 Jan 5 2021 network
drwxr-xr-x 3 admin user 4096 Jan 5 2021 pmd
-------r-- 1 root root 4835 Feb 11 04:09 pmonitor.enc
drwxrwx--- 2 root admins 4096 Jan 1 00:00 python
-rw-r--r-- 1 admin user 2848 Jan 2 21:45 snapall
drwxr-xr-x 6 admin user 4096 Jan 1 00:01 switch
-rw-r--r-- 1 admin user 735660 Jan 1 2021 swlog
drwxr-xr-x 2 admin user 4096 Feb 8 01:21 swlog_archive
-rw-r--r-- 1 admin user 740893 Feb 11 04:09 swlog_chassis1
-rw-r--r-- 1 admin user 1280009 Feb 7 19:13 swlog_chassis1.0
drwxr-xr-x 2 admin user 4096 Jan 5 2021 system
-------r-- 1 root root 4835 Feb 11 02:06 test.cap
-rw-r--r-- 1 admin user 594809 Jan 1 2021 u-boot.8.2.1.R01.255.tar.gz
-rw-r--r-- 1 admin user 3453 Jan 1 2021 u-boot_copy
drwxr-xr-x 2 admin user 4096 Feb 8 01:20 working
- Use the ‘?’ to display additional parameters. How would you change the name of the capture file?
sw7 (6860-A) -> show port-monitoring ?
^
STATUS FILE
6 Health
The Health feature can be used to gather basic information on the state of the switch such as CPU, memory
and traffic utilization information.
sw7 (6860-A) -> show health
CMM Current 1 Min 1 Hr 1 Day
Resources Avg Avg Avg
----------------------+---------+-------+-------+-------
CPU 7 7 7 6
Memory 64 64 64 64
7 RMON
Remote Monitoring can be used to gather statistics for displaying in OmniVista or other NMS solutions.
Make sure that interface 1/1/1 is enabled so you can get these statistics.
-> interfaces 1/1/1 admin-state enable
Chassis/
Entry Slot/Port Flavor Status Duration System Resources
-------+----------+---------+-----------+------------+----------------
1001 1/1/1 Ethernet Active 74:21:55 300 bytes
1004 1/1/4 Ethernet Active 74:21:55 300 bytes
1010 1/1/10 Ethernet Active 74:21:55 301 bytes
1023 1/1/23 Ethernet Active 74:21:55 301 bytes
1024 1/1/24 Ethernet Active 74:21:55 301 bytes
1003 1/1/3 Ethernet Active 74:21:55 300 bytes
1006 1/1/6 Ethernet Active 74:21:54 300 bytes
1005 1/1/5 Ethernet Active 74:21:54 300 bytes
1009 1/1/9 Ethernet Active 72:50:10 300 bytes
1007 1/1/7 Ethernet Active 01:13:21 300 bytes
Chassis/
Entry Slot/Port Flavor Status Duration System Resources
-------+----------+---------+-----------+------------+----------------
1 1/1/1 History Active 74:22:28 5470 bytes
2 1/1/4 History Active 74:22:28 5470 bytes
3 1/1/10 History Active 74:22:28 5471 bytes
4 1/1/23 History Active 74:22:28 5471 bytes
5 1/1/24 History Active 74:22:28 5471 bytes
6 1/1/3 History Active 74:22:28 5470 bytes
7 1/1/6 History Active 74:22:27 5470 bytes
8 1/1/5 History Active 74:22:27 5470 bytes
9 1/1/9 History Active 72:50:43 5470 bytes
10 1/1/7 History Active 01:13:54 5470 bytes
Chassis/
Entry Slot/Port Flavor Status Duration System Resources
-------+----------+---------+-----------+------------+----------------
8
Switch maintenance and Diagnostics tools
Probe's Owner: Switch Auto Probe on Chassis 1, Slot 1, Port 1, ifindex 1001
Entry 1001
Flavor = Ethernet, Status = Active,
Time = 74 hrs 23 mins,
System Resources (bytes) = 300
OmniSwitch R8
Link Aggregation Groups
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Link Aggregation Groups
• Static
- Port parameters MUST be exactly the same at both ends and within the group
• same speed (e.g., all 10 Mbps, all 100 Mbps, all 1 Gigabit, or all 10 Gigabit)
- Only works between Alcatel-Lucent OmniSwitches
• Dynamic
- IEEE 802.3ad LACP
- LACP will negotiate the optimal parameters for both ends using LACPDU (Link Aggregation Control Protocol Data Unit)
- Ports must be of the same speed within the same aggregate group
- It also works between two different devices such as switches, servers and storage systems.
Static Link Aggregation Groups - CLI
Creating a Static Aggregate Group
• -> linkagg static agg <agg_num> size <size> admin-state enable
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
------+----------+--------+-----+-------------+------------+-------------
1 Static 40000001 8 ENABLED UP 2 2
2 Dynamic 40000002 4 ENABLED DOWN 0 0
3 Dynamic 40000003 8 ENABLED DOWN 0 2
4 Static 40000005 2 DISABLED DOWN 0 0
Command Usage
show linkagg counters Displays statistics collected for the type and
number of packets transmitted and received on
link aggregate ports.
show linkagg traffic Displays the total number of packets and bytes
that are received and transmitted on link
aggregate ports.
• Hashing Control
• Control over the hashing mode Server #
• Brief Mode:
- UDP/TCP ports not included
Server #
- Only Source IP and destination IP addresses
are considered Extended Mode
-> hash-control brief
• Extended Switch Default Hasing Mode
- UDP/TCP ports to be included in the hashing 9900 extended
algorithm
6900 brief
- Result in more efficient load balancing 6860 extended
-> hash-control extended [ udp-tcp-port | no] 6865 extended
6560 extended
6465 brief
Load Balancing Multicast on Link Aggregation Groups
• Multicast traffic is by default forwarded through the primary port of the Link Aggregation Group
• User has the option to enable hashing for non-unicast traffic, which will load balance the non-unicast
traffic across all ports in the Link Aggregation Group
• If non-ucast option is not specified, link aggregation will only load balance unicast packets
OmniSwitch AOS R8
Link Aggregation
How to
✓ This lab is designed to familiarize you with Dynamic link aggregation.
Contents
1 Topology ........................................................................................ 2
2 Link Aggregation – Dynamic between 6860’s .............................................. 2
2.1. Create a Dynamic Link Aggregation .............................................................. 2
2.2. Test the configuration ............................................................................. 4
3 Link Aggregation – Dynamic between 6860-A and 6900 VC .............................. 6
3.1. Create a Dynamic Link Aggregation .............................................................. 6
3.2. Test the configuration ............................................................................. 8
2
Link Aggregation
1 Topology
Link Aggregation provides the ability to combine multiple physical ports into a single logical port for added
throughput and redundancy; this can be done statically using OmniChannel or dynamically using the IEEE
802.3ad (LACP) protocol.
• sw7 (6860-A)
• sw8 (6860-B)
-
3
Link Aggregation
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED DOWN 0 0
- Notice we have no ports associated, using the actor admin key assigned to the link aggregation, let's
associate the ports:
- Ports are associated to a dynamic link aggregation using the actor admin key. Although in the above
example the actor admin key matches the link agg number, this is not a requirement as the admin key
has local significance only.
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED UP 2 2
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
78 Dynamic 40000078 2 ENABLED UP 2 2
Dynamic Aggregate
SNMP Id : 40000078,
Aggregate Number : 78,
SNMP Descriptor : Dynamic Aggregate Number 78 ref 40000078 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
4
Link Aggregation
Dynamic Aggregate
SNMP Id : 40000078,
Aggregate Number : 78,
SNMP Descriptor : Dynamic Aggregate Number 78 ref 40000078 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 2,
Primary Port : 1/1/23,
Port Selection Hash : Source Destination Ip,
Wait To Restore Time : 0 Minutes
LACP
MACAddress : [e8:e7:32:d4:84:20],
Actor System Id : [00:00:00:00:00:00],
Actor System Priority : 0,
Actor Admin Key : 78,
Actor Oper Key : 78,
Partner System Id : [00:00:00:00:00:00],
Partner System Priority : 0,
Partner Admin Key : 0,
Partner Oper Key : 78
Agg-Down/Violation Reason: None,
- To demonstrate the redundancy capabilities, experiment with removing a link and monitor the results of
your pings tests
Tips
You can use the command ping <dest_ip_address> count <number> to send more than 6 pings.
To break a ping sequence, press the key CTRL+C
To simulate a link failure, you can bring down the corresponding interface :
interface chassis/slot/port admin-state disable (6860)
- Now, we define a dynamic link aggregate on 6900-A and 6860-A, assign the group ID 17 and size it at 2
ports.
sw1 (6900-A) -> linkagg lacp agg 17 size 2 actor admin-key 17
sw1 (6900-A) -> linkagg lacp port 1/1/5 actor admin-key 17
sw1 (6900-A) -> linkagg lacp port 2/1/6 actor admin-key 17
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
17 Dynamic 40000017 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
17 Dynamic 40000017 2 ENABLED UP 2 2
8
Link Aggregation
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
Link Aggregation
How to
✓ Create Dynamic Aggregation Links
Contents
1 Topology ........................................................................................ 2
2 Creating a Dynamic Link Aggregation ...................................................... 3
2.1. Creating a Dynamic Link Aggregation between the 6360 virtual chassis and the 6860-A 3
2.1.1. On the 6360 virtual chassis ................................................................................ 3
2.1.2. On the 6860-A ............................................................................................... 4
1 Topology
Link Aggregation provides the ability to combine multiple physical ports into a single logical port for added
throughput and redundancy. In this lab, you will create dynamic link aggregation using the IEEE 802.3ad (LACP)
protocol on AOS Release 8.
In this lab, you are going to create a new link aggregation between the 6360 Virtual Chassis and 6860-A. The link
aggregation 78 (Vlan 278) has been already created between the 2 OS6860s for in the network core.
Furthermore, for security reason, the client wants to avoid using the VLAN1 (the default VLAN). Thus, the
default VLAN on the link aggregation will be the VLAN 57.
3
Link Aggregation
2.1. Creating a Dynamic Link Aggregation between the 6360 virtual chassis and the 6860-A
- Now, we will define a dynamic link aggregate, assign the group ID 7 and configure its size to 2:
sw5 (OS6360-A) -> linkagg lacp agg 7 size 2 actor admin-key 7
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED DOWN 0 0
- Using the actor admin key assigned to the link aggregation, associate the ports 1/1/3 and 2/1/4 to the
linkagg 7:
sw5 (6360-A) -> linkagg lacp port 1/1/3 actor admin-key 7
sw5 (6360-A) -> linkagg lacp port 2/1/4 actor admin-key 7
- Now 2 ports are linked to the link aggregation, but the link aggregation is still DOWN, because the
configuration on the other side (on the 6860-A) has not been done yet.
sw5 (6360-A) -> show linkagg
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED UP 2 2
17 Dynamic 40000017 2 ENABLED UP 2 2
78 Dynamic 40000078 2 ENABLED UP 2 2
Dynamic Aggregate
SNMP Id : 40000007,
Aggregate Number : 7,
SNMP Descriptor : Dynamic Aggregate Number 7 ref 40000007 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 2,
Primary Port : 1/1/4,
Port Selection Hash : Source Destination Ip,
Wait To Restore Time : 0 Minutes
LACP
MACAddress : [2c:fa:a2:0e:62:49],
Actor System Id : [00:00:00:00:00:00],
Actor System Priority : 0,
Actor Admin Key : 7,
Actor Oper Key : 7,
Partner System Id : [00:00:00:00:00:00],
Partner System Priority : 0,
Partner Admin Key : 0,
Partner Oper Key : 7
Agg-Down/Violation Reason: None,
6
Link Aggregation
Dynamic Aggregate
SNMP Id : 40000007,
Aggregate Number : 7,
SNMP Descriptor : Dynamic Aggregate Number 7 ref 40000007 size 2,
Name : ,
Admin State : ENABLED,
Operational State : UP,
Aggregate Size : 2,
Number of Selected Ports : 2,
Number of Reserved Ports : 2,
Number of Attached Ports : 2,
Primary Port : 2/1/4,
Port Selection Hash : Source Destination Ip,
Wait To Restore Time : 0 Minutes
LACP
MACAddress : [94:24:e1:7c:79:6f],
Actor System Id : [00:00:00:00:00:00],
Actor System Priority : 0,
Actor Admin Key : 7,
Actor Oper Key : 7,
Partner System Id : [00:00:00:00:00:00],
Partner System Priority : 0,
Partner Admin Key : 0,
Partner Oper Key : 7
Agg-Down/Violation Reason: None,
o On the 6860-A:
sw7 (OS6860-A)-> vlan 57
sw7 (OS6860-A)-> vlan 57 members linkagg 7 untagged
Infrastructure
Client 5
Double-click on VMware vSphere
- IP address: 192.168.57.105
- Subnet mask: 255.255.255.0
Client 7
Double-click on VMware vSphere
- IP address: 192.168.57.107
- Subnet mask: 255.255.255.0
- To demonstrate the redundancy capabilities, put a port (belonging to the link aggregation) down, and
monitor the results of your pings tests.
sw7 (6860-A) -> interface 1/1/3 admin-state disable
802.1q
How To
✓ Apply 802.1q tagging on link aggregation and ports
Content
1 Topology ........................................................................................ 2
2 Enabling the 802.1Q Tagging ................................................................ 2
2.1. Tagging a Link ....................................................................................... 2
2.1.1. On the 6360 Virtual Chassis ............................................................................... 2
2.1.2. On the 6860-B ............................................................................................... 2
2.2. Creating Additional VLANs ........................................................................ 3
2.3. Configuring 802.1Q on Ports ...................................................................... 4
3 Testing the Configuration .................................................................... 6
2
802.1q
1 Topology
In a Layer 2 environment the Ports is used for bridging traffic across a physical connection between
switches. In an IEEE 802.1Q environment, the Default VLAN for the port is bridged, and all the other VLANs
will have the IEEE 802.1Q tag inserted for proper VLAN association at the remote side.
- Activate the port 2/1/3 on the 6360 Virtual Chassis (linked to the 6860-B):
sw5 (6360-A) -> interfaces 2/1/3 admin-state enable
- Create the VLAN 58, then modify the VLAN on the port 2/1/3 from the default VLAN (VLAN 1) to VLAN
58:
sw5 (6360-A) -> vlan 58
sw5 (6360-A) -> vlan 58 members port 2/1/3 untagged
- Create the VLAN 58, then modify the VLAN on the port 1/1/3 from the default VLAN to VLAN 58:
sw8 (6860-B) -> vlan 58
sw8 (6860-B) -> vlan 58 members port 1/1/3 untagged
- Create the VLANs 20 and 30 on the 3 switches (Virtual Chassis of 6360-A, 6860-A et 6860-B) :
sw5 (6360-A) -> vlan 20
sw5 (6360-A) -> vlan 30
- For now, no port has been assigned neither to VLAN 20 nor VLAN 30.
- Tag the VLANs 20 and 30 on the link between the 3 switches (in red on the diagram below):
o On the 6360-A:
sw5 (6360-A) -> show vlan 20 members
port type status
----------+-----------+---------------
2/1/3 qtagged forwarding
0/7 qtagged forwarding
o On the 6860-A:
sw7 (6860-A) -> show vlan 20 members
port type status
----------+-----------+---------------
0/7 qtagged forwarding
0/78 qtagged forwarding
o On the 6860-B:
sw8 (6860-B) -> show vlan 20 members
port type status
----------+-----------+---------------
1/1/3 qtagged blocking
0/78 qtagged forwarding
If we take, for example, the port 1/1/3 on the 6860-B, we can see that it is carrying tagged information for
VLANs 20 and 30 and bridging the VLAN 58.
Reminder
A physical port always has 1 VLAN (the default VLAN for the port) that bridges traffic (level 2)
6
802.1q
- Let’s assign the port of each Client VM to the appropriate VLAN, and modify their IP addresses as
described below:
o Client 5:
sw5 (6360-A) -> vlan 20 members port 1/1/1 untagged
sw5 (6360-A) -> interfaces 1/1/1 admin-state enable
sw5 (6360-A) -> show vlan members port 1/1/1
vlan type status
--------+-----------+---------------
20 default forwarding
o Client 6:
sw5 (6360-A) -> vlan 30 members port 2/1/1 untagged
sw5 (6360-A) -> interfaces 2/1/1 admin-state enable
sw5 (6360-A) -> show vlan members port 2/1/1
vlan type status
--------+-----------+---------------
30 default forwarding
- Check that the Client 5 (VLAN 20) can reach its gateway (ping 192.168.20.7)
- Check that the Client 6 (VLAN 30) can reach its gateway (ping 192.168.30.8)
7
802.1q
- How are the Clients VM exchange between each other (Layer 2 or Layer 3)?
----------------------------------------------------------------------------------------------------------------------------- -
----------------------------------------------------------------------------------------------------------------------------- -
- Save the configuration and Copy running to certified all the switches managed
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Spanning Tree
1/1/2
F - DP ROOT BRIDGE F - DP
• GOAL
• Self-configuring algorithm that
F - RP
maintains a loopfree topology 1/1/1 F - RP 1/1/1
SW-B (MAC@: bb) 1/1/2 1/1/5
on a network F - DP BLK- ALT
X SW-C (MAC@: cc)
PRIORITY: 32768
• Provides helps to provide data PRIORITY: 32768
• Supports two Spanning Tree operating modes: SW-A (MAC@: aa) 1/1/2
1/1/3
VLAN 2
VLAN 3
X
1/1/2
1/1/3
SW-B (MAC@: bb)
X
- flat (single STP instance per switch)
- per-VLAN (single STP instance per VLAN).(By default on OmniSwitch)
Per-VLAN
1/1/1 VLAN 1 1/1/1
SW-A (MAC@: aa) 1/1/2 VLAN 2 1/1/2 SW-B (MAC@: bb)
• Supports three Spanning Tree operating protocols: 1/1/3 VLAN 3 1/1/3
STP : Convergence time : 50 secs
RSTP : Convergence time : < 1 sec
MSTP : < 1 sec ->
STP reminder
• SPECIFICATION
• IEEE 802.1S - DEFAULT PORT PATH COSTS 16-bit Port Path Cost PPC 32-bit Port Path Cost PPC
VLAN 20
PRIORITY: 32768
MAC@ : E8:E7:32:56:45:C4 ROOT BRIDGE
SW-A (MAC@: aa) DP 1/1/1 1/1/1 ALT - BLK
1/1/5 1/1/2
SW-B (MAC@: cc) SW-C (MAC@: bb)
D- FW ROOT BRIDGE D -FW DP FW RP-FW
1/1/1 1/1/2
MAC@ : E8:E7:32:CD:63:D3 MAC@: E8:E7:32:D4:85:0D
PRIORITY: 20000 PRIORITY: 32768
Protocol selection
Mode selection
Protocol selection
Select protocol
Mode Selection
Select Mode
Monitor
spantree [cist | msti msti_id | vlan vlan_id] [port chassis/slot/port[-port2] | linkagg agg_id[-agg_id2]] priority priority
Displays Spanning Tree bridge information for a per-VLAN mode VLAN instance Forwarding // Discarding
How to
✓ Configure the Spanning Tree Protocol (STP) options on an OmniSwitch.
Contents
1 Topology ........................................................................................ 2
2 Managing the Spanning Tree Protocol ...................................................... 2
2.1. Changing the priority of the 6860-A ............................................................. 2
2.2. Identifying the port status ........................................................................ 2
2.3. Testing the redundancy ........................................................................... 6
3 Using the 1x1 Spanning Tree Mode ......................................................... 8
3.1. Configuring the Priority............................................................................ 9
3.2. Verifying the Configuration ....................................................................... 9
3.2.1. Verifying the VLAN 20 Configuration..................................................................... 9
3.2.2. Verifying the VLAN 30 Configuration................................................................... 11
2
Spanning Tree Protocol (STP)
1 Topology
The Spanning Tree Protocol (STP) is an important concept to understand in a bridged network.
- Customer wants to have the 6860-A as root bridge for vlan 20 and vlan 30
To achieve this, change the priority of the 6860 to ensure that:
sw7 (6860-A) -> spantree vlan 20 priority 20000
sw7 (6860-A) -> spantree vlan 30 priority 20000
o On the 6860-A:
sw7 (6860-A) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 32768 (0x8000),
Bridge ID : 8000-2c:fa:a2:0e:62:3f,
Designated Root : 8000-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 0,
Root Port : None,
TxHoldCount : 3,
Topology Changes : 5,
Topology age : 03:00:02,
Last TC Rcvd Port : Slot 0 Interface 7,
Last TC Rcvd Bridge : 8000-94:24:e1:7c:82:1d,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
o On the 6860-B:
sw8 (6860-B) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 32768 (0x8000),
Bridge ID : 8000-e8:e7:32:d4:84:03,
Designated Root : 8000-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 3,
Root Port : Slot 0 Interface 78,
TxHoldCount : 3,
Topology Changes : 5,
Topology age : 03:01:19,
Last TC Rcvd Port : Slot 0 Interface 78,
Last TC Rcvd Bridge : 8000-2c:fa:a2:0e:62:3f,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
This gives you the configured STP parameters of VLAN 20. Notice the mode (Per VLAN or 1X1), meaning
each VLAN runs a separate STP instance.
Additionally, take note of the Bridge ID and the Designated Root. If they are the same, your switch is the
Root Bridge for VLAN 20.
4
Spanning Tree Protocol (STP)
- We can also deduce from the above output that our STP is relatively stable, it has been 03:01:19
hours since the last topology change (Topology Age) and we have only had 5 Topology changes
By default, the bridge priority is 32768 (0x8000). Since all priorities are identical by default, the switch
with the lowest MAC address is selected as the root bridge (in this example, the 6860-A has the lowest
MAC address).
Also, notice that only one side of the link(s) has a port or link aggregation with the status BLK (blocking).
This ensures the neighbor(s) are still able to initiate a topology change in the event of a failure.
- Fill up the following diagrams:
For VLAN 20
For VLAN 30
Notes
The Client 5 is already in the VLAN 20. If not, type: sw5 (6360-A) -> vlan 20 members port 1/1/1 untagged
- Configure the network interface of the Client 8 with the following information:
Client 8:
IP address = 192.168.20.108
Subnet mask = 255.255.255.0
Default Gateway = 192.168.20.7
- Start a continuous ping between client connected across an uplink (e.g between client 8 and client 5):
Client 8:
C:\> ping –t 192.168.20.105
- Once your ping is successful, remove the connection between the 6360 virtual Chassis and the 6860-A:
sw5 (6360-A) -> linkagg lacp agg 7 admin-state disable
- Relaunch the commands above, and notice how quickly Rapid STP recovers from a link failure:
sw7 (6860-A) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 32768 (0x8000),
Bridge ID : 8000-2c:fa:a2:0e:62:3f,
Designated Root : 8000-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 0,
Root Port : None,
TxHoldCount : 3,
Topology Changes : 8,
7
Spanning Tree Protocol (STP)
Tips
Remember that anytime there is a physical change, the STP will make the network infrastructure re-converge.
8
Spanning Tree Protocol (STP)
As the default parameters are the same for each VLAN (base MAC address, cost links, etc…), the status of
each port is the same for each VLAN. To take advantage of the 1x1 mode and provide load-balancing, it may
be necessary to modify bridge priority to have a predictable behavior.
For example, this design would be interesting, considering that the blocked port for each VLAN is different:
Here, the 6360 VC is the access switch and 6860s are core switches. The 6360 VC has a dual attachment to
the 6860s to provide redundancy. The goal is to have one of the uplinks up for VLAN 20 and the other one for
VLAN 30.
9
Spanning Tree Protocol (STP)
o On the 6860-B:
sw8 (6860-B) -> show spantree vlan 20
Spanning Tree Parameters for Vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 32768 (0x8000),
Bridge ID : 8000-e8:e7:32:d4:84:03,
Designated Root : 4E20-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 3,
Root Port : Slot 0 Interface 78,
TxHoldCount : 3,
Topology Changes : 11,
Topology age : 00:16:44,
Last TC Rcvd Port : Slot 0 Interface 78,
Last TC Rcvd Bridge : 8000-2c:fa:a2:0e:62:3f,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
o On the 6360:
sw5 (6360-A) -> show spantree vlan 20
Spanning Tree Status : ON,
Protocol : IEEE Rapid STP,
mode : Per VLAN (1 STP per Vlan),
Priority : 32768 (0x8000),
Bridge ID : 8000-94:24:e1:7c:82:1d,
Designated Root : 4E20-2c:fa:a2:0e:62:3f,
Cost to Root Bridge : 3,
Root Port : Slot 0 Interface 7,
TxHoldCount : 3,
Topology Changes : 16,
Topology age : 00:20:47,
Last TC Rcvd Port : Slot 0 Interface 7,
Last TC Rcvd Bridge : 8000-2c:fa:a2:0e:62:3f,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
o On the 6860-A:
Sw7 (6860-A) -> show spantree
sw7 (6860-A) -> show spantree vlan 30
sw7 (6860-A) -> show spantree vlan 30 ports
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Dual-Home Link (DHL)
•DHL
• GOAL •LinkA VLANs •LinkB VLANs
•ACCESS LAYER
• 0 to 600 seconds
•DHL
• None (default) :The staled MAC adress entries are kept in the MAC table
• MVRP Enhanced:
• Joins only VLAN that are maps on DHL link
• When DHL link fails, the other link issues joins message with « new » flags set
• When DHL link recovers, the link issues new joins to reestablish connectivity
• RAW Flooding
• List of MAC addresses learned on non DHL port for all VLAN assigned to DHL links
• Send a broadcast frame with source MAC address from that list on redundant DHL
links in case of failure, or on the primary in case of recovery.
MAC Address Flushing MVRP ENHANCED
SW2 1/3 SW3
1/2
1/1 1/1
•VLAN 2 •MVRP Join +
SW2 1/3 SW3
•VLAN 1 • « New » flag
1/2
1/1 1/1
•DHL SW1
•VLAN 1 •VLAN 2 •(VLAN 2)
SW1
RAW FLOODING
•(VLAN 2)
SW2 1/3 SW3
How to
✓ Setup the high availability Dual-Home Link Active-Active feature.
Contents
1 Topology ........................................................................................ 2
2 Configuring the Prerequisites ............................................................... 3
2.1. Prerequisite: Creating a linkagg from 6360 VC to 6860-B .................................... 3
2.2. Assigning VLANs on the Link Aggregations ...................................................... 4
2.3. Tag the VLAN 20 and 30 on the link aggregation ............................................... 4
2.4. Tag the VLAN 57 on the link aggregation 78 .................................................... 5
3 Configuring the DHL Active-Active link .................................................... 5
3.1. DHL session Creation ............................................................................... 5
4 DHL Active-Active Monitoring ............................................................... 6
2
Dual Home Link Active-Active
1 Topology
The customer wants to configure the dual home link solution instead of the STP.
Dual-Home Link (DHL) provides fast failover between core and edge switches without implementing Spanning
Tree.
This mapping prevents network loops by designating only one active link for each VLAN, even though both links
remain active and are associated with each of the common VLANs.
When one of the 2 active DHL links fails or is brought down, the VLANs mapped to that link are then forwarded
on the remaining active link to maintain connectivity to the core. When the failed link comes back up, DHL
waits a configurable amount of time before the link resumes forwarding of its assigned VLAN traffic.
DHL linkA and linkB must belong to the same default VLAN.
3
Dual Home Link Active-Active
- For the purpose of the lab, create a link aggregation between the 6360 VC and the 6860-B:
o 6360 VC
sw5 (6360-A) -> linkagg lacp agg 8 size 2 actor admin-key 8
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
7 Dynamic 40000007 2 ENABLED UP 2 2
8 Dynamic 40000008 2 ENABLED DOWN 0 0
o 6860-B
sw8 (6860-B) -> show vlan members port 1/1/3
vlan type status
--------+-----------+---------------
20 qtagged forwarding
30 qtagged forwarding
58 default forwarding
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
8 Dynamic 40000008 2 ENABLED UP 2 2
18 Dynamic 40000018 2 ENABLED UP 2 2
78 Dynamic 40000078 2 ENABLED UP 2 2
Notes
Spanning Tree is disabled on all the DHL enabled ports
IP address = 192.168.20.105
Subnet mask = 255.255.255.0
Default Gateway = 192.168.20.7
- From Client 5, start a continuous ping to the VLAN 20 IP interface (created on the 6860-A):
C:\> ping –t 192.168.20.7
- The VLAN 20 is blocked on the link aggregation to avoid a loop. Thus, the traffic goes from 6360-A to
6860-A via the link aggregation 7:
sw5 (6360-A) -> show vlan 20 members
port type status
----------+-----------+---------------
1/1/1 default forwarding
0/7 qtagged forwarding
0/8 qtagged dhl-blocking
- Now disable the link aggregation 7 on the 6360-A while the ping is still running:
- Stop the ping and enable the link aggregation 7 on the 6560-A:
sw5 (6360-A) -> linkagg lacp agg 7 admin-state enable
Notes
It can takes a few seconds for the VLAN 20 to be forwarded back on the link aggregation 8: when the failed link
comes back up, DHL waits a configurable amount of time (default: 30 secs) before the link resumes forwarding
of its assigned VLAN traffic.
- Save configuration:
sw5 (6360-A) -> write memory flash-synchro
sw8 (6860-B) -> write memory flash-synchro
OmniSwitch R8
Virtual Router Redundancy Protocol (VRRP)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Virtual Router Redundancy Protocol (VRRP)
• Protocol for electing a switch as the master virtual router Master Backup
• Dynamic fail over in the forwarding responsibility Multicast - 224.0.0.18
Master 1 Backup 1
Backup 2 Master 2
Subnet
Def GW = Def GW =
VR 1 IP address VR 2 IP address
* Two virtual routers with their hosts splitting traffic between them
VRRP reminder
• VRRP Tracking
ADDRESS
X
• 2
• IPV4-INTERFACE
• IPV6-INTERFACE Master 1 Pri = 100 1/1/3 1/1/1 Backup 1 Pri = 80
• PORT
VLAN
R1
• Virtual Router ID = 1
3 VLAN 20 (int_20) R2 4
Backup 1 Pri = 70
Master 1 Pri = 80
1 5
Default Route
show ip vrrp
show ip vrrp 1
show ip vrrp statistics
* At least two virtual routers must be configured on the LAN—a master router and a backup router.
VRRP – Full configuration step
• Step by step
Creates a VRRP virtual router for IP addresses
- Allow by default
- may be disabled “no preempt”
R1 Virtual Router ID = 1
3 R2 3
Enabled for a port or ip address, VLAN 20 (int_20)
or Vlan , or address
Backup 1 Pri = 70 Master 1 Pri = 80
1 4
Associated a Tracking Policy with VRRP
a Virtual Router
How to
✓ Configure the VRRP protocol in Release 8
Contents
1 Topology ........................................................................................ 2
2 Configuring the VRRP ......................................................................... 3
3 Configuring the Master / Backup............................................................ 8
2
Virtual Router Redundancy Protocol (VRRP)
1 Topology
The Virtual Router Redundancy Protocol is a standard router redundancy protocol which provides redundancy by
eliminating the single point of failure inherent in a default route environment. The VRRP router, which controls
the IP address associated with a virtual router is called the master router and is responsible for forwarding
virtual router advertisements. If the master router becomes unavailable, the highest priority backup router
transitions to the master state.
3
Virtual Router Redundancy Protocol (VRRP)
o On 6860-A
o On 6860-B
- In the steps above, we have created 2 VRRP instances 1 and 2 (VRRP 1, VRRP 2), and associated it with
respectively VLAN 20 and 30 (VRRP 1 > VLAN 20, VRRP 2 > VLAN 30). We have then associated a Virtual IP
address of 192.168.20.254 to VRRP 1 and 192.168.30.254 to VRRP 2 which both VRRP instances will share.
- Also take note of the Virtual MAC address. This is the address that the router will use in the active state
for all the responses. This prevents end stations from having to re-arp to their router in the event of a
failure:
sw7 (6860-A) -> show ip vrrp statistics
Checksum Errors : 0,
Version Errors : 0,
VRID Errors : 0
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Master 98575 1 0
2 int_30 Master 81058 1 0
6
Virtual Router Redundancy Protocol (VRRP)
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Backup 44764 0 448
2 int_30 Backup 34581 0 346
- From the “statistics” command, we can see that the 6860-A is the active virtual router. Since all priorities
are equal, the lowest router ID is the selection criteria.
- The DHCP server has not been configured with these gateway addresses, so to perform this test we need
to switch back to static addresses by setting the gateway for clients 5 and 9.
- Now let's change our default gateway for clients 5 and 9 :
Client 5:
IP address = 192.168.20.105
Subnet mask = 255.255.255.0
Default Gateway = 192.168.20.254
Client 9:
IP address = 192.168.30.109
Subnet mask = 255.255.255.0
Default Gateway = 192.168.30.254
- Notice that the “Physical Address” which corresponds to the IP address 192.168.20.254 is the VRRP
interface MAC address (VRRP instance 1 > VLAN 20).
- Now start a continuous ping to VRRP interface (192.168.20.254) from the client 5 …
C:\> ping –t 192.168.20.254
- … Then remove the master VRRP gateway (in this example 6860-A). We will simply reboot the switch
(don’t forget to save!):
6860-A -> write memory
6860-A -> reload from working no rollback-timeout
- Notice how quickly the DHL switch from one link to the other, and how fast the Backup VRRP becomes
master. Check the VRRP status on 6860-B:
sw8 (6860-B) -> show ip vrrp statistics
Checksum Errors : 0,
Version Errors : 0,
VRID Errors : 0
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Master 6205571 1 62003
2 int_30 Master 6195388 1 61900
- To provide load balancing between both 6860, we will configure the 6860-A to be Master on VLAN 20, and
the 6860-B to be Master on VLAN 30.
- The default priority is 100. Let’s put a priority of 150 for VRRP 1 on 6860-A, and a priority of 150 for VRRP
2 on 6860-B:
Warning
THE VRRP INSTANCE MUST BE DISABLED BEFORE CHANGING THE PRIORITY
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Master 1895 1 3
2 int_30 Backup 112204 0 1122
Interface
VRID Name State UpTime Become Master Adv. Rcvd
----+--------------------------------+----------+----------+-------------+----------
1 int_20 Backup 6356865 1 62164
2 int_30 Master 2228 1 3
OmniSwitch R8
Consistent AOS Network Security
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Use the Advanced AOS Security mechanisms in order to
protect the core network as well as data
- Ping of Death, SYN attack, Land attack, Teardrop, Bonk, Boink, Pepsi
- Detect ARP flooding
QoS rate-limits ARP packets to the CPU
- Detect any packet with invalid source or destination IP address
A packet matching specific criteria well be marked at “Invalid-IP”
- Detect Multicast IP and MAC address mismatch
- Detect Ping overload
System measures the rate of ICMP requests received over a period of 5 seconds, and detects a DoS attack if the measured rate
exceeds 100 pkts/sec
- Detect packets received with a source address of 127.0.0.1
- Traps can be configured or QM can be used to Quarantine device
-> ip udp relay service {tftp | tacacs | ntp | nbns | nbdd | dns} [description description]
• To specify a VLAN on which traffic destined for the specified UDP service port is forwarded
-> ip udp relay {service {tftp | tacacs | ntp | nbns | nbdd | dns} | port port_num
[description description]} vlan vlan_id[-vlan_id2]
• To specify the UDP server IP address to which traffic destined for a UDP port is forwarded as
unicast packets.
-> ip udp relay {service {tftp | tacacs | ntp | nbns | nbdd | dns} | port port_num [description
description]} address ip_address
Generic UDP Port Relay
• To display the generic UDP relay service configuration
-> show ip udp relay [service {tftp | tacacs | ntp | nbns | nbdd | dns} | port port_num]
• To display the current statistics for each UDP port relay service.
-> show ip udp relay statistics [service {tftp | tacacs | ntp | nbns | nbdd | dns}] [port
[port_num]]
• Creates a drop-entry as soon as it attempts to resolve an ARP for the purpose of forwarding
traffic
- The entry is removed either:
when the ARP is resolved, or
after 12 attempts have been made, once every 5 secs. (~1 minute)
• Duplicate request received during the time the switch is attempting to resolve the ARP is
dropped
- Avoids CPU utilization climb and destabilizing the switch while next-hop is being resolved
ARP Poisoning Detection
• Detects the presence of a ARP-Poisoning host on the network
- Identifies unsolicited ARP Replies from an attacker, false ARP requests and unsolicited
ARP replies
- Sends out ARP Requests for certain configurable restricted addresses and its own interface addresses
- Reply to all ARP Requests for its IP Interface address, but will not learn the ARP mapping of the source from such
packets
- ARP Reply will be accepted only if the Switch had originated a corresponding ARP Request
- Logs the event and send a trap
Displaying the number of attacks detected for configured ARP poison restricted-addresses
-> show ip dos arp-poison
WED JAN 30 16:15:35 : IP (15) info message:
+++ 1/0 ARP poisoning REPLY from 192.168.60.100.
The table contains a list of IP addresses and their corresponding MAC addresses
Entries in the table are used to translate 32-bit IP addresses into 48-bit Ethernet or IEEE 802.3
hardware addresses
Dynamic addresses remain in the table until they time out (Default 300 sec.)
-> arp 171.11.1.1 00:05:02:c0:7f:11
Static entries are permanent and are created using the IP address of the entry followed by its
physical (MAC) address
-> arp 171.11.1.1 00:05:02:c0:7f:11 alias
Use the alias keyword to specify that the switch will act as an alias (proxy) for this IP address.
Local Proxy ARP
Allows the network administrator to configure proxy functionality on the switch
Enables proxy ARP on a per VLAN basis
All ARP requests received on VLAN memberSwitch
ports
B
are answered with the MAC address of the
VLAN’s virtual IP router port ARP Normal ARP
PC 1 PC 2
192.168.10.101 192.168.10.102
-> arp filter ip_address [mask mask] [vid] [sender | target] [allow | block]
-> arp filter 198.0.0.0 mask 255.0.0.0 sender block
• Uni-directionnal 1/3/1
1/3/2 2/1/16
- User-port 1/3/3
1/3/4
2/1/17
- User-port Release 8:
no direct user-to-user traffic
only user-to-network
- Network-port
no direct network-to-network traffic
only network-to-user
Port Mapping
• Creating a Mapping Session
- -> port-mapping session_id [user-port {slot chassis/slot | chassis/slot/port[-port2] | linkagg agg_id}] [network-port {slot
chassis/slot | chassis/slot/port[-port2] | linkagg agg_id}]
Examples
-> port-mapping 3 user-port 1/2/3 network-port 1/6/4
-> port-mapping 4 user-port 1/2/5-8
• Enables, disables a port mapping session -> port-mapping 5 user-port 1/2/3 network-port slot 3
-> port-mapping session_id {enable | disable}
• Creates a port mapping session with the user ports, network ports, or both user ports and network ports
• -> port-mapping session_id [user-port {slot chassis/slot | chassis/slot/port[-port2] | linkagg agg_id}] [network-port {slot
chassis/slot | chassis/slot/port[-port2] | linkagg agg_id}]
IPA IPB
• Description MACA MACB
- Once a DHCP lease is offered to a L2 client, stores the router ARP cache ARP cache
IPB -> MAC1 IPA -> MAC1
IP advertised in the DHCP ACK
- An ARP reply with the access router @MAC is sent for all
subsequent ARP requests to the access router or to any other
IPs in the same VLAN/subnet
MAC Forced Forwarding - CLI/WebView
-> port-mapping 1 user-port 1/1/1-2 network-port linkagg 8
-> port-mapping 1 dynamic-proxy-arp enable
-> dhcp-snooping vlan 20 admin-state enable
-> port-mapping 1 enable
-> show port-mapping
SessionID USR-PORT NETWORK-PORT
-----------+----------------+------------------
1 1/1/1 0/8
1 1/1/2
-> show port-mapping status
• Configures the action on a single port, a range of ports, when the port reaches the storm
violated state
• Violation options
- Block only traffic that violates LPS port restrictions MAC-1
-> authorized traffic is forwarded on the port
- Shutdown the port
MAC Limit
• Steps to Configuring LPS: Or
MAC List
- Enable LPS on a port
- Set the number of learned Mac’s
- Set the time limit for LPS MAC-2
• Disables all learning on the port. Existing MAC addresses are retained but no additional learning of
addresses, except for static MAC addresses, is allowed
• Configures the amount of time, in minutes, to allow source learning on all LPS ports.
• Configuring the maximum number of filtered MAC addresses that can be learned on the LPS
port(s)
-> port-security port chassis/slot/port[-port2] maximum number
• Converting the dynamically learned MAC addresses on the LPS port(s) to static MAC addresses
-> port-security {port chassis/slot/port[-port2] | chassis} convert-to-static
• The following set of commands enables LPS on port 1/1/1, converting dynamically learned
MAC address of currently attached device to static. When another device is connected to
port 1/1, a violation occurs and this port will be shutdown
• Clears all port violations on the switch for the given port
-> clear violation port { chassis/slot/port[-port2] | linkagg agg_id[-agg_id2]}
Learned Port Security - L2 Notification
• Provides notification of newly learned bridged MAC addresses after the port matches the
specified threshold amount
-> port-security port chassis/slot/port[-port2] learn-trap-threshold number
• Sends a trap for every MAC learned after the threshold is reached. It contains:
- MAC address
- Slot/Port
- VLAN
- Date & Time
OmniSwitch AOS R8
Learned Port Security
How to
✓ This lab is designed to familiarize yourself with Learned Port Security
feature.
Contents
1 Topology ........................................................................................ 2
2 Learned Port Security ........................................................................ 3
2.1. Configure the switch to learn maximum one mac address ................................... 3
2.2. Configure the switch port to accept the traffic only from currently attached device ... 4
2.3. Port violation........................................................................................ 5
2
Learned Port Security
1 Topology
The LPS feature is used in networks to prevent employees to use small basic switches or hub in the enterprise
network. This can grandly help IT stuff to efficiently manage network security.
Learned Port Security provides controls over the source learning function on an OmniSwitch.
- On the 6860-B, assign port 1/1/7 to vlan 180 and activate the interface:
Notes
In this example above, there’s 3 mac addresses: 1 from client 4 and 2 from 6560. The 6560 uses different mac
addresses for Layer 2 traffic, like LLDP or STP and another one, the chassis base mac address for Layer3 traffic
associated with VLAN 1 IP interface.
3
Learned Port Security
- Once again try to ping the gateway from both client 3 and 6560 (it should fail).
- The first mac address seen is normally bridged but the others are filtered. There’s more chance for
Layer 2 traffic to be bridged than other Layer 3 traffic.
- Now it should remain only 2 mac addresses: one from client 3 and another one from the IP interface of
VLAN 1 in 6560.
6860-B -> show mac-learning port 1/1/7
Legend: Mac Address: * = address not valid,
Notes
Here, the Client 4 mac address is bridged, the 6560B is filtered. Thus we can ping the gateway from client 4
but not from 6560.
2.2. Configure the switch port to accept the traffic only from currently attached device
In order to allow only one dynamically learned mac address on a switch LPS port (only fixe ports), we will
use convert-to-static parameter with port-security. The currently attached devices mac address will be
associated to this LPS port and one static entry will be created in mac address table. This means that only
this device will be allowed on that port.
Please notice that the device must be learned on the LPS port before to enter the command port-security
convert-to-static
- To convert the dynamically learned MAC addresses to static addresses on a specific LPS port at any time
irrespective of the source learning time window, use the port-security convert-to-static command as
shown below:
6860-B -> port-security port 1/1/7 convert-to-static
- Analyze carefully the output of the command shown below, you can see that the currently attached
device mac address is learned on the specified port and the type of the entry is permanent (static).
6860-B -> show mac-learning port 1/1/7
Legend: Mac Address: * = address not valid,
Notes
In the example above, the switch mac address age out, so as there’s only the client 3 mac address learnt on the
port, is still forwarding
- Try to ping again the gateway from both client 4 and 6560-B. You should see a warning message on the
6860-B :
Tue Feb 11 02:58:49 : AGCMM AG-Lps info message:
+++ AGCMM_INFO:(1392087529.552)lpsPortViolation[433]Port-security Violation on PORT 1/1/7 : Shutting down
port
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
IP Interfaces
• Use
Application Interface-name
-------------+--------------------------------
dns -
ftp -
ldap -
ntp -
radius -
sflow -
snmp Loopback0
ssh -
swlog -
tacacs -
telnet -
tftp - -
Static / Dynamic Routing
Static vs Dynamic Routing
Static Routes
• Entered manually by the network administrator
• Anytime the network topology changes, administrator must update the routes
• Static routes always have priority over dynamic routes
• Suitable for environments where network traffic is relatively predictable and where network design is
relatively simple
-> ip static-route <Destination Network>/<Mask> gateway <host> [METRIC | BFD-STATE | NAME | TAG | NO]
Static Routes - Configuration
• Specify a static route to the destination IP address 134.1.21.0
-> ip static-route <Destination Network>/<Mask> follows <host> [METRIC | NAME | TAG | NO]
Recursive Static Route - CLI
-> ip static-route 172.30.0.0/16 follows 2.2.2.2 metric 1
-> show ip router database
Legend: + indicates routes in-use
* indicates BFD-enabled static route
r indicates recursive static route, with following address in brackets
Total IPRM IPv4 routes: 4
Destination Gateway Interface Protocol Metric Tag Misc-Info
-------------------+------------------+-----------+---------+--------+-------+-----------------
+ 2.2.2.2/32 192.168.100.253 vlan100 RIP 2 0
+ 10.1.20.0/24 10.1.20.1 vlan20 LOCAL 1 0
+r 172.30.0.0/16 192.168.100.253 vlan100 STATIC 1 0 [2.2.2.2]
+ 192.168.100.0/24 192.168.100.1 vlan100 LOCAL 1 0
• Invalid
• Default at 180 - range 3..360
- The time interval before an active route expires (and enters the “garbage” state)
- AOS to enforce the constraint that invalid cannot be less than 3x of update
• Holddown
• Default at 0 - range 0..120
- The time interval during which a route remains in the holddown state. Whenever a route is seen from the same
gateway with a higher metric than the route in the RIB, the route goes into holddown.
- This excludes route updates with an INFINITY metric
ID = 4.4.4.4 ID = 5.5.5.5
Finding Neighbors
◼ Exchange Process
R1 State R1 R2 R2 State
Down Down
Hello
Init Init
Hello
2-Way 2-Way
Hello
Exstart Exstart
(cont. R1 ID)
Exchange Exchange
Hello
Loading (cont. R2 ID) Loading
Full Full
⚫ Init State
A destination router has received a new router’s hello packet
Adds it to its neighbor list
⚫ 2-Way State
The new router receives a unidirectional reply from the destination router
Adds the destination router to its neighbor list
Designated & Backup Designated Routers
◼ Once in 2-Way State, the routers elect a Designated Router (DR) and a Backup
Designated Router (BDR)
◼ Role
⚫ Maintaining the LSDB (Link State DataBase)
⚫ Receiving and disseminating update to the routers on the segment
DR 2 BDR DROther
Update
DROther
New link! 1
R4
Designated & Backup Designated Routers
◼ DR & BDR Election
⚫ The DR & BDR are elected according to the following parameters:
1. IP interface priority (highest priority)
2. Router ID (highest value)
⚫ If the DR fails,
The BDR is promoted to DR
Another Router (DROther) is promoted to BDR
DR BDR DROther
DROther DROther
ID = 4.4.4.4 ID = 5.5.5.5
Priority = 100 Priority = 50
Designated & Backup Designated Routers
◼ Election > Exstart State
⚫ DR & BDR form adjacencies with the other OSPF routers
◼ Highest router ID becomes the master and start the exchange process
ID = 1.1.1.1 ID = 2.2.2.2 ID = 3.3.3.3
Priority = 250 Priority = 200 Priority = 150
SLAVE
DR BDR DROther
DROther DROther
MASTER
ID = 4.4.4.4 ID = 5.5.5.5
Priority = 100 Priority = 50
MASTER SLAVE
R4 R1 (DR)
R4 DBD R1 (DR)
➢ ID Adv. Router
Init ➢ Cost Adv Router Init
➢ Seq nb
2-Way 2-Way
Exstart Exstart
LSAck
Exchange Exchange
Sharing Routing Information
◼ Loading information in the Database > Loading State
⚫ If the master has more up-to-date information than the slave,
Slave sends a Link State Request (LSR) to the master
Master then sends a Link State Update (LSU) with detailed information of the links
Slave incorporate informations in its local database
Slave sends a Link State Acknowledge (LSAck) to the master
⚫ If slave has more up-to-date information,
It will repeat the Exchange and Loading states
MASTER SLAVE
MORE
UP-TO-DATE
INFO R4 R1 (DR)
R4 R1 (DR)
Init LSR Init
2-Way 2-Way
Exstart LSU Exstart
Exchange Exchange
Loading LSAck Loading
Sharing Routing Information
State
Down
◼ Master & Slave synchronized > Full State
Init
⚫ Incremental updates after entering a full state
2-Way
Exstart
◼ In case of Update (ex. new route discovered) Exchange
3 Loading
R1 R2 R3 Full
DR BDR DROther
2
VLAN 1
DROther
1
R4
◼ Cost is calculated:
⚫ From the root node to every other node in the network
⚫ Using the metric cost of the outgoing interfaces
THE SPF IS
RUNNING TOO
OFTEN! AREA 0
DISTRIBUTION
… … ACCESS … …
… …
AREA 2.2.2.2
AREA 1.1.1.1
ROUTER TYPES
Backbone Router (BB) & Internal Router (IR)
◼ Routers that are entirely within the backbone area are called Backbone Router
(BB)
◼ Routers that are wholly within an area are called Internal Routers (IR)
BB
IR … IR IR … IR
AREA 2.2.2.2
AREA 1.1.1.1
Area Border Router (ABR)
◼ Router that attaches multiples areas (backbone + other areas)
◼ Main function
⚫ Summarize sub networks found throughout the OSPF system
ABR
AREA 0.0.0.0 …
AREA 1.1.1.1
Autonomous System Boundary Router (ASBR)
◼ Router that is running multiple routing protocols
◼ Serves as a gateway
EXTERNAL DOMAIN
RIP
ASBR
AREA 0.0.0.0 …
AREA 1.1.1.1
LSA TYPES
LSA – Type 1 > Router LSA
◼ Each router within the area floods router LSA
R2
R1 R3
AREA 0.0.0.0
❖ Each router sends a LSA – Type 1 to each other with all its directly connected links
LSA – Type 2 > Network LSA
◼ Only generated by DR (multi-access network)
R2 DR
R3
R1
AREA 0.0.0.0
AREA 0.0.0.0
R3
❖ R1 floods the new route information via a LSA – Type 1 (Router LSA) in the Area 2
❖ ABR (1) creates an LSA – Type 3 (Summary LSA) and flood it into the area 0
AREA 0.0.0.0
R3
AREA 2.2.2.2
LSA – TYPE 5 ABR (1)
ABR (2)
LSA – TYPE 5 LSA – TYPE 5
ASBR … R2
…
RIP R4 R5
❖ The ASBR redistributes the RIP routes into OSPF via a LSA – Type 5 – External LSA
❖ The LSA – Type 5 – External LSA is flooded into all the other areas
LSA – Type 4 > Summary ASBR LSA
◼ Generated by the ABR
AREA 0.0.0.0
R3
AREA 2.2.2.2
LSA – TYPE 1 ABR (1)
ABR (2)
LSA – TYPE 4 LSA – TYPE 4
ASBR … R2
…
R4 R5
RIP
AREA 1.1.1.1
EXTERNAL DOMAIN
❖ When the ABR (1) receives the LSA, it creates a LSA Type 4 – Summary ASBR LSA and flood it into the area 0
◼ LSA – Type 7 carries exact same information as LSA – Type 5 but is not blocked
in NSSA areas
AREA 0.0.0.0
AREA 2.2.2.2
(NSSA AREA) R3
❖ The ASBR redistributes the RIP routes into OSPF via a LSA – Type 7 – External LSA (because Area 2 is NSSA)
❖ The ABR (1) convert the LSA – Type 7 to LSA – Type 5, then flood it into all the other areas
*LSA-Type 6 are not explained in this course as they are not used in today’s infrastructures
AREA TYPES
Standard Area
AREA 0 STANDARD AREA 1
R1 R2 R3
EXTERNAL
TYPE 1/2 TYPE 1/2
DOMAIN
TYPE 3
TYPE 5
TYPE 4
◼ Router Types
⚫ R2 = Area Border Router (ABR)
⚫ R3 = Autonomous System Boundary Router (ASBR)
◼ LSA Types
⚫ Type 1 & 2 LSAs are flooded between routers in the same area
⚫ Type 3 & 5 are flooded throughout the backbone and all standard areas
⚫ Type 4 LSAs are injected into the backbone by the ABR of an area which contains an
ASBR
Stub Area
◼ External routes are not forwarded in a stub area
TYPE 3
DEFAULT
◼ Router Types
⚫ R2 = Area Border Router (ABR)
⚫ R2 & R3 share a common stub area
◼ LSA Types
⚫ Type 5 LSAs are not propagated into the stub area
Instead, R2 (ABR) injects a Type 3 LSA containing a default route into the stub area (« through
itself »)
⚫ Type 4 LSAs are not propagated into the stub area
Totally Stubby Area
◼ External routes + Type 3 LSAs are not forwarded in a Totally Stubby area
DEFAULT
◼ Router Types
⚫ R2 = Area Border Router (ABR)
⚫ R2 & R3 share a common stub area
◼ LSA Types
⚫ Like stub areas, totally stubby areas do not receive Type 4 & Type 5 LSAs from their
ABRs
⚫ Neither do the Type 3 LSAs
⚫ All routing out of the area relies on a single default route injected by the ABR
Not So Stubby Area (NSSA)
◼ Stub & Totally Stubby Areas
⚫ Pro: Convenient to reduce the resource utilization of routers (no external routes to
process)
⚫ Con: Neither type can contain an ASBR (as types 4 & 5 LSAs not authorized)
AREA 0 NSSA 1
R1 R2 R3
EXTERNAL
TYPE 1/2 TYPE 1/2
DOMAIN
TYPE 5 TYPE 7
TYPE 4
DEFAULT
◼ Router Types
⚫ R2 = Area Border Router (ABR)
⚫ R3 = Autonomous System Boundary Router (ASBR)
◼ LSA Types
⚫ Type 7 LSAs = Type 5 LSAs in disguise
This allows an ASBR to advertise external links to an ABR
ROUTES REDISTRIBUTION
Routes Redistribution
◼ Allows to learn and advertise IPv4 routes between different protocols
RIP
◼ STEP 1: CONFIGURING ROUTE MAPS 192.168.1.0/24
192.168.2.0/24
⚫ A Route Map is composed of AREA 0.0.0.0
Action ASBR
Route map name
Sequence number
Action: permit/deny
Match EXAMPLE: REDISTRIBUTION OF 192.168.1.0 ONLY
Criteria that a route must match
ROUTE MAP
Action statement is applied to the route - ACTION: PERMIT
- MATCH: 192.168.1.0/24
Set
- SET: NOT USED
Modify route information before being - ACTION: DENY
redistributed - MATCH: 192.168.2.0/24
Applied if - SET: NOT USED
All the route-map criteria is met
The action permits redistribution
Routes Redistribution
◼ STEP 2: CONFIGURING ROUTE REDISTRIBUTION
⚫ Redistribution from source protocol to destination protocol
Source protocol: from which the sources are learned
Destination protocol: from which the sources are redistributed
Creating an Area
S p e c i f y i n g a n A r e a Ty p e
Enabling OSPF
OSPF Configuration
◼ Step by Step
Creating an Area
Create the OSPF area(s)
AREA 0 AREA 1
S p e c i f y i n g a n A r e a Ty p e
When creating an area, an area type can be specified (Normal/Stub/NSSA)
OSPF Configuration
◼ Step by Step
AREA 0 AREA 1
AREA 0 AREA 1
OSPF Configuration
◼ Step by Step
REDIST. REDIST.
AREA 0 AREA 1
RIP
EXTERNAL DOMAIN
Enabling OSPF
Enable the OSPF Software previously loaded
OSPF Configuration
0) CONFIGURING THE ROUTER-ID
SW-> ip router router-id 192.168.254.7
INT 1 INT 2
1) LOADING THE SOFTWARE
SW-> ip load ospf
AREA 0
2) CREATING AN AREA
SW-> ip ospf area 0.0.0.0
7) ENABLING OSPF
SW-> ip ospf admin-state enable
REDIST. REDIST.
AREA 0 AREA 1
RIP
EXTERNAL DOMAIN
OmniSwitch AOS R8
WITH SUMMARIZATION
AREA 0.0.0.0
192.168.0.0/23 VIA ABR
ABR
WITHOUT SUMMARIZATION
192.168.0.0/24 VIA ABR
192.168.0.0/24 192.168.1.0/24 192.168.1.0/24 VIA ABR
AREA 1.1.1.1
Aggregation
◼ Internal routes: Summarization > External routes: Aggregation
WITH AGGREGATION
AREA 0.0.0.0
192.168.0.0/23 VIA ABR
ASBR
WITHOUT AGGREGATION
192.168.0.0/24 VIA ABR
192.168.0.0/24 192.168.1.0/24 192.168.1.0/24 VIA ABR
RIP
EXTERNAL DOMAIN
OSPF Interface Authentication
◼ If authentication enabled, neighbors can communicate only if:
⚫ They use the same type of authentication
⚫ They have a matching password or key
◼ 2 types of authentication:
⚫ Simple
Uses simple clear-text passwords
⚫ MD5
Encrypted authentication, uses a key and a password
Virtual Link
◼ Reminder: all areas must be connected to the backbone area (Area 0)
⚫ Not possible? Solution: Virtual Link
◼ Modifying Log levels allows to have more (or less) information about a specific
protocol/feature (ex. OSPF) in the logs
SW1 SW2
SW1 SW2
# of Events = 4, # of Events = 4,
# of Init State Neighbors = 0, # of Init State Neighbors = 0,
# of 2-Way State Neighbors = 0, # of 2-Way State Neighbors = 0,
# of Exchange State Neighbors = 0, # of Exchange State Neighbors = 0,
# of Full State Neighbors = 0, # of Full State Neighbors = 0,
# of type-9 LSAs on this interface = 0, # of type-9 LSAs on this interface = 0,
SW1 SW2
# of Init State Neighbors = 0, # of Init State Neighbors = 0,
# of 2-Way State Neighbors = 0, # of 2-Way State Neighbors = 0,
# of Exchange State Neighbors = 0, # of Exchange State Neighbors = 0,
# of Full State Neighbors = 1, # of Full State Neighbors = 1,
OmniSwitch AOS R8
RIB
Destination
Routing
Protocol
REDIST ROUTE MAP
Overview of Route Map
-> show ip router database
Route Redistribution -> show ip router database
Legend: + indicates routes in-use
b indicates BFD-enabled static route
i indicates interface static route
r indicates recursive static route, with following address in brackets
Destination Routing
Protocol -> show ip routes
◼ Sequence-number ◼ Match
⚫ 400 sequences statements per switch ⚫ 124 IPv4 addresses
⚫ Sequence range 1 to 100 ⚫ 124 IPv6 addresses
⚫ Default sequence 50 ⚫ 31 IPv4 Address matches
⚫ 12 IPv6 Address matches
⚫ 62 Tags
⚫ 62 IPv4 Interfaces
⚫ 62 IPv6 Interfaces
⚫ 31 Metrics
⚫ 249 Route types
Route Map - Configuration
◼ -> ip route-map myroute-map? ACTION MATCH SEQUENCE-NUMBER SET
• Match • Action
• IP-ADDRESS • permit
• IP-NEXTHOP Action • deny
• IPV4-INTERFACE
• IPV6-ADDRESS
• IPV6-INTERFACE
• IPV6-NEXTHOP
• METRIC Match • Set
• ROUTE-TYPE • Metric 1
• LEVEL2 • effect
• LEVEL1
Set… • add
• INTERNAL ROUTE-MAP • subtract
• EXTERNAL • replace
• TAG • none
IP • metric-type
access- • INTERNAL
• EXTERNAL
list Redist- • Tag
• IP access-list control • Community
• access-list-name • local-preference
• ip-address/mask • Level
• Redist-control • LEVEL1-2
• all-subnets • LEVEL2
• no-subnets • LEVEL1
• aggregate
New Redistribution - Commands
ip route-map route-map-name [sequence-number number] set metric metric [effect {add | subtract |
replace | none}]
◼ Rip redistribution
->ip redist {local | static | ospf | isis | bgp} into rip route-map route-map-name
◼ OSPF redistribution
->ip redist {local | static | rip | isis | bgp} into ospf route-map route-map-name
Route Map - Access List Creation
◼ Deletes route map all sequence number of 50 in the rip_1 route map
-> no ip route-map rip_1 sequence-number 50
Notes: The “no” version of the command that specifies a match or set parameter only deletes that parameter from the
route-map. If a sequence-number is included but no match or set parameters, then only that specific route-map is deleted.
If the command only has a route-map-name, then the entire route-map is deleted.
OmniSwitch AOS R8
OSPF
How to
✓ Implement a OSPF backbone area configuration, different types of areas,
authentication and virtual links on an OmniSwitch.
Contents
1 Topology ........................................................................................ 3
2 Configuration .................................................................................. 4
2.1. Client VLAN Configuration......................................................................... 4
2.2. Configure connections between 6860B and 6900 VC .............................................. 4
3 OSPF Backbone ................................................................................ 5
3.1. OSPF Backbone Logical Diagram .................................................................. 5
3.2. Configuration........................................................................................ 5
3.2.1. Loopback interface configuration ........................................................................ 6
3.3. Verification .......................................................................................... 8
4 OSPF Areas ................................................................................... 13
4.1. OSPF Areas Logical Diagram ..................................................................... 13
4.2. Configuration....................................................................................... 13
4.3. Verification ......................................................................................... 14
5 OSPF Redistribution ......................................................................... 16
6 Access to the DATA server ................................................................. 18
2
OSPF
1 Topology
Open Shortest Path First routing (OSPF) is a shortest path first (SPF), or link state, protocol. OSPF is an interior
gateway protocol (IGP) that distributes routing information between routers in a single Autonomous System
(AS). OSPF chooses the least-cost path as the best path. OSPF is suitable for complex networks with large
numbers of routers since it provides faster convergence where multiple flows to a single destination can be
forwarded on one or more interfaces simultaneously.
4
OSPF
2 Configuration
- Enable interfaces
3 OSPF Backbone
All OSPF networks must have an OSPF backbone area configured
3.2. Configuration
- Enable OSPF protocol on 3 switches to advertise all local routes. In order to have a complete
connectivity between all switches, OSPF will be used to advertise dynamically all the routes.
- The first step is to load OSPF protocol and to enable OSPF on the newly created IP interfaces. As all
OSPF networks must have a backbone area, this will be created with 0.0.0.0 as the area identifier.
- Let’s define the router-id and the backbone area on all switches:
Attached Interfaces =
- Verify that there are not any interfaces associated with the backbone area yet:
- Let’s assign the interfaces to the corresponding OSPF area. This is done in two steps. The first one is to
enable the interfaces into OSPF, and then the interfaces are assigned to their corresponding area:
3.3. Verification
- Now that the backbone area has been created on all switches, let’s verify some basic OSPF parameters
on the 3 switches:
- Each switch has 2 neighbors in full state meaning there have been route updates exchanged between
them.
- Now, let’s verify the routes that are seen by each switch.
Notes
The first command shows the routes learned by the switch using any static or dynamic routing protocol. This is
the global routing table. In this example, only LOCAL and OSPF routes are present.
The second one only shows the OSPF routes learned by the switch
- Verify that all switches Loopback0 IP addresses are in the routing table. One is LOCAL to the switch
whereas the other two are learned through OSPF.
- Also verify that all other IP interfaces that were configured are also present in the routing table as well.
- Type the following command to verify the Link State DataBase (LSDB)
- At this point, the LSDB should include 6 Link State Advertisements (LSA).
- There are 3 routers in the network setup. Each router sends one LSA (rtr)
- There are 3 network segments in the setup (VLANs 217, 218, 278)
- There is a Designated Router elected on each network segment. This DR sends one LSA (net)
- Remember that the switch with the highest priority, or in case of a tie, the highest router ID will be
chosen as a Designated Router and the second highest will be the Backup DR. Let’s check the DR and
BDR status on your switch:
sw1 (6900-A) -> show ip ospf interface
- Type the following to save your running configuration as the next labs are built on this configuration.
-> write memory flash-synchro
- You can also save your running configuration in a file on the flash that will be used for the OSPF virtual
link lab.
- Type the following on all Switches:
4 OSPF Areas
4.2. Configuration
On the 6860s create and configure Area 1.1.1.1:
4.3. Verification
- Verify the correct operation of the OSPF setup with the following commands:
sw1 (6900-A) -> show ip ospf area
Area Id AdminStatus Type OperStatus
---------------+-------------+-------------+------------
0.0.0.0 enabled normal up
- Verify that the new routes have been learned by OSPF and are seen by all switches:
- Verify that in the LSDB new LSAs have been added (sumnet). These LSAs have the information of the
networks that belong to a different area:
5 OSPF Redistribution
- It was demonstrated in the two previous parts of the lab how interfaces running OSPF participate in
distributing routing information within the Autonomous System.
- In this lab we will configure additional interfaces. however, they will not run the OSPF protocol. In
order for them to be reachable, redistribution will need to be configured.
(int_120 on 6900 VC, int_70 on 6860-A and int_80 on 6860-B are seen are local routes)
- Check on the 6860 than this new route has been learnt:
- Check on the 6900 than this new route has been learnt:
- To have an Internet access for VM clients, a pre-configuration has to be done on the OS6900-A
sw1 (6900-A) -> ip route-map localIntoOspf sequence-number 10 match ip-address 192.168.100.0/24 permit
- Default route 0.0.0.0/0 on 6900 is a static route which should be advertised to other switch Manage a
Redistribution of Static routes
Notes
The second static route has been managed previously on the conf download to the switch at the beginning of
the training.10.0.0.51 is the IP address of the DNS.
- The previous section showed how to redistribute a local route. The same can be applied to a static
route.
- To redistribute the static route into OSPF another filter must be created since static routes are not
considered part of the OSPF Autonomous System. Type the following:
- Manage RIP dynamic protocol on 6900 VC (int_100). And then let’s redistribute local route and static
routes to rip.
sw1 (6900-A) -> ip redist local into rip route-map local admin-state enable
sw1 (6900-A) -> ip redist static into rip route-map local admin-state enable
sw1 (6900-A) -> ip redist ospf into rip route-map local admin-state enable
sw1 (6900-A) -> write memory flash-synchro
7 OSPF Authentication
- Verify that the switches have become neighbors once authentication was enabled on both ends of the link
21
OSPF
- These two values will be combined and used in the MD5 hashing algorithm for authentication between the
switches. Check your routing tables, neighbors, and interfaces and enable debugging to display any
problems.
8 Stub Area
8.2. Configuration
- For this Lab, we will add a new 6560 switch to become an internal router for stub area 2.2.2.2
- A router becomes an internal router when it doesn’t have a Backbone connection and is member of only
a single area. For the purposes of the lab, Stub-Switches will be used as an internal router.
Notes
Switches in Stub Areas do not have external routes in their routing database
- Check areas:
8.3. Verification
- Type the following on 6560-A:
sw3 (6560-A) -> show ip ospf routes
Domain Domain
Destination/Mask Gateway Metric Name ID Type
---------------------+-----------------+--------+--------+--------+----------
0.0.0.0/0 172.16.137.7 2 Vlan 137 Inter
172.16.17.0/24 172.16.137.7 2 Vlan 137 Inter
172.16.18.0/24 172.16.137.7 3 Vlan 137 Inter
172.16.78.0/24 172.16.137.7 2 Vlan 137 Inter
172.16.137.0/24 172.16.137.3 1 Vlan 137 Intra
192.168.20.0/24 172.16.137.7 2 Vlan 137 Inter
192.168.30.0/24 172.16.137.7 3 Vlan 137 Inter
192.168.60.0/24 192.168.60.3 1 Vlan 60 Intra
192.168.254.1/32 172.16.137.7 2 Vlan 137 Inter
192.168.254.3/32 0.0.0.0 0 N/A Intra
192.168.254.7/32 172.16.137.7 1 Vlan 137 Intra
192.168.254.8/32 172.16.137.7 2 Vlan 137 Inter
Notes
On the stub-switch, there should be a default route with a next-hop pointing towards the IP interface of the
backbone switch
How would the stub area be changed into a totally stubby area?
OmniSwitch AOS R8
Graceful Restart
Lesson Summary
Network Segment S
Router A Router C
◼ If a router restarts:
Session
Down Reinit. Adj ⚫ Neighbor reinitializes the adjacency and
SPF recalc. SPF recalc. floods out updated LSAs showing that
the restarting router is no longer part of
the network
Updated LSA ⚫ All routers in the area must run SPF
Updated LSA
Restarting Neighbor algorithm to compute new routes
Router
R1 LSACK R2 LSACK R3
RESTARTING ROUTER
◼ Grace LSAs are sent to neighbors either before (planned) or after (unplanned) restart.
⚫ Contain a “grace period”; time in seconds for achieving the OSPF restart.
⚫ May or may not be acknowledged by the neighbors.
⚫ Are “link-local”; only sent to adjacent neighbors
DATA
R1 R2 R3
RESTART PENDING…
◼ During the restart neighbors act as if nothing happened to the restarting router
⚫ The restarting router is still listed as an adjacency.
⚫ Traffic is forwarded to the restarting router
⚫ The restarting router performs non-stop forwarding
Graceful Restart
◼ With Graceful restart
LSA LSA
SPF
Note: Graceful restart is disabled for OSPF and ISIS and enabled for BGP by default
OmniSwitch R8
DHCP
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
DHCP
•A global relay agent forwards DHCP packets to a global destination IP address LAN SWITCH
DHCP DHCP
Client Client
DHCP Relay
• By default, the DHCP Relay feature is disabled.
• When the DHCP Relay feature is enabled, DHCP packets are relayed on a global basis or on a per-
interface basis.
sw8 (6860-B) -> show ip dhcp relay
IP DHCP Relay :
ip dhcp relay admin-state {enable | disable DHCP Relay Admin Status = Enable,
Forward Delay(seconds) = 0,
Max number of hops = 16,
Relay Agent Information = Disabled,
Relay Agent Information Policy = Drop,
• Global basis configuration DHCP Relay Opt82 Format = Base MAC,
DHCP Relay Opt82 String = e8:e7:32:b3:3c:f9,
PXE support = Disabled,
• Configuring the Global Relay Agent Relay Mode
Bootup Option
= Global,
= Disable,
ip dhcp relay destination ip_address sw8 (6860-B) -> show ip dhcp relay statistics
Global Statistics :
Reception From Client :
ip dhcp relay destination 192.168.100.102 Total Count = 0, Delta = 0
Forw Delay Violation :
Total Count = 0, Delta = 0
• Removing the Global Relay Agent Max Hops Violation :
Total Count = 0, Delta = 0
Agent Info Violation :
Total Count = 0, Delta = 0
no ip dhcp relay destination ip_address Invalid Gateway IP :
Total Count = 0, Delta = 0
Server Specific Statistics :
From Interface Any to Server 192.168.100.102
Tx Server :
Total Count = 0, Delta = 0
InvAgentInfoFromServer:
Total Count = 0, Delta = 0
DHCP Relay sw8 (6860-B) -> show ip dhcp relay
IP DHCP Relay :
DHCP Relay Admin Status = Enable,
Forward Delay(seconds) = 0,
Max number of hops = 16,
• Configuring a Relay Agent for an IP Interface Relay Agent Information = Disabled,
Relay Agent Information Policy = Drop,
DHCP Relay Opt82 Format = Base MAC,
DHCP Relay Opt82 String = e8:e7:32:b3:3c:f9,
PXE support = Disabled,
• To Configure the DHCP relay destination address for Reception From Client :
Total Count = 0, Delta = 0
Forw Delay Violation :
the specified IP interface Total Count =
Max Hops Violation :
0, Delta = 0
Untrusted
Trusted Port
Untrusted
Rogue DHCP
Server
DHCP Snooping
Platforms Supported
• Release 8
- mac-address verification: verifying the source MAC address of DHCP packets with the client MAC address contained
in the same packet
1 byte1 byte 1 byte 1 byte 2 bytes 1 byte 1 byte 1 byte 1 byte 12 bytes (Variable)
Remote-id
•Agent ID
Subremote-id
Suboption TLV
Lenght
Remote-id lenght
• Example
• Displays a list of VLANs that have DHCP Snooping enabled and whether or not MAC address verification
and Option-82 data insertion is enabled for each VLAN
-> show dhcp-snooping vlan
• Displays the trust mode and DHCP Snooping violation statistics for all switch ports and link aggregates
that are filtered by DHCP Snooping
-> show dhcp-snooping port
How to
✓ Configure the DHCP Relay feature (aka IP Helper)
Contents
1 Topology ........................................................................................ 2
2 Accessing the DHCP Server .................................................................. 3
3 Testing the DHCP Relay ...................................................................... 5
2
DHCP Server & DHCP Relay
1 Topology
A DHCP server provides dynamic IP addresses on lease for client interfaces on a network. It manages a pool of IP
addresses and information about client configuration parameters. The DHCP server obtains an IP address
request from the client interfaces.
After obtaining the requests, the DHCP server assigns an IP address, a lease period, and other IP configuration
parameters, such as the subnet mask and the default gateway.
The DHCP Relay feature allows UDP broadcast packets to be forwarded across VLANs that have IP routing
enabled.
3
DHCP Server & DHCP Relay
- Check if there is a route from the 6860 to the DHCP server (192.168.100.102):
sw7 (6860-A) -> show ip routes
o On the 6860-B:
Sw8 (6860-B) -> ip dhcp relay destination 192.168.100.102
Sw8 (6860-B) -> ip dhcp relay admin-state enable
sw8 (6860-B) -> show ip dhcp relay
IP DHCP Relay :
DHCP Relay Admin Status = Enable,
Forward Delay(seconds) = 0,
Max number of hops = 16,
Relay Agent Information = Disabled,
Relay Agent Information Policy = Drop,
DHCP Relay Opt82 Format = Base MAC,
DHCP Relay Opt82 String = e8:e7:32:cd:57:f3,
PXE support = Disabled,
Relay Mode = Global,
Bootup Option = Disable,
- Assign the VLAN 20 or 30 to the clients connected to the 6360 virtual chassis:
sw5 (6360-A) -> vlan 20 members port 1/1/1 untagged
sw5 (6360-A) -> vlan 20 members port 2/1/1 untagged
sw5 (6360-A) -> vlan 30 members port 1/1/2 untagged
sw5 (6360-A) -> vlan 30 members port 2/1/2 untagged
Tips
The IP DHCP relay feature can also be configured
on a per-VLAN basis.
This can be interesting if different DHCP servers
must serve IP addresses for different subnets.
Here, as we have a unique DHCP server, it’s not
necessary.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Quality of Service (QoS)
* Queuing management
Filtering
• HOW IT WORKS Policy Based
* Layer 2 and
Routing
• QoS is implemented on the switch through the use of .
* Routed traffic
Layer 3/4 ACLs
: redirecting
ICMP Policies
Policy Based
* Filtering
- Port-based QoS configuration Mirroring * Prioritizing
.
* Mirror traffic based * Rate limiting traffic
on QoS policies (security)
- User-defined policies
Access Guardian
- Integration with virtual output queuing to manage egress * User Network Profile
congestion
- Auto-QOS configuration
QOS CONFIGURATION
QOS CONFIGURATION
• Step by Step
Global Parameters
Setting Up Policies
Monitoring policies
Auto-QOS configuration
QOS CONFIGURATION
Global Parameters
Description Command/keyword
By default QoS is enabled on the switch. If QoS policies qos enable/disable
are configured and applied, the switch attemps to
classify and apply relevant policy actions
• Step by Step
⚫ To change the default QSet profile (QSP 1) to one of the other supported profiles (QSP 2, 3, or 4)
qos qsp system-default 2
QOS CONFIGURATION
• Step by Step
Examples :
• To limit the ingress or egress bandwidth for a QoS port -> qos port [chassis]/slot/port
[trusted]
[maximum egress-bandwidth]
-> qos port 1/1/1 maximum egress-bandwidth 10M
[maximum ingress-bandwidth]
[default 802.1p value]
[default dscp value]
• Change the 802.1p value to 7 for the port 1/1/1
[default classification {802.1p | tos |
dscp}]
[dei {ingress | egress}]
-> qos port 1/1/1 default 802.1p 7
FORWARDING ENGINE
H
E
A ACTION
D PACKET CLASSIFICATION
E
R
CONDITION ACTION
---- ----
GETS POLICIES … …
FROM :
- CLI
- WEBVIEW L2 (source & dest)
- Prioritization, Bandwidth shaping
- POLICYVIEW (OV)
- MAC, VLAN, - ICMP filtering
- Slot/Port, IPMS Filtering - ICMP prioritizing, ICMP rate limiting
- 802.1p/ToS/DSCP marking and mapping
L3/L4 - Policy Based Routing PBR for redirecting
- SIP, DIP, - Routed traffic
- TCP,UDP,IP proto - Policy Based Mirroring
- Source TCP/UDP port - Advanced Layer 2 to 4 Filtering
- Destination TCP/UDP port - Server Load Balancing
QOS CONFIGURATION -> policy condition condition_name
Setting Up Policies
Policy port group Slot and port number combinations policy port group group_name slot/port[-port]
[slot/port[-port]...]
Policy mac group Multiple MAC addresses that may be attached policy mac group mac_group mac_address [mask
to a condition mac_mask] [mac_address2 [mask mac_mask2]...]
Policy network group IPv4 source or destination addresses policy network group net_group ip_address [mask
Default “switch” group net_mask] [ip_address2 [mask net_mask2]...]
Includes all IPv4 addresses configured on the
switch
Policy service group TCP or UDP ports or port ranges (source or policy service group service_group service_name1
destination) [service_name2...]
• Examples -> policy port group techports 1/1/1 3/1/1 3/2/1 3/3/1
-> policy condition cond4 source port group techports
Setting Up Policies
-> policy action action_name
Create a policy action ACL (disposition drop) [disposition {accept | drop | deny}]
[shared]
Change queuing priority
[priority priority_value]
Update TOS/Diffserv and/or 802.1p priority
[maximum bandwidth bps]
tags
[maximum depth bytes]
802.1p/TOS/Diffserv marking
[tos tos_value]
802.1p/TOS/Diffserv mapping [802.1p 802.1p_value]
Per COS max bandwidth (64K bps) [dcsp dcsp_value]
Maximum depth [map {802.1p | tos | dscp} to {802.1p | tos| dscp} using map_group]
Statistics (# of packets, # of bytes) [permanent gateway ip ip_address]
Ingress policing / Egress shaping [port-disable]
Port Redirection [redirect port slot/port]
[redirect linkagg link_agg]
Routed Traffic Redirection
[no-cache]
Link Aggregate Redirection
[{ingress | egress | ingress egress | no} mirror slot/port]
Port Disable [cir bps [cbs byte] [pir bps] [pbs byte] [counter-color [red-
Mirroring nonred | green-nongreen | green-red |green-yellow | red- yellow]]
Multi-actions support
Ingress Rate Limiting
- Examples :
Setting Up Policies
Does it Match Condition ?
-> policy rule rule_name [enable | disable] [precedence precedence] [condition condition]
[action action] [validity period name | no validity period] [save] [log [log-interval seconds]]
[count {packets | bytes}] [trap | no trap] [default-list | no default-list]
Examples :
Setting Up Policies
- Examples :
Maps traffic destined for port 3/2 with and 802.1p value of 4 to an 802.1p value of 7
-> policy condition Traffic destination port 1/1/1 802.1p 4 802.1P MAPPING
-> policy validity-period vp01 hours 13:00 to 19:00 days monday Friday
-> policy rule r1 validity-period vp01
QOS CONFIGURATION
• Step by Step
Monitoring policies
Monitoring policies
Display the QoS statistics:
-> show qos statistics
Affiche le journal des événements QoS. Cette commande affiche également les paquets
abandonnés par les entrées du filtre source IP
192.168.99.254 Firewall/Gateway
Internet
192.168.10.0 192.168.99.0
2/1
Unknown DA
20.10.0.0 10.10.0.0
Policy Based Routing - Example
• Traffic from the firewall is sent back to the switch to be re-routed
- Adding the source port to the condition allows traffic to not get caught in a loop
-> policy condition TrafficFromFW source IP 10.10.0.0 mask 255.255.0.0 source port 2/1/1
-> policy action To_Internet permanent gateway IP 192.168.10.254
-> policy rule Redirect_Internet condition TrafficFromFW action To_Internet
192.168.99.254 Firewall/Gateway
Internet
192.168.10.0 192.168.99.0
2/1
Unknown DA
20.10.0.0 10.10.0.0
Remote Port Mirroring (RPM)
Remote Port Mirroring (RPM)
• Allows traffic to be carried over the network to a remote switch
• Achieved by using a dedicated remote port mirroring VLAN
• RPM VLAN has to be configured on the source, destination and intermediate switches
• No other traffic is allowed on that VLAN
SOURCE PORT
Policy Based Mirroring
• Mirroring is done based on a QoS policy instead of a specific port
- 1 session supported at any given time
• Port Based Mirroring. It can be done on incoming or outgoing traffic or both.
- policy action mirror
• Mirror traffic based on
- Source & Destination addresses
- Address pairs
- Protocols
- VLAN classification
• Port mirroring and monitoring cannot be configured on the same port
INGRESS, EGRESS, OR BOTH INGRESS & EGRESS PACKETS
POLICY ACTION & PORT ASSIGNMENT
DIRECT TRAFFIC TO MIRROR PORT
MIRRORING POLICY
Policy Based Mirroring
• Example 1
• -> policy condition c1 source ip 1.1.1.1
• -> policy action a1 ingress egress mirror 1/1/1
• -> policy rule r1 condition c1 action a1
• -> qos apply
- Policy rule r1 will cause all packets with a source IP of 1.1.1.1 to be ingress and egress mirrored to port 1/1/1
• Example 2
• -> policy condition c1 source ip 1.1.1.1
• -> policy action a2 ingress egress mirror 1/1/1 disposition drop
• -> policy rule r2 condition c1 action a2
• -> qos apply
- Policy rule r2 drops traffic with a source IP of 1.1.1.1, but the mirrored traffic from this source is not dropped and
is forwarded to port 1/1/1
OmniSwitch AOS R8
Quality of Service (QoS)
How to
✓ Configure Quality of Service rules on the OmniSwitches (R6/R8)
Contents
1 Introduction .................................................................................... 2
2 Configuring Port Default 802.1P/ToS/DSCP ............................................... 3
3 Configuring Trusted Ports .................................................................... 3
3.1. Example 1 ........................................................................................... 3
3.2. Example 2 ........................................................................................... 4
4 Configuring the Policies ...................................................................... 4
5 Configuring User ports Security ............................................................. 7
2
Quality of Service (QoS)
1 Introduction
By default, the QoS feature is enabled on an OmniSwitch. If QoS policies are configured and applied, the switch
will attempt to classify traffic and apply relevant policy actions.
Notes
In this lab, we will not cover all the QoS features. The main objective of this lab is to provide an overview
about how to configure the QoS. For more information, read the Policy Condition Combination table in the
Network Configuration Guide for a list of valid combinations.
Diagram containing all the devices that will be used during this lab:
- Before beginning, reset all the QoS parameters back to default (6360-A):
sw5 (6360-A) -> qos flush
sw5 (6360-A) -> qos apply
sw5 (6360-A) -> show qos config
QoS Configuration
Admin = enable,
Trust ports = no,
Log lines = 10240,
Log level = 6,
Log console = no,
Forward log = no,
User-port filter = spoof ,
User-port shutdown = none,
Phones = trusted,
DEI Mapping = disable,
DEI Marking = disable,
Pending changes = none
3
Quality of Service (QoS)
Notes
In this example above:
- Any untagged traffic (traffic without any 802.1p settings) arriving on port 1/1/1 will be tagged with an
802.1p value of 7 (highest priority).
- If the port is configured to be untrusted, any tagged traffic will be tagged with an 802.1p value of 7.
- If the port is configured to be trusted, any tagged traffic will preserve the 802.1p value in the flow.
3.1. Example 1
- To configure individual ports to recognize 802.1p or ToS, use the qos port trusted command with the
desired slot/port number:
Notes
In this example above, the qos port trusted command specifies that port will be able to recognize and trust
the 802.1p bits. The global setting is active immediately; however, modifying a port configuration requires qos
apply to activate the change.
4
Quality of Service (QoS)
3.2. Example 2
- In the following example:
o A policy condition “Traffic” is then created to classify traffic containing 802.1p bits set to 4.
o The policy action “SetBits” specifies that the bits will be changed to 7 when the traffic leaves
the switch
o A policy rule called 802.1p_rule puts the condition and the action together.
sw5 (6360-A) -> policy rule 802.1p_rule condition Traffic action SetBits
Notes
802.1p mapping may also be set for Layer 3 traffic, which typically has the 802.1p bits set to 0.
- In the above example, what would happen if ingress traffic on chassis 1 slot 1 port 1 was tagged with an
802.1p value of 5?
----------------------------------------------------------------------------------------------------------------------------- ------
Let’s consider that the devices located in the VLAN 20 are employees, and the devices located in the VLAN 30
are contractors. We want to prioritize employees’ traffic over contractors’ traffic.
- The rule is not active on the switch until it has been applied:
sw5 (6360-A) -> show active policy rule
Rule name : 802.1p_rule
Condition name = Traffic,
Action name = SetBits
- In this following example, any flow coming from the VLAN 20 is sent to a queue supporting its maximum
bandwidth requirement. Via the QoS feature, it is also possible to modify the policy action that you have
created earlier to limit the maximum bandwidth:
sw5 (6360-A) -> policy action priority_5 maximum bandwidth 100k
sw5 (6360-A) -> qos apply
- The bandwidth can be specified in abbreviated units, in this case, 100k (= 100 kilo bytes).
- Check the management:
sw5 (6360-A) -> show policy condition
Condition name : Traffic
802.1p = 4
- To specify a precedence value for a rule, use the policy rule command with the precedence keyword:
sw5 (6360-A) -> policy rule rule1 precedence 1000 condition client_traffic action priority_5
- By default, rules are enabled. Rules may be disabled or re-enabled through the policy rule command:
sw5 (6360-A) -> policy rule rule1 disable
sw5 (6360-A) -> qos apply
sw5 (6360-A) -> show active policy rule
Rule name : 802.1p_rule
Condition name = Traffic,
Action name = SetBits
- To prevent IP source address spoofing, add ports to the port group called UserPorts:
Notes
This port group does not need to be used in a condition or rule to be effective on flows and only applies to
routed traffic. Ports added to the UserPorts group will block spoofed traffic while still allowing normal traffic
on the port
- To avoid any loop in the network, any user access port used will be blocked if a Spanning Tree frame is
received:
sw5 (6360-A) -> qos user-port shutdown bpdu
OmniVista™ 2500 NMS
Solution Overview
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Lesson Summary
Solution Overview
At the end of this presentation, you will be able to:
• Describe the OmniVista 2500 Purpose
• List the OmniVista 2500 Main Features
Introduction
◼ OmniVista 2500
⚫ Network Management System (NMS)
⚫ Unified Management / Monitoring / Provisioning of LAN & WLAN devices:
ALE OmniSwitch Switches
ALE OmniAccess Stellar Access Points
3rd Party Devices
OMNIVISTA 2500
Hypervisors
• VMware ESXi
• VirtualBox
• MS Hyper-V
• KVM
Home Page
◼ Applications
⚫ Accessible via a drop
down menu
◼ Dashboard
⚫ OV 2500 Home Page
⚫ Applications widgets
Quick overview
Customizable
(add/remove…)
Applications
ADMIN
• Notifications
• Display traps generated by the devices
• Perform an action when receiving
urgent/important traps (send a mail, run an
application, forward the trap…)
• Topology
• Topology view of all the discovered devices
• View information about a specific device
• Perform certain actions (edit/telnet/reboot a
device)
Main Features
• Analytics
• View of network resources utilization (users,
devices, applications) R
• Reports generation (usage trends, predictive
analysis of future network utilization…)
• Application Visibility
• Identify and restrict usage of applications that
are used by users (ex. Facebook)
• Uses the DPI feature (Deep Packet Inspection)
Main Features
HEAT MAP
• Floor Plan
• Determine optimal placement of access points
in a location FLOOR PLAN
• Heat Map
• Create & Organize Wi-Fi coverage maps
(“Heat Maps”)
Main Features GUESTS VLAN, EMPLOYEES VLAN,
RESTRICTED ACCESS FULL ACCESS
• Captive Portal
• Integrated captive portal with credentials
management (email, social login, Rainbow...)
• External captive portal redirection
CAPTIVE PORTAL
GUESTS
EMPLOYEE DEVICE
(BYOD)
Main Features
STANDBY
VLAN + RULES
MASTER « CAMERAS »
• High Availability
• 1 OV2500 Master / 1 OV2500 Standby
• Avoid loss of service
• Troubleshooting
• Embedded troubleshooting tools
• Rapid isolation of network issues
• APIs
• Northbound RESTful APIs
• Integration of network management functions
with 3rd party ecosystem application
Follow us on…
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
OmniSwitch AOS R8
OmniVista 2500 NMS-E
How to
✓ Access to the OmniVista 2500 NMS server
✓ Test connectivity between the OmniVista 2500 and the OmniSwitches
✓ Discover & Manage the OmniSwitches from the OmniVista 2500
Contents
1 Introduction .................................................................................... 3
2 Topology ........................................................................................ 3
3 Powering On the OmniVista 2500 NMS Virtual Machine .................................. 4
4 Configuring the SNMP ......................................................................... 6
4.1. Configuring SNMP in the 6360 VC ................................................................. 6
4.2. Configuring SNMP in the 6900 Virtual Chassis ................................................. 12
4.3. Configuring SNMP in the 6860A .................................................................. 13
4.4. Configuring SNMP in the 6860B .................................................................. 13
2
OmniVista 2500 NMS Access & OmniSwitches_basic_features
1 Introduction
Your company has just bought a set of OmniSwitches and wants to manage them using a centralized platform.
The OmniVista 2500 NMS is a management system that will be used to monitor and configure the switches.
In this lab, your task is to the setup the basic parameters needed in the OmniSwitches and OmniVista server to
be able to discover the switches in the OmniVista, and to arrange them on a map so the physical links between
them can be monitored.
2 Topology
The OmniVista 2500 NMS Virtual Appliance has already been deployed in the R-Lab infrastructure. Its
initial parameters (IP address, size of network, license) have also been configured
- Select the Virtual Machine PodX_OV (X = R-Lab Number), then right-click on it and select Snapshot ->
Snapshot Manager…:
Warning
THE NAME OF THE VM MAY BE DIFFERENT ACCORDING TO THE OV VERSION INSTALLED IN THE POD.
MAKE SURE THAT YOU ARE SELECTING THE “OV…” VM.
5
OmniVista 2500 NMS Access & OmniSwitches_basic_features
- Check the progress in the Status Bar, at the bottom of the screen.
- Once it is completed, right-click on the VM PodX_OV and select Power -> Power On
Tips
It takes 10-15 minutes for the OmniVista 2500 NMS virtual machine to boot up completely. You cannot access it
right away. Continue with the following part to learn how to configure the OmniSwitches parameters. You will
come back to the OmniVista later in this lab.
6
OmniVista 2500 NMS Access & OmniSwitches_basic_features
Your task is to configure the SNMP on the access switches (6360 Virtual Chassis).
For the Access training (215) this management has already been done for the core and distribution
switches. Not for training bootcamp (220) and advanced (216)
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
sw5 (6360-A) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV2500 Server: 192.168.100.107):
sw5 (6360-A) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
- We will use the Loopback0 IP interface address for the communication between the OmniVista and the
OmniSwitches. Manage the Loopback0 on the switch:
sw5 (6360-A) -> ip interface Loopback0 address 192.168.254.5
Application Interface-name
-------------+--------------------------------
dns -
ftp -
ldap -
ntp -
radius -
sflow -
snmp Loopback0
ssh -
swlog -
tacacs -
7
OmniVista 2500 NMS Access & OmniSwitches_basic_features
telnet -
tftp - -
- Check the presence of a route to the network 192.168.100.0 on the 6860-A and 6860-B:
sw7 (6860-A) -> show ip routes
- Try to ping the OmniVista from the 6860-A and the 6860-B:
sw7 (6860-A) -> ping 192.168.100.107 source-interface Loopback0
PING 192.168.100.107 (192.168.100.107) from 192.168.254.7 : 56(84) bytes of data.
64 bytes from 192.168.100.107: icmp_seq=1 ttl=63 time=0.729 ms
64 bytes from 192.168.100.107: icmp_seq=2 ttl=63 time=0.562 ms
64 bytes from 192.168.100.107: icmp_seq=3 ttl=63 time=0.577 ms
To be able to reach the OmniVista 2500 from the 6360 VC, a default route must be created on it.
Notes > Reminder: Connection between the 6360 VC and the 6860s
The 6360 is connected to both 6860s:
- Connection to the 6860-A through the link aggregation 7 (VLAN 57)
- Connection to the 6860-B through the link aggregation 8 (VLAN 57)
Before command (route not known on 6860-A table) After command route available (distribute via 0SPF)
Before command (route not known on 6900-A table) After command route available (distribute via 0SPF)
- Try to ping the OmniVista internal address from the int_57 interface:
sw5 (6360-A) -> ping 192.168.100.107 source-interface int_57
PING 192.168.100.107 (192.168.100.107) from 192.168.57.5 : 56(84) bytes of data.
64 bytes from 192.168.100.107: icmp_seq=1 ttl=62 time=1.99 ms
64 bytes from 192.168.100.107: icmp_seq=2 ttl=62 time=2.19 ms
64 bytes from 192.168.100.107: icmp_seq=3 ttl=62 time=2.06 ms
64 bytes from 192.168.100.107: icmp_seq=4 ttl=62 time=2.26 ms
64 bytes from 192.168.100.107: icmp_seq=5 ttl=62 time=2.77 ms
64 bytes from 192.168.100.107: icmp_seq=6 ttl=62 time=1.90 ms
- As we want to use the Loopback0 to communicate with the OmniVista, launch a ping from the Loopback0
interface:
sw5 (6360-A) -> ping 192.168.100.107 source-interface Loopback0
PING 192.168.100.107 (192.168.100.107) from 192.168.254.5 : 56(84) bytes of data.
Notes >
For trainee who attend access training (215). Dynamic routing protocol is fully explained on advanced training.
Objective of this command is to update automatically routing table on core switches via ospf protocol.
Notes
These static routes will be automatically broadcasted on the core network thanks to the routing process
running between the core switches (6900 and 6860).
---
192.168.254.5/32 +172.16.17.7 00:00:10 OSPF
+172.16.18.8 00:00:14 OSPF
-----
- Try to ping the OmniVista internal address through the Loopback0 interface:
sw5 (6360-A) -> ping 192.168.100.107 source-interface Loopback0
PING 192.168.100.107 (192.168.100.107) from 192.168.254.5 : 56(84) bytes of data.
64 bytes from 192.168.100.107: icmp_seq=1 ttl=62 time=1.20 ms
64 bytes from 192.168.100.107: icmp_seq=2 ttl=62 time=0.995 ms
64 bytes from 192.168.100.107: icmp_seq=3 ttl=62 time=0.972 ms
64 bytes from 192.168.100.107: icmp_seq=4 ttl=62 time=1.12 ms
64 bytes from 192.168.100.107: icmp_seq=5 ttl=62 time=0.983 ms
64 bytes from 192.168.100.107: icmp_seq=6 ttl=62 time=0.998 ms
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
Sw1 (6900-A) -> user snmpuserv3 read-write all password Superuser01= sha+des
13
OmniVista 2500 NMS Access & OmniSwitches_basic_features
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
Sw1 (6900-A) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw1 (6900-A) -> write memory flash-synchro
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
Sw7 (6860-A) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
Sw7 (6860-A) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw7 (6860-A) -> write memory flash-synchro
- Create an SNMP user account, set the read-write rights, and enable the SHA+DES encryption:
Sw8 (6860-B) -> user snmpuserv3 read-write all password Superuser01= sha+des
- Declare the OmniVista Server as management station (ex. IP@ of OV 2500 Server: 192.168.100.107):
Sw8 (6860-B) -> snmp station 192.168.100.107 snmpuserv3 v3 enable
sw8 (6860-B) -> write memory flash-synchro
The Configuration of the OmniSwitches is now complete. The next step consists in discovering the
OmniSwitches in the OmniVista 2500 NMS.
14
OmniVista 2500 NMS Access & OmniSwitches_basic_features
Notes
The Remote-Lab is configured for the OmniVista 2500 NMS platform to be reached directly from the Windows
Desktop of the access machine, allowing an easier access.
- Launch a web browser from the Windows desktop and enter the following URL (see diagram below):
https://10.4.Pod#.208:8443.
- In the Create Discovery Profile screen, General section, enter the following parameters:
Name: Training
CLI/FTP User Name: admin
CLI/FTP Password: switch
Confirm CLI/FTP Password: switch
- Below the General section, click on SNMP, and enter the following parameters:
SNMP Version: SNMPv3
Timeout (msec): 5000
Retry count: 3
User Name: snmpuserv3
Auth & Priv Protocol: SHA+DES
Auth Password: Superuser01=
Confirm Auth Password: Superuser01=
Priv Password: Superuser01=
Confirm Priv Password: Superuser01=
- Click on the box to select the Training profile from Choose Discovery Profiles
- Click on “+” to move it to the right
- Click Create and select the ranges from the list (click on the box) and select Discover Now.
16
OmniVista 2500 NMS Access & OmniSwitches_basic_features
- The discovery process will start. Click on Finish when the discovery is completed.
- You should see the discovered devices in the Managed Devices window. You can also find additional
information about the status of the switch, its IP address, the type of switch discovered, and the
firmware version used.
- Select and Add all the discovered switches to this map (click on the square and then “+”) or use add
item icone (> or >>)
- Then click Create
- Arrange the switches according to the initial diagram so all the links are displayed
If a link is not being shown in the map, select the switch and look for the Operations window
on the right. Select Poll Device or Poll Link and then wait for a moment to synchronize.
- Left click on a switch to see the various options. From the menu on the right you have the capability to
manage your switches.
Your network can now be managed and monitored from the OmniVista 2500 NMS platform.
18
OmniVista 2500 NMS Access & OmniSwitches_basic_features
7 Creating a VLAN
The OmniSwitches that have been discovered in the OmniVista 2500 can now be configured from the
OmniVista web administration page. To demonstrate that, we will create, in this part, a VLAN and its
dedicated IP interface on the OmniSwitch 6900-A, all from the OmniVista.
- Create the VLAN 110 on the 6900-A from the OmniVista 2500 web page:
> Select CONFIGURATION > VLANS > VLAN
> Click on Create VLAN by Devices button
1. Devices Selection
> VLAN IDs: 110
> VLAN(s) Description: SERVERS
> Click on the Add/Remove Devices
> Select the 6900-A (192.168.254.1), then click on > to add it as selected
> Click on OK
> Click on Next
2. VLAN Configuration
> Check that Admin Status = Enabled
> Click on Next
5. Review
> Review the information
> Click on Create
- Check that the VLAN and IP interface are now displayed in the 6900-A:
sw1 (6900-A) -> show vlan
vlan type admin oper ip mtu name
------+-------+-------+------+------+------+------------------
1 std Ena Ena Dis 1500 VLAN 1
100 std Ena Ena Ena 1500 VLAN 100
110 std Ena Dis Ena 1500 SERVERS
217 std Ena Ena Ena 1500 VLAN 217
218 std Ena Ena Ena 1500 VLAN 218
4094 vcm Ena Ena Dis 1500 VCM IPC
--
- For the next lab, configure the following IP address for the Client 1
Client 1:
IP address = 192.168.110.51
Subnet mask = 255.255.255.0
Default Gateway = 192.168.110.1
Preferred DNS Server = 10.0.0.51
Before command ( route not known on 6860-A table) After command route available (distribute via 0SPF)
20
OmniVista 2500 NMS Access & OmniSwitches_basic_features
OmniSwitch R8
Access Control Lists (ACL)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Access Control Lists (ACL)
* Stamping
whether or not packet flows * Bandwidth shaping
source mac
LAYER 3 ACL
CONDITION KEYWORDS
source ip
MULTICAST ACL
CONDITION KEYWORDS
multicast ip
source mac group source ipv6 multicast network
• Packet classification
destination mac source network group group
destination mac group destination ip destination ip
source vlan destination ipv6 destination vlan
source port destination network destination port
source port group group destination port group
PACKET CLASSIFICATION destination port source ip port destination mac
destination port group destination ip port destination mac group
CONDITION ACTION ethertype service
802.1p service group
DISPOSITION FORWARD / BLOCK ip protocol
---- accept | drop | deny ipv6
OUTGOING TRAFFIC
nh
flow-label
destination port
POLICY RULE destination port group
INCOMING PACKET icmptype
icmpcode
TOS DSCP
policy action source tcp port
destination tcp port
source udp port
accept | drop | deny
destination udp port
established
Tcpflags
Global Parameters
Setting Up Policies
Configuration Examples
Monitoring policies
Access Control Lists (ACL)
• Step by Step
Global Parameters
Description Command/keyword
By default QoS is enabled on the switch. If QoS policies qos enable/disable
are configured and applied, the switch attemps to
classify and apply relevant policy actions
Resets the QoS configuration to its defaults qos reset
* By default, flows that do not match any policies are accepted on the switch
Access Control Lists (ACL) CONDITION
PACKET CLASSIFICATION
ACTION
• Step by Step
POLICY RULE
Setting Up Policies
LAYER 2 ACL LAYER 3 ACL MULTICAST ACL
1 CONDITION KEYWORDS CONDITION KEYWORDS CONDITION KEYWORDS
-> policy port group pgroup1 1/1/1-5 2/1/1-2 source mac source ip multicast ip
source mac group source ipv6 multicast network group
destination mac source network group destination ip
2 destination mac group destination ip destination vlan
source vlan destination ipv6 destination port
source port destination network group destination port group
-> policy condition c2 source port group pgroup1 source port group source ip port destination mac
destination port destination ip port destination mac group
destination port group service
3 ethertype service group
802.1p ip protocol
ipv6
policy action a1 disposition accept nh
flow-label
destination port
4 destination port group
icmptype
icmpcode
policy rule rule7 precedence 65535 condition c2 TOS DSCP
action a1 source tcp port
destination tcp port
source udp port
5 destination udp port
established
qos apply Tcpflags
Access Control Lists (ACL)
• Step by Step
Configuration Examples
- Layer 2 ACL :
- Allows all bridged traffic except for traffic matching the source MAC address and VLAN 5
- Layer 3 ACL
- Deny traffic from source ip address included in netgroup1
Configuration Examples
- Layer 3 ACL :
- Drop the Traffic with a source IP address of 192.68.82.0, a source IP port of 23, using protocol 6 on the switch
- Layer 3 ACL :
- Flows coming into the switch destined for any of the specified IP in GroupA is allowed on the switch
Monitoring policies
- Profiles can be configured to drop additional traffic such as RIP, OSPF,VRRP, DHCP, DNS,… or BPDUs
- To configure filtering of spoof, rip, ospf , bgp packets
-> qos user-port {filter | shutdown}
{spoof|bgp|bpdu|rip|ospf|vrrp|dvmrp|pim|isis|dhcpserver|dns-reply}
⚫ UserPort ports to send out a port violation recovery trap when the UserPorts ports get reenabled after a
timeout
Advanced ACL Security Features
• Early ARP discard
• Limitation of number of arp packets sent to CPU
• ARP packets not destined for switch are not processed
• Enabled by default
• ARPs intended for use by a local subnet, AVLAN, VRRP, and Local Proxy ARP are not discarded
• ARP ACLs
• Source IP address examination in the header of ARP packets
• Directed Broadcasts
• IP datagram sent to broadcast address of subnet the user is not on
• Generates large number of responses to a spoofed host
-> ip directed-broadcast disable
OmniSwitch AOS R8
Access Control Lists (ACLs)
How to
✓ Setting up Access Control Lists (ACLs) on the OmniSwitches (R6/R8)
Contents
1 Introduction .................................................................................... 2
1.1. Retrieving client’s information ................................................................... 2
2 Filtering L2 traffic ............................................................................ 3
3 Using the ICMP Filter ......................................................................... 3
4 Filtering HTTP & FTP Traffic ................................................................ 4
4.1. Filtering the FTP Traffic (OmniSwitch 6360 VC) ............................................... 4
4.1.1. Checking the access to the FTP Server .................................................................. 4
4.1.2. Testing the FTP Access .................................................................................... 4
4.2. Filtering the HTTP Traffic ......................................................................... 5
4.3. Filtering the HTTP Traffic ......................................................................... 5
4.4. Testing the Configuration ......................................................................... 5
2
Access Control Lists (ACLs)
1 Introduction
2 Filtering L2 traffic
- First, reset the ACL/QoS configuration to its default settings:
sw5 (6360-A) -> qos reset
sw5 (6360-A) -> qos flush
sw5 (6360-A) -> qos apply
- Launch a permanent ping from the Client 5 to the database server (192.168.110.51):
Client 5 Client 9
- Check that you don’t have FTP access from the Client 5 (employee, VLAN 20), but it is still working fine
from the Client 9 (contractor, VLAN 30):
sw5 (6360-A) -> policy rule deny_http_contractor condition httpfromvlan30 action deny precedence 65535
sw5 (6360-A) -> qos apply
- Check that you don’t have HTTP access from the Client 9 (contractor, VLAN 30), but it is still working
fine from the Client 5 (employee, VLAN 20):
/ Client 5 Client 9
HTTP
6
Access Control Lists (ACLs)
OmniSwitch R8
Access Guardian
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Access Guardian
⚫ MAC-based (non-supplicant)
• HOW IT WORKS ⚫
or
802.1x-based (supplicant)
VLAN ACCESS
10 ALL
EXECUTIVE
RADIUS Access-Request
{ "user"
HIGH HIGH
RADIUS Access-Accept + UNP name User-Password="xxxxxx"
BWDTH PRIORITY Filter-ID = "UNP-name"
}
VLAN INTERNET
30 ONLY
GUEST
Admin
Teacher
Student
> Device moved to Default UNP for registration > Device moved to Default UNP for registration
No No
802.1X MAC
Enabled?
No Auth
enabled ?
Yes
No
Supplicant? Yes
Classification
Yes Rules
Same branch as
802.1x 802.1x
UNP Selection
RADIUS Filter-Id
UNP Profile
Classification
Rules
No UNP Not valid UNP
UNP Profile
Configure ports
Bridge Port
-> unp {port chassis/slot/port1[-port2] | linkagg agg_id1[-agg_id2]} port-type bridge MAC or
802.1x
or
-> unp {port chassis/slot/port1[-port2] | linkagg agg_id[-agg_id2]} 802.1x-authentication Classification
rules
-> unp {port chassis/slot/port1[-port2] | linkagg agg_id[-agg_id2]} mac-authentication
UNP profile
VLAN ID
Example
Policy List
-> unp port 1/1/1 port-type bridge ACL QoS
-> unp port 1/1/1 802.1x-authentication
-> unp port 1/1/1 mac-authentication
Access Guardian -Configuration Steps
• STEP BY STEP
UNP profile
-> unp policy validity-location policy_name [port chassis/slot/port[-port2] | VLAN ID
linkagg agg_id[-agg_id2] [system-name system_name] [system-location system_location]
Policy List
ACL QoS
Example
Location
Period
-> unp policy validity-location ALE-Brest port 1/1/10
-> unp policy validity-location ALE-Brest port 1/1/1-5
Access Guardian -Configuration Steps
• STEP BY STEP
• Specifies the days and times during which a device can access the network
UNP profile
VLAN ID
-> unp policy validity-period policy_name [days days] [months months] [hours hh:mm to hh:mm] [interval
mm:dd:yy hh:mm to mm:dd:yy hh:mm] [timezone zones]] Policy List
ACL QoS
Example Location
Period
unp policy validity-period “Office-Time”
unp policy validity-period “Office-Time” days MONDAY
unp policy validity-period “Office-Time” days MONDAY time-zone CET
unp policy validity-period “Office-Time” hours 9:00 to 17:00
Access Guardian -Configuration Steps
• STEP BY STEP
UNP profile
Policy List
ACL QoS
policy list list_name type unp [enable | disable]
Location
Assigns existing QoS policy rules to the specified QoS policy list. Period
-> unp profile profile-name qos-policy-list list_name location-policy policy_name period-policy policy_name
Example :
-> unp profile employee qos-policy-list deny_employees location-policy ALE-Brest period-policy Office-Time
UNP Selection
RADIUS Filter-Id
UNP
Profile
UNP
Timeout Profile
Classification
Configure mac-authentication device classification policies Not valid UNP Rules
No UNP UNP
Profile
Server Default
-> unp port chassis/slot/port mac-authentication [pass-alternate profile_name] Down
Alternate
UNP
UNP
UNP Profile
Profile
Profile
AAA Profile
802.1x authentication
Captive-portal authentication
Mac authentication AAA profiles to define a custom, pre-defined AAA
Radius authentication/accounting configuration that can be applied to a specific set
servers of UNP ports or through a Captive Portal profile.
Syslog servers
Access Guardian -Configuration Steps
⚫ Configure a server as a RADIUS server on the switch.
• STEP BY STEP -> aaa radius-server my_radius host 192.168.100.102 key alcatel-lucent
⚫ Configure the switch “my_radius” for 802.1X device authentication /server accounting
UNP Port -> aaa authentication 802.1x my_radius -> aaa accounting 802.1x my_radius
Teacher
⚫ Create the required VLANs.
802.1X
enabled ? -> vlan 10 admin-state disable name vlan10-block
Yes -> vlan 20 admin-state enable name vlan20-corporate
no
Supplicant? Mac Auth
⚫ Create the required UNP profile and map the profile to VLAN 10 and 20
Yes no -> unp profile corporate -> unp profile def_unp
802.1x -> unp profile corporate map vlan 20 -> unp profile def_unp map vlan 10
Classification
⚫ Enable UNP on ports that will connect to user devices
Pass Fail no
-> unp port 1/1/1 port-type bridge
RADIUS Filter-Id
Default ⚫ Set the default UNP profile on the port
UNP Profile
Block
-> unp port 1/1/1 default-profile def_unp
UNP Profile
No UNP
-> unp port-template 802.1X-template
Block
⚫ Configure the template and define an alternate UNP profile to use if the RADIUS server
Alternate does not return a UNP profile
UNP Profile -> unp port-template 802.1x-template 802.1x-authentication
-> unp port-template 802.1x-template 802.1x-authentication pass-alternate corporate
Monitoring
Displays Access Guardian 802.1X device classification policies configured for 802.1X ports
Displays information about accounting servers configured for 802.1X port-based network access control
Display the Access Guardian status of all users learned on 802.1X ports
Configure the RADIUS server to use for device authentication (802.1X, MAC, or Captive Portal)
Enable the MAC authentication session timer to determine the amount of time the user session
remains active after a successful login (the default time is set to 12 hours).
aaa mac session-timeout enable
Example
Users are moved to a specific profile when RADIUS server is not available
Configures the policy for classifying the device when the authentication server is not reachable
Sets re-authentication time for the device to authenticate again with the RADIUS server when it is classified
according to the auth-server-down policy
Access Guardian
How to
✓ Configure the Access Guardian on OmniSwitch
Contents
1 Introduction .................................................................................... 2
2 Configuring the Access Guardian on the 6360 VC......................................... 3
3 Managing the Access Guardian feature on the 6360 VC ................................. 4
3.1. Declaring the RADIUS Server ...................................................................... 4
3.2. Creating the Policies ............................................................................... 4
3.3. Creating the Policy Lists ........................................................................... 4
3.4. Creating the User Network Profiles .............................................................. 5
3.5. Configuring the User Ports ........................................................................ 5
3.6. Testing the Configuration ......................................................................... 5
3.7. Testing the Radius Configuration................................................................. 5
3.8. Testing the Access Guardian ...................................................................... 6
2
Access Guardian
1 Introduction
During this lab, we will configure the Access Guardian feature on the access switches, the 6360 VC.
Use ACL rules created in the previous lab and apply it in UNP Profiles.
The authentication of the network users will be done via a RADIUS server. On our infrastructure, the RADIUS
server is installed on a virtual machine (name: AAA Training Server), and its IP address is 192.168.100.102.
Once authenticated, a Universal Network Profile (UNP) will be applied to the network users. More
information about the UNP profiles to create is provided in the following pages of this lab.
3
Access Guardian
Notes:
@MAC Auth: as there are no MAC addresses configured on the RADIUS server, the user will be blocked from
accessing the network via a MAC address authentication.
During this lab, we will use the policies (ACLs) on the 6360 VC configured in the ACLs lab, and apply them to
the employee or contractor once authenticated:
- Create a policy list to deny the HTTP access for the contractors (VLAN 30):
sw5 (6360-A) ->policy list deny_contractors type unp enable
sw5 (6360-A) ->policy list deny_contractors rules deny_http_contractor
Notes:
A supplicant user (that seeks to authenticate) is authenticated by the RADIUS Server which sends
back the UNP profile name as Filter-Id attibutes (UNP-employee or UNP-contractor).
Client 5
Open the Networks
Connections and right-click
on the Pod connection
Click on Properties
Tips
If the Authentication tab is not available, click on the Start button, Run…, type services.msc and
click Ok. Look for Wired AutoConfig service and start it. Now the Authentication should be
available
7
Access Guardian
- On client 5
- Go back to the network connection Pod properties, then disable 802.1x on the network interface (from
authentication tab of the LAN connection properties)
- As there are not any MAC addresses configured on the RADIUS server, then the user is blocked from
accessing the network.
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Link Layer Discovery Protocols (LLDP)
I’m an
I’m a
IP-Phone I’m a
PC
I’m a PBX
PC
I’m an
IP-Phone
Protocol Data Unit (LLDP-PDU)
Standard: IEEE 802.1AB
Ethernet Header Link Layer Discovery Protocol Protocol Data Unit (LLDP-PDU)
• LLDP PDUs
⚫ Extensions optional fields
802.1: Vlan name, port vlan
802.3: MAC Phy
MED: Power and Capability
Inventory Management
Network Policy
Media Endpoint Devices (LLDP-MED)
NETWORK
POLICY
LOCATION ID
EXTENDED
POWER-VIA-MDI
INVENTORY
Configuration
• Enabling LLDP PDU flow on a port, slot, or all ports on a switch
-> lldp {slot/port | slot | chassis} lldpdu {tx | rx | tx-and-rx | disable}
Admin
1 2
IP Phone
LLDP-MED
• Mobile Tag versus 802.1Q Tag
Enabled on the VLAN that will receive tagged Enabled on fixed ports; tags port traffic for
mobile port traffic destination VLAN
Triggers dynamic assignment of tagged mobile Statically assigns (tags) fixed ports to one or more
port traffic to one or more VLANs VLANs
LLDP Network Policy TLV/Mobile Tag
• Example
OS6860-A 7
1/1/20 1/1/4
151.1.1.0
151.1.1.0
IP Phone 31001
• Configuring a local Network Policy on the switch for a specific application type
OS6860-A 7
1
1/1/20 1/1/4
151.1.1.
0
151.1.1.
0
IP Phone 31001
2
How to
✓ This lab is designed to familiarize you with the Link Layer Discovery
Protocol (LLDP).
Contents
1 Topology ........................................................................................ 2
2 Configure LLDP ................................................................................ 2
2
Link Layer Discovery Protocol
1 Topology
Link Layer Discovery Protocol (LLDP) is a standard that provides a solution for the configuration issues
caused by expanding networks. LLDP supports the network management software used for complete
network management. LLDP is implemented as per the IEEE 802.1AB standard.
The exchanged information, passed as LLDPDU, is in TLV (Type, Length, Value) format. The information
available to the network management software must be as new as possible; hence, remote device
information is periodically updated.
Notes
LLDP is enabled by default in reception and transmission
2 Configure LLDP
- To control per port notification status about a change in a remote device associated to a port, use the
following command:
sw5 (6360-A) -> lldp port 1/1/3 notification enable
sw5 (6360-A) -> lldp port 2/1/3 notification enable
sw5 (6360-A) -> lldp port 1/1/4 notification enable
sw5 (6360-A) -> lldp port 2/1/4 notification enable
Tips
LLDP is configured at port level (or NI or chassis), but not at linkagg level.
3
Link Layer Discovery Protocol
- To control per port management TLV to be incorporated in the LLDPDUs, use the following command
sw5 (6360-A) -> lldp port 1/1/3 tlv management port-description enable
sw5 (6360-A) -> lldp port 2/1/3 tlv management port-description enable
sw5 (6360-A) -> lldp port 1/1/4 tlv management port-description enable
sw5 (6360-A) -> lldp port 2/1/4 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/3 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/4 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/23 tlv management port-description enable
sw7 (6860-A) -> lldp port 1/1/24 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/3 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/4 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/23 tlv management port-description enable
sw8 (6860-B) -> lldp port 1/1/24 tlv management port-description enable
- Verify the LLDP per port statistics by entering the following command:
sw7 (6860-A) -> show lldp statistics
Chas/ LLDPDU LLDPDU LLDPDU LLDPDU LLDPDU TLV TLV Device
Slot/Port Tx TxLenErr Rx Errors Discards Unknown Discards Ageouts
----------+----------+----------+----------+----------+----------+----------+----------+----------
1/1/1 65 0 0 0 0 0 0 0
1/1/3 65 0 65 0 0 0 0 0
1/1/4 66 0 64 0 0 0 0 0
1/1/5 65 0 65 0 0 0 0 0
1/1/6 65 0 65 0 0 0 0 0
1/1/23 65 0 64 0 0 0 0 0
1/1/24 64 0 63 0 0 0 0 0
[truncated]
- The commands below specify the switch to control per port management TLVs to be incorporated in the
LLDPDUs. This will allow to have additional information such as system description, name, capabilities and
management IP address of neighbouring devices.
5
Link Layer Discovery Protocol
[truncated]
Tips
Compare the output of this command with the same command that was entered before
OmniSwitch R8
Power over Ethernet (PoE)
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
Objectives
Power over Ethernet (PoE)
• OmniSwitch switches with PoE capabilities can provide power to a large range of equipments (ex: IP
phones, access points, PTZ cameras,…)
- PoE priority and configurable maximum power per port for power allocation
- Dynamic PoE Allocation: Provide only the amount of power needed by powered devices (PD) up to the total energy
budget for the most efficient power consumption possible
Property 02.3af (802.3at Type 1) "PoE" 802.3at Type 2 "PoE+" 802.3bt Type 802.3bt Type 4 "4PPoE"/"PoE++"
3 "4PPoE"]/"PoE++"
Maximum current Imax 350 mA 600 mA 600 mA per pair 960 mA per pair
Energy Management Three power class levels (1-3) Four power class levels (1-4) Six power class levels (1-6) Eight power class levels (1-8)
OS6860(E)-(P)24
OS6860N-P48M
OS6860(E)-(P)48
OS6860N-P48Z
OS6860E-P24Z8
OS6860N-P24Z8
Power Over Ethernet- OmniSwitch 6560
OS6560
OS6560-P24Z24
OS6560-P24X4
Multi Gig
Model OS6560-P24X4
24 x 10/100/1G Base-T POE+
Model OS6560-P24Z24 OS6560-48X4
ports
24 x 100/1G/2,5G Base-T ports OS6560-P48X4
2 x SFP 1G ports
POE (802.3af/bt) (Up to 95W
4 x SFP+ 1/10G ports
on a port)
OS6560-P24Z8
OS6560-P48Z16 Model OS6560-P48X4
48 x 10/100/1000 Base-T ports
POE (802.3af/at) (Up to 30W
on a port)
2 x SFP ports
POE (802.3af/at/bt)
Model OS6560-P48Z16
32 x 10/100/1000 Base-T ports
Model OS6560-P24Z8
POE (802.3af/at) (Up to 30W
16 x 10/100/1000 Base- ports
on a port) Model OS6560-48X4
(802.3af/at)
16 x 100/1G/2,5G Base-T ports 48 x 10/100/1000 Base-T ports
8 x 1G / 2,5G Base-T ports
POE (802.3af/at/bt) (Up to 2 x SFP ports
POE (802.3af/at/bt) (Up to
95W on a port) POE (802.3af/at/bt)
95W on a port)
Power Over Ethernet – OmniSwitch 6465
OMNISWITCH 6465
OS6465-P6
OS6465-P12
OS6465-P28
Power Over Ethernet – OmniSwitch 6865
OMNISWITCH 6865
OS6865-P16X
OS6865-U28X
OS6865-U12X
PoE Management on AOS R8
PoE Management
• Displays the power supplies hardware information and current status:
-> show powersupply
Total PS
Chassis/PS Power Type Status Location
-----------+---------+--------+--------+-----------
1/1 920 AC UP Internal
Total 920
• Setting the maximum amount of inline power for one port (in mW)
-> lanpower port 1/1/24 power 18000
-> lanpower slot 1/1 maxpower 400 for a slot (in W)
PoE Management
• Setting the PoE Operational Status on a Port
• Disabled by default
-> lanpower port 1/1/1 admin-state enable
• Used to provide PoE power a few seconds after powering up the chassis
• Allows the chassis to immediately provide PoE power to any connected device after powering
up without waiting for the chassis to finish booting
• provide uninterrupted power to the connected device (PD) even when the switch is restarting or
recharging, such as during a soft restart
Multicast Introduction
Module Objectives
Unicast
Multicast
Multicast - Advantages & Use
◼ Conserves Bandwidth
◼ After a user joins, the network builds the necessary routing paths so that the
user receives the data sent to the multicast group
Multicast - Addressing
◼ Based on Class “D” IP address values
⚫ From 224.0.0.0 to 239.255.255.255
⚫ Allocated by sending application MAC address derived from IP address
⚫ Least Significant 23 bits of IP address mapped onto MAC address
IP MultiCast address 224.1.2.3 = 01:00:5E:01:02:03
224.0.0.xxx – Routing protocols and other low level topology discovery and maintenance protocols
Well-Known Class D Address examples
……… (http://www.iana.org/assignments/multicast-addresses)
Multicast - Routing
◼ Multicast router knows who wants traffic
◼ IGMP v3
⚫ Membership query
⚫ V3 Membership report (Explicit Host Tracking)
IGMP Source-Specific Join (v3 only) ⚫ V2 Leave group
⚫ V2 Membership report
⚫ V2 Leave group
⚫ V1 Membership report
IGMP - Useful Technical Details
◼ IGMP is a protocol confined to the local segment of the LAN
◼ Is never forwarded by any router and thus always has a Time-To-Live (TTL) of 1
◼ IGMP Host Membership Queries are sent to the "All Systems on this Subnet" class
D address (224.0.0.1)
◼ IGMP "Leave Group" messages are sent to the "All Routers on this Subnet" class
D address (224.0.0.2)
IPv6 Multicast - Overview
◼ Multicast Listener Discovery (MLD)
⚫ Used by IPv6 systems (hosts and routers)
⚫ Reporting of IPv6 multicast group memberships to any neighboring multicast routers
Similar to IGMP for IPv4
◼ MLD Version 1
⚫ Forwarding by IPv6 multicast destination addresses
◼ MLD Version 2
⚫ Forwarding by source IPv6 addresses and IPv6 multicast destination addresses
◼ IPMS
⚫ Intercepts IGMP packets to track membership by port rather than by network
⚫ Two sets of information are combined to tell switches how to forward/route traffic
⚫ Performance is significantly improved because forwarding decisions are made by
hardware
◼ IP Multicast Switching:
⚫ Based on the IGMP query and report Group Port Src IP Vlan
messages that are snooped, the switch
226.0.0.4 1/5/22 1.1.1.2 2
forwards multicast traffic only to the ports
that requested it 228.1.1.1 1/2/4 2.2.2.3 34
1/5/22
Without multicast switching, multicast traffic would be forwarded to the entire VLAN
How Does Multicast Switching Work?
◼ By maintaining this multicast forwarding table, the switch dynamically forward
multicast traffic only to those interfaces that want to receive it as nominal
unicast forwarding does
Forward Mcast
traffic to port on
which the join
Video L3 Multicast message was
Server Switch received
Without multicast switching, multicast traffic would be forwarded to the entire VLAN
Configuring IPMS
◼ The minimum configuration
-> ip multicast admin-state enable
Group Address Source Address VLAN Port Mode Static Count Life
---------------+---------------+-----+-----+--------+-------+------+-----
225.0.0.101 0.0.0.0 1 1/1 exclude no 49 239
225.0.0.102 0.0.0.0 1 1/1 exclude no 49 243
239.255.255.250 0.0.0.0 1 1/1 exclude no 48 241
239.255.255.250 0.0.0.0 1 1/24 exclude no 45 239
◼ VLAN ◼ Count
⚫ VLAN associated with the IP multicast group ⚫ Number of IGMP membership requests made
◼ Port ◼ Life
⚫ Slot and port number of the IP multicast ⚫ Life time of the IGMP group membership
group
IPMS Monitoring - IGMP Neighbor Table Entries
◼ Host Address
⚫ IP address of the IP multicast neighbor
◼ VLAN
⚫ VLAN associated with the IP multicast neighbor
◼ Port
⚫ Slot and port number of the IP multicast neighbor
◼ Static
⚫ Whether it is a static IP multicast neighbor or not
◼ Count
⚫ Displays the count of IP multicast neighbor
◼ Life
⚫ Life time of the IP multicast neighbor
IPMS Monitoring - Forwarding Table
-> show ip multicast forward
Total 2 Forwards
Ingress Egress
Group Address Host Address Tunnel Address VLAN Port VLAN Port
---------------+---------------+---------------+-----+-----+-----+-----
225.0.0.101 192.168.100.10 0.0.0.0 1 2/1 1 2/24
225.0.0.102 192.168.100.10 0.0.0.0 1 2/1 1 2/24
◼ Group Address
⚫ IP group address of the IP multicast forward
◼ Host Address
⚫ IP host address of the IP multicast forward
◼ Tunnel Address
⚫ IP source tunnel address of the IP multicast forward
◼ VLAN
⚫ VLAN associated with the IP multicast forward
◼ Port
⚫ Slot and port number of the IP multicast forward
L2 Static Multicast
◼ Configures a static multicast MAC address and assigns the address to one or
more egress ports
⚫ Packets received on ports associated with the specified VLAN that contain a
destination MAC address that matches the static multicast address are forwarded to
the specified egress ports
◼ Static multicast MAC addresses maintained in the Source Learning MAC address
table
-> mac-address-table static-multicast mac-address port_id vlan_id
used to define a destination multicast MAC address and assign the address to one or more egress
ports within a specified VLAN
⚫ VLAN
-> ip multicast vlan vid max-group [num] [action {none | drop | replace}]
⚫ Port
Applicable for all VLAN instances of the port
Per port limit overrides VLAN and global configuration
-> ip multicast port slot|port max-group [num] [action {none | drop | replace}]
⚫ Actions
None. Disables the maximum group limit configuration
Drop. Drops the incoming membership request
Replace. Replaces an existing membership with the incoming membership request
Storm Control
◼ Configuration of different thresholds for each type of storm/flood traffic
⚫ Broadcast
⚫ Multicast
⚫ Unknown Unicast
◼ Thresholds configuration
rate % num: rate in % of the port speed
rate mbps num : rate in true mbits per sec
rate pps num : rate in packet per sec
-> interfaces {slot/port | slot | s/p1-p2} flood rate {% num| mbps num | pps num}
Slot/ Bcast Bcast Bcast Ucast Ucast Ucast Mcast Mcast Mcast
Port Value Type Status Value Type Status Value Type Status
-----+-------------+-----+---------+----------+-----+-----------+----------+-----+--------
1/17 496 mbps enable 496 mbps enable 496 mbps disable
Load balancing multicast on Link Aggregation
◼ Multicast traffic is by default forwarded through the primary port of the Link
Aggregation Group
◼ Option to enable hashing for non-unicast traffic, which will load balance the
non-unicast traffic across all ports in the Link Aggregation
⚫ If non-ucast option is not specified, link aggregation will only load balance unicast
packets
◼ Enables or disables initial packet buffering for IPv4 and IPV6 multicast flows on
the specified VLAN or globally on the switch.
-> ip multicast [vlan vlan_id[-vlan_id2]] initial-packet-buffer admin-state {enable | disable}
How to
✓ This lab is designed to familiarize you with the IP multicast switching
capability on the OmniSwitch family of products
Contents
1 Toplogy ......................................................................................... 2
2 IP Multicast Switching ........................................................................ 3
2.1. Without IPMS enable ............................................................................... 3
2.2. IP Multicast Switching (IPMS) enable ............................................................ 5
2
Multicast switching
1 Toplogy
Multicast switching is used to efficiently handle multicast traffic by forwarding multicast packets only to the
switch ports that need to receive them
- The configuration for multicast switching is simple, requiring only that the switches be bridged together.
A multicast stream(s) will then be started at the multicast server
- For this lab, we will have 3 clients connected on the same VLAN.
- Check vlan 30 members on 6360-A
- Get IP addresses from the clients (ipconfig /all) retrieved from dhcp server.
Client 8:
Client 9:
Client 10:
2 IP Multicast Switching
- Open the “send” application from the client's desktop 8. And fill up as below the tool window.
This tool generates multicast IP packets, with Destination IP address (multicast group) 231.1.1.5 on
stream01.
- Click on start
- As the packets are sent check the counters on the VLAN 30 interfaces of 6360-A :
Chassis/Slot/Port : 1/1/2
Operational Status : up,
Port-Down/Violation Reason: None,
Last Time Link Changed : Tue Jul 6 02:14:48 2021,
Number of Status Change : 1,
Type : Ethernet,
SFP/XFP : N/A,
Interface Type : Copper,
EPP : Disabled,
Link-Quality : N/A,
MAC address : 94:24:e1:7c:82:25,
BandWidth (Megabits) : 100, Duplex : Full,
Autonegotiation : 1 [ 1000-F 100-F 100-H 10-F 10-H ],
Long Frame Size(Bytes) : 1552,
Inter Frame Gap(Bytes) : 12,
loopback mode : N/A,
Rx :
Bytes Received : 4020, Unicast Frames : 21,
Broadcast Frames: 2, M-cast Frames : 0,
UnderSize Frames: 0, OverSize Frames: 0,
Lost Frames : 0, Error Frames : 0,
CRC Error Frames: 0, Alignments Err : 0,
Tx :
Bytes Xmitted : 49924, Unicast Frames : 18,
Broadcast Frames: 13, M-cast Frames : 705,
UnderSize Frames: 0, OverSize Frames: 0,
Lost Frames : 0, Collided Frames: 0,
Error Frames : 0, Collisions : 0,
Late collisions : 0, Exc-Collisions : 0
- As you can see in the capture below, by default multicast traffic is flooded on all the port on the same
VLAN as the source.
- Next, enable IP Multicast Switching (IPMS). With IPMS enabled only ports with devices that requested to
see the stream will have it forwarded. Without it, multicast traffic would be treated as a broadcast and
sent to all ports in the VLAN.
• Open the “send” application from the client's desktop 6. And fill up as below the tool window.
This tool generates multicast IP packets, with Destination IP address (multicast group) 233.1.1.5.
- On 6860--B enable Multicast Querying (the switch where the multicast server is connected to):
- Open the “receive” application from the client's desktop 9 to subscribe to multicast traffic.( IP address
(multicast group) 233.1.1.5)
Ingress Egress
Group Address Host Address Tunnel Address Vlan/Service Vlan/Service Interface
---------------+---------------+---------------+--------------+--------------+----------------------
Group Address Source Address Vlan/Service Interface Mode Static Count Life
---------------+---------------+--------------+----------------------+--------+-------+------+-----
231.1.1.5 0.0.0.0 vlan 30 1/1/2 exclude no 3 254
239.255.255.250 0.0.0.0 vlan 30 1/1/2 exclude no 3 227
239.255.255.250 0.0.0.0 vlan 30 2/1/1 exclude no 3 226
239.255.255.250 0.0.0.0 vlan 30 2/1/2 exclude no 4 231
Total 4 Groups
Group Address Source Address Vlan/Service Interface Mode Static Count Life
---------------+---------------+--------------+----------------------+--------+-------+------+-----
239.255.255.250 0.0.0.0 vlan 20 0/78 exclude no 7 239
239.255.255.250 0.0.0.0 vlan 30 1/1/1 exclude no 7 245
231.1.1.5 0.0.0.0 vlan 30 0/8 exclude no 5 245
239.255.255.250 0.0.0.0 vlan 30 0/8 exclude no 14 245
Ingress Egress
Group Address Host Address Tunnel Address Vlan/Service Vlan/Service Interface
---------------+---------------+---------------+--------------+--------------+----------------------
Group Address Source Address Vlan/Service Interface Mode Static Count Life
---------------+---------------+--------------+----------------------+--------+-------+------+-----
239.255.255.250 0.0.0.0 vlan 20 0/7 exclude no 6 196
OmniSwitch AOS R8
◼ Supports IP Tunneling
⚫ Unicast connection between two IP Multicast routers for traversing non-multicast
devices
◼ Source location
⚫ Look up route to source to determine which interface to accept traffic on
⚫ The Unicast routing table is propagated
⚫ Split horizon is used (don’t propagate routes on the interface that you learned them
from)
Neighbor Discovery
◼ DVMRP Probe packet
Server
R3
-> show ip dvmrp neighbor
Neighbor Address Vlan Uptime Expires GenID Version State
---------------+-----+-----------+-----------+---------+---------+-------
143.209.92.214 2 00h:09m:12s 00h:00m:06s 546947509 3.255 active
Flood and Prune
◼ Flood and Prune Protocol
⚫ Multicast traffic is flooded to all downstream routers Flood
This can be efficient if there are a large number of recipients. Prune
⚫ Routers that do not have clients registered to receive traffic Traffic
will send a DVMRP prune message
Flood Prune
Graft
◼ Grafting:
⚫ Adding a branch to multicast traffic delivery
⚫ If new IGMP membership requests are received, the router sends a “graft” message
Graft is only used after a prune
Waits for “graft ack”
If no ack, re-send
When prune times out, upstream router starts flooding traffic again (7200 sec.)
⚫ Router receives message, duplicates and sends it to local subscribers, and sends it on (if necessary)
New Tree
Graft
Graft
Server R1 R2
DVMRP
Forwarding Table
Client
R3
-> show ip multicast forwarding
Source Destination
Mcast Group Source IP Type VLAN Slot/Port Type VLAN Slot/Port
------------+-------------+----+----+---------+----+---+---------- DVMRP Forwarding
224.2.190.33 211.200.1.102 NATV 3 1/13 NATV 2 1/5 Table
224.2.190.33 211.200.1.102 NATV 3 1/13 NATV 4 1/11
224.2.246.33 141.100.1.100 NATV 4 1/11 NATV 2 1/5
Routing Table
Route Exchange
Client
R3
◼ RFCs Supported
⚫ 2362 - Protocol Independent Multicast-Sparse Mode (PIM-SM) Protocol Specification
⚫ 2934 - Protocol Independent Multicast MIB for Ipv4
⚫ 2932 - Ipv4 Multicast Routing MIB
⚫ 3973 - Protocol Independent Multicast-Dense Mode (PIM-DM)
⚫ 3376 - Internet Group Management Protocol
⚫ 4601 - Protocol Independent
◼ 128 interfaces
C1
Neighbor Discovery & Designated Router
◼ Neighbor Discovery
◼ PIM Hello
⚫ Periodic multicast group address packet (224.0.0.13= ALL-PIM-ROUTERS group)
⚫ TTL= 1
⚫ Default = 30 seconds PIM
router
◼ Designated Router (DR)
PIM Hello
⚫ One per subnet, sends join messages to RP
⚫ Election based on:
Highest Priority PIM Hello PIM Hello
◼ Interface is added to egress interface list for all groups when first neighbor is
heard
PIM-SM - Rendez-Vous Point Tree RPT
224.2.190.33 R1 R2
◼ Rendezvous Point (RP)
Server RP
⚫ Common forwarding router for a shared
distribution tree
7/11
⚫ Each group has a RP 172.39.2.2 PIM Join
⚫ Receivers send explicit join message to RP
R3
⚫ Each source sends multicast data packets
encapsulated in unicast packets to RP 5/3
(Register message). PIM Join
Client
⚫ RP can be configured statically
(S,G) join
Server R1 R2
RP
172.39.2.2
PIM Join R3
Multicast Traffic
Client
R4
PIM-SM - SPT Switchover
◼ Once the multicast traffic goes along the SPT, the last-hop router generates a
PIM prune message towards the RP.
◼ The RP stops sending multicast traffic along the RPT and generates a Register-
Stop message that is sent to the first-hop router
◼ The first-hop router stops the encapsulation of the multicast traffic that was
sent to the RP and forwards the traffic along the SPT.
Server R1 Register-Stop R2
RP
172.39.2.2
Prune
PIM Prune
R3
Multicast Traffic
Prune
Client
The switchover is initiated
automatically by the last DR R4
SPT status is enabled by default
Bootstrap Router
1
◼ BootStrap Router (BSR)
⚫ Keeps routers in network up to date on
reachable C-RPs
RP-SET
5
RP Group
Client Client
Server
PIM-DM
-> ip load pim
-> ip pim interface <interface_name >
-> ip pim dense group group_address/prefix_length [[no] override] [priority priority]
-> ip pim sparse admin-state enable
PIM-SM - Advanced Configuration
◼ Candidate Bootstrap Routers (C-BSRs)
-> ip pim cbsr 192.168.3.1 priority 0
Highest Priority value (0 to 255, default=64) –> Highest IP address
◼ Static RP
-> ip pim static-rp group_address/prefix_length rp_address [[no] override]
[priority priority]
◼ Interface
⚫ Designated Router (DR)
Highest Priority value (default=1) –> Highest IP address
-> ip pimsm interface int_name dr-priority priority
⚫ Stub
Specifies to not send any PIM packets via this interface, and to ignore received PIM packets
-> ip pimsm interface int_name stub
◼ SPT Switchover
⚫ Last hop DR switching to the SPT begins once the first data packet is received
->ip pim spt status enable
◼ Source-specific (S, G) Join message
->ip pim rp-threshold value (default=1)
Specifies the data rate, in bits per second (bps), at which the RP will attempt to switch to native forwarding by issuing a source-
specific (S, G) Join message toward the source
PIM - Monitoring -> show ip pim sparse
Status = enabled,
-> show ip pim? Keepalive Period = 210,
BSR Max RPs = 32,
CANDIDATE-RP
Probe Time = 5,
CBSR
Register Checksum = header,
DENSE
Register Suppress Timeout = 60,
GROUP-MAP
RP Threshold = 1000,
GROUTE
SPT Status = enabled
INTERFACE
-> show ip pim dense
NEIGHBOR
NOTIFICATIONS Status = enabled,
SGROUTE Source Lifetime = 210,
SPARSE State Refresh Interval = 60,
SSM State Refresh Limit Interval = 0,
STATIC-RP State Refresh TTL = 16
-> show ip pim cbsr
CBSR Address = 192.168.3.1,
Status = enabled,
CBSR Priority = 0,
Hash Mask Length = 30,
Elected BSR = False,
Timer = 00h:00m:00s,
Total 2 Mroutes
-> show ip pim groute 225.0.0.101 -> show ip pim sgroute 192.168.100.100 225.0.0.101
(*,225.0.0.101) (192.168.100.100,225.0.0.101)
UpTime = 00h:32m:53s UpTime = 01h:15m:49s
RP Address = 192.168.3.1, PIM Mode = ASM,
PIM Mode = ASM, Upstream Join State = Not Joined,
PIM Mode Origin = Static RP, Upstream RPT State = Not Joined,
Upstream Join State = Not Joined, Upstream Join Timer = 00h:00m:00s,
Upstream Join Timer = 00h:00m:00s, Upstream Neighbor = none,
Upstream Neighbor = none, SPT Bit = True,
Interface Specific State: DR Register State = Pruned,
vlan3 DR Register Stop Timer = 00h:00m:00s,
UpTime = 00h:32m:53s, Interface Specific State:
Local Membership = False, vlan3
Join/Prune State = Joined, UpTime = 01h:15m:49s,
Prune Pending Timer = 00h:00m:00s, Local Membership = False,
Join Expiry Timer = 00h:02m:37s, Join/Prune State = Joined,
Assert State = No Info, RPT State = No Info,
Assert Timer = 00h:00m:00s, Prune Pending Timer = 00h:00m:00s,
vlan100 Join Expiry Timer = 00h:02m:49s,
UpTime = 00h:00m:00s, Assert State = No Info,
Local Membership = False, Assert Timer = 00h:00m:00s,
Join/Prune State = No Info, vlan100
Prune Pending Timer = 00h:00m:00s, UpTime = 00h:00m:00s,
Join Expiry Timer = 00h:00m:00s, Local Membership = False,
Assert State = No Info, Join/Prune State = No Info,
Assert Timer = 00h:00m:00s, RPT State = No Info,
Prune Pending Timer = 00h:00m:00s,
Join Expiry Timer = 00h:00m:00s,
Assert State = No Info,
Assert Timer = 00h:00m:00s,
OmniSwitch AOS R8
PIM-SM
How to
✓ This lab is designed to familiarize you with the PIM-SM capability on an
OmniSwitch.
Contents
1 Topology ........................................................................................ 2
2 PIM-SM Configuration ......................................................................... 4
2
PIM-SM
1 Topology
Protocol-Independent Multicast (PIM) is an IP multicast routing protocol that uses routing information
provided by unicast routing protocols such as RIP and OSPF. PIM is “protocol-independent” because it does
not rely on any particular unicast routing protocol.
3
PIM-SM
- In the multicast switching lab, all requesting devices in the same VLAN received the multicast stream.
Now let’s move the receivers into different VLANs. This will require the multicast traffic to be routed in
order to reach each receiver. PIM-SM gives us the capability to route multicast traffic.
- A multicast router is by default an IGMP querier, we can disable the querier forwarding on both 6860
- On the 6900, check that OSPF still runs properly and that all client vlans are reachable:
2 PIM-SM Configuration
- Enable PIM-SM in the core routers:
Total 3 Interfaces
Total 5 Interfaces
Total 5 Interfaces
Total 2 Neighbors
Total 4 Neighbors
Total 4 Neighbors
- Manage the client 1, client 6 and 9 to send and receive multicast traffic as indicated in the tables
below.
Use the application multicast tool from the desktop to do it.
PC Client Send Receive
Example :
-
7
PIM-SM
Total 1 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+--------------+--------
192.168.20.70 231.10.10.10 int_217 172.16.17.7 00h:00m:48s ST
Total 1 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+--------------+--------
192.168.20.70 231.10.10.10 int_20 192.168.20.8 00h:02m:18s ST
Total 1 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+--------------+--------
192.168.20.70 231.10.10.10 int_20 00h:00m:15s STL
Ring 2
◼ Dedicated Protocol
⚫ APS (Automatic Protection Switching) Ring 1
Main
◼ Works on single and multiple independent and Ring
laddered rings
Sub - Ring
Concepts
◼ Ring Protection Link (RPL)
⚫ Link between 2 ring switches that is blocked to prevent a loop in the ring
◼ RPL Owner
⚫ Switch hosting the RPL Port
⚫ Blocks traffic on the RPL Port during normal ring operations
◼ Service VLAN
⚫ Ring-wide VLAN used for transmission of R-APS messages
◼ Protected VLAN
⚫ VLAN(s) that is/are added to the ERP ring
⚫ ERP determines the forwarding state of protected VLAN(s)
Concepts
◼ 2 ring ports are identified in each switch
RPL Owner
RPL Protection Link
RPL port
R-APS MESSAGE
NR (No Request)
RB (RPL blocked)
RPL Owner
RPL Protection Link
Blocked RPL port
Ring Failure
◼ Failure! (Ring Mode: Protection)
⚫ Adjacent ports are blocked
⚫ Signal Failure (SF) R-APS message is sent
⚫ RPL Owner unblocks RPL port
RPL Owner
RPL Protection Link
Unblocked RPL port
RPL Owner
Main Subtended
Ring Ring
ERP CONFIGURATION
ERP Configuration
◼ Step by Step
Ring 1 1/1
1/2
SVLAN 1001
MEG Level 1 1/3 1/4
ERP Ring
1/1 1/2
1/4 1/3
ERP Configuration
◼ Step by Step
ERP Ring
1/1 1/2
1/4 1/3
RPL Port
ERP Configuration
◼ Step by Step
RPL Port
How to
✓ Create an ERP Ring and check its behavior
Contents
1 Topology ........................................................................................ 2
2 Create a User-defined directories labERP ................................................. 3
3 Configure ERPv2 ring ......................................................................... 3
3.1. Configure VLANs on the switches ................................................................ 3
3.2. Configure the ERP on all switches................................................................ 4
3.3. Make the physical connections according to the lab diagram ................................ 5
3.4. Check the ERP Ring 1 setup by performing some show commands. ......................... 5
4 Lab Check ...................................................................................... 7
4.1. Connect clients to switches ....................................................................... 7
4.2. Test the feature .................................................................................... 7
2
Ethernet Ring Protection
1 Topology
Ethernet Ring Protection (ERP) is a protection switching mechanism for Ethernet ring topologies, such as
multi-ring and ladder networks. This implementation of ERP uses the Automatic Protection Switching (APS)
protocol to coordinate the prevention of network loops within a bridged Ethernet ring.
- For this lab, we will build an ERP ring made of the two 6560s and two 6900s
Notes
We are going to Create a "User-defined directories" call “labERP” and boot the switches on it for this lab.
At the end of the lab, we are going to restart to working directory to retrieve initial configuration.
3
Ethernet Ring Protection
Notes: VLAN 50 is the Service VLAN for ERP Ring 1, VLAN 60 is a Protected VLAN.
Service VLAN is used for the transmission and reception of R-APS Channel (tagged R-APS
messages) and the ETH CCM (tagged CCM) for a given ring.
4
Ethernet Ring Protection
- On 6900-A, tag VLAN 50 to the assigned ring ports 1/1/3 and 1/2/1:
sw1 (6900-A) -> vlan 50 members port 1/1/3 tagged
sw1 (6900-A) -> vlan 50 members port 1/2/1 tagged
- On 6900-B tag VLAN 50 to the assigned ring ports 1/1/3 and 1/2/1:
sw2 (6900-B) -> vlan 50 members port 1/1/3 tagged
sw2 (6900-B) -> vlan 50 members port 1/2/1 tagged
- On 6560-A tag VLAN 50 to the assigned ring ports 1/1/3 and 1/1/25:
sw3 (6560-A) -> vlan 50 members port 1/1/3 tagged
sw3 (6560-A) -> vlan 50 members port 1/1/25 tagged
- On 6560-B tag VLAN 50 to the assigned ring ports 1/1/3 and 1/1/25:
sw4 (6560-B) -> vlan 50 members port 1/1/3 tagged
sw4 (6560-B) -> vlan 50 members port 1/1/25 tagged
- On 6900-A set VLAN 60 as port default for the assigned ring ports 1/1/3 and 1/2/1:
sw1 (6900-A) -> vlan 60 members port 1/1/3 untagged
sw1 (6900-A) -> vlan 60 members port 1/2/1 untagged
- On 6900-B set VLAN 60 as port default for the assigned ring ports 1/1/3 and 1/2/1:
sw2 (6900-B) -> vlan 60 members port 1/1/3 untagged
sw2 (6900-B) -> vlan 60 members port 1/2/1 untagged
- On 6560-A set VLAN 60 as port default for the assigned ring ports 1/1/3 and 1/1/25:
sw3 (6560-A) -> vlan 60 members port 1/1/3 untagged
sw3 (6560-A) -> vlan 60 members port 1/1/25 untagged
- On 6560-B set VLAN 60 as port default for the assigned ring ports 1/1/3 and 1/1/25:
sw4 (6560-B) -> vlan 60 members port 1/1/3 untagged
sw4 (6560-B) -> vlan 60 members port 1/1/25 untagged
Notes
- For ERP Ring 1, the RPL owner is switch 6900-A. Each ring must have its own RPL
- Mandatory parameters for ring creation are a unique ring ID, two physical or logical ports, Service
VLAN and MEG level.
- The maximum number of rings per node that can be created depends on switch model (refer to the
latest AOS Network Configuration guide)
- A maximum number of 16 nodes per ring is recommended.
- Physical switch ports and logical link aggregate ports can be configured as ERP ring ports.
3.4. Check the ERP Ring 1 setup by performing some show commands.
- On all nodes, check the ERP setup:
- Example:
Notes
ERP Ring States:
- idle: the RPL port is blocking, indicating that the topology is stable. the node is performing normally.
- Protection: on link failure, NI down, or node down of erp nodes. The RPL node is now forwarding and
the ring is said to be protected.
- Pending: The node is recovering from failure. When a node is in pending state, the WTR timer will be
running. All nodes are in pending state till WTR timer expiry.
7
Ethernet Ring Protection
4 Lab Check
- Client 1:
- On 6900-A:
- Client 2:
- On 6900-B:
- Client 3:
- On 6560-A:
- Client 4:
- On 6560-B:
- Re-connect (enable) the link in ERP Ring 1. Check status of ERP ring. What happens?
.................................................................................................................
.................................................................................................................
.................................................................................................................
- At the end of this lab, restore the four switches to initial configuration by restarting them from "working
directory".
MACSec
Lesson Summary
Create key-chain
(both switches)
Up to 4 manually configured SA
Associate security key to key-chain keys are used to secure traffic
(both switches) on the point-to-point link
between two nodes)
Create key-chain
⚫ IEEE 802.1X authenticates the endpoint and transmits the necessary cryptographic
keying material to both sides
⚫ Endpoint undergoes authentication and the he switch relays the RADIUS server
response and sniffs the Master key to program it on the connected port.
If Successful
Radius Auth returns
UNP-Profile “employee“
which ap the vlan
Monitoring commands
◼ Show command
How to
✓ This lab is designed to familiarize you with the MACsec feature
Contents
1 Overview ....................................................................................... 3
2 Topology ........................................................................................ 3
3 Prerequisite .................................................................................... 4
3.1. Initialize both switches ............................................................................ 4
3.2. Check available port for MACsec capability .................................................... 4
3.3. Check available licence MACsec capability ..................................................... 5
3.4. Implement a link between switches ............................................................. 5
4 Static SA Mode – Switch-to-Switch links.................................................... 6
4.1. Configure the keys and keychains ................................................................ 6
4.2. Configure keys and keychain and associate them in both switches ......................... 6
4.2.1. Create security keys ....................................................................................... 6
4.2.2. Create key-chain ........................................................................................... 7
4.2.3. Associate security key to key-chain ...................................................................... 7
4.3. Configure sci-tx/sci-rx for a port ................................................................ 7
4.4. Monitor Macsec implementation ................................................................. 7
4.5. Remove MACsec configuration .................................................................... 8
The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE.
2
Macsec
Implementation
1 Overview
MACSec provides point-to-point security on Ethernet links between directly connected nodes.
- IEEE standard (802.1AE-2006) for encryption over Ethernet. Encrypt and authenticate all traffic in a LAN
with GCM-AES-128.
Using MACSec prevents DoS attacks, intrusion, wire-tapping, masquerading, etc. MACSec can be used to secure
most of the traffic on Ethernet links – LLDP frames, LACP frames, DHCP/ARP packets, etc
MACSec-enabled links are secured by matching security keys. Data integrity checks are done. Optionally, traffic
can also be encrypted, if enabled by user configuration
Three modes are In AOS OmniSwith:
- Static SA Mode – Switch-to-Switch links
- Dynamic SA Mode – Switch-to-Switch links
- Dynamic SA Mode – Host-to-Switch links
We are going to cover the two first mode in this lab.
- Host-to-Switch links is not covered as Native Window supplicant doesn’t seem to support MACSec.
- Nevertheless an example of configuration step is given at the end of the lab in appendix.
2 Topology
Notes
We are going to Create a "User-defined directories" call “labmacsec” and boot the both switches on it for this
lab.
At the end of the lab, we are going to restart to working directory to retrieve initial configuration.
4
Macsec
3 Prerequisite
- Create a User-defined directories “labmacsec” and boot the switches from the new user-defined
directory (labmacsec):
- Type the following to create a user defined directory, copy the contents of the WORKING directory to it
and once the switch boots, verify that it booted from the “labmacsec” directory:
sw8 (6860-B)
->mkdir labmacsec
sw8 (6860-B)
->cp labinit/*.* labmacsec
sw8 (6860-B)
->ls labmacsec
sw8 (6860-B)
->reload from labmacsec no rollback-timeout
Confirm Activate (Y/N): y
sw8 (6860-B) ->show running-directory
- To begin, let’s create a new VLAN and assign an IP address to that VLAN as done previously
4.2. Configure keys and keychain and associate them in both switches
- In this example, we used key generated above. If you generate new keys, do not forget to replace it below
in command line
sw7 (6860-A) -> security key 1 algorithm aes-gcm-128 encrypt-key ef68850d93b82fb494843f66f5864cc5
Tips
Up to 4 manually configured SA keys are used to secure traffic on the point-to-point link between two nodes)
7
Macsec
Tips
//Example for “no” format:
// Un-configure macsec sci-tx params
-> no interface 1/1/25 macsec sci-tx key-chain
-> no interface 1/1/25 macsec sci-tx encryption
-> no interface 1/1/25 macsec sci-tx
hex-key 0x000102030405060708090a0b0c0d0e0f
keyed-name 0x000102030405060708090a0b0c0d0eff
5.2. Configure keys and keychain and associate them in both switches
- Configure keys
sw7 (6860-A) -> security key 1 algorithm aes-cmac-128 hex-key 0x000102030405060708090a0b0c0d0e0f keyed-
name 0x000102030405060708090a0b0c0d0eff
sw8 (6860-B) -> security key 1 algorithm aes-cmac-128 hex-key 0x000102030405060708090a0b0c0d0e0f keyed-
name 0x000102030405060708090a0b0c0d0eff
- Create key-chain
sw7 (6860-A) -> security key-chain 1
sw8 (6860-B) -> interfaces port 1/1/25 macsec mode dynamic key-chain 1 encryption
- At the end of this lab, restore both switches to initial configuration by restarting them from "working
directory".
- Create necessary UNP Profile for learning supplicant. If Successful Radius Auth returns UNP-Profile
“employee" which ap the vlan 30
vlan 30
unp profile “employee“
unp profile “employee” map vlan 30
Serial to USB
USB A RJ45 to DB9 Female
console
OS6900 T20/T40/X20/X40 Straight UTP cable
Console Server
Serial to USB
2
OS6900-USB-RJ45 RJ45 to DB9 Female
RJ45
OS6900 X72/Q32
Straight UTP cable
console
Serial to USB
Console Server
RJ45 to DB9 Female
OS6900 RJ45
console
RJ45 to DB9 Female
V72/C32/X48C6/T48C6/V48C8 Straight UTP cable
* Connections to Console servers may need Straight or Roll-over UTP cable depending on Console Server model
OS6900 CONSOLE
USB A
console
Console Roll-over Adapter
OS6900 T20/T40/X20/X40
@ 9600 Baud Rate
OS6900-USB-RJ45
Comes in the box Console Roll-over cable with USB Type A
3
RJ45
OS6900 X72/Q32 console
Console Roll-over Adapter
OR
@ 9600 Baud Rate
Console Roll-over cable with USB Type C
OS6900 RJ45
console
V72/C32/X48C6/T48C6/V48C8
February 22
Serial to USB
RJ45 to DB9 Female
Micro USB
console
OS6860/OS6860E Straight UTP cable
Needs to be
ordered separately
OS6860N
@ 115200 Baud Rate RJ45 to DB9 Female
Straight UTP cable
February 22
* Connections to Console servers may need Straight or Roll-over UTP cable depending on Console Server model
OS6860 CONSOLE
Comes in the box Requires installation of a driver on PC
https://www.silabs.com/developers/usb-to-uart-bridge-vcp-drivers
5
OS6860-RS232CBL
Needs to be
ordered separately
OR
OS6860N
OS6860-RS232CBL
@ 115200 Baud Rate Micro USB
console
Needs to be
February 22
ordered separately
OTHER SWITCHES Console Server
Serial to USB
OS6900-USB-RJ45 RJ45 to DB9 Female
6450
RJ45
6465 console
6560
Console Roll-over cable with USB Type A
6 6850
6855
6865 Console Roll-over Adapter
9900
10K
Console Roll-over cable with USB Type C
February 22
* Connections to Console servers may need Straight or Roll-over UTP cable depending on Console Server model
Campus LAN Network Solution
High End Modular L2/L3 Switch Portfolio
OmniSwitch 6900
OmniSwitch 6900-X
High Density 10GigE Switch
High Density 10GigE Switch
• 20 SFP+ ports (1G/10G)
- Up to 32 SFP+ ports on the 6900-X20
640Gbps wire-rate capacity
• 480Mpps OS6900-X20
• Sub microsecond latency
• 128K MAC addresses
• Wire-rate switching and routing
Virtual chassis of up to 6 switches
Redundant hot swappable power supplies, fans AOS
• Optional modules R8
- 1 for OS6900-T20 (in front)
• Front To Back / Back To Front Air Flow LAN Core / Aggregation
Data Center Top of Rack switch
Verticals
OmniSwitch 6900-T
High Density 10GigE Switch
High Density 10GigE Switch OS6900-T20
• 20 10GBase-T ports (IEEE 802.3an)
- Up to 28 10GBase-T ports on the 6900-T20
640Gbps wire-rate capacity/ low latency
• Sub microsecond latency
• 128K MAC addresses
• IPv4 hosts 8K / IPMC 8K
• Wire-rate switching and routing
Virtual chassis of up to 6 switches
Redundant hot swappable power supplies, fans
• Optional modules
- 1 for OS6900-T20 (in front)
• Front to Back / Back to Front Air Flow
• 128 x 10G ports 32 QSFP28 100G Ports 128 SFP+ 10G ports
with splitter cables
• 72 x 25G ports
Scalable with 32x100G-BaseX ports with QSFP28
connectors
• Operate at 100G/40G/4x25G/4x10G using splitter
cables
• Port connect to a transceiver or DAC cable
Hot swappable
Very Low Latency <600ns fan tray
• 128 x 10G ports 32 QSFP28 100G Ports 128 SFP+ 10G ports
with splitter cables
• 72 x 25G ports
Scalable with 32x100G-BaseX ports with QSFP28
connectors
• Operate at 100G/40G/4x25G/4x10G using splitter
cables
• Port connect to a transceiver or DAC cable
Hot swappable
Very Low Latency <600ns fan tray
Hardware characteristics:
Front to Rear & Rear to Front fan trays
Dual redundant power supplies (uses new 400W PSU)
Virtual Chassis of 6 Hot swappable
fan tray
OmniSwitch 6900-X48C4E
Multicolored LED front panel
40-port unpopulated SFP+ ports
4-port unpopulated QSFP28 interfaces 4 QSFP28 100G Ports
Hot swappable
fan tray
OmniSwitch 6900-V48C8
Multicolored LED front panel
48-port unpopulated SFP28 ports
8-port unpopulated QSFP28 ports 8 QSFP28 100G Ports
Hot swappable
fan tray
OmniSwitch 6900
Optional modules for X and T Models
OS-HNI-U6 OS-QNI-U3 OS-XNI-U12E
4 x 10G SFP+ ports 3 x 40G QSFP+ ports 12 port SFP+ ports
2 x 40G QSFP+ ports 40G 1G/10G
FC 2G/4G/8G
Ethernet 100-FX
• SFP-100-LC-MM
• SFP-100-LC-SM15
• SFP-100-LC-SM40
OmniSwitch 6900 Hardware
Buffer And Traffic Management
Switch Advanced Features
• Virtualization with MC-LAG or Virtual Chassis
• Fast network re-convergence and optimal load
balancing with Shortest Path Bridging
• Ease of configuration
Optimum Application Performance with Rich QoS
• Rich application classification capabilities (L2/L3/L4)
• Advanced Queuing and congestion management
- Enhanced Transmission Selection (ETS) 802.1Qaz (DCB)
- Queue Set profiles (SPQ, WFQ, RED, WRED)
• Congestion Notification
- Priority based Flow Control (PFC), IEEE 802.1Qbb (DCB)
- 802.3x
• Core Routing Layer 3 support
• Wire-rate at L2 / L3 (IPv4/v6, unicast and multicast)
• Advanced routing support with protocols such as OSPF,
BGP, PIM-SM, BFD, VRF
OmniSwitch 9900
OmniSwitch 9907
A 7-Slot low latency chassis for Campus LAN
• Core/Distribution
• Edge
High-throughput Campus LAN chassis
• 5.12Tbps Fabric capacity
• 1/10/40/100G
• Virtual Chassis Support (2 Chassis)
Built-in redundancy (MGMT/Fabric/PS/Fans)
All Modules hot-swappable
Internal POE supply/ HPoE up to 75W & 802.3at
support
MACsec, 1588v2 & MPLS ready hardware
AOS
SDN Ready – OpenFlow/VXLAN/OpenStack/REST APIs R8
OmniSwitch 9907
Overview • 2x40G QSFP+ ports per CMM for uplink or VFL connectivity
• Up to 4x40G ports in redundant system
• Each 40G can be divided into 4x10G
11 RU
7 Slots
• 5 Dedicated NI Slots
• 480Gbps Full Duplex bandwidth per slot
EMP
1 GigE Ethernet Management Port
USB Port
OmniSwitch 9907 - NIs
•NI Cards Connectors Port Speeds Maximum Port Density
•8 x 1/2.5/5/10
•OS99-XNI-P24Z8 •RJ45 GigE BaseT PoE • Ports 1-8 (HPoE)
• 40G/100G Base-X
•OS99-CNI-U8 QSFP28 • 8 (32)
• 4x10G/25G Base-X
OmniSwitch 9907
Fabric/ Fan-Tray Modules (Rear)
facebook.com/ALUEnterprise
linkedin.com/company/alcatellucententerprise
twitter.com/ALUEnterprise
youtube.com/user/enterpriseALU
OmniSwitch AOS R6/R8
Advanced IP Interfaces
Lesson summary
◼ Automatically advertised by RIP and OSPF protocols when the interface is created (not by
BGP)
◼ Used for:
⚫ RP (Rendez-Vous Point) in PIMSM
⚫ sFlow Agent IP address
⚫ Source IP of RADIUS authentication
⚫ NTP Client
⚫ BGP peering
⚫ OSPF router-id
⚫ Switch and Traps Identification from an NMS station (i.e OmniVista)
Loopback0 / Selectable Primary IP Interface
◼ Applications will be able to choose the source interface IP
⚫ any IP interface/ loopback
⚫ in the particular VRF based on an application specific command
◼ The table contains a list of IP addresses and their corresponding MAC addresses
◼ Entries in the table are used to translate 32-bit IP addresses into 48-bit
Ethernet or IEEE 802.3 hardware addresses
◼ Dynamic addresses remain in the table until they time out (Default 300 sec.)
◼ Static entries are permanent and are created using the IP address of the entry
followed by its physical (MAC) address
-> arp 171.11.1.1 00:05:02:c0:7f:11
◼ Use the alias keyword to specify that the switch will act as an alias (proxy) for
this IP address.
-> arp 171.11.1.1 00:05:02:c0:7f:11 alias
Local Proxy ARP
◼ Allows the network administrator to configure proxy functionality on the switch
◼ All ARP requests received on VLAN member ports are answered with the MAC
address of the VLAN’s virtual IP router port
Switch B
Normal ARP
ARP
PC 1 PC 2
192.168.10.101 192.168.10.102
-> arp filter ip_address [mask mask] [vid] [sender | target] [allow | block]
-> arp filter 198.0.0.0 mask 255.0.0.0 sender block
⚫ Per-VLAN DHCP
-> ip helper address {Server Addr} vlan {vid} (R6)
130.1.1.1
VLAN 3
⚫ Multiple DHCP Per-VLAN
-> ip helper address {address1} {address2} vlan {vid} (R6)
Assign VLAN 5 as a forwarding VLAN for the DNS well-known service port
-> ip udp relay dns vlan 4
Intelligent Fabric
Lesson summary
1- Auto-VC
◼ Auto VFL
◼ Auto Chassis ID
◼ Auto vs Static
N N
VC Mode
Y boot.cfg exists? N
Standalone Mode • Auto VFL
Y
• Auto Chassis ID
Auto-VC
Auto VFL feature – Auto VFL ports Auto VFL process runs only on port
explicitly configured as auto VFL
port in vcsetup.cfg or runtime
configuration
Y
1
Auto VFL Ports Auto VFL Detection Process
Automatically detect whether an vcsetup.cfg exists
10G and 40G auto VFL port can become VFL
No copper
N
OS6900-X / T
Assign VFL ID automatically • Last 5 ports of each chassis
2
OS6900: id= 0, 1, 2, 3, 4, 5 • Including ports in expansion slots
Assign VFL ID
• Regardless of SFP+/QSFP presence on those ports
OS6900-Q32
• Last 5 ports of each chassis
◼ Upon receiving their new chassis ID, non master units reboot and apply their
new ID
◼ In case of a new chassis insertion, Master Chassis assigns the chassis id of the
new member
vcsetup.cfg
◼ RCL is run after Auto VC, and before the rest of Auto Fabric
⚫ May result in no Auto Fabric being run depending on the RCL result
⚫ May be used to enhance Auto Fabric
⚫ The linkagg created by the RCL will be retained for use later and not modified by
regular Auto Linkagg
◼ RCL tries 6 times, 3 each on VLAN 1 and 127 to get DHCP and download
instruction file
◼ To cancel RCL, run command “auto-config-abort”
3- Auto-LACP
4- Auto-Routing
5- Auto-SPB Fabric
6- Auto-Network Profiling
7- Auto-MVRP
Auto-Discovery
Auto-LACP
3- Auto-LACP
◼ LLDP enhancement
⚫ Propriatery TLV used to detect the peer and, in return, receive peer’s system ID
⚫ If LACP negotiation succeeds, form a link aggregation on a detected set of ports
vcboot.cfg
! Link Aggregate:
linkagg lacp agg 127 size 16 admin-state enable
linkagg lacp agg 127 actor admin-key 65535
linkagg lacp port 1/1/1c actor admin-key 65535
linkagg lacp port 2/1/15 actor admin-key 65535
linkagg lacp port 3/1/14 actor admin-key 65535 -> show linkagg port
Chassis/Slot/Port Aggregate SNMP Id Status Agg Oper Link Prim
-------------------+----------+--------+----------+----+-----+-----+----
1/1/1C Dynamic 1003 ATTACHED 127 UP UP NO
2/1/15 Dynamic 101015 ATTACHED 127 UP UP NO
3/1/14 Dynamic 201014 ATTACHED 127 UP UP YES
Auto-Discovery
IP Auto Protocol Configuration
4- Auto-Routing
⚫ DHCP, RCL or user configuration CLI ⚫ Protocols are loaded when the first valid hello is
received
◼ Active during and after the normal auto fabric ⚫ Configure the critical parts in order to form
discovery time adjacencies and share routes
⚫ Runs in parallel with no interdependency ⚫ Will automatically create route-maps to
redistribute local subnet routes into OSPF/ISIS as
◼ Can be started by the following internal routes
⚫ No boot.cfg (out of box)
⚫ Auto fabric discovery started by CLI or boot.cfg
⚫ IP auto protocol started by CLI or boot.cfg
vcboot.cfg
! IP Route Manager:
ip static-route 135.118.225.0/24 gateway 172.25.167.193 metric 1
ip route-map "auto-configure" sequence-number 50 action permit
ip route-map "auto-configure" sequence-number 50 set metric-type internal
ip redist local into ospf route-map "auto-configure" admin-state enable
Auto-Discovery
Auto SPB Fabric
5- Auto-SPB Fabric
vcboot.cfg
◼ SPB configuration ! VLAN:
spb bvlan 4000-4015 admin-state enable
spb bvlan 4000-4015 name "AutoFabric BVLAN"
⚫ To apply a set of default SPB Backbone port mac-learning vlan 4000-4015 disable
vcboot.cfg
! Loopback Detection:
loopback-detection enable
loopback-detection service-access port 2/1/1 enable
loopback-detection service-access port 3/1/1 enable
Loopback Detection
Service Access Port
• 1/2 and 2/2 are SAP ports having same ISID and path cost • 1/2 and 1/3 are SAP ports having same ISID and path cost
• Loopback-detection is enabled with option ‘service-access’ • Loopback-detection is enabled with option ‘service-access’
on ports 1/2 and 2/2 on ports 1/2 and 1/3
• Traffic loops through 1/2 and 2/2 • Traffic loops through 1/2 and 1/3
• Port 2/2 is shutdown in case B has higher bridge identifier, • Port 1/3 is shutdown as this interface has higher port
since 1/2 and 2/2 has equal path costs identifier, since 1/2 and 1/3 has equal path costs
Auto-Discovery
Auto MVRP
7- Auto-MVRP
Intelligent Fabric
How to
✓ Configure the Intelligent Fabric on the 6900 and 6860
Contents
1 Basic Network Diagram ....................................................................... 2
2 Lab Preparation ............................................................................... 3
2.1. OmniSwitches not used in the configuration ................................................... 3
2.2. OmniSwitches 6900 and 6860-A Configuration ................................................. 3
3 Auto-VC ......................................................................................... 4
4 Auto-LACP ...................................................................................... 8
2
Intelligent Fabric
The objective of this lab is to achieve automatically the following topology with the Intelligent Fabric.
The Auto-VC feature will automatically create the virtual chassis between the two OmniSwitches 6900 and
the Auto-LACP feature will create the aggregation “127” from the OmniSwitch 6860 to the virtual chassis.
3
Intelligent Fabric
2 Lab Preparation
The script “reset SW#” will shut down all the user ports of the Switches. Thus, there will be no interaction
between these Switches and those from the Topology. For example, we will not have an unwanted auto-LACP
between our auto-Virtual Chassis and the other 6860 (Switch 8)
If you don’t want to lose the configuration of the Switches 3, 4, 5, 6 and 8 by running the
script “reset SW#”, you can use an alternative method. This method is to shut down all the
user ports of these Switches with the command :
Sw# -> interfaces 1/1-24 admin down (R6)
Sw# -> interfaces 1/1-24 admin-state disable (R8)
Notes:
The command “-> rm /flash/…/*.cfg” will delete all configuration files for a stand-alone switch
(boot.cfg) or an already configured virtual chassis (vcboot.cfg and vcsetup.cfg).
4
Intelligent Fabric
3 Auto-VC
One of the Auto-fabric feature is the Auto-VC (Automatic Virtual Chassis). The Auto-Fabric is enabled by
default on the 6900 and 6860(E).
Auto-VC allows device that have no existing Virtual Chassis (VC) configuration (no config file) to form a VC
with compatible devices without user configuration.
In our case, a Virtual Chassis will be configured automatically between the two OS6900.
The following actions are performed by the Auto-VC feature:
- Auto VFL Ports: Virtual Fabric Link (VFL) Detection Process – Automatically detect whether an auto VFL
port can become VFL. Without a config file (no vcsetup.cfg and no boot.cfg) the last 5 ports of each
chassis are designed as auto VFL port.
- Assign VFL ID: A VFL ID is assigned automatically.
- Auto Chassis ID: Both chassis start with a chassis ID 1 and then begins negotiation. The chassis with the
lowest MAC address is elected Master (Chassis ID 1) and the other chassis will get the chassis ID 2.
During the reload of the Switches, take a look at the terminal of your two OS6900. You will notice these
lines:
Starting 6900 Boot Process
Mount /dev/sda1
FS is EXT2
Do you want to disable auto-configurations on this switch [Y/N]?
Preparing Flash...
Without an input from the user, the Switch will use the default value “Yes” and will activate the auto-Fabric.
If you don’t want to use the auto-fabric feature, enter “N” when this message is displayed.
- Wait for the switch to reboot. You will then see auto-fabric messages displayed in the terminal.
***********************
* *
* Welcome To Rlab LAN *
* Pod 20 Switch 1 *
* 6900-A *
* *
***********************
(none) login:
Thu Feb 9 10:36:19 : capManCmm Chass info message:
+++ CMM: INFO: early NI discover slot 1 waiting module type
- The MAC address of the remote 6900 is discovered. The negotiation process starts and elects the remote
6900 as the new Master, because the remote 6900 has the lowest MAC address.
- As the local chassis has not been elected as the Master and act as the Slave, it’s chassis ID is changed
(Chassis ID 2).
...
- As the local chassis is not the Master, its chassis ID changed and so, the chassis must restart in order to
apply its new chassis ID.
- This whole process, between the manual reboot and the automatic reboot should last for about 5
minutes.
- On the other 6900, you will get the following logs:
***********************
* *
* Welcome To Rlab LAN *
* Pod 20 Switch 2 *
* 6900-B *
* *
***********************
(none) login:
Thu Feb 9 10:36:16 : capManCmm Chass info message:
+++ CMM: INFO: early NI discover slot 1 waiting module type
- The MAC address of the remote 6900 is discovered. The negotiation process starts and elects the local
6900 as the new Master, because the local 6900 has the lowest MAC address.
Thu Feb 9 10:38:46 : isisVc library(vcmLib) info message:
+++ vcmlib_overwrite_vcsetup_config@8365: Overwriting chassis ID
- The local chassis has been elected as the Master, it’s chassis ID is set to 1.
Thu Feb 9 10:38:51 : vc_licManager licMgr error message:
6
Intelligent Fabric
- The remote 6900 is unreachable through the VFL link 1/0, so the local 6900 considers the Virtual Chassis
“Down” for the moment.
- Please wait around 3 minutes after the automatic reboot of the Slave 6900.
- You can check the terminal of the Slave 6900 after its automatic reboot:
Sw1 (6900-A) -> show virtual-chassis topology
Local Chassis: 2
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
2 Unassigned Init 2 100 113 2c:fa:a2:05:cd:a9
- When the Slave 6900 has completed its reboot, it will go into a Virtual Chassis “Init” state. It will then
contact the Master and act as the Slave running in the Virtual Chassis.
- Let’s then have a look to the Virtual-Chassis configuration.
- On the Master 6900 enter the following:
Sw2 (6900-B) -> show virtual-chassis topology
Local Chassis: 1
Oper Config Oper
Chas Role Status Chas ID Pri Group MAC-Address
-----+------------+-------------------+--------+-----+------+------------------
1 Master Running 1 100 113 2c:fa:a2:05:cd:71
2 Slave Running 2 100 113 2c:fa:a2:05:cd:a9
4 Auto-LACP
One other Auto-fabric feature is the Auto-LACP (Automatic Link Aggregation Protocol).
Auto-LACP uses enhanced LLDP packets in order to detect the peer and in return, receive peer’s system
ID.
If two ports at least are detected, the LACP negotiation will start and the aggregation link is formed.
- If the Switch 7 has been rebooted at the same time than the two Switches 6900, it will reach a ready state
long before the 6900 Virtual Chassis is established.
- The auto-LACP will be configured automatically around 5 minutes after the establishment of the auto-VC.
If you want to speed up the discovery process, you could use the following command to force the auto-
LACP to be discovered :
sw7 (6860-A) -> auto-fabric discovery start
- Compared to the Auto-VC, the Auto-LACP does not generate logs in the console.
- You can still get some logs from the swlog file.
Enter the following command and check the time and date of the switch
sw7 (6860-A) -> show system
Display the swlog file with a timestamp. Replace mm/dd/yyyy and hh:mm:ss by the start time and date of
the 6860-A (its last reboot).
sw7 (6860-A) -> show log swlog timestamp mm/dd/yyyy hh:mm:ss
2014 Feb 19 06:00:21 0S6860 swlogd: dafcCmm cmm info(5) AUTO-FABRIC-EVENT: LINKAGG_AGG_CONFIG: Aggregate
127 created. Key 65535, partner 2c:fa:a2:05:cd:71
2014 Feb 19 06:00:21 0S6860 swlogd: MIP_GATEWAY mipgwd info(5) ---- Logging MIP_SET type, command to be
sent:
2014 Feb 19 06:00:21 0S6860 swlogd: MIP_GATEWAY mipgwd info(5) MIP_SET(4) msg_id(14680090)
(APPID_DAFC_CMM(165/0) -> APPID_LINKAGGREGATION(12)) values:
2014 Feb 19 06:00:21 0S6860 swlogd: MIP_GATEWAY mipgwd info(5) Table(12301/0): alclnkaggAggTable
2014 Feb 19 06:00:21 0S6860 swlogd: dafcCmm cmm info(5) AUTO-FABRIC-EVENT: LINKAGG_AGG_CONFIG: Hash 7 on
aggregate 127 created.
- Enter the following commands on the 6860 and the Master 6900:
SW2 (6900-B) -> show linkagg
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
127 Dynamic 40000127 16 ENABLED UP 2 2
-------------------+----------+--------+----------+----+-----+-----+----
1/1/6 Dynamic 1006 ATTACHED 127 UP UP YES
2/1/5 Dynamic 101005 ATTACHED 127 UP UP NO
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+-------------+---------+----+------------+--------------+-------------
127 Dynamic 40000127 16 ENABLED UP 2 2
- As you can see, the Aggregation Link has been automatically created. The aggregation ID has the same
value on both switch (6860-A and the VCof 6900). The ports that belong to the aggregation are also the
same.
OmniSwitch AOS R6/R8
Download and unzip the upgrade files for the appropriate model and release
From BPWS
U p g r a d e Software image
◼ Step by Sep
Memory Requirements
UBoot and FPGA Requirements
Upgrade Instructions
…
Note: If there are any issues after upgrading the switch can be rolled back to the previous certified version
U p g r a d e Software image
◼ Step by Step
In addition to the AOS images, archive will also contain an uboot and FPGA upgrade kit.
If require (Release note)
FTP (Binary) the FPGA upgrade kit and /or Uboot upgrade tar.gz to the /flash directory (primary CMM)
Reload from running directory
How to
✓ This lab is designed to familiarize you with the MVRP feature and learn
how to configure it through the CLI.
Contents
1 Topology ........................................................................................ 2
2 Use MVRP ....................................................................................... 3
2.1. Configure the maximum number of VLANs ...................................................... 3
2.2. Create some dynamic VLANs ...................................................................... 3
2.3. Delete VLAN ......................................................................................... 4
2.4. Revert to 1x1 RSTP mode ......................................................................... 5
2
Multiple VLAN Registration Protocol
1 Topology
MVRP is used primarily to prune unnecessary broadcast and unknown unicast traffic, and dynamically create
and manage VLANs.
MVRP has to be globally enabled on a switch before it can start forwarding MVRP frames.
In order to have MVRP enabled, switch must be in spanning-tree flat mode.
- At this step our network is configure with STP 1x1, but to enable MVRP we have to be in flat mode.
- To configure STP flat mode type:
6860-A -> spantree mode flat
6860-B -> spantree mode flat
6450-B -> bridge mode flat
Tips
MVRP can be enabled on ports regardless of whether it is globally enabled or not. However, for the port to
become an active participant, MVRP must be globally enabled on the switch. By default, MVRP is disabled on
the ports. To enable MVRP on a specified port, use the mvrp port command
Notes
MVRP can be configured only on fixed, 802.1 Q and aggregate ports. It cannot be configured on mirror, mobile,
VPLS Access, and VLAN Stacking User ports.
3
Multiple VLAN Registration Protocol
2 Use MVRP
Notes
The VLAN type is then Dynamic
Notes
VLAN are automatically created and port tagged, but of course, there’s no ip interface creation nor association
with MSTI.
- What happens to it ?
6450-B -> show vlan
stree mble src
vlan type admin oper 1x1 flat auth ip tag lrn name
-----+-----+------+------+------+------+----+-----+-----+------+----------
1 std on on on on off on off on VLAN 1
20 std on on on on off on off on VLAN 20
30 std on on on on off on off on VLAN 30
40 mvrp on off off on off off off on VLAN 40
4001 std on on on on off on off on Administration
Tips
The mvrp status in R6 is equal to the dyn status in R7/R8. That means the VLAN 40 has been automatically re-
created.
◼ Unicast
Bidirectional Forwarding Detection - Overview
◼ Benefits of BFD over other Hello Protocols
⚫ Faster convergence
⚫ Independent of specific media, data and network protocols
⚫ Can be encapsulated within any routing protocol being forwarded between two systems
⚫ Supports BGP,OSPF,VRRP tracking and Static route protocols
⚫ Less CPU-intensive than reduced timer mechanisms for routing protocols
⚫ Detects failures in milliseconds without having to fine-tune routing protocol Hello timers
⚫ Detects one-way link failures
BFD PEER ROUTER Session establishment
Three-way Handshake
S . Down
V
T . Init
O B A R
S
. Up
G T R
P I
F P C P
BFD packets
S V BDF S V
T T
O B A R O B A R
S T S T
G R G R
P I P I
F P C P ADJACENCY F P C P
BDF BDF
Echo
Bidirectional Forwarding Detection - Asynchronous Mode
S V S V
T T
O B A R O B A R
S T S T
G R G R
P I P I
F P C P F P C P
BDF BDF
◼ Enabled by default
S V S V
T Echo T
O B A R O B A R
S T S T
G R G R
P I P I
F P C P F P C P
◼ Configuring the global transmit time interval for BFD control packets
⚫ -> ip bfd-std transmit transmit-interval (default: 100ms)
◼ Configuring the global receive time interval for BFD control packets
⚫ -> ip bfd-std receive receive-interval (default: 100ms)
All of the above global command status are configurable at the BFD interface level
Bidirectional Forwarding Detection - Configuration
All of the above global command status are configurable at the BFD interface level
Bidirectional Forwarding Detection - Timer
◼ Specified in microseconds, allowing very fast or very slow detection
◼ Continuous negotiation
! BFD adjacency will not form if the send-timer on one peer is lower than the receive-timer on another peer
Bidirectional Forwarding Detection – Configuration Example
Sw1 Sw2
1/11 1/12
1/12 1/11
Sw3 Sw4
! BFD-STD : 10.1.1.2
ip bfd-std echo-interval 100
Vlan 10
ip bfd-std status enable
10.1.1.0
ip bfd-std transmit 100
Sw1 Sw2
ip bfd-std receive 100
ip bfd-std mode echo-only
MASTER 1/11 1/12 BACKUP
ip bfd-std l2-hold-timer 100
ip bfd-std interface vlan10
ip bfd-std interface vlan10 transmit 100 Vlan 2 Vlan 3 Vlan 2 Vlan 3
ip bfd-std interface vlan10 receive 100 192.168.10.247 192.168.11.247 192.168.10.248 192.168.11.248
ip bfd-std interface vlan10 multiplier 1
ip bfd-std interface vlan10 mode echo-only
ip bfd-std interface vlan10 echo-interval 100
ip bfd-std interface vlan10 l2-hold-timer 100
ip bfd-std interface vlan10 status enable ! VRRP
vrrp 1 1 disable
! VRRP : vrrp 1 1 priority 100 preempt interval 1
vrrp bfd-std enable vrrp 1 1 address 192.168.10.250
vrrp track 1 enable priority 75 address 10.1.1.2 bfd-std enable vrrp 1 1 enable
vrrp 1 1 disable vrrp 2 2 disable
vrrp 1 1 priority 150 preempt interval 1 vrrp 2 2 priority 100 preempt interval 1
vrrp 1 1 address 192.168.10.250 vrrp 2 2 address 192.168.11.250
vrrp 1 1 track-association 1 vrrp 2 2 enable
vrrp 1 1 enable
vrrp 2 2 disable
vrrp 2 2 priority 150 preempt interval 1
vrrp 2 2 address 192.168.11.250
vrrp 2 2 track-association 1
vrrp 2 2 enable
Bidirectional Forwarding Detection – Configuration Example
10.1.1.2
Vlan 10
10.1.1.0
Sw1 Sw2
with BFD disabled -- takes around 10 seconds for the backup to become master.
with BFD enabled -- takes less than 3 seconds for the backup to become master.
OmniSwitch AOS R6/R8
192.168.0.10
192.168.0.3 192.168.0.9
192.168.0.5
192.168.0.8
◼ Benefits:
⚫ Cost savings: no costly hardware upgrade to servers
⚫ Scalability: allows up to 16 clusters per switch
⚫ Reliability: provides load-sharing and redundancy
⚫ Flexibility: QoS may be applied to servers
Characteristics
◼ Virtual IP address
⚫ Must be an address in the same subnet as the servers
⚫ SLB cluster automatically creates a proxy ARP for the VIP with the switch’s MAC
address
◼ All servers must be part of the same VLAN/subnet. Servers do not need to be
physically connected to the SLB switch/router, they can be connected through
L2 switches for that SLB VLAN.
Configuration
◼ Create a loopback adapter in the server
⚫ Define the Virtual IP address to the loopback adapter
◼ Alternative
⚫ Weighted Round Robin (WRR)
⚫ SLB cluster distributes traffic according to the relative “weight” a server has within an
SLB cluster
⚫ Aggregate weight of all servers should not exceed 32
-> ip slb server ip <ip-addr> cluster <clstr> admin status <enable | disable> probe <probe>
weight <weight>
Cluster
192.168.100.102
Weight = 3
192.168.100.109
Weight = 2
192.168.100.99
Weight = 1
192.168.100.200
192.168.100.103
Weight = 0
Backup Server Scenario
Cluster cl1
192.168.100.102
Weight = 1
192.168.100.200 192.168.100.99
Weight = 0
Cluster cl1
Server A: 192.168.100.102
Weight = 3
Server B:192.168.100.109
Weight = 2
Server C: 192.168.100.99
Weight = 1
192.168.100.200
Server D: 192.168.100.103
Weight = 0
Server A handles three times the traffic of Server C, and Server B twice the traffic
of Server C.
Server D is a backup server
Hashing Control Algorithm
◼ Hashing Control
⚫ Control over the hashing mode AA Source Destination AA
AA Address Address AA
Link Aggregation
ECMP
Server Load Balancing
Server #
◼ Two hashing algorithms available
⚫ Brief Mode: Brief Mode
UDP/TCP ports not included
Only Source IP and destination IP addresses are considered
-> hash-control brief
⚫ Extended
UDP/TCP ports to be included in the hashing algorithm
Result in more efficient load balancing
-> hash-control extended [udp-tcp-port | no]
AA Source Destination UDP/TCP AA
AA Address Address Port AA
Platform Default Hashing Mode
6850E/6855 Brief
9000E Extended Server #
6860 Brief Extended Mode
6900 Brief
10K Extended
Cluster Modes
◼ SLB Cluster VIP
⚫ Traffic destined to the Virtual IP of the Server Farm
⚫ Each server is also configured with a Loopback Interface for the Virtual IP
⚫ A server can be configured with more than one VIP
Therefore, a server can belong to more than one SLB cluster
10
L3 Network
Switch Server 10.0.0.3
Route to reach VIP
SLB enabled
L2 switch
-> policy condition cond1 source port 1/1 destination tcp port 80
-> ip slb cluster Firewall condition cond1 L3
-> ip slb server ip 10.0.0.1 cluster WebServer
-> ip slb server ip 10.0.0.2 cluster WebServer
Cluster « Firewall »
Access the VIP
VLAN 10
IP@ 10.0.0.254 Server 10.0.0.1
-> policy condition cond1 source port 1/1 destination tcp port 80
-> ip slb cluster Firewall condition cond1 L2
-> ip slb server ip 10.0.0.1 cluster WebServer
-> ip slb server ip 10.0.0.2 cluster WebServer
Cluster « Firewall »
Access the VIP
VLAN 10
IP@ 10.0.0.254 Server 10.0.0.1
Server 10.0.0.2
VLAN
1/1 10
L3 Network
Switch
Route to reach VIP
SLB enabled
Bridged Network
The server must be configure to receive packet with a destination MAC
address that is different than the MAC address of the server (i.e.
promiscuous mode)
Health Monitoring
◼ Health Monitoring of the servers based on
⚫ Ethernet link state detection
⚫ IPv4 ICMP ping
⚫ Content Verification Probe
20 probes per switch
Basic Probe - PING
Application probes: ftp, http, https, mail (imap, imaps, pop, pops, smtp), nntp)
Custom probes - tcp, udp
Can specify interval, time-out, and retries
◼ Server States
⚫ Disabled: server has been administratively disabled by the user
⚫ No Answer: server has not responded to ping requests from the switch
⚫ Link Down: bad connection to the server
⚫ Discovery: switch is pinging a physical server
⚫ In Service: server can be used for client connections
⚫ Retrying: switch is making another attempt to bring up the server
Server Load Balancing - Probe Configuration
◼ Creating SLB Probes
-> ip slb probe <probe_name> {ftp | http | https | imap | imaps | nntp |
ping | pop | pops | smtp | tcp | udp}
◼ Options
⚫ Probe timeout (ms) and Period (sec)
⚫ TCP/UDP Port
⚫ URL / User Name / Password
sent to a server as credentails for an HTTP(S) GET operation
⚫ Send
An ASCII string sent to a server to invoke a response
⚫ Expect
An ASCII string used to compare a response from a server
-> ip slb probe http_test http
-> ip slb probe http http_test period 10
-> ip slb cluster C1 vip 192.168.160.201
-> ip slb server ip 192.160.160.4 cluster C1 weight 2 probe http_test
-> ip slb server ip 192.160.160.4 cluster C1 weight 4 probe http_test
Probe Configuration
◼ http / https
◼ ping ⚫ USERNAME
⚫ TIMEOUT ⚫ URL
⚫ RETRIES ⚫ TIMEOUT
⚫ PORT ⚫ STATUS
⚫ PERIOD ⚫ RETRIES
⚫ PORT
⚫ PERIOD
⚫ PASSWORD
⚫ EXPECT
◼ tcp / udp
⚫ TIMEOUT
◼ ftp / imap / imaps / pop / pops / smtp / nntp ⚫ SSL
⚫ TIMEOUT ⚫ SEND
⚫ RETRIES ⚫ RETRIES
⚫ PORT ⚫ PORT
⚫ PERIOD ⚫ PERIOD
⚫ NO
⚫ EXPECT
Specifications
on Windows Server
◼ Starting with Windows Server 2008, Microsoft has implemented a strong host
model which disallowed the host to receive packets on an interface not assgned
as the destination IP address. To configure weak host mode enter the following
commands:
netsh interface ipv4 set interface <LAN Interface Name> weakhostreceive=enabled
netsh interface ipv4 set interface <Loopback Interface Name> weakhostreceive=enabled
netsh interface ipv4 set interface <Loopback Interface Name> weakhostsend=enabled
on Linux Server
How to
✓ This lab is designed to familiarize you with the server load balancing
feature on OmniSwitches.
Contents
1 Topology ........................................................................................ 1
2 Server Load Balancing configuration ....................................................... 1
2.1. Client Configuration ................................................................................ 1
2.2. Client VLAN configuration ......................................................................... 1
2.3. Loopback interface creation on clients ......................................................... 1
2.4. SLB configuration ................................................................................... 2
2.5. Demonstrate SLB ................................................................................... 3
2.6. SLB Load Balancing – Self Guided Section ....................................................... 3
3 Summary ........................................................................................ 4
4 Lab Check ...................................................................................... 4
1
Server Load Balancing
1 Topology
Virtual Chassis
192.168.110.0 192.168.110.0
1/2/1-2 2/2/1-2
1/1/1 2/1/1
OS6900-A 1 OS6900-B 2
1/1/5 1/1/6 2/1/6 2/1/5 Client 2 VLAN 110
Client 1 VLAN 110
You can now check client 2 connectivity by pinging its gateway interface.
(This creates a Server Load Balancing cluster with the virtual IP address of 192.168.20.100). We will now
assign servers to the cluster.
sw1 (6900-A) -> ip slb server ip 192.168.110.101 cluster WorldWideWeb
The previous commands added two servers to the cluster named WorldWideWeb. Let’s view some of the SLB
configuration parameters. Type the following:
sw1 (6900-A) -> show ip slb
Admin status : Enabled,
Operational status : In Service,
Number of clusters = 1
You will see that one of the servers has a flow associated with it. Change the ip address of the client 5 and
connect again to the vip web server, you should be associated with another one.
3 Summary
This lab introduced the configuration of the Server Load Balancing feature of an OmniSwitch. Load
balancing can be used to distribute traffic over multiple servers. This is done using a virtual IP address for
all client requests;
4 Lab Check
- What is an advantage of configuring SLB?
.........................................................................................................................
.........................................................................................................................
- What is the purpose of the Virtual IP address?
.........................................................................................................................
.........................................................................................................................
- What is the purpose of the MS Loopback Adapter?
.........................................................................................................................
.........................................................................................................................
OmniSwitch AOS R6
Link Aggregation
How to
✓ This lab is designed to familiarize you with Static link aggregation.
Contents
1 Topology ........................................................................................ 2
2 Link Aggregation – Static option ............................................................ 2
2.1. Create a Static Link Aggregation ................................................................. 2
2.2. Test the configuration ............................................................................. 3
3 Lab Check ...................................................................................... 4
2
Link Aggregation
1 Topology
Link Aggregation provides the ability to combine multiple physical ports into a single logical port for added
throughput and redundancy; this can be done statically using OmniChannel or dynamically using the IEEE
802.3ad (LACP) protocol.
Notes
In this example, 5 represents the aggregate identifier and 2 is the maximum number of ports in the aggregate
- Check to see what you have done; notice the operational status is DOWN.
- Type:
-> show linkagg
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED DOWN 0 0
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED DOWN 0 2
Notes
Ports don't necessarily have to be the same on both ends of the link.
Number Aggregate SNMP Id Size Admin State Oper State Att/Sel Ports
-------+----------+---------+----+------------+--------------+-------------
5 Static 40000005 2 ENABLED UP 2 2
Notes
6450-A already an IP address assigned to vlan 1 from previous lab
4
Link Aggregation
Notes
There’s no link between 6860 and 6450, so it’s not possible to make a ping between them.
- To demonstrate the redundancy capabilities, experiment with removing a link and monitor the results of
your pings tests
Tips
You can use the command ping <dest_ip_address> count <number> to send more than 6 pings.
To break a ping sequence, press the key CTRL+C
To simulate a link failure, you can bring down the corresponding interface :
interface slot/port admin down (6450)
- We will now perform a similar configuration exercise using the IEEE 802.3ad standard (LACP). Before
proceeding remove the static link aggregation group you created. You can either return your switch to
factory default or remove them manually. Note that you cannot delete a link aggregation group if there
are ports still associated with it:
6450 -> no static linkagg 5
ERROR: LAERR53 Static aggregate not empty deletion failed
- Ensure the link aggregation groups are removed on both switches as described above. There is no need to
disconnect the physical connections to continue to the next lab section.
3 Lab Check
Objectif
✓ This lab is designed to familiarize you with the OmniSwitch 6560 Virtual
Chassis feature (VC) and its configuration.
Contents
1 Configuring a Virtual Chassis of 2 OmniSwitchs 6560 .................................... 2
2 Monitoring the Virtual Chassis ............................................................... 3
2
6560 Virtual Chassis
In this part, we will configure the Virtual Chassis ID, and group them in a Virtual Chassis Group 1.
- Assign a globally unique chassis identifier to the switch and enable the switch to operate in virtual chassis
mode, on both 6560:
6560-A -> show virtual-chassis topology
6560-A -> virtual-chassis chassis-id 1 configured-chassis-id 1
6560-A -> virtual-chassis chassis-group 1
6560-A -> show virtual-chassis topology
- Manage the 6560-A to be the master chassis, assign a highest chassis priority to it:
6560-A -> virtual-chassis configured-chassis-priority 200
- Configure a virtual fabric link (VFL) and member ports for the VFL:
6560-A -> virtual-chassis auto-vf-link-port 1/1/25
6560-A -> virtual-chassis auto-vf-link-port 1/1/26
6560-A -> write memory
VFL is an aggregate of high-speed ports used, between the peers, for inter-chassis traffic and control data
through the IPC-VLAN
- Vérifier que les liens virtuel fabric link (vfl) ont bien été créés :
6560-A -> show virtual-chassis vf-link
6560-A -> show virtual-chassis vf-link member-port
Notes
At the end of Chassis role election process, the Slave chassis will reboot to initialize its parameters and chassis
status.
- If the status of the OS6560 is not “Running”, check that the System Ready is set to Yes with the command:
6560-A -> debug show virtual-chassis topology
Local Chassis: 1
Oper Config Oper System
Chas Role Status Chas ID Pri Group MAC-Address Ready
-----+------------+-------------------+--------+-----+------+------------------+-------
1 Master Running 1 200 1 2c:fa:a2:aa:32:a1 Yes
2 Slave Running 2 100 1 2c:fa:a2:a2:f1:9d Yes
Notes
The chassis role determines which switch is the master of the Virtual Chassis.
The Master and Slave roles are only active when the operational status of the virtual-chassis feature is up for
both chassis.
Notes
The “Is Primary” field defines the primary port of the virtual fabric link.
4
6560 Virtual Chassis
- Verify the consistency of system-level mandatory parameters between the two chassis:
Notes
The two chassis in the same Virtual-Chassis group must maintain identical configuration and operational
parameters.
AAA Radius
http://www.alcatel-lucent.com
2
1
You have to log in fist!
Supplicant?
Yes No
MAC No
802.1X authentication
auth
Pass Fail Pass Fail
Captive
RADIUS Profile RADIUS Profile Portal
Captive Portal Captive Portal Captive Portal Captive Portal Pass Fail
Group mobility Captive Portal Group mobility Group mobility Group mobility
Profile Profile
Block
Block
Policies can be interchanged
Some policies (Captive portal, Profile, Block) are terminal policies (cannot be followed by other policies)
Captive Portal policy will start a new authentication branch
“Fail” branches will only classify devices into non-authenticated Profiles
Captive Portal - Example
Supplicant?
Yes No
Captive
MAC
802.1X Portal
auth
Radius Profile
AAA Radius
Supplicants
or
non-supplicants user http://www.alcatel-lucent.com
DHCP
1 Offer
Switch DHCP and DNS Server
DHCP
Default DHCP scope
Request
10.123.0.0/16
Def GW: 10.123.0.1
1 DNS Request DNS server: 10.123.0.1
HTTP redirect to
captive portal login
Captive Portal - Customization
◼ Logo
◼ Welcome text
◼ Background image
R6 R8
/flash/switch /flash/switch/captive_portal/custom_files
• cpPolicy.html • /assets
• logo.png ( prefered ), jpg, gif • /images/logo.jpg
My Company Welcome text message
• background.png, jpg, gif • /pages/cportal_policy.pdf
• banner.jpg • /scripts/cportal_scripts.js
• cpLoginWelcome.inc • /styles/cportal_style.css
• cpStatusWelcome.inc • /templates
• cpFailWelcome.inc • cportal_login.html
• cpLoginHelp.html • cportal_redirect.html
• cpStatusHelp.html • cportal_status.html
• cpFailHelp.html • error404.html
• cpBypassHelp.html • qmr_quarantined.html
• unauth.html
Captive Portal - Customization
◼ Configuring a different subnet for the Captive Portal IP address
◼ URL redirection
⚫ capability of redirecting the user to a
Redirection URL upon successful authentication
Redirection URL upon failure/bypass authentication (not supported in R8)
• For both pass and fail policies, order in which parameters are specified determines the order in
which they are applied
• Type of policy must end with either the default-vlan, block, or captive-portal
• Terminal parameter block parameter is used by default
Access Guardian – Port-Templates (R8)
◼ AAA Profile
⚫ Specifies the default AAA profile for the port Template
◼ Default Edge-Profile
⚫ When template is attached to UNP port/linkagg any existing default profile is
overriden
◼ Pass-alternate
⚫ If classification does not return a valid UNP then the pass-alternate is assigned
Access Guardian - Application Example
Supplicant/Non-Supplicant with Captive Portal Authentication
◼ Corporate supplicant device
⚫ Passes 802.1X authentication
⚫ Assigned a UNP-corporate
◼ Corporate user with non-supplicant, non-corporate device
⚫ Does not trigger 802.1X authentication
⚫ Fails MAC authentication
⚫ Get temporary UNP-captive_portal
⚫ Captive Portal assign UNP-corporate after successful authentication
◼ Guest supplicant device
⚫ Fails 802.1X authentication
⚫ Get temporary UNP-captive_portal
⚫ Captive Portal assign UNP-guest after successful authentication
◼ Guest non-supplicant device
⚫ Fails 802.1X authentication
⚫ Fails MAC authentication
⚫ Get temporary UNP-captive_portal
⚫ Captive Portal assign UNP-guest after successful authentication
◼ Allowed devices
⚫ Passes MAC authentication
⚫ Assigned a UNP-allowed_devices
Supplicant/Non-Supplicant with Captive Portal Authentication
Yes No
Supplicant?
MAC
802.1X auth
Fail Pass
Pass Fail
UNP_Corporate
UNP_devices
Captive
Pass Portal Fail
UNP_Guest
UNP_Corporate
Block
Supplicant/Non-Supplicant with Captive Portal Authentication
1. Configure a RADIUS Server
R6/R8 -> aaa radius-server radius_server host 10.2.3.4 hash-key secret
After successful 802.1x authentication, if the RADIUS server doesn't return a valid UNP, force UNP-
corporate. If 802.1x fail, then redirect to the captive portal authentication
After successful MAC authentication, if the RADIUS server doesn't return a valid UNP, force UNP-
devices. If MAC authentication fail, then redirect to the captive portal authentication
After successful captive portal authentication, if the RADIUS server doesn't return a valid UNP, force
UNP-guest. If captive portal authentication fail, then block the device.
Supplicant/Non-Supplicant with Captive Portal Authentication
5. Configure authentication on bridge port (R8)
R8 -> unp port 1/1/1 default-profile UNP-captive_portal
R8 -> unp port 1/1/1 802.1x-authentication enable pass-alternate UNP-
corporate
After successful 802.1x authentication, if the RADIUS server doesn't return a valid UNP, force UNP-corporate. If
802.1x fail, then device is assign the UNP-captive_portal for which captive portal configuration is set.
After successful MAC authentication, if the RADIUS server doesn't return a valid UNP, force UNP-devices. If MAC
fail, then device is assign the UNP-captive_portal for which captive portal configuration is set.
After successful Captive Portal authentication, if the RADIUS server doesn't return a valid UNP, force UNP-guest.
OmniSwitch AOS R8
Anycast RP
Lesson Summary
◼ RFC
Server
Register
RP2
⚫ RFC 4610 Anycast-RP Using
Protocol Independent Multicast
(PIM) RP1 OSPF
RP2
⚫ Uses a single statically defined RP
address (set on a Loopback interface) Register
OSPF
The RP routers share this Loopback unicast (IGP)
(IGP).)
⚫ The rest of the network configuration including additional IP interfaces, PIM Interfaces
and OSPF configuration to complete the network setup is outside the scope of this
example
Set of router that will act as RPs for the Anycast-RP address
◼ Step by Step
RP1 RP2
Note: This static configuration should exist on all PIM routers in the PIM domain, not just
those routers that are participating in the Anycast-RP set.
Anycast RP Configuration
◼ Step by Step
Set of router that will act as RPs for the Anycast-RP address
Sw8 Non-RP
Loopback0 : 192.168.254.8
All other PIM routers that are NOT participating in the Anycast-RP set will still have the
PIM configuration defining the RP, but will not have the anycast-rp specific configuration.
Sw8 Non-RP
ip pim static-rp 231.0.0.0/8 10.10.10.1
Loopback0 : 192.168.254.7
OmniSwitch AOS R6/R8
Anycast RP
How to
✓ This lab is designed to familiarize you with the Anycast capability on an
OmniSwitch.
Contents
1 Topology ........................................................................................ 2
2 PIM-SM Configuration ......................................................................... 4
3 Lab Check ...................................................................................... 8
2
Anycast RP
1 Topology
Protocol-Independent Multicast (PIM) is an IP multicast routing protocol that uses routing information
provided by unicast routing protocols such as RIP and OSPF. PIM is “protocol-independent” because it does
not rely on any particular unicast routing protocol.
3
Anycast RP
- In the multicast switching lab, all requesting devices in the same VLAN received the multicast stream.
Now let’s move the receivers into different VLANs. This will require the multicast traffic to be routed in
order to reach each receiver. PIM-SM gives us the capability to route multicast traffic.
- As we will route the traffic, we don’t need the querier configured on 6450-A (but we still need to
forward querying) :
-
- Also, a multicast router is by default an IGMP querier, we can disable the querier forwarding on both
6860
- On the 6900, check that OSPF still runs properly and that all client vlans are reachable :
2 PIM-SM Configuration
- Enable PIM-SM in the core routers :
- Configure Anycast-RP on three.These routers will be used as the RP. The RP address will be 10.10.10.1,
which will be configured on a Loopback1 interface on the three routers.
- OSPF is configured on these routers so this Loopback1 address is advertised in OSPF to all routers in the
network. Different PIM routers in the network will either reach one if these three routers for the RP
depending on the best path metric.
- On the three routers, configure the Anycast-RP address 10.10.10.1. The 231.0.0.0/8 specifies the group
address range that the Anycast-RPs will be responsible for.
-
6900 -> ip pim static-rp 231.0.0.0/8 10.10.10.1
Note: This static configuration should exist on all PIM routers in the PIM domain, not just those routers
that are participating in the Anycast-RP set.
Next you need to define something called the RP set. This is the set of all routers which would act as
the RP. You need to have a LoopbackX interface on each prospective RP router, which is different than
the LoopbackX that is being used as the RP address.
In our previous configuration, we defined the Loopback0 is defined on all routers with IP address
192.168.254.X/32. This Loopback0 address is already used as the Router ID for OSPF.
Configuration defining the Anycast-RP set must be the same on all routers participating in Anycast-RP
- One thing to note here is that you need to define your own IP address as well as all remote IP addresses
in this RP set so the configuration for the Anycast-RP set will be the same on all RPs in the Anycast-RP
set.
Total 5 Interfaces
Interface Name IP Address Designated Hello J/P Oper BFD
Router Interval Interval Status Status
--------------------------------+---------------+---------------+--------+--------+--------+--------
int_20 192.168.20.7 192.168.20.8 30 60 enabled disabled
int_30 192.168.30.7 192.168.30.8 30 60 enabled disabled
int_170 192.168.170.7 192.168.170.7 30 60 enabled disabled
int_217 172.16.17.7 172.16.17.7 30 60 enabled disabled
int_278 172.16.78.7 172.16.78.8 30 60 enabled disabled
6
Anycast RP
Total 5 Interfaces
Interface Name IP Address Designated Hello J/P Oper BFD
Router Interval Interval Status Status
--------------------------------+---------------+---------------+--------+--------+--------+--------
int_20 192.168.20.8 192.168.20.8 30 60 enabled disabled
int_30 192.168.30.8 192.168.30.8 30 60 enabled disabled
int_180 192.168.180.8 192.168.180.8 30 60 enabled disabled
int_218 172.16.18.8 172.16.18.8 30 60 enabled disabled
int_278 172.16.78.8 172.16.78.8 30 60 enabled disabled
Total 2 Neighbors
- Manage the client 1 , client 5 and 10 to send and receive multicast traffic as indicated in the tables
below.
Use the application multicast tool from the desktop to do it.
Total 3 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+-----------+--------
192.168.110.50 231.1.1.1 int_110 00h:18m:46s STL
192.168.20.50 231.5.5.5 int_217 172.16.17.7 00h:00m:07s ST
192.168.30.50 231.10.10.10 int_217 172.16.17.7 00h:00m:31s ST
Total 3 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+-----------+--------
192.168.110.50 231.1.1.1 int_217 172.16.17.1 00h:00m:05s SR
192.168.20.50 231.5.5.5 int_20 192.168.20.8 00h:03m:04s ST
192.168.30.50 231.10.10.10 int_30 192.168.30.8 00h:03m:01s ST
Total 3 (S,G)
Source Address Group Address RPF Interface Upstream Neighbor UpTime Flags
---------------+---------------+--------------------------------+-----------------+-----------+--------
192.168.110.50 231.1.1.1 int_218 172.16.18.1 00h:00m:19s ST
192.168.20.50 231.5.5.5 int_20 00h:03m:12s STL
192.168.30.50 231.10.10.10 int_30 00h:03m:15s STL
3 Lab Check
AS AS
ISP
IGP EGP
BGP4
◼ Border Gateway Protocol
◼ Current version: 4
BGP
BGP
OSPF RIP
BGP
IBGP peering
EBGP peering
◼ Peering
⚫ Two routers with a BGP connection are neighbors or peers
⚫ Peers can be external (EBGP) or internal (IBGP)
⚫ No need of direct connection between IBGP peers
⚫ EBGP peers are usually directly connected
BGP Peer/Neighbor
◼ No dynamic discovery ◼ Connection State
⚫ Idle – waiting for incoming connection TCP
◼ (Selective) Route exchange
port 179
◼ Keepalive mechanism ⚫ Connect – setting up a TCP session
◼ 4 four message types ⚫ Active – unable to create a TCP session
⚫ Open
⚫ OpenSent - sending out its OPEN message
⚫ Keepalive ⚫ OpenConfirm – waiting for the KEEPALIVE
message
⚫ Update
⚫ Established – BGP session is up
⚫ Notification
AS 54
AS 4
BGP Route information
◼ Path Vector Protocol
AS 25
R2
192.168.1.0
R1
AS 54
R3
AS 4
BGP Update
◼ Between BGP neighbors
AS 25
AS 54 192.168.1.0
R1 R3
BGP UPDATE
BGP Attribute (1)
◼ Part of the update message
◼ Variable length
◼ Can be:
⚫ Well-known mandatory
⚫ Well-known discretionary
⚫ Optional transitive
⚫ Optional nontransitive
AS 25
AS 54 192.168.1.0
R1 R3
BGP Attributes overview
AS-Path Attribute
◼ Well-known mandatory attribute
R2
AS 54 R3
AS 401
R4
AS 23 R5
AS 4
192.168.1.0 AS ( 23,401,54,25)
Next-Hop Attribute (1)
◼ Well-known mandatory attribute
R1
R3
10.1.1.2
R2
10.1.1.3
AS 25
192.168.1.0
Next-Hop Attribute (2)
◼ IBGP conserves the next hop attribute learned over EBGP
R3 R1
10.1.1.2/24
R2
AS 25
10.1.1.3/24 192.168.1.0
Origin Attribute
◼ Well-known mandatory attribute
AS 54 AS 250
172.18.0.0
R1 172.18.0.0 /8
Local pref = 200
AS 3400
AS 100
R2
172.18.0.0 /8
Local pref = 100
BGP Local Preference Metric
198.101.24.0
Atlanta
200.100.50.1
AS 300 AS 500
Local
Preference = 200
Atomic Aggregate Attribute
◼ Well-known discretionary attribute
AS 54 AS 650 AS 20
AS 10 150.215.30.0 /28
Multi Exit Discriminator (MED)Attribute
◼ Optional non-transitive attribute
AS 54 172.18.0.0/16
R1 MED = 100
R4
R2
172.18.0.0/16
172.18.0.0/16
MED = 200 R3 AS 250
BGP Multi-Exit Discriminator
◼ Inbound Metric
◼ Meaning: “How I prefer receiving the traffic from you”
◼ When two autonomous systems have multiple links with each other, the MED
(Multi-Exit Discriminator) informs the other AS of recommended entrance
points
◼ Lower MED value is preferred
⚫ Default setting for MED = 0
◼ Metric is non-transitive
⚫ Only shared between two autonomous systems
⚫ Passed from one AS to a second AS
◼ When the second AS advertises the networks from the first AS, MED value is
set back to 0 before leaving second AS
BGP Multi-Exit Discriminator
AS 100
MED for
198.100.28.1
198.101.24.0 = 300
AS 200
MED for
198.101.24.0
198.101.24.0 = 100
200.100.50.1
200.100.50.1
AS 300 AS 100
Router B
AS 200
198.101.24.0 198.101.24.0 /21 ISP A
198.101.25.0
198.101.26.0
198.101.27.0
198.101.28.0
198.101.29.0
198.101.30.0
198.101.31.0 Router A
198.101.24.0 /21 Internet
Community Attribute
◼ Optional transitive attribute
Community Action
◼ Define AS
-> ip bgp autonomous-system 100
◼ Loopback0 IP interface address can be used for both Internal and External BGP
peer sessions
-> ip bgp neighbor 100.10.1.1 update-source Loopback0
◼ ebgp-multihop parameter
⚫ For EBGP sessions, if the External peer router is multiple hops away
-> ip bgp neighbor 100.10.1.1 ebgp-multihop
BGP Split Horizon
R1 AS 4
R5
R3
R2
AS 4
R4
BGP Synchronization
R4
R1 EBGP peers
AS 54
172.31.0.0
IBGP
R5 peers
EBGP peers R3
10.3.0.0 AS 4
R2 23.0.0.0/8
◼ Route map
Route-map example
If BGP update matches aspath-list
If prefix-list = <value>
Set network local_preference = <value>
BGP Policy Matching Flowchart
Match ?
ip bgp policy aspath-list 1
Yes
policy ip bgp policy prefix-list 2
Denied->
Action?
ip bgp policy community-list 3 Evaluation
stopped
IS-IS
Lesson Summary
C B
⚫ Support for VLSM and CIDR
Cost:10
Area 49.0002
Area 49.0003
L1/L2
L1
L1 L1/L2
49.0002.00D0.9501.0102.00 49.0003.00D0.9501.0104.00
IS-IS — Packet Format
◼ IS-IS packets use layer 2 encapsulation of the media.
⚫ IS-IS uses Ethernet 802.3/802.2 instead of the Ethernet II used for IP traffic.
⚫ The TLV identifies the type of information in the IS-IS packet.
⚫ IS-IS packets are called PDUs.
◼ Pseudo node
⚫ When a broadcast subnetwork has n connected ISs, the broadcast subnetwork itself is
considered to be a pseudo node. The pseudo node has links to each of the n ISs and
each of the ISs has a single link to the pseudo node (rather than n-1 links to each of
the other ISs). Link-state PDUs are generated on behalf of the pseudo node by the DIS.
IS-IS — Hello Packet Format
◼ Used to discover neighbors and elect the DIS
◼ Sent every 9 seconds from L1 and L2 routers, if they are not the DIS
◼ 3 different formats:
⚫ Level 1 and Level 2 in broadcast subnetworks
⚫ Point-to-point in general topology subnetworks
◼ Highest priority elects the DIS for both L1 and L2 in broadcast networks
⚫ Highest interface MAC address is the tiebreaker if priorities are equal
⚫ DIS assigns the subnetwork ID (DIS NET + SEL)
Link-State PDU (LSP) Format
◼ Slightly different formats for L1 and L2 LSPs
◼ Reachability information is provided for all local networks from the router that
created the LSP:
⚫ Network prefix
⚫ Metrics
⚫ IP mask
◼ A router that receives a CSNP that includes out-of-date LSPs will transmit up-
to-date LSPs.
◼ CSNPs are exchanged at router initialization and periodically afterward to
maintain synchronization.
⚫ Every 10 seconds on broadcast network
⚫ Every 5 seconds on point-to-point link
◼ DIS election is based on priority and/or the highest MAC address and is
preemptive.
◼ L1 and L2 can have separate priorities set.
◼ The DIS creates the pseudo node and floods updates over the LAN.
L1 L1/L2 L2
L1 L1 L2
IS-IS — Packet Exchange
◼ L1 and L2 adjacencies use the same procedure.
◼ The link’s circuit ID is set by the system with the higher source ID.
⚫ Concatenation of system ID and local circuit ID
Monitoring
-> show isis status
-> show ip isis vlan
-> show ip isis vlan detail
-> show ip isis route
-> show ip isis spf
-> show ip isis adjacency
IS-IS - Area types
Area 01 Area 02
L1 L1/L2 L1/L2
L1 L1
L1
L1/L2 Area 04
Area 03
L1/L2
L1 L1 L1
OmniSwitch AOS R6/R8
Security Certifications
Lesson summary
NDcPP
Common Criteria
CERTIFIED
All security
certifications
to address
governmental
and federal
requirements
Common Criteria
Objectives
National Information
Assurance Partnership
8.X
Q2’17
OS6865
OS6350
OS6250
6.X OS6450 OS6860/E OS6900 OS10K OS9900
Q2’17
• Level of certification:
• EAL2 - Structurally Tested
EAL2 requires the cooperation of the developer in terms of the delivery of design
information and test results.
• NDcPP - Network Device collaborative Protection Profile
NDcPP This collaborative Protection Profile (cPP) was developed by the Network
international Technical Community with representatives from industry, Government
Common Criteria
agencies, Common Criteria Test Laboratories, and members of academia.
CERTIFIED
Common Criteria Types
◼ Common Criteria has two types of certifications:
• Protection Profiles USA, UK, Canada and Australia
• Evaluation Assurance Levels Remaining CC countries
◼ NDcpp:
• Network Device common protection profile (NDcpp) applies to switching and
routing products
• Focus is on verifying profile requirements through extensive testing
• Testing is performed by independent lab
◼ EAL:
• Evaluation Assurance Levels (EAL) are from 1 to 7
• Focus is on detailed documentation of the product’s security framework
• Testing is performed by vendor with audit testing by lab
◼ Details: http://www.commoncriteriaportal.org/products/
Common Criteria – Why Sweden (Csec) was chosen
◼ Common Criteria certification is mutually recognized by all 17 testing and 9 consuming
nations. The top countries were evaluated as possible agencies.
◼ NDcpp:
2. Connection to syslog, radius and ldap servers via TLS 1.1 and 1.2
3. Crypto Key Management – Only allow RSA 2048 bit or larger, verify key destruction. 8.x also supports
ECDSA keys.
4. Crypto Operation – Encryption only with AES in CBC mode of 128 and 256 bits, Crypto signatures with
only RSA 2048 bit, ECDSA SHA2 NIST P-256, and ECDSA SHA2 NIST P-384, SHA-256 used for user
password storage, Keyed-hash only using HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-512, run in FIPS
mode.
5. Password Management – 15 char minimum, storage allowed in SHA1/AES128, SHA256, SHA256/AES128
6. Certificate/Key management – New commands to load, generate, and delete X.509 certificates,
generate key file with RSA 2048, block direct file access
7. Trusted updates – AOS software images are verified prior to reboot and on boot.
8. Insecure protocols blocked – telnet, ftp, tftp, snmp, http, https; radius, ldap and syslog not over TLS
Enlarge the entropy pool to increase randomness and add RSA key generation
JITC
Objectives
◼ ALE OmniSwitch network equipment product families that are being certified as
Core, Distribution and Access Devices under the DISA UCR Assured Services LAN
(ASLAN) are:
Q2
’17
JITC
What does it mean exactly in term of security for ALE Network equipment?
Q2’17
Q3’17 OS6900
OS6450 TBC
Q3’17
OS6860/E OS6865 TBC
OS6350 OS9900
◼ Level of certification:
• Security Level 1
Basic security requirements are specified for a cryptographic module (e.g., at least one Approved algorithm or
Approved security function shall be used).
• Security Level 2
Security Level 2 improves upon the physical security mechanisms of a Security Level 1 cryptographic module by
requiring features that show evidence of tampering, including tamper-evident coatings or seals that must be broken
to attain physical access to the plaintext cryptographic keys and critical security parameters (CSPs) within the
module, or pick-resistant locks on covers or doors to protect against unauthorized physical access.
FIPS-140-2 status
◼ AOS 8.x products – Level 1:
1. Testing nearing completion
2. Submission expected April
3. Certification expected June (fast track)
⚫ The maximum hop count Note: If a VLAN is not mapped to any MSTI,
supported is 40, default is 20 it is associated to the MSTI 0 (aka IST)
MSTP reminder - Specification
◼ SPECIFICATION
⚫ Instance 0
Always configured on any 802.1s switch
Common and Internal Spanning Tree instance
CIST
By default, all VLANs are mapped to the CIST
S e l e c t t h e F l a t S p a n n i n g Tr e e m o d e
Configure MSTIs
S e l e c t t h e F l a t S p a n n i n g Tr e e m o d e
Change Spanning Tree mode to flat mode
SW1 SW2
SW3
Configure MSTIs
Every switch has a CIST (= MSTI 0)
Create additional MSTI
Required to segment VLANs into separate instances
MSTI 0
MSTI 1 SW1 SW2
MSTI 2
REGION_1
REVISION NB: 1
SW3
REGION_1
REVISION NB: 1
SW3
REGION_1
REVISION NB: 1
RB SW3
Tips: manage switches priority values to have a different switch assumes the Root
spantree role for each MSTI
Ex:
SW 1 SW 2 SW 3
MSTI 0 (CIST) 32768 32768 16384
MSTI 1 16384 32768 32768
MSTI 2 32768 16384 32768
Configuring MSTP - Monitoring
-> show spantree msti 3
Monitoring Spanning Tree Parameters for Msti 3
Spanning Tree Status: ON,
Protocol: IEEE Multiple STP,
mode: FLAT (Single STP),
Priority: 4099 (0x1003),
spantree ID: 1003-00:d0:95:bd:2a:e2,
Designated Root: 1003-00:d0:95:bd:2a:e2,
Cost to Root spantree: 0,
Root Port: None,
Next Best Root Cost: 0,
Next Best Root Port: None,
Hold Time: 1,
Topology Changes: 5,
Topology age: 00:06:50,
Current Parameters (seconds)
Max Age = 20,
Forward Delay = 15,
Hello Time = 2
Parameters system uses when attempting to become root
System Max Age = 20,
System Forward Delay = 15,
System Hello Time = 2
Mapping:
1/1/11 1/1/22
Configuring MSTP - Example
1/1/11 1/1/22
X
Root spantree VLAN 16 to 20
CSTI 0
MSTI 1
SwitchA-> show spantree mst port 1/1/1 SwitchB-> show spantree mst port 1/1/2
MST Role State Pth Cst Edge Boundary Op Cnx Vlans MST Role State Pth Cst Edge Boundary Op Cnx Vlans
---+------+-----+--------+----+--------+------+-------- ---+------+-----+--------+----+--------+------+--------
- -
0 DESG FORW 20000 NO NO PTP 0 ROOT FORW 20000 NO NO PTP
1 DESG FORW 20000 NO NO PTP 1-15 1 ROOT FORW 20000 NO NO PTP 1-15
2 ALT BLK 20000 NO NO PTP 2 DESG FORW 20000 NO NO PTP
SwitchA-> show spantree mst port 1/1/11 SwitchB-> show spantree mst port 1/1/22
MST Role State Pth Cst Edge Boundary Op Cnx Vlans MST Role State Pth Cst Edge Boundary Op Cnx Vlans
---+------+-----+--------+----+--------+------+-------- ---+------+-----+--------+----+--------+------+--------
- -
0 DESG FORW 20000 NO NO PTP 100 0 ALT BLK 20000 NO NO PTP 100
1 DESG FORW 20000 NO NO PTP 1 ALT BLK 20000 NO NO PTP
2 ROOT FORW 20000 NO NO PTP 16-20 2 DESG FORW 20000 NO NO PTP 16-20
Configuring MSTP - Example
Example 2 Mapping:
Priority Switch A Switch B Switch C
Root spantree
Switch B MSTI 1
Switch B
Root spantree
MSTI 2
1/1/2 3/1/1 3/1/2 1/1/2
1/1/3 1/1/3 3/1/1
◼ VRF Overview
◼ VRF Configuration
◼ Multiple instances of IP routing protocols, such as static, RIP, IPv4, BGPv4, and
OSPFv2 on the same physical switch
◼ Ability to use duplicate IP addresses across VRF instances
OR
VRF 1
VRF 2
VRF 3
Multi-VRF - VRF awareness
VRF - Virtual Routing and Forwarding
◼ Provides the ability to configure separate ◼ When an IP packet for customer A is
routing instances on the same switch. received on a PE; the VRF A determines
⚫ Segments layer 3 traffic. how to route the packet trough the
provider backbone so that it reaches the
◼ Each Provider Edge (PE) maintains more
intended customer A destination
than one routing table, in addition to the
default routing instance. Customer A
Site 2
⚫ One VRF instance is configured on the PE
for each customer network to which the PE
is connected.
VRF A Customer B
Provider Site 2
Customer A Edge 2
Site 1
VRF A VRF B
Customer B
Site 1 VRF B Service Provider
IP Network
Provider Customer A
Edge 1 Site 3
Customer C
Site 1 VRF C VRF B
Provider
Edge 3
VRF C Customer B
Site 2
VRF - Virtual Routing and Forwarding
VRF
OR Customer
Per VRF QoS
VRF Edge
VRF 1
VRF 2
VRF 3
VRRP
DHCP Server 1
VRRP
DHCP Server 2
Enterprise class MPLS
VRRP
DHCP Server 3
Provider
Edge
7450
ESS
VRF - CLI Commands
◼ Creating a VRF Instance ◼ Assigning IP Interfaces to a VRF Instance
-> vrf create vrpIpOne -> vrf IpOne
IpOne: -> IpOne: -> ip interface intf100 address
100.1.1.1/24 vlan 100
IpOne: ->
◼ Selecting a VRF Instance
IpOne: -> vrf IpTwo
◼ Removing a VRF Instance
IpTwo: ->
-> no vrf IpTwo
*removes associated ip interfaces as well
◼ View a list of the Configured VRF’s
-> show vrf
◼ Returning to the default VRF instance
Virtual Routers Protocols
IpOne: -> vrf default
------------------------------------------ ->
default
IpOne RIP
IpTwo BGP Note: VRF names are case sensitive
Total Number of Virtual Routers: 3
◼ VRF CLI context is used to determine the association between a specific routing
configuration and a VRF instance
VRF - Specifications
◼ Specifications per switch
VRF Route Leak
◼ VRF Route Leak forwards routes from one VRF routing table to another VRF
routing table, allowing routing from one VRF to a gateway in another VRF.
◼ Route maps are used to import and export routes from the VRFs to the GRT.
200.1.1.0
GRT
200.1.1.0
VRF 192.168.130.160
VRF 1
10.255.11.160
192.168.130.0 172.20.0.0
10.255.11.0 172.21.0.0
VRF 2 172.20.0.0 192.168.140.0
172.21.0.0 10.255.12.0
VRF 3 192.168.1.0 192.168.1.0
⚫ A local profiler
local
profiler
⚫ UNP profiling
OmniSwitch®
Signature
DB
DP enable UNP
Overview
OmniSwitch®
Employee DB
Contacts DB
Internet
Overview
◼ MAC OUI: allows devices to be recognized by identifying their MAC addresses.
◼ DHCP FingerPrinting: allows to track the devices on the network and block
those are not allowed access. It also helps in analyzing the future growth by
accessing the trending information.
OmniSwitch®
DP
interface
DP enable
IoT Device Profiling
DHCP client request
Example :
DHCP option 55 (the parameter request list) Microsoft Windows XP option 55 :
and option 60 (the vendor identifier) 1,15,3,6,44,46,47,31,33,249,43
Or
[Mac Vendors] Apple iPhone
1,3,6,15,119,78,79,95,252
Device profiling Steps
• Maintain a database of
identified IoT devices and
Known
Device
un-identified IoT devices Unknown
device DB for qualitative and Device DB
quantitative analysis.
SIP Snooping
OS6860
Lesson summary
◼ Discuss about
⚫ SIP snooping overview
⚫ SIP snooping configuration
Overview
◼ Identify, Mark, Treat and Monitor
◼ QOS treatments for the media streams / RTP flows being established between
the SIP user agent endpoints.
⚫ Each media stream contains RTP and RTCP flows.
⚫ Marking is done using the DSCP field in IP header.
⚫ Provide user configured QOS treatment for SIP/RTP/RTCP traffic flows based on its
marking.
QOS treatment will be done by mapping DSCP to queue number and drop precedence
◼ Calculate QOS metric values of delay, jitter, round trip time, R factor and MOS
values of media streams from its corresponding RTCP.
⚫ Raise trap when any of QOS metrics cross user defined threshold.
◼ By default, the SIP packets forwarded by hardware are not subject to any
specific QOS treatment.
⚫ The packets are treated as normal packets and follow the same QOS treatment
according to qos port or policy rules configuration.
Overview
◼ SIP network Components
⚫ Edge switches, aggregation switches and core
switches
⚫ SIP Server (registrar, proxy, redirect, gateway) SIP Proxy
(Call server)
⚫ SIP Phones (User Agents)
Voice
◼ SIP Snooping supports a 4 byte lookup, only “INVI” lookup will be done instead
of complete INVITE.
OmniSwitch AOS Release 8 Network Configuration Guide ---> Chapter: Configuring SIP Snooping