Lab_Guide
Lab_Guide
Fundamentals
LAB GUIDE
Version: 24.31
Switching Series
© Copyright 2024 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice.
The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accom-
panying such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Notices
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and
services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be con-
strued as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions
contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with
FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items
are licensed to the U.S. Government under vendor's standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over
and is not responsible for information outside the Hewlett Packard Enterprise website.
Acknowledgments
All third-party marks are property of their respective owners.
Contents
Contents
Contents i
Lab 1: Testing lab connectivity 1
Task 1-1: Aruba Training Lab access 3
Task 1-2: Testing connectivity 4
Lab 2: Initial setup 7
Task 2-1: Reset switches to factory default 7
Task 2-2: Explore the AOS-CX switch CLI 11
Task 2-3: Configure initial settings 26
Task 2-4: Create and explore checkpoints 31
Lab 3.1: Configure a VLAN 35
Task 3.1-1: Assign PCs to VLAN 11 35
Task 3.1-2: Explore MAC address table 39
Task 3.1-3: Save your configurations 46
Lab 3.2: Add a second switch to the topology 49
Task 3.2-1: Configure initial settings on Access-2 49
Task 3.2-2: Enable link between access switches 54
Task 3.2-3: Assign PCs to VLAN 11 61
Task 3.2-4: Save your configurations 64
Lab 3.3: Add a core switch to the topology 67
Task 3.3-1: Add Core-1 to the topology 68
Task 3.3-2: Adding a second VLAN 74
Task 3.3-3: Save your configurations 82
Lab 4.1: Rapid Spanning Tree Protocol 83
Task 4.1-1: Add the redundant core switch and redundant links 84
Task 4.1-2: Verify the topology 89
Task 4.1-3: Test link failure 100
Contents i
Task 4.1-4: Save your configurations 103
Lab 4.2: Deploying MSTP 105
Task 4.2-1: Configure an MST region 106
Task 4.2-2: Load balancing 109
Task 4.2-3: Save your configurations 120
Lab 4.3: Explore broadcast storm effects (optional) 121
Task 4.3-1: Pre-lab setup 121
Task 4.3-2: Create Layer 2 loop 124
Task 4.3-3: Contain a broadcast storm 129
Task 4.3-4: Preventing loops 130
Task 4.3-5: Save your configurations 132
Task 4.3-6: Revert Access-1 and Access-2 configuration 133
Lab 5: Link aggregation between core switches 135
Task 5-1: Configure manual link aggregation 136
Task 5-2: Configure dynamic link aggregation 142
Task 5-3: Save your configurations 148
Lab 6.1: Create an HPE Aruba Networking Virtual Switching
Framework stack 151
Task 6.1-1: Deploy a VSF stack 152
Task 6.1-2: Configure distributed link aggregation 160
Task 6.1-3: Save your configurations 169
Lab 6.2: Configure an HPE Aruba Networking Virtual Switching
eXtension environment 171
Task 6.2-1: Configure VSX 172
Task 6.2-2: Distributed LAG 179
Task 6.2-3: Save your configurations 186
Lab 6.3: Maintaining the VSF stack 189
Task 6.3-1: Secondary member 189
Task 6.3-2: Split brain detection 193
Task 6.3-3: Save your configurations 202
ii Contents
Contents
Lab 7: Layer 3 services 203
Task 7-1: Inter-VLAN routing 204
Task 7-2: Explore end-to-end packet delivery 212
Task 7-3: Add redundancy to the core layer 227
Task 7-4: Save your configurations 235
Lab 8: Static routes 237
Task 8-1: Add links to ISPs 238
Task 8-2: Adding static routes 240
Task 8-3: Redundancy with floating routes 247
Task 8-4: Save your configurations 252
Lab 9.1: Open Shortest Path First 255
Task 9.1-1: OSPF single area between cores 256
Task 9.1-2: Add the server switch 262
Task 9.1-3: Advertise LAN segments 273
Task 9.1-4: Testing services 276
Task 9.1-5: Save your configurations 281
Lab 9.2: OSPF advanced settings (optional) 283
Task 9.2-1: Cost-based path manipulation (traffic engineering) 283
Task 9.2-2: Passive interfaces 291
Task 9.2-3: Define point-to-point networks 297
Task 9.2-4: Make router ID routable 301
Task 9.2-5: Default network injection 303
Task 9.2-6: Save your configurations 308
Lab 10: Quality of Service 309
Task 10-1: Default QoS switch configuration 309
Task 10-2: Explore QoS markings 314
Task 10-3: Save your configurations 319
Lab 11: Network access security 321
Task 11-1: Prepare the environment 322
Task 11-2: RADIUS server setup 328
Contents iii
Task 11-3: Basic 802.1X authentication with a single user 330
Task 11-4: MAC-based authentication 341
Task 11-5: Save your configurations 343
Lab 12: Secure management access 345
Task 12-1: Management port 346
Task 12-2: Role Based Access Control 349
Task 12-3: RADIUS-based management 353
Task 12-4: Explore the AOS-CX Web UI 357
Task 12-5: Save your configurations 366
iv Contents
Lab 1: Testing lab connectivity
2
n Windows server: You have NO access to this server, but you will access its webpage and down-
load files running TFTP from PC1.
n HPE Aruba Networking ClearPass (CPPM): You have NO access to this sever, but you will use it
as an AAA server for your switches.
TIP: You can keep each device connection in a separate browser tab and switch
between them instead of visiting the topology each time you want to open a new con-
nection.
If you cannot connect to one of those devices, let your instructor know or open a Lab
support ticket.
3. Once logged in, you will be placed in the Remote Lab dashboard.
4. At the remote lab topology, right-click the Access-1 switch icon and select Open Console.
6. Verify that there is no saved configuration by entering the show startup-config command.
6300# show startup-config
startup-config doesn't exist
8. Delete the saved configuration by entering the erase startup-config command; answer y to the
question to confirm the action.
6300# erase startup-config
This will clear all non-VSF configurations from the startup-config. Additionally,
if any VSF member is not present in the stack, this command will remove the VSF
configurations of such members as well.
10. Even though the saved configuration was erased, any configurations made are still active at the
switch's running configuration. To delete the current configuration and ensure that your switch is
at the factory default state, reboot your switch with the boot system command, answer n (no) to
the prompt to save the configuration, and answer y (yes) to confirm the reboot action.
6300# boot system
Checking if the configuration needs to be saved...
Notice that, once logged in, you will be placed in the manager context indicated by
the switch prompt followed by a #.
3. Press the question mark (?) key to show the available commands that you can execute in the cur-
rent command context.
6300# ?
aruba-central Configure Aruba-Central
auto-confirm Disables user confirmation, and executes the operation
without prompting
boot Reboot all or part of the system; configure default boot
parameters
checkpoint Checkpoint information
The commands displayed by the help are respective to the current context level
(manager). Page through the commands available at this level. Some important com-
mands are included.
4. List the parameters available for the show command by typing show followed by ?.
6300# show ?
aaa Authentication, Authorization and Accounting
access-list Access control list (ACL)
accounting Show local accounting information
active-gateway Show active gateway settings
alias Short names configured for a set of commands
allow-unsafe-updates Show allowed non-failsafe updates
allow-unsupported-transceiver Show unsupported transceiver information
app-recognition Show application recognition information
arp Show IPv4 addresses from neighbor table
<<Omitted output>>
Answer: This turns manager mode (context) on, taking you to the operator context. This means
only basic commands with no control over the device will be available.
6. Press the ? key to show the commands you can execute in the operator command context.
6300> ?
clear Reset functions
container Configure a container for add-on applications
enable Turn on privileged mode command
exit Exit current mode and change to previous mode
led Set LED state
list Print command list
mtrace Multicast traceroute for tracing multicast routing path from a
receiver to a source
no Negate a command or set its defaults
page Enable page break
ping Send ping requests to test network connectivity
ping6 Send IPv6 ping requests to test network connectivity
repeat Repeat a list of commands from history
show Show running system information
top Top command
traceroute Trace the route to a device on the network
Available commands in both manager and operator contexts are different. This is
used as basic role-based access control for defining what operators can do when
logged into the device.
7. Type enable and press Enter, which will turn privileged mode back on.
6300> enable
6300#
8. Type co, then press the Tab key twice to list commands that start with "co":
6300# co [tab] [tab]
Answer: the CLI will display any commands starting with "co".
9. Type conf followed by a single [tab] press.
6300# configure
Answer: As no other command starts with "conf," the switch completes the configure command.
You can execute any command as soon as you have entered an unambiguous char-
acter string. For instance, conf [Enter] will have the same effect as configure [Enter].
10. Press the Enter key. This takes you to the global configuration mode, where you can start mak-
11. Press the ? key to show the available commands that you can execute in the global config mode.
6300(config)# ?
aaa Configure Authentication, Authorization and
Accounting feature
access-list Access control list (ACL)
alias Create a short name for the specified
command(s).
allow-unsafe-updates Allow non-failsafe updates of programmable
devices
allow-unsupported-transceiver Allow unsupported transceivers
app-recognition Enable and configure application recognition
You can notice how commands available here are different than in previous CLI
modes due the configuration nature of them.
12. Type interface 1/1/1, then press Enter. You will be moved to the interface sub configuration
mode.
6300(config)# interface 1/1/1
6300(config-if)#
13. Press the ? key. Again, you will see a different list of available commands for this subcontext.
6300(config-if)# ?
aaa Configure Authentication, Authorization and
Accounting feature
app-recognition Configure application recognition parameters
apply Apply a configuration record
arp Configure ARP commands
bfd Set BFD configuration
cdp Configure CDP operating mode
client Configure network client monitoring
description Add an interface description
dhcpv4-snooping Configure DHCPv4-Snooping
dhcpv6-snooping Configure DHCPv6-Snooping
downshift-enable Enable automatic speed downshift
Answer: By entering end on any context level, the switch prompt will return to the operator con-
text.
15. Next, you will enter a command that is invalid and then fix issues with it by using the command-
recall feature. Enter this command exactly as shown: show hitory.
6300# show hitory
Invalid input: hitory
Repeating commands can be a useful way to enter similar commands more quickly, as
well as to correct mistakes in commands.
The options available under show system are displayed. Notice the <cr> at the end.
This means that you can execute the command without supplying any further para-
meters.
You will notice that a long output automatically populates, overrunning the screen
and not allowing you to read the first lines. You can use the page command to display
subsequent command outputs in portions, which gives you the ability to control
when to display the next page by pressing the space bar.
System Resources:
Processes : 253
CPU usage(%) : 25
CPU usage(% average over 1 minute): 13
CPU usage(% average over 5 minute): 8
Memory usage(%) : 18
Open FD's : 2470
Storage 1: Endurance utilization = 0-10% (mmc-type-a), 0-10% (mmc-type-b), Health =
normal
Now, the show commands break the output using the number of lines in the current
terminal window. You may manually enter the number of lines to be displayed at
once.
What are the current CPU and memory utilization of the switch?
Alternatively, you can use the top CPU and top memory commands to display these
numbers. A key difference between the show system resource-utilization and top
commands is that top commands list higher resources using commands first. Also,
the output displays the processes' ID and status, and the user runs the command (the
system or a real user logged into the device).
High CPU utilization is a symptom of an unstable process or situation happening in
the system, such a Layer 2, Layer 3, or layer 7 loop.
24. Press the space key a few times to scroll all the way down, or press the q key.
25. Try the show system command. This version of the command will also show the current host-
name, description SNMP contact and location, serial number, base MAC address, up time, and so
forth.
6300# show system
Hostname : 6300
System Description : FL.10.13.1000
System Contact :
System Location :
Answer: It depends on your switch information. The previous example is showing the serial num-
ber as SG01KN701M.
What is the system base MAC address?
Answer: It depends on your switch information. The previous example is showing the MAC
adddress 104f58-fc1440.
What is the system up time?
Answer: It depends on your switch information. The previous example is showing the up time as
3 hours, 53 minutes.
26. Enter the list command.
6300# list
show hostname
show domain-name
list
configure { terminal }
disable
exit
end
page
page <2-1000>
no page
show running-config {all}
show session-timeout
start-shell
auto-confirm
no auto-confirm
diagnostics
no diagnostics
show history {timestamp}
repeat { id <A:1-500>|count <1-1000>|delay <1-1000> }
show vrf
show vrf VRF
show dhcp client vendor-class-identifier
show ztp information
-- MORE --, next page: Space, next line: Enter, quit: q
Answer: FL.10.13.1000
28. Enter the show images command.
6300# show images
---------------------------------------------------------------------------
ArubaOS-CX Primary Image
---------------------------------------------------------------------------
Version : FL.10.13.1000
---------------------------------------------------------------------------
ArubaOS-CX Secondary Image
---------------------------------------------------------------------------
Version : FL.10.05.0021
Size : 642 MB
Date : 2020-10-29 10:36:02 PDT
SHA-256 : 4c795e8c9eec5952645ded19cf9a2018deb545c7ed0221f32a1a5bd0d64ee5f6
------------------------------------------------------
Answer: Two images are supported: primary and secondary. Keep in mind that either one can be
set as active for the switch boot process.
What is the default image?
Answer: It depends on your switch configuration. The example above is showing the primary
image as active.
29. Enter the show capacities command.
6300# show capacities
System Capacities:
Capacities Name Value
----------------------------------------------------------------------------------------
<<Omitted output>>
Maximum number of entries in an Access Control List 8000
Maximum number of entries in a class 1000
Maximum number of entries in an Object Group 1024
Maximum number of entries in a policy 128
<<Omitted output>>
Maximum number of classifier policies configurable in a system 4000
Maximum number of IPv4 neighbors(# of ARP entries) supported in the system 49152
Maximum number of IPv6 neighbors(# of ND entries) supported in the system 49152
Maximum number of Keychains supported in the system 64
Maximum number of Keys supported in a single Keychain 64
Maximum number of Keys supported in the system 4096
Maximum number of L2 MAC addresses supported in the system 32768
<<Omitted output>>
Maximum number of routes (IPv4+IPv6) on the system 66046
Maximum number of IPv4 routes on the system 65536
Maximum number of IPv6 routes with prefix 0-64 61440
Maximum number of IPv6 routes with prefix 65-127 510
Maximum number of VLANs supported in the system 4094
Maximum number of VLAN Translation rules supported 4000
<<Omitted output>>
What is the maximum number of access control entries per access list supported in the system?
Answer: 8000
What is the maximum number of MAC addresses supported in the system?
Answer: 66,046
What is the maximum number of VLANs supported in the system?
Answer: 4094
Note that the system capacity varies based on the switch model. HPE Aruba Net-
working switch families CX 6400 Series, CX 8100 Series, CX 8300 Series, CX 9300
Series, and CX 10000 Series can be configured with a profile. System profiles set the
overall capabilities and capacities of the switch based on the selected profile used at
boot time. System profiles set capacities such as that of the hardware forwarding
table.
System profiles provide you with the flexibility to configure switches based on their
location in the network (for example, core, spine, leaf). When a switch boots without a
profile specifically configured, it boots with the default profile. When a switch is con-
figured with a non-default profile, the switch requires a reboot for the profile to be
applied.
Examples of profiles supported by the CX 8100 Series, CX 83xx Series, CX 9300 Ser-
Interface 1/1/1 is up
Admin state is up
Link state: up for 3 days (since Thu Mar 28 15:12:51 UTC 2024)
Link transitions: 1
Description:
Persona:
Hardware: Ethernet, MAC Address: 10:4f:58:fc:14:67
MTU 1500
Type 1GbT
Full-duplex
qos trust none
Speed 1000 Mb/s
Auto-negotiation is on
Energy-Efficient Ethernet is disabled
Flow-control: off
Error-control: off
MDI mode: MDI
VLAN Mode: access
Access VLAN: 1
Rate collection interval: 300 seconds
Statistic RX TX Total
---------------- -------------------- -------------------- --------------------
Packets 0 317196 317196
Unicast 0 0 0
Multicast 0 231115 231115
Broadcast 0 86081 86081
Bytes 0 61423830 61423830
Jumbos 0 0 0
Dropped 0 0 0
Pause Frames 0 0 0
Errors 0 0 0
CRC/FCS 0 n/a 0
Collision n/a 0 0
Runts 0 n/a 0
Giants 0 n/a 0
Answer: 10G-DAC1 / 10G SFP+ 1m DAC; it is a 10 Gigabit Direct Attach Cable with 1 meter
Interfaces 1/1/25 to 1/1/28 in a 24-port switch model and 1/1/49 to 1/1/52 in a 48-
port switch model are SPF+ 25 Gig capable interfaces that support either trans-
ceivers or Direct Attached Cables (DACs). In this case, port 28 has a 10 Gig DAC
attached.
<<Omitted output>>
interface 1/1/27
no shutdown
interface 1/1/28
no shutdown
no routing
vlan access 1
interface vlan 1
ip dhcp
!
!
!
!
!
https-server vrf default
https-server vrf mgmt
You will notice that most portions of the configuration are shown by listing the
switch ports and their settings. The code version and actual admin account are listed
first.
Notice that the device prompt has change to the new hostname, Access-1.
6. Apply the console session timeout to one day (1440 minutes) to prevent a logout during the lab
activities.
Access-1(config)# session-timeout 1440
7. Use the show interface brief command for displaying a table of ports and their more relevant
settings.
Access-1(config)# show interface brief
------------------------------------------------------------------------------------------
Port Native Mode Type Enabled Status Reason Speed Description
VLAN (Mb/s)
<<Omitted output>>
Answer: Port modes show the port's operational mode. Access ports transmit and receive a
single untagged VLAN. Trunk ports can carry multiple tagged VLANS in the same link. VSF ports
stack switches using VEF.
What ports are enabled?
Notice that the CX 6000 Series switch family has all their ports configured as Layer 2
interfaces and enabled by default. Meanwhile, all CX 8xxx Series, CX 9300 Series, and
CX 10000 Series switches have administratively disabled ports and are configured as
routed ports.
8. You will now disable switch ports, to simulate a single switch topology using the switch Access-1
and two clients.
9. Configure or disable a single port. Eenter the interface configuration context by entering the
interface 1/1/2 command.
Access-1(config)# interface 1/1/2
Access-1(config-if)#
<<Omitted output>>
What are the Enabled, Status, and Reason values for ports 1/1/27 and 1/1/28 now?
What link stats messages can you see at the top related to ports 1/1/27 and 1/1/28?
Answer: The link status for interfaces 1/1/21 and 1/1/22 is now Administratively down.
What other messages in the event log do you get?
You should see notifications informing you that Link Layer Discover Protocol (LLDP)
neighbors have been deleted because the ports have been disabled. Also, since AOS-
CX switches periodically attempt to contact the Aruba Activate Cloud service and the
switch has no internet connectivity, the device complains that the service is unreach-
able.
The usage of additional parameters could filter many show commands. In this
example, the -r parameter makes the show output start with more recent events first.
and -n ten only displays the last 10 entries in the log.
15. Define interface descriptions for ports 1/1/1 and 1/1/3. Do not leave interface 1/1/3 yet.
Access-1(config)# interface 1/1/1
Access-1(config-if)# description To_PC1
16. At the interface 1/1/3 context level, enter the show running-config current-context com-
mand.
Access-1(config-if)# show running-config current-context
interface 1/1/3
description To_PC3
no shutdown
no routing
vlan access 1
exit
This command is a shortcut for displaying only the commands available at the con-
text/subcontext level. Get used to it, since it is of great use when configuring and
editing ports, protocols, access control lists, and so forth.
17. Enter the show interface 1/1/3 command, followed by | include Description.
Access-1(config-if)# show interface 1/1/1 | include Description
Description: To_PC1
The pipe (|) command filters the output of show commands according to the criteria
specified by the include, exclude, count, begin, or redirect parameters.
Strings of characters that follow the filtering tool (for example, "Description" in the
preceeding command) are case sensitive. Typing the wrong capitalization may lead
Answer: It depends on your switch and previous students. It may vary from a few to dozens.
AOS-CX systems are 100% database driven. This means that configuration scripts
you save are stored in a local database instead of a regular configuration file. The
database is periodically tracked and whenever the changes are made, they will be
automatically stored after a five minute idle period. Any new configuration change,
followed by a five minute idle period, will create a new checkpoint that can later be
used to back up or restore the running configuration state of the system.
On demand checkpoints can be generated by saving the running configuration or cre-
ating custom checkpoints.
Notice that those are sample outputs. Results may vary between switches depending
on the use of the switch and activities.
4. Save the current switch configuration using the write memory command.
Access-1# write memory
Copying configuration: [Success]
Access-1#
8. Now make a checkpoint called Lab2_final using the running-config as the source.
Access-1# copy running-config checkpoint Lab2_final
Copying configuration: [Failure]
Cannot create duplicate checkpoint, configuration already exists in checkpoint Lab3
Access-1#
AOS-CX cannot have two different configuration snapshots with identical contents in
Keeping track of when checkpoints are created is important during regular main-
tenance tasks. This is the reason configuring all switches with a Network Time Pro-
tocol (NTP) server is important.
Since IP connectivity is not enabled yet, you will continue working without setting up
an NTP server and trust the system clock for now. NTP configuration will be covered
in a later module.
-----------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-----------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default 1/1/1-1/1/28
-------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default 1/1/1-1/1/28
11 Employees down no_member_port static
Answer: Down.
What caused the new VLAN to have this status?
----------------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
----------------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 down no_member_forwarding default 1/1/2,1/1/4-1/1/28
11 Employees up ok static 1/1/1,1/1/3
Answer: Up.
Currently, only ports 1/1/1 and 1/1/3 are up. When you replaced VLAN 1 with VLAN
11 on the ports, both VLANs will still appear, but VLAN 1 is no longer associated
with any port in the up state. Therefore, VLAN 1's status was changed to down.
-------------------------------------------------------------------------------
VLAN Name Mode Mapping
-------------------------------------------------------------------------------
11 Employees access port
11. Enter the show vlan summary command. This command shows the VLAN count in the system.
Access-1(config)# show vlan summary
Number of existing VLANs : 2
Number of static VLANs : 2
12. Enter the show interface 1/1/1 command. You will be able to see the VLAN ID and VLAN Mode
at the bottom of the command.
Access-1(config)# show interface 1/1/1
Interface 1/1/1 is up
Admin state is up
Link state: up for 5 days (since Thu Mar 28 15:12:51 UTC 2024)
Link transitions: 1
Description: To_PC1
Persona:
Hardware: Ethernet, MAC Address: 10:4f:58:fc:14:67
MTU 1500
Type 1GbT
Full-duplex
qos trust none
Speed 1000 Mb/s
Auto-negotiation is on
Energy-Efficient Ethernet is disabled
Flow-control: off
Error-control: off
MDI mode: MDI
VLAN Mode: access
Access VLAN: 11
Rate collection interval: 300 seconds
<<Omitted output>>
13. Finally, try the show interface brief command followed by a filtering option | begin 5 Port.
Access-1(config)# show interface brief | begin 5 Port
Port Native Mode Type Enabled Status Reason Speed Description
VLAN (Mb/s)
------------------------------------------------------------------------------------------------
1/1/1 11 access 1GbT yes up 1000 To_PC-1
1/1/2 1 access 1GbT no down Administratively down -- --
1/1/3 11 access 1GbT yes up 1000 To_PC3
The pipe (|) command filters the output of show commands according to the criteria
specified by the include, exclude, count, begin, or redirect parameters.
Strings of characters that follow the filtering tool (for example, "Port" in the previous
example) are case sensitive. Incorrect capitalization may lead to the absence of out-
put or other unexpected results.
In the previous example, information will be filtered out, listing only the lines that
include the "Port" string along with the five subsequent lines.
What is the value under Native VLAN for ports 1/1/1 and 1/1/3 versus 1/1/2?
2. Click the windows icon on the top left corner, then type control panel. Windows will auto-
matically display all items matching the string.
3. Click the top result (Control Panel). A new window will display.
4. In the Control Panel, click View network status and tasks under Network and Internet.
Lab 3.1: Configure a VLAN
If NIC was disabled (grayed out), then you will have to double-click it twice, first to
enable it then a second time to access the NIC Status window.
There is an interface called "Do NOT Touch!" Repeat with me: "Do not touch!" If
changes are made to that NIC (like modifying the IP address or disabling the inter-
face), the access to this virtual machine will be disrupted. Only the lab support team
will be able to recover the system, and that process may delay your lab progress.
8. In the Lab NIC Properties section, select Internet Protocol Version 4 (TCP/IPv4), then click
Properties.
9. In Internet Protocol Version 4 (TCP/IPv4) Properties, select Use the following IP address:
under the General tab. Then enter the following configuration:
n IP address: 10.1.11.101
n Subnet mask: 255.255.255.0
n Click OK.
Lab 3.1: Configure a VLAN
12. In the Command Prompt window, type ipconfig and press Enter. This command will display the
IPv4 settings of all NICs in the system.
Answer: It depends on the local VM attributes; take note of your VM's physical address.
This is the typical IP address configuration process in a Windows system. You will now repeat it
on PC3.
14. Using the Remote Lab dashboard, connect to PC3.
15. Repeat steps 3 to 10 and configure the following IP address on PC3:
n IP address: 10.1.11.103
n Subnet mask: 255.255.255.0
16. If there is any OOBM NIC on PC3, disable it by right-clicking the OOBM NIC and selecting
Disable.
17. Repeat steps 11 to 13 to check PC3's IP address and MAC address.
What is PC3's Lab NIC MAC address?
Answer: It depends on the local VM attributes; take note of your VM's physical address.
19. Using the Remote Lab dashboard, open the Access-1 console.
20. Verify the switch's MAC address table.
Access-1(config)# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 2
Answer: Two entries, one for PC1 on port 1/1/1 and one for PC3 on port 1/1/3.
21. Using the output information, write down the client's MAC addresses in the following table, along
with the ports and VLAN IDs.
PC1
PC3
Were these MAC addresses discovered on the ports where you expected them?
Answer: Yes, as per the lab topology, PC1 is connected to port 1/1/1 and PC3 is connected to
port 1/1/3.
There are multiple forms of the show mac-address-table command that can be used
for displaying only entries that match a certain criteria, such as an address learned in
a particular VLAN or port, or learned dynamically versus configured statically in the
MAC table. Press the ? key at the end of the command for displaying the options.
Access-1(config)# show mac-address-table ?
address Show a specific MAC address
count Show the number of MAC addresses
detail Show detailed MAC address entry information
dynamic Show learned MAC addresses
interface Show MAC addresses for a specific interface
lockout Show MAC lockout address information
mac-move Show MAC address move information
port Show MAC addresses for a specific port
static Show static MAC address information
unsorted Show entries unsorted for faster initial output
vlan Show MAC addresses for specific VLANs
<cr>
7. Enable interface 1/1/4 and set a description (this interface is connected to PC4).
Access-2(config)# interface 1/1/4
Access-2(config-if)# no shutdown
Access-2(config-if)# description To_PC4
Access-2(config-if)# exit
PC4 Config
8. Using the Remote Lab dashboard, open a remore desktop connection to PC4.
9. Click the Windows icon on the top left corner, then type control panel. Windows will auto-
matically display all items matching the string.
10. Click the top result (Control Panel). A new window will pop up.
11. In the Control Panel, click View network status and tasks under Network and Internet.
If the NIC was disabled (grayed out), then you will have to double-click it twice, first
to enable it, then a second time to access the NIC Status window.
There is an interface called "Do NOT Touch!" Repeat with me: "Do not touch!" If
changes are made to that NIC (like modifying the IP address or disabling the inter-
Lab 3.2: Add a second switch to the
face), the access to this virtual machine will be disrupted. Only the lab support team
will be able to recover the system, and that process may delay your lab progress.
topology
15. In the Lab NIC Properties section, select Internet Protocol Version 4 (TCP/IPv4), then click
Properties.
16. In Internet Protocol Version 4 (TCP/IPv4) Properties, select Use the following IP address:
under the General tab. Then enter the following configuration:
Was the ping successful? Lab 3.2: Add a second switch to the
When the destination IP address is within the source's IP segment and the ping test
result is "Destination host unreachable," it means that the Layer 3 to Layer 2 address
resolution using Address Resolution Protocol (ARP) has failed and the ICMP echo
message was not sent at all. However, if the result is "timeout," it means that the host
was able to resolve the destination's MAC and the ICMP packet was sent, but there is
no reply coming back.
5. Confirm interface 1/1/28 came up using the show interface brief command followed by the fil-
ter | exclude down.
Access-2(config)# show interface brief | exclude down
------------------------------------------------------------------------------------------
The pipe (|) command filters the output of show commands according to the criteria
specified by the include, exclude, count, begin, or redirect parameters.
Strings of characters that follow the filtering tool (for example, "down" in the com-
mand above) are case sensitive. Typing the wrong capitalization may lead to the
absence of output.
Using the filter "exclude down," the information will be filtered out, listing all the lines
except those containing the "down" string.
Answer: Port 1/1/4 is running at 1000 Mbps (1 Gbps), port 1/1/28 is running at 10,000 Mbps
(10 Gbps).
6. Next, you will use LLDP to analyze the information the protocol can provide regarding what
device is connected to specific interfaces. Issue the show lldp configuration command.
Access-2(config)# show lldp configuration
=========================
Management Address
Port Description
Port VLAN-ID
System Capabilities
System Description
System Name
OUI
Port VLAN-Name
Dot1 Link Aggregation
Answer: The transmit interval is 30 seconds, and the hold time multiplier is 4.
What are the LLDP transmit and receive modes on all of the ports?
Answer: The default mode for LLDP receive (RX) and transmit (TC) is enabled.
7. Issue the show lldp local device command. This will show the information the local device
shares/advertises with LLDP messages.
Access-2(config)# show lldp local-device
Chassis-ID : 10:4f:58:f6:84:80
System Name : Access-2
System Description : Aruba JL668A FL.10.13.1000
Management Address : 10:4f:58:f6:84:80
Capabilities Available : Bridge, Router
Capabilities Enabled : Bridge, Router
TTL : 120
Management Address VLAN:
Port-ID : 1/1/4
Port-Desc : "To_PC4"
Port Mgmt-Address : 10:4f:58:f6:84:80
Port VLAN ID : 1
Maximum Frame Size: 1500
Parent Interface : interface 1/1/4
Port-ID : 1/1/28
Port-Desc : "1/1/28"
Port Mgmt-Address : 10:4f:58:f6:84:80
Port VLAN ID : 1
Maximum Frame Size: 1500
Parent Interface : interface 1/1/28
Port-ID : mgmt
Port-Desc : "mgmt"
Port Mgmt-Address : 10:4f:58:f6:84:80
AOS-CX systems have IP routing service enabled by default and cannot be disabled.
This means they will automatically populate entries in the routing table for whatever
topology
IP segment is configured within Layer 3 ports (either physical or logical) and start
8. To view the remote side LLDP info, enter the show lldp neighbor-info command.
Access-2(config)# show lldp neighbor-info
9. Based on the last two outputs (show lldp local-device and show lldp neighbor-info), find
the following information:
Does the entry match the Chassis ID and System Name seen in step 9?
Answer: Yes.
What is the local port?
Port : 1/1/28
Neighbor Entries : 1
Neighbor Entries Deleted : 0
Neighbor Entries Dropped : 0
Neighbor Entries Aged-Out : 0
Neighbor System-Name : Access-2
Neighbor System-Description : Aruba JL668A FL.10.13.1000
Neighbor Chassis-ID : 10:4f:58:f6:84:80
Neighbor Management-Address : 10:4f:58:f6:84:80
Chassis Capabilities Available : Bridge, Router
Chassis Capabilities Enabled : Bridge, Router
Neighbor Port-ID : 1/1/28
Neighbor Port-Desc : 1/1/28
Neighbor Port VLAN ID : 1
Neighbor Port VLAN Name : DEFAULT_VLAN_1
Neighbor Port MFS : 1500
Link aggregation supported : Yes
Link aggregation enabled : No
Aggregation port ID : 0
TTL : 120
Lab 3.2: Add a second switch to the
This version of the command displays the detailed data of the neighbor just like the
show lldp local-device command used earlier on Access-2.
Understanding LLDP and the information it provides can help you verify and
troubleshoot Layer 1 communication between devices.
13. Now that you are sure about which ports are used, you are ready to set the interface descrip-
tions. Set descriptions on both switches' interface 1/1/28.
14. Configure the Access-1 interface as follows:
Access-1(config)# interface 1/1/28
Access-1(config-if)# description To_Access-2_port-28
Access-1(config-if)# exit
This output may give you more entries than the ones in example above (that is, PC1).
Ignore all but the interfaces to PC3 and PC4.
Answer: 00:50:56:b1:18:2e. Notice that the MAC address in your lab should be different as each
host has a unique physical address.
What port and VLAN are PC4 seen on?
Answer: As you can see, both PCs are on different ports (which is expected) and on different
VLANs. PC4 is seen on VLAN 1 because that is the only VLAN that exists on Access-2 and the
only VLAN it forwards in its 1/1/28 interface.
Objectives
After finding the root cause that prevents communication between two endpoints, it is time to apply a
topology
configuration that solves the issue. You will proceed now to extend VLAN 11 to the Access-2 switch.
-------------------------------------------------------------------------
Port Native VLAN Trunk VLANs
-------------------------------------------------------------------------
1/1/28 1 1,11
------------------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
------------------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default 1/1/1-1/1/28
------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
10. Display the trunk interfaces. You should have only one trunk port.
Access-2(config)# show interface trunk
-------------------------------------------------------------------------
Port Native VLAN Trunk VLANs
-------------------------------------------------------------------------
1/1/28 1 1,11
11. Navigate back to PC4 and, using the command prompt, ping the PC3 IP address (10.1.11.103).
Access-2
Access-2(config)# show mac-address-table
MAC age-time : 300 seconds
topology
Access-1
MAC address Port VLAN
PC3 (MAC):
PC4 (MAC):
Access-2
MAC address Port VLAN
PC3 (MAC):
PC4 (MAC):
2. Back up the current Access switches' configuration as a custom checkpoint called Lab3-2_final.
Access-1
Access-1# copy running-config checkpoint Lab3-2_final
Copying configuration: [Success]
Access-2
Access-2# copy running-config checkpoint Lab3-2_final
Copying configuration: [Success]
ip dhcp
!
https-server vrf mgmt
topology
11. If your switch has preexisting configurations, reset it with steps 11a and 11b, if not, proceed to
step 12.
a. Erase startup-config.
8325# erase startup-config
Erase checkpoint startup-config ? (y/n): y
12. Modify the hostname to Core-1 and the session timeout to 1440 minutes.
8325# configure terminal
8325(config)# hostname Core-1
Core-1(config)# session-timeout 1440
<<Omitted output>>
CX 8xxx Series, CX 9300 Series, and CX 10000 Series switches have interfaces con-
figured as routed ports and disabled by default.
Answer: Access
Are ports enabled?
Answer: Yes
Why are ports 1 and 2 still down? (see the Reason column)
Lab 3.3: Add a core switch to the
Answer: There is a group speed mismatch. By default, CX 8325 Series switches have ports con-
figured for 25 Gbps. In this lab, we are using 1 Gbps and 10 Gbps. Therefore, port groups need to
topology
Notice that all mismatched ports belong to group 1, which contains ports 1/1/1 to
1/1/12. The choice between 1/10 Gbps and 25 Gbps is done by a port group, mean-
ing that you are not allowed to mix 1 Gbps and 10 Gbps ports with 25 Gbps ports in
the same port group at the same time. For other switch families, check the datasheet
for interface group information.
Continue (y/n)? y
18. Verify the Core-1 interfaces' statuses. Interfaces 1/1/1 and 1/1/2 should have their status as up.
Core-1(config)# show interface brief
--------------------------------------------------------------------------------------------------------
Port Native Mode Type Enabled Status Reason Speed Description
VLAN (Mb/s)
--------------------------------------------------------------------------------------------------------
1/1/1 1 access 10G-DAC1 yes up 10000 --
1/1/2 1 access 10G-DAC1 yes up 10000 --
1/1/3 1 access -- yes down No XCVR installed -- --
1/1/4 1 access -- yes down No XCVR installed -- --
1/1/5 1 access 1G-BT yes up 1000 --
1/1/6 1 access -- yes down No XCVR installed -- --
1/1/7 1 access 1G-BT yes up 1000 --
1/1/8 1 access -- yes down No XCVR installed -- --
<<Omitted output>>
Note that interfaces 1/1/5, 1/1/7, and 1/1/8 are also active.
19. Disable interfaces 1/1/5, 1/1/7, and 1/1/8 since they are not used in this lab.
Core-1(config)# interface 1/1/5,1/1/7,1/1/8
Core-1(config-if-<1/1/5,1/1/7,1/1/8>)# shutdown
Core-1(config-if-<1/1/5,1/1/7,1/1/8>)# exit
20. Use the show lldp neighbor-info command to validate that Access-1 and Access-2 are con-
nected to ports 1 and 2 respectively.
Core-1(config)# show lldp neighbor-info
Now that the connection between Core-1, Access-1, and Access-2 is enabled and active, it is time
for you to add VLAN 11 to the core switch and allow the transit of VLAN 11 through uplinks.
24. Using the Remote Lab dashboard, open a remote desktop connection to PC1, open the command
prompt, and start a ping to PC4.
3. Configure interface 1/1/1 as access port for VLAN 12 and add VLAN 12 to the list of allowed
VLANs on trunk port 1/1/25.
Access-1(config)# interface 1/1/1
Access-1(config-if)# vlan access 12
Access-1(config-if)# interface 1/1/25
Access-1(config-if)# vlan trunk allowed 12
Access-1(config-if)# exit
Lab 3.3: Add a core switch to the
--------------------------------------------------------------------------------------------
----
VLAN Name Status Reason Type
Interfaces
7. Configure interface 1/1/4 as access port for VLAN 12 and add VLAN 12 to the list of allowed
VLANs on trunk port 1/1/25.
Access-2(config)# interface 1/1/4
Access-2(config-if)# vlan access 12
Access-2(config-if)# interface 1/1/25
Access-2(config-if)# vlan trunk allowed 12
Access-2(config-if)# exit
--------------------------------------------------------------------------------------------
----
VLAN Name Status Reason Type
Interfaces
--------------------------------------------------------------------------------------------
----
12 Managers up ok static
1/1/4,1/1/25
-------------------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
16. In the Control Panel, click View network status and tasks under Network and Internet.
19. In the Lab NIC status window, click the Properties button.
20. In the Lab NIC Properties section, select Internet Protocol Version 4 (TCP/IPv4), then click the
Properties button.
23. Navigate to the PC4 remote desktop and repeat steps 14 to 22 to configure the following
IP address:
n IP address: 10.1.12.104
n Subnet mask: 255.255.255.0
24. Open a command prompt and ping PC1's new IP address (10.1.12.101).
Lab 3.3: Add a core switch to the
topology
Answer: Yes.
You might also see a 10.X.11.101 entry associated with the same MAC. That is an old
record from the time PC1 and PC4 were both in VLAN X11; this entry will eventually
expire.
If you do not get an entry mapped to port 1/1/3, artificially generate some traffic on
PC3 to let Access-1 relearn its MAC address. A single ping to 10.X.11.101 is enough.
It will work even if the ping is unsuccessful.
topology
Access-2
Access-2(config)# write memory
Copying configuration: [Success]
Core-1
Core-1(config)# write memory
Copying configuration: [Success]
2. Back up the current Access-1, Access-2, and Core-1 configuration as a custom checkpoint called
Lab3-3_final.
Access-1
Access-1(config)# copy running-config checkpoint Lab3-3_final
Copying configuration: [Success]
Access-2
Access-2(config)# copy running-config checkpoint Lab3-3_final
Copying configuration: [Success]
Core-1
Core-1(config)# copy running-config checkpoint Lab3-3_final
Copying configuration: [Success]
84 Task 4.1-1: Add the redundant core switch and redundant links
Lab 4.1: Rapid Spanning Tree
Protocol
AOS-CX switches from the CX 8xxx Series, CX 9300 Series, and CX 10000 Series
have spanning tree disabled by default.
MST0
Root ID Priority : 32768
MAC-Address: 10:4f:58:f6:84:80
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
------------ ------------ ---------- ------- ---------- ----------- --------- -------- -------- -------
1/1/1 Designated Forwarding 2000 128 P2P 23 2 2 0
1/1/2 Root Forwarding 2000 128 P2P Bound 6 19 4 0
<<Omitted output>>
Answer: MSTP
8. Using the Remote Lab dashboard, launch a console connection to Core-2.
9. Log in to the switch using the following credentials:
n Username: admin
n Password: <no password - just press Enter>
10. Enter the basic configuration, such as the hostname, session timeout, port-group speed, and
interfaces configuration as follow:
8325# configure terminal
8325(config)# hostname Core-2
Core-2(config)# session-timeout 1440
Core-2(config)# system interface-group 1 speed 10
This command will disable any transceivers in the group that do not support
the new speed and may disrupt the network.
Continue (y/n)? y
Core-2(config)# interface 1/1/1-1/1/56
Core-2(config-if-<1/1/1-1/1/56>)# no routing
Task 4.1-1: Add the redundant core switch and redundant links 85
no Core-2(config-if-<1/1/1-1/1/56>)# no shutdown
Core-2(config-if-<1/1/1-1/1/56>)# exit
Core-2(config)# interface 1/1/5,1/1/7
Core-2(config-if-<1/1/5,1/1/7>)# shutdown
Core-2(config-if-<1/1/5,1/1/7>)# exit
Core-2(config)# interface 1/1/1
Core-2(config-if)# description To_Access-1_Port-26
Core-2(config-if)# interface 1/1/2
Core-2(config-if)# description To_Access-2_Port-26
Core-2(config-if)# exit
MST0
Root ID Priority : 32768
MAC-Address: 10:4f:58:f6:84:80
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- --------- ------- ------ --------- ------- --------- -------- ------- -------
1/1/1 Disabled Down 20000 128 P2 0 0 0 0
<<Omitted output>>
13. Using the Remote Lab dashboard, launch a console connection to Access-1.
14. Allow VLANs 11 and 12 on port 1/1/26.
Access-1# configure terminal
Access-1(config)# interface 1/1/26
Access-1(config-if)# vlan trunk allowed 1,11,12
Access-1(config-if)# no shutdown
Access-1(config-if)# description To_Core-2_Port-1
Access-1(config-if)# exit
15. On the Access-1 switch, use LLDP to discover which Core-2 remote port is connected to inter-
face 1/1/26. This will be port 1/1/1.
Access-1(config)# show lldp neighbor-info
86 Task 4.1-1: Add the redundant core switch and redundant links
Lab 4.1: Rapid Spanning Tree
Total Neighbor Entries : 3
Protocol
Total Neighbor Entries Deleted : 3
Total Neighbor Entries Dropped : 0
Total Neighbor Entries Aged-Out : 3
16. Using the Remote Lab dashboard, launch a console connection to Access-2.
17. Allow VLANs 11 and 12 on port 1/1/26.
Access-2# configure terminal
Access-2(config)# interface 1/1/26
Access-2(config-if)# vlan trunk allowed 1,11,12
Access-2(config-if)# no shutdown
Access-2(config-if)# description To_Core-2_Port-2
Access-2(config-if)# exit
Access-2(config)#
18. On the Access-2 switch, use LLDP to discover which Core-2 remote port is connected to inter-
face 1/1/26. This will be port 1/1/2.
Access-2(config)# show lldp neighbor-info
You have prepared the access switches' uplinks. Now, you will prepare the connections between
the cores and their downlinks.
19. Navigate to the Core-1 console tab and use LLDP to discover which ports are connected
between Core-1 and Core-2.
Core-1(config)# show lldp neighbor-info
Task 4.1-1: Add the redundant core switch and redundant links 87
Total Neighbor Entries Aged-Out : 1
88 Task 4.1-1: Add the redundant core switch and redundant links
Lab 4.1: Rapid Spanning Tree
Core-2(config)# interface 1/1/45-1/1/46
Protocol
Core-2(config-if-<1/1/45-1/1/46>)# vlan trunk allowed 1,11,12
Core-2(config-if-<1/1/45-1/1/46>)# exit
MST0
Root ID Priority : 32768
MAC-Address: 10:4f:58:f6:84:80
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
IMPORTANT: Some of the command output depends on your switch hardware. For
example, the system MAC address is unique to your equipment.
Answer: This is relative to your switch. In this example, the switch's MAC address is:
10:4f:58:fc:14:40.
What is the switch priority?
You can obtain the BID by concatenating the switch priority value with the switch
MAC address—for example, 32768:10:4f:58:fc:14:40 for the output in the example.
MST0
Root ID Priority : 32768
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Core-1
Core-1(config)# show spanning-tree
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 32768
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Core-2
Core-2(config)# show spanning-tree
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 32768
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Protocol
Forward Delay(in seconds):15
Which switch is acting as the root bridge? (Compare the BID to the Root ID.)
Answer: The result may vary since each lab has a set of switches with different MAC addresses.
In this example, Core-1 was selected as the root due to its MAC address having the lowest num-
bers.
Notice that all the switches have the same priority on their factory config.
5. Navigate to the Core-1 console and configure its priority to become the root bridge.
Core-1(config)# spanning-tree priority 1
6. Navigate to the Core-2 console and configure its priority to become a secondary root bridge.
Core-2(config)# spanning-tree priority 2
Configuring the second smallest priority on Core-2 aims to ensure that, in case of a
general failure on Core-1, Core-2 will assume the root bridge role.
7. Repeat the show spanning-tree command on all switches and take note of the BID of each
switch.
Answer: 20,000
The link path cost is relevant because it is used as a metric for calculating the Root
Path Cost (RPC) for each non-root bridge's port. The port RPC is calculated by taking
the RPC announcement in an incoming BDPU and adding it to the link path cost of
the port that receives the BPDU. This is equivalent to adding up the link path cost of
each link between the local switch to the root bridge. If two or more ports have paths
to the root bridge, the one with the lowest RPC is the one that will be chosen as the
root port.
RSTP (802.1r) and MST (802.1w) use path costs defined in the 802.1t standard,
which is an update of the legacy STP (802.1D). 802.1t defines the following path
costs based on link speeds:
9. Issue the show spanning-tree detail command. The output will be very long.
The show spanning-tree detail command displays the role and state of the ports,
similar to the show spanning-tree command, with the addition of which switch is the
designated bridge for each link, the number of transitions to forwarding state, and
the number of BPDUs being exchanged.
10. Now try a filtered version of the show spanning-tree detail command in order to find the des-
ignated bridge on each uplink.
Access-1(config)# show spanning-tree detail | begin "Port 1/1/25"
Port 1/1/25 id 25
Designated root has priority :4096 Address: 44:5b:ed:67:d3:00
Designated bridge has priority :4096 Address: 44:5b:ed:67:d3:00
Designated port id :1
Number of transitions to forwarding state : 5
Bpdus sent 23, received 513259
TCN_Tx: 12, TCN_Rx: 23
Port 1/1/26 id 26
Designated root has priority :4096 Address: 44:5b:ed:67:d3:00
Designated bridge has priority :8192 Address: 90:20:c2:c0:bc:00
Designated port id :1
Number of transitions to forwarding state : 4
Protocol
TCN_Tx: 7, TCN_Rx: 15
What is the switch's BID of the designated bridge on port 1/1/25 (port connected to Core-1)?
Port 1/1/26 id 26
Designated root has priority :4096 Address: 44:5b:ed:67:d3:00
Designated bridge has priority :8192 Address: 90:20:c2:c0:bc:00
Designated port id :2
Number of transitions to forwarding state : 2
Bpdus sent 31742, received 2877
TCN_Tx: 7, TCN_Rx: 12
What is the switch's BID of the designated bridge on port 1/1/25 (port connected to Core-1)?
Port 1/1/46 id 46
Designated root has priority :4096 Address: 44:5b:ed:67:d3:00
Designated bridge has priority :4096 Address: 44:5b:ed:67:d3:00
Designated port id :46
Number of transitions to forwarding state : 3
Bpdus sent 22, received 35490
TCN_Tx: 8, TCN_Rx: 12
Based on recorded information, which is the root bridge? Remember that the root bridge is the
switch with the lowest BID.
Answer: Core-1
What was the BID component that made this switch the root bridge, the MAC address or the pri-
ority value?
MST0
Root ID Priority : 4096
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
<<Omitted output>>
23. On the access switches, use filtered versions of the show spanning-tree command for validating
the roles of the ports.
Access-1
Access-1(config)# show spanning-tree | exclude Disabled
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 4096
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------- --------- ---------- -------- -------- ------- ------
1/1/1 Designated Forwarding 20000 128 P2P 825074 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 825093 0 0 0
1/1/25 Root Forwarding 2000 128 P2P Bound 23 517214 12 23
1/1/26 Alternate Blocking 2000 128 P2P Bound 12 38134 7 15
Access-2
Access-2(config)# show spanning-tree | exclude Disabled
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 4096
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------- --------- ---------- -------- -------- ------- ------
1/1/4 Designated Forwarding 20000 128 P2P 566544 0 0 0
1/1/25 Root Forwarding 2000 128 P2P Bound 510989 6281 9 22
1/1/26 Alternate Blocking 2000 128 P2P Bound 31742 6267 7 12
Protocol
If they do not, it may be because some of the ports are either down or the access
switches' priorities are not 32768. Fix that portion of the configuration before mov-
ing forward.
24. On Core-1 and Core-2, use filtered versions of the show spanning-tree command for validating
the roles of the ports. Look specifically for ports 1/1/1, 1/1/2, 1/1/45, and 1/1/46.
Core-1
Core-1(config)# show spanning-tree | exclude Disabled
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 4096
MAC-Address: 44:5b:ed:67:d3:00
This bridge is the root
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- -------- ---------- ------- -------- -------- ------- -------
1/1/1 Designated Forwarding 2000 128 P2P 39514 14 21 9
1/1/2 Designated Forwarding 2000 128 P2P 6500 33029 21 7
1/1/45 Designated Forwarding 800 128 P2P 39222 29 15 14
1/1/46 Designated Forwarding 800 128 P2P 39004 242 16 6
Core-2
Core-2(config)# show spanning-tree | exclude Disabled
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 4096
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- -------- --------- ---------- --------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 38404 12 15 6
1/1/2 Designated Forwarding 2000 128 P2P 6499 31742 14 5
1/1/45 Root Forwarding 800 128 P2P Bound 24 39013 18 12
1/1/46 Alternate Blocking 800 128 P2P Bound 22 39010 8 12
At this point and based on Figure 4.1-3 in the previous task, traffic is flowing from
PC1 to Access-1 → Access-1 to Core-1 (using the port 1/1/25 to 1/1/1 link) →
Core-1 to Access-2 (using the port 1/1/2 to 1/1/25 link) → Access-2 to PC4. You
Answer: Traffic is now flowing from PC1 to Access-1 → Access-1 to Core-2 (using the port
1/1/26 to 1/1/1 link) → Core-2 to Core-1 (using the port 1/1/45 link) → Core-1 to Access-2
(using the port 1/1/2 to 1/1/25 link) → Access-2 to PC4, as seen in Figure 4.1-5.
Protocol
Access-1(config-if)# no shutdown
Access-1(config-if)# exit
Access-1(config)# show spanning-tree | include Root
Root ID Priority : 4096
1/1/25 Root Forwarding 2000 128 P2P Bound
23 518393 12 23
Access-2
Access-2(config)# write memory
Copying configuration: [Success]
Core-1
Core-1(config)# write memory
Copying configuration: [Success]
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches' configuration, as a custom checkpoint called Lab4-1_final.
Access-1
Access-1(config)# copy running-config checkpoint Lab4-1_final
Copying configuration: [Success]
Access-2
Access-2(config)# copy running-config checkpoint Lab4-1_final
Copying configuration: [Success]
Core-1
Core-1(config)# copy running-config checkpoint Lab4-1_final
Copying configuration: [Success]
Notice that all VLANs are mapped to instance 0 (CST) by default, and the region
name is equal to the switch MAC address.
3. Configure an MST region named CXF and create two new instances: instance 1 mapped to VLAN
11 and instance 2 mapped to VLAN 12.
Note the differences, such as the region name, revision level, and instances 1 and 2.
7. Core-2 has the default MST configuration. Repeat the step 3 configuration on Core-2.
Core-2(config)# spanning-tree config-name CXF
Core-2(config)# spanning-tree config-revision 1
Core-2(config)# spanning-tree instance 1 vlan 11
Core-2(config)# spanning-tree instance 2 vlan 12
Answer: That value is specific to each deployment. In this example, the config ID is:
10:4f:58:fc:14:40.
What is the default VLAN to Instance mapping?
Answer: That value is specific to each deployment. In this example, the config ID is:
10:4f:58:f6:84:80.
What is the default VLAN to instance mapping?
As you can see, the sccess switches' configuration is different from the core switches
and although Access-1 and Access-2 share the same dDigest (result of having all
VLANs mapped to Instance 0), they do not share the region ID or revision number.
Therefore, they belong to different regions
16. You should have the same MST configuration on Core-1, Core-2, Access-1, and Access-2, cre-
ating a single MSTP region.
#### MST1
Vlans mapped: 11
Bridge Address:44:5b:ed:67:d3:00 Priority:32768
Root Address:10:4f:58:f6:84:80 Priority:32768
Port:1/1/2, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 78519 90 48 27
1/1/2 Root Forwarding 2000 128 P2P 45838 34944 49 23
#### MST1
Vlans mapped: 11
Bridge Address:90:20:c2:c0:bc:00 Priority:32768
Root Address:10:4f:58:f6:84:80 Priority:32768
Port:1/1/2, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 78228 91 55 8
1/1/2 Root Forwarding 2000 128 P2P 46329 34139 62 5
1/1/45 Alternate Blocking 800 128 P2P 47 78829 28 48
1/1/46 Alternate Blocking 800 128 P2P 47 78827 8 49
Access-1
Access-1(config)# show spanning-tree mst 1 | exclude Disabled
#### MST1
Vlans mapped: 11
Bridge Address:10:4f:58:fc:14:40 Priority:32768
Root Address:10:4f:58:f6:84:80 Priority:32768
Port:1/1/25, Cost:4000, Rem Hops:18
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 20000 128 P2P 865238 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 865257 0 0 0
1/1/25 Root Forwarding 2000 128 P2P 99 557055 30 49
1/1/26 Alternate Blocking 2000 128 P2P 91 78323 13 55
#### MST1
Vlans mapped: 11
Bridge Address:10:4f:58:f6:84:80 Priority:32768
Root Address:10:4f:58:f6:84:80 Priority:32768
Port:0, Cost:0, Rem Hops:20
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/4 Designated Forwarding 20000 128 P2P 606682 0 0 0
1/1/25 Designated Forwarding 2000 128 P2P 513496 46431 25 50
1/1/26 Designated Forwarding 2000 128 P2P 34250 46437 11 60
Notice that results may vary based on switch specifics such as the MAC address.
Note that the Instance 1 root bridge may be any switch in the topology, including one
of your access switches. Remember that the entire topology converges towards the
root bridge, and links will be blocked based on that. What may generate a bottleneck
is where too much traffic must traverse an access switch and a sub-optimal path.
5. Now verify Instance 2 (MST2) on all switches and take notes in Figure 4.2-2.
Core-1
Core-1(config)# show spanning-tree mst 2| exclude Disabled
#### MST2
Vlans mapped: 12
Bridge Address:44:5b:ed:67:d3:00 Priority:32768
Root Address:10:4f:58:f6:84:80 Priority:32768
Port:1/1/2, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 81331 90 48 27
1/1/2 Root Forwarding 2000 128 P2P 48650 37756 49 23
1/1/45 Designated Forwarding 800 128 P2P 81378 52 51 24
1/1/46 Designated Forwarding 800 128 P2P 81160 267 53 6
Core-2
Core-2(config)# show spanning-tree mst 2 | exclude Disabled
#### MST2
Vlans mapped: 12
Bridge Address:90:20:c2:c0:bc:00 Priority:32768
Root Address:10:4f:58:f6:84:80 Priority:32768
Port:1/1/2, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 80563 91 55 8
1/1/2 Root Forwarding 2000 128 P2P 48664 36474 62 5
1/1/45 Alternate Blocking 800 128 P2P 47 81164 28 48
1/1/46 Alternate Blocking 800 128 P2P 47 81162 8 49
Access-1
Access-1(config)# show spanning-tree mst 2 | exclude Disabled
#### MST2
Vlans mapped: 12
Bridge Address:10:4f:58:fc:14:40 Priority:32768
Root Address:10:4f:58:f6:84:80 Priority:32768
Port:1/1/25, Cost:4000, Rem Hops:18
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 20000 128 P2P 867478 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 867497 0 0 0
1/1/25 Root Forwarding 2000 128 P2P 99 559295 30 49
1/1/26 Alternate Blocking 2000 128 P2P 91 80563 13 55
Access-2
Access-2(config)# show spanning-tree mst 2| exclude Disabled
#### MST2
Vlans mapped: 12
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/4 Designated Forwarding 20000 128 P2P 608912 0 0 0
1/1/25 Designated Forwarding 2000 128 P2P 515726 48661 25 50
1/1/26 Designated Forwarding 2000 128 P2P 36480 48667 11 60
Note that instances 1 and 2 are using the same root bridge, and the same ports
(alternate ports) block traffic for both instances. Therefore, there is no load bal-
ancing between links.
6. To fix that, configure Core-1 as the root bridge for instance 1 and Core-2 as the root bridge for
instance 2.
Core-1
Core-1(config)# spanning-tree instance 1 priority 1
7. Configure Core-1 as the secondary root for instance 2 and Core-2 as the secondary root for
instance 1.
Core-1
Core-1(config)# spanning-tree instance 2 priority 2
Core-2
Core-2(config)# spanning-tree instance 1 priority 2
#### MST1
Vlans mapped: 11
Bridge Address:44:5b:ed:67:d3:00 Priority:4096
Root Address:44:5b:ed:67:d3:00 Priority:4096
Port:0, Cost:0, Rem Hops:20
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 81965 95 48 27
1/1/2 Designated Forwarding 2000 128 P2P 49285 37951 49 23
1/1/45 Designated Forwarding 800 128 P2P 82012 496 51 24
1/1/46 Designated Forwarding 800 128 P2P 81794 711 53 6
Core-2
Core-2(config)# show spanning-tree mst 1 | exclude Disabled
#### MST1
Vlans mapped: 11
Bridge Address:90:20:c2:c0:bc:00 Priority:8192
Root Address:44:5b:ed:67:d3:00 Priority:4096
Port:1/1/45, Cost:800, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 81487 101 55 8
1/1/2 Designated Forwarding 2000 128 P2P 49588 36672 62 5
1/1/45 Root Forwarding 800 128 P2P 785 82087 28 48
1/1/46 Alternate Blocking 800 128 P2P 787 82088 8 49
Access-1
Access-1(config)# show spanning-tree mst 1 | exclude Disabled
#### MST1
Vlans mapped: 11
Bridge Address:10:4f:58:fc:14:40 Priority:32768
Root Address:44:5b:ed:67:d3:00 Priority:4096
Port:1/1/25, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 20000 128 P2P 868130 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 868149 0 0 0
1/1/25 Root Forwarding 2000 128 P2P 104 559949 30 49
1/1/26 Alternate Blocking 2000 128 P2P 96 81218 13 55
Access-2
Access-2(config)# show spanning-tree mst 1| exclude Disabled
#### MST1
Vlans mapped: 11
Bridge Address:10:4f:58:f6:84:80 Priority:32768
Root Address:44:5b:ed:67:d3:00 Priority:4096
Port:1/1/25, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/4 Designated Forwarding 20000 128 P2P 609571 0 0 0
1/1/25 Root Forwarding 2000 128 P2P 515911 49323 25 50
1/1/26 Alternate Blocking 2000 128 P2P 36667 49329 11 60
Answer: Core-1
#### MST2
Vlans mapped: 12
Bridge Address:44:5b:ed:67:d3:00 Priority:8192
Root Address:90:20:c2:c0:bc:00 Priority:4096
Port:1/1/45, Cost:800, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 82320 100 48 27
1/1/2 Designated Forwarding 2000 128 P2P 49639 37956 49 23
1/1/45 Root Forwarding 800 128 P2P 82366 851 51 24
1/1/46 Alternate Blocking 800 128 P2P 82151 1068 53 6
#### MST2
Vlans mapped: 12
Bridge Address:90:20:c2:c0:bc:00 Priority:4096
Root Address:90:20:c2:c0:bc:00 Priority:4096
Port:0, Cost:0, Rem Hops:20
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 2000 128 P2P 81572 101 55 8
1/1/2 Designated Forwarding 2000 128 P2P 49673 36672 62 5
1/1/45 Designated Forwarding 800 128 P2P 870 82172 28 48
1/1/46 Designated Forwarding 800 128 P2P 872 82173 8 49
Access-1
Access-1(config)# show spanning-tree mst 2 | exclude Disabled
#### MST2
Vlans mapped: 12
Bridge Address:10:4f:58:fc:14:40 Priority:32768
Root Address:90:20:c2:c0:bc:00 Priority:4096
Port:1/1/26, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/1 Designated Forwarding 20000 128 P2P 868492 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 868511 0 0 0
1/1/25 Alternate Blocking 2000 128 P2P 109 560316 30 49
1/1/26 Root Forwarding 2000 128 P2P 101 81585 13 55
Access-2
Access-2(config)# show spanning-tree mst 2| exclude Disabled
#### MST2
Vlans mapped: 12
Bridge Address:10:4f:58:f6:84:80 Priority:32768
Root Address:90:20:c2:c0:bc:00 Priority:4096
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- ------------ ---------- ------ ---------- ------- -------- -------- ------- ------
1/1/4 Designated Forwarding 20000 128 P2P 609943 0 0 0
1/1/25 Alternate Blocking 2000 128 P2P 515916 49700 25 50
1/1/26 Root Forwarding 2000 128 P2P 36672 49706 11 60
Answer: Core-2
Which ports are blocked on each switch?
Notice that the active links from instance 2 converge to Core-2, while the active links
for instance 1 converge to Core-1, balancing the traffic between core switches and
uplinks.
Access-2
Access-2(config)# write memory
Copying configuration: [Success]
Core-1
Core-1(config)# write memory
Copying configuration: [Success]
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches' configuration as a custom checkpoint called Lab4-2_final.
Access-1
Access-1(config)# copy running-config checkpoint Lab4-2_final
Copying configuration: [Success]
Access-2
Access-2(config)# copy running-config checkpoint Lab4-2_final
Copying configuration: [Success]
Core-1
Core-1(config)# copy running-config checkpoint Lab4-2_final
Copying configuration: [Success]
Core-2
Core-2(config)# copy running-config checkpoint Lab4-2_final
Copying configuration: [Success]
9. Verify that interfaces 1/1/25 and 1/1/26 are disabled and interfaces 1/1/27 and 1/1/28 are
enabled and active.
Access-2(config)# show interface brief | begin 1/1/25
1/1/25 1 trunk 10G-DAC1 no down Administratively down -- --
1/1/26 1 trunk 10G-DAC1 no down Administratively down -- To_Core-2_Port-2
1/1/27 1 trunk 10G-DAC1 yes up 10000 To_Access-2_Port-27
1/1/28 1 trunk 10G-DAC1 yes up 10000 To_Access-2_Port-28
Remember that you are about to create a Layer 2 loop, which has the potential to
affect the entire network. In order to limit the effects, you have to make sure that
both uplinks 1/1/25 and 1/1/26 are down. Do not proceed if this is not the case.
11. Use the show spanning-tree command and look at ports 1/1/27 and 1/1/28.
Access-2(config)# show spanning-tree | exclude Disabled
Spanning tree status : Enabled Protocol: MSTP
MST0
Root ID Priority : 32768
MAC-Address: 10:4f:58:fc:14:40
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
--------- ------------- ---------- -------- --------- ------ --------- -------- -------- -------
1/1/4 Designated Forwarding 20000 128 P2P 612697 0 0 0
1/1/27 Root Forwarding 2000 128 P2P 197 16 5 7
1/1/28 Alternate Blocking 2000 128 P2P 44624 19 4 8
Access-2
Access-2(config)# copy running-config checkpoint Lab4-3_task1
Copying configuration: [Success]
In total, how many broadcast and multicast packets has 1/1/27 received since the count was last
cleared?
Answer: That value is specific to each deployment. In this example, 10 multicast packets were
sent and received.
In total, how many broadcast and multicast packets has 1/1/28 received since the count was last
cleared?
Answer: That value is specific to each deployment. In this example, seven multicast packets were
sent and received.
3. Wait a minute, then repeat step 2.
Access-1(config)# show interface 1/1/27-1/1/28 statistics
---------------------------------------------------------------------------------------------------------------------------------------
--------------
Interface RX Bytes RX Packets RX Drops TX Bytes TX Packets TX Drops RX Broadcast RX Multicast TX Broadcast TX Multicast RX
Pause TX Pause
---------------------------------------------------------------------------------------------------------------------------------------
--------------
1/1/27 26841 169 0 28391 174 0 1 168 6 168 0
0
1/1/28 26629 166 0 28267 171 0 1 165 6 165 0
0
Access-1(config)#
How many total broadcast and multicast packets do you see on both interfaces?
Answer: That value is specific to each deployment. In this example, 165 multicast packets were
sent and received.
4. Access PC4, open the command prompt, and issue the ipconfig -all command and record
PC4's MAC address.
5. Run a continuous ping to PC1's IP address (10.1.12.101). The ping should be successful.
6. Navigate back to the Access-2 console.
7. Enable spanning tree BPDU filtering on interfaces 1/1/27 and 1/1/28.
BPDU filtering is a feature that prevents a switch from sending or receiving spanning
tree BPDUs. When enabling the feature on ports 1/1/27 and 1/1/28, you will prevent
Access-2 from processing incoming Access-1's BPDUs, and also Access-1 will no
longer receive Access-2's BPDUs. This will cause, after few seconds, a transition.
Connecting a device with BPDU filtering enabled to an access switch in order to cre-
ate a Layer 2 loop is a well-known Denial of Service (DoS) attack. Later, in task 3, you
will learn an effective way of protecting your network against this threat.
8. Use the show spanning-tree command and look at current 1/1/27 and 1/1/28 interfaces' state
in Access-2. They will now be in Forwarding mode.
Access-2(config)# show spanning-tree | include Forwarding
1/1/4 Designated Forwarding 20000 128 P2P 655858 0 0 0
1/1/27 Designated Forwarding 2000 128 P2P 43312 43131 5 7
1/1/28 Designated Forwarding 2000 128 P2P 87739 43134 4 8
Answer: There should now be a loop and a broadcast storm. You will now gather evidence of its
presence.
9. Move back to Access-1.
10. Wait a minute and display the Access-1 interface statistics again.
Access-1(config)# show interface 1/1/27-1/1/28 statistics
---------------------------------------------------------------------------------------------------------------------------------------
--------------
Interface RX Bytes RX Packets RX Drops TX Bytes TX Packets TX Drops RX Broadcast RX Multicast TX Broadcast TX
Multicast RX Pause TX Pause
---------------------------------------------------------------------------------------------------------------------------------------
---------------------
1/1/27 25226928109 340409519 0 175180720055 2570100044 38348805 267030943 80 7069778 204
0 0
1/1/28 175061716363 2568350145 0 25361773859 342392388 716378 7069983 78 267030766 202
0 0
How many more broadcast and multicast packets combined do you have now on each interface?
Answer: That value is specific to each deployment. In this example, Broadcast went from a few
entries to millions of packets.
The large increment of broadcast and multicast packets in a short period of time is
one piece of evidence of a broadcast storm. It is the result of a loop.
The lack of connectivity in the affected devices is one of the main symptoms of a
broadcast storm.
15. Show the debug buffer of the L2MAC module using the include filtering command, followed by
the four last hexadecimal characters of PC1's MAC address that you recorded in step 2.
Access-1(config)# show debug buffer module L2MAC | include d6:e3
2024-04-18:19:21:49.353436|l2mac-mgrd|LOG_DEBUG|CDTR|1|L2MAC|L2MAC_EVENT|macmgr_mac_manager_handle_mac_event(3281), [00:50:56:
b1:d6:e3, 1/1/28, VLAN12, dynamic, vsxp=0, r=0] Event = DYNAMIC MAC MOVE
2024-04-18:19:21:49.353468|l2mac-mgrd|LOG_DEBUG|CDTR|1|L2MAC|L2MAC_EVENT|macmgr_mac_manager_handle_mac_event(3303), MAC=00:50:
56:b1:d6:e3, VLAN=12, Port=1/1/28 is trying to be inserted
2024-04-18:19:21:49.353531|l2mac-mgrd|LOG_DEBUG|CDTR|1|L2MAC|L2MAC_EVENT|macmgr_mac_manager_handle_mac_event(3333), MAC=00:50:
56:b1:d6:e3 was successfully inserted
2024-04-18:19:21:49.537024|l2mac-mgrd|LOG_DEBUG|CDTR|1|L2MAC|L2MAC_EVENT|macmgr_mac_manager_handle_mac_event(3281), [00:50:56:
b1:d6:e3, 1/1/27, VLAN12, dynamic, vsxp=0, r=0] Event = DYNAMIC MAC MOVE
2024-04-18:19:21:49.537057|l2mac-mgrd|LOG_DEBUG|CDTR|1|L2MAC|L2MAC_EVENT|macmgr_mac_manager_handle_mac_event(3303), MAC=00:50:
56:b1:d6:e3, VLAN=12, Port=1/1/27 is trying to be inserted
2024-04-18:19:21:49.537118|l2mac-mgrd|LOG_DEBUG|CDTR|1|L2MAC|L2MAC_EVENT|macmgr_mac_manager_handle_mac_event(3333), MAC=00:50:
56:b1:d6:e3 was successfully inserted
Are there any events describing MAC address learning on interface 1/1/27 first, then 1/1/28
later?
Answer: Yes, it is observed that the PC1 MAC address is being learned on port 1/1/28 and then
on port 1/1/27 a few times.
A MAC address learning of flapping between all interfaces involved in the loop is
another piece of evidence of a broadcast storm. The affected interfaces are not neces-
sarily the ones where the client is connected!
Vendor : Aruba
Product Name : JL668A 6300F 24G 4SFP56 Sw
Chassis Serial Nbr : SG01KN701M
Base MAC Address : 104f58-fc1440
ArubaOS-CX Version : FL.10.13.1000
Answer: That value is relative to each system and time. Check the CPU utilization on your
Access-1 output. In this example, Access-1 had 25% CPU utilization.
Answer: That value is relative to each system and time. Check the CPU utilization on your
Access-1 output. In this example, Access-1 had 11% CPU utilization.
A rate limit is a good protection mechanism when connecting devices that you do not
control to your network that you do not control.
4. Next, you will test another feature that might be of use for preventing loops. To test its effects,
you will have to remove rate filtering in order to re-create the unstable situation.
5. Remove rate-limit related commands.
Access-1(config-if-<1/1/27-1/1/28>)# no rate-limit broadcast
Access-1(config-if-<1/1/27-1/1/28>)# no rate-limit multicast
6. Wait a few seconds, then verify the system CPU; it should have risen once more.
Interface 1/1/27
Loop-protect enabled : Yes
Action on loop detection : TX RX disable
Loop detected count : 1
Loop detected : Yes
Detected on VLAN : 1
Detected at : 2024-04-18T20:13:07
Interface status : down
Interface 1/1/28
Loop-protect enabled : Yes
Action on loop detection : TX RX disable
Loop detected count : 1
Loop detected : Yes
Detected on VLAN : 1
Detected at : 2024-04-18T20:13:07
Interface status : down
Answer: Yes
What are the interfaces' statuses now?
In the previous example, the switch was able to detect the loop on both ports
simultaneously. However, it is also possible to have the switch detecting the loop on
one of the ports first and blocking it before detecting it on the other.
4. Use the show interface brief command for displaying the current state of ports 1/1/27 and
1/1/28.
(config-if-<1/1/27-1/1/28>)# show interface brief | exclude Administratively
----------------------------------------------------------------------------------------------
Port Native Mode Type Enabled Status Reason Speed Description
VLAN (Mb/s)
----------------------------------------------------------------------------------------------
1/1/1 12 access 1GbT yes up 1000 To_PC1
1/1/3 11 access 1GbT yes up 1000 To_PC3
1/1/27 1 trunk 10G-DAC1 yes down Network loop detected -- --
1/1/28 1 trunk 10G-DAC1 yes down Network loop detected -- To_Access-2_port-28
vlan1 -- -- -- yes down -- --
8. Disable ports 1/1/27 and 1/1/28, then re-enable them. This will remove the "Network loop detec-
ted" state and bring them back on.
Access-1(config-if-<1/1/27-1/1/28>)# shutdown
Access-1(config-if-<1/1/27-1/1/28>)# no shutdown
Access-1(config-if-<1/1/27-1/1/28>)# exit
Access-2
Access-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches' configuration as a custom checkpoint called Lab4-3_final.
Access-1
Access-1(config)# copy running-config checkpoint Lab4-3_final
Copying configuration: [Success]
Access-2
Access-2(config)# copy running-config checkpoint Lab4-3_final
Copying configuration: [Success]
Access-2
Access-2(config)# copy checkpoint Lab4-2_final running-config
Copying configuration: [Success]
8. Create a port range with interfaces 1/1/45 and 1/1/46, and make these two ports members of
core switches
LAG 256.
Core-1(config-lag-if)# interface 1/1/45-1/1/46
Core-1(config-if-<1/1/45-1/1/46>)# lag 256
Core-1(config-if-<1/1/45-1/1/46>)# exit
Statistic RX TX Total
---------------- -------------------- -------------------- --------------------
Packets 222909 393126 616035
Unicast 6344 12375 18719
Multicast 216251 378779 595030
Broadcast 314 1972 2286
Bytes 34695063 75190794 109885857
Jumbos 0 11768 11768
Dropped 0 0 0
Filtered 192305 195 192500
Pause Frames 0 0 0
Errors 0 0 0
CRC/FCS 0 n/a 0
Collision n/a 0 0
Runts 0 n/a 0
Giants 0 n/a 0
Answer: This is relative to each device. In this example, 616,035 packets were transmitted.
Are all these packets generated by the continuous ping you are running?
Right now, interface LAG 256 is up because the previous configuration has created a
local static aggregation that does not depend on any control plane protocol-based
negotiation with the remote end (Core-2). However, this has data plane implications;
the number of sent and received packets are not the result of a continuous ping. The
question is: What else can be creating that amount of traffic? After all, you are in the
middle of a maintenance window and nobody else is working in the network.
This means Core-2 is looping some frames back to Core-1, including the BPDUs it
relays. This causes MAC address flapping. Also, each broadcast or multicast Core-2
receives in its downlinks will be sent across both ports 45 and 46, generating duplic-
ated frames. That is why pings either stopped or were inconsistent.
The solution is to disable one of the ports (preferably the former alternate port),
before starting the static aggregation configuration, and re-enable it once it is done
on both sides.
Another potential loop situation can take place when configuring static aggregation
in access switches' uplinks that terminate on different non-related/non-stacked phys-
ical devices.
Therefore, before configuring static aggregation, you must verify the following:
n All LAG member ports except one are disabled on one side.
n Confirm cabling is correct and involves two switching entities only.
Since you are already facing the issue, you will begin by removing the transient loop. Then, you
will complete Core-2's portion of the setup.
12. Stop the continuous ping.
15. Configure interfaces 1/1/45 and 1/1/46 as member ports of LAG 256.
core switches
Core-2(config)# interface 1/1/45-1/1/46
Core-2(config-if-<1/1/45-1/1/46>)# lag 256
Core-2(config-if-<1/1/45-1/1/46>)# exit
Aggregate lag256 is up
Admin state is up
Description : To_Core-1_Ports-45&46
MAC Address : 90:20:c2:c0:bc:00
Aggregated-interfaces : 1/1/45 1/1/46
Aggregation-key : 256
Speed : 50000 Mb/s
qos trust none
VLAN Mode: native-untagged
Native VLAN: 1
Allowed VLAN List: 11-12
L3 Counters: Rx Disabled, Tx Disabled
Statistic RX TX Total
---------------- -------------------- -------------------- --------------------
Packets 396533 227938 624471
Unicast 12375 6354 18729
Multicast 382181 221241 603422
Broadcast 1977 343 2320
Bytes 75724543 35481958 111206501
Jumbos 11768 0 11768
Dropped 0 0 0
Filtered 355317 1333 356650
Pause Frames 0 0 0
Errors 0 0 0
CRC/FCS 0 n/a 0
Collision n/a 0 0
Runts 0 n/a 0
Giants 0 n/a 0
10. Configure the LACP mode to active and LACP rate to fast.
Core-1(config-lag-if)# lacp mode active
Core-1(config-lag-if)# lacp rate fast
core switches
Two peer ports operating in passive mode will never establish an LACP link.
For an LACP LAG, one side must have LACP in active mode and the peer must have
an LACP configuration of active or passive mode. If you do not enable LACP on a
LAG, it is treated as a static LAG and the peer cannot negotiate LACP with the LAG.
LACP rate
The lacp rate command sets an LACP heartbeat interval and timeout timer.
n It specifies the heartbeat request to every second, and the timeout period is a
three-consecutive-heartbeat loss that is three seconds.
n It specifies the heartbeat request to every 30 seconds. The timeout period is a
three-consecutive-heartbeat loss that is 90 seconds, which is the default set-
ting.
12. Create a port range with interfaces 1/1/45 and 1/1/46, and make these two ports members of
LAG 256.
Core-1(config-lag-if)# interface 1/1/45-1/1/46
Core-1(config-if-<1/1/45-1/1/46>)# lag 256
Core-1(config-if-<1/1/45-1/1/46>)# no shutdown
Core-1(config-if-<1/1/45-1/1/46>)# exit
Aggregate lag256 is up
Admin state is up
Description : To_Core-2_Ports-45&46
Type : normal
Lacp Fallback : Disabled
MAC Address : 44:5b:ed:67:d3:00
Aggregated-interfaces : 1/1/45 1/1/46
Aggregation-key : 256
Aggregate mode : active
Hash : l3-src-dst
LACP rate : fast
Speed : 50000 Mb/s
Mode : trunk
Answer: Up.
What are the member ports?
Notice that LAG 256 appears to be active and operational from the LAG point of
view.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
core switches
Intf Aggr Port Port State System-ID System Aggr
Name Id Pri Pri Key
----------------------------------------------------------------------------------
1/1/45 lag256 0 0 PLFOEX 00:00:00:00:00:00 0 0
1/1/46 lag256 0 0 PLFOEX 00:00:00:00:00:00 0 0
Core-1(config)#
What state flags for the local switch (actor details) were triggered by LACP?
Answer: P, L, F, O, E, and X.
What is the meaning of each state flag (abbreviation)?
Notice that the flags O—OutofSync and X—Expired indicate that LACP has detected
problems and that the LAG is not active. Also, the lack of flags C—Collecting and D—
Distributing indicates that no data frames are being received or sent on those inter-
faces. This is a protective measure from LACP to avoid loops in the network.
21. Repeat the show lacp interfaces command one more time.
State abbreviations :
core switches
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Notice that the LACP states are different. States O and X were removed, and states
N—InSync, C—Collecting, and D—Distributing were added, which means that your
LAG 256 is now functional.
MST0
Root ID Priority : 4096
MAC-Address: 44:5b:ed:67:d3:00
Hello time(in seconds):2 Max Age(in seconds):20
Forward Delay(in seconds):15
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
-------- -------------- ---------- ---------- ---------- ------------ ---------- ---------- --------- -------
1/1/1 Designated Forwarding 2000 128 P2P 224076 1757 69 16
1/1/2 Designated Forwarding 2000 128 P2P 192230 38326 72 12
lag256 Root Forwarding 800 64 P2P 195 193 2 1
What is the spanning tree state of ports 1/1/45, 1/1/46, and LAG 256?
Ports 1/1/45 and 1/1/46 are not listed, while LAG 256 is the root. When LAG 256
was created and ports 1/1/45 and 1/1/46 became part of it, then spanning tree
stopped considering the physical interfaces in its calculations and started using LAG
1 instead.
2. Back up the current access switches' configuration as a custom checkpoint called Lab5_final.
Core-1
Core-1(config)# copy running-config checkpoint Lab5_final
Core-2
core switches
Core-2(config)# copy running-config checkpoint Lab5_final
Copying configuration: [Success]
Lab 6.1: Create an HPE Aruba Networking Virtual Switching Framework stack
It has been one year since BigStartup started the business, and increased profits are making it possible
to open additional offices. This new project for additional offices begins next month, and they want you
to take care of the entire network deployment. This project will take several months, and you might not
be able to assist with Level 1 support. You suggest handing over control of the access switches to an
internal staff member. They are not very experienced in networking and do not feel confident man-
aging multiple independent switches.
To simplify the deployment, you plan to create a single stack of switches using a technology called HPE
Aruba Networking Virtual Switching Framework (VSF) so that the internal staff member will only need
to deal with one logical unit.
Objectives
After completing this lab, you will be able to:
n Create a VSF stack.
n Define stack roles.
n Verify VSF topology.
n Configure distributed link aggregation.
Lab topology
The following lab topology will be used for your practical activities:
Lab 6.1: Create an HPE Aruba Networking Virtual Switching Framework stack 151
Task 6.1-1: Deploy a VSF stack
Objectives
You are about to create a VSF stack. This involves rebooting one of the units, which might affect users
connected to it. Although you know the process will take no more than five minutes, you have reques-
ted a 30-minute maintenance window. To further minimize the inconvenience, you have scheduled the
maintenance window during lunch.
In this task, you will create a VSF stack with both access switches using port 1/1/28. Then you will
explore the stack properties and normalize the port configuration on member 2.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Launch a remote console to PC4.
4. Open the command prompt and start a continuos ping to PC1 (10.1.12.101). The ping should be
successful.
11. Renumber the switch to vsf member 2. You will be prompted to save the configuration and
reboot the unit. Answer y.
Access-2(config)# vsf renumber-to 2
This will save the VSF configuration and reboot the switch.
Do you want to continue (y/n)? y
12. The system will reboot and be back online after a few minutes.
13. Log in with admin and no password (leave empty and press Enter).
Access-2 login: admin
Password:
Last login: 2024-04-24 19:19:12 from the console
User "admin" has logged in 3 times in the past 30 days
member-2#
Answer: Member-2.
14. Move back to Access-1.
15. Run the show vsf command.
Access-1(config)# show vsf
Answer: Chain
How many members are part of the stack?
Answer: Two
Does the stack MAC address match any of the members' addresses?
Answer: Yes
Whose?
Answer: Conductor
What is status (role) of Member 2?
Answer: Member
16. Run the detailed version of the output.
Access-1(config)# show vsf detail
VSF Stack
MAC Address : 10:4f:58:fc:14:40
Secondary :
Topology : chain
Status : No Split
Split Detection Method : None
Software Version : FL.10.13.1000
Force Autojoin : Disabled
Member ID : 1
MAC Address : 10:4f:58:fc:14:40
Type : JL668A
Model : 6300F 24-port 1GbE and 4-port SFP56 Switch
Status : Conductor
ROM Version : FL.01.14.0002
Serial Number : SG01KN701M
Uptime : 3 weeks, 6 days, 4 hours, 21 minutes
CPU Utilization : 10%
Memory Utilization : 20%
VSF Link 1 : Up, connected to peer member 2, link 1
VSF Link 2 :
Member ID : 2
MAC Address : 10:4f:58:f6:84:80
Type : JL668A
Model : 6300F 24-port 1GbE and 4-port SFP56 Switch
Status : Member
ROM Version : FL.01.14.0002
Serial Number : SG01KN701K
Uptime : 4 minutes
CPU Utilization : 5%
Answer: JL688A
What is the switch type (model) of both members?
Answer: That value varies based on the switch load. In this example, Member 1 was using 10% of
its CPU and 20% of its memory.
What is the CPU and memory utilization of Member 2?
Answer: That value varies based on the switch load. In this example, Member 2 was using 5% of
its CPU and 8% of its memory.
17. Use the show vsf topology command for looking at logical connections between members.
Access-1(config)# show vsf topology
Conductor
+-------+ +-------+
| 2 |1==1| 1 |
+-------+ +-------+
VSF Member 1
These interfaces lost their previous configuration, moved to routed ports, and are
now exclusively used for VSF. Due to their routed mode properties, Layer 2 loops can-
not be created through them.
What VLANs are assigned to ports 1/1/1 and 1/1/3 (PC1 and PC3)?
Answer: VLAN 1.
What is the port mode of interfaces 1/1/25 and 1/1/26 (uplinks of Member 1)?
Answer: Trunk.
What is the port mode of interfaces 2/1/25 and 2/1/26 (uplinks of Member 2)?
Answer: Access.
20. Move back to PC4. Is the ping still going?
23. Enable Member 2’s uplinks to Core-1 and Core-2 and allow VLANs 1, 11 and 12 across interfaces
2/1/25 and 2/1/26.
Access-1(config)# interface 2/1/25-2/1/26
Access-1(config-if-<2/1/25-2/1/26>)# no shutdown
Access-1(config-if-<2/1/25-2/1/26>)# vlan trunk allowed 1,11,12
Access-1(config-if-<2/1/25-2/1/26>)# exit
24. Enable the port that connects to PC4 (2/1/4), then make it a member of VLAN 12.
Access-1(config)# interface 2/1/4
Access-1(config-if)# no shutdown
Access-1(config-if)# vlan access 12
Access-1(config-if)# exit
Well done! You have restored connectivity in record time! Now that the urgency is over, you can
change the hostname of the system to something more appropriate.
25. Change the hostname to Access-VSF.
Access-1(config)# hostname Access-VSF
Access-VSF(config)#
5. Type show followed by a ?. You will get the show command’s help as the output.
member-2# show ?
allow-unsafe-updates Show allowed non-failsafe updates
images Show the version of software stored in the Primary and
Secondary image locations
needed-updates Show needed updates of programmable devices
tech Display output of a predefined command sequence used by
technical support
terminal-monitor Displays Terminal-monitor status
version Displays switch version
vsf Show VSF information
Are the available commands and options the same that you would see in the Conductor or a non-
stacked switch?
Answer: Member switches have limited commands available, as the commander switch executes
the management and control plane.
6. Run the member 1 command, which will take you to Member 1’s (the Conductor) CLI.
member-2# member 1
Users are not allowed to access the conductor's console from member/standby
Member switches are not allowed to manage the stack nor access or manage the con-
ductor switch.
7. Connect to the Access-1 console and enter the member 2 command. When prompted for a pass-
word, simply press Enter.
Access-VSF# member 2
[email protected]'s password:
8. Press the question mark (?). You will get the help as the output.
Note that the Conductor switch has more command options when accessing member
switches. This is especially useful for troubleshooting.
12. Connect to the Core-1 console and create LAG 1 with the following settings:
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Distributed LAGs are possible since VSF stacked switches act as a single switch for
the data, management, and control planes, simulating a connection between your
switches.
18. Connect to the Core-2 console and create LAG 2 with the following settings:
n Description: To-Access-VSF
n Allowed VLANs: 1, 11 and 12
n LACP rate: fast
n LACP mode: active
n Enabled: yes
Core-2(config)# interface lag 2
Core-2(config-lag-if)# description To-Access-VSF
Core-2(config-lag-if)# no routing
Core-2(config-lag-if)# vlan trunk allowed 1,11,12
Core-2(config-lag-if)# lacp mode active
Core-2(config-lag-if)# lacp rate fast
Core-2(config-lag-if)# no shutdown
Core-2(config-lag-if)# exit
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
A simplified view of your topology should look like the following picture. Notice that
a complex topology with several links was drastically simplified by using VSF and
LACP.
#### MST1
Vlans mapped: 11
Bridge Address:10:4f:58:fc:14:40 Priority:32768
Root Address:02:01:00:00:00:01 Priority:4096
Port:lag1, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
---------- -------------- ---------- -------- ---------- ------------ ---------- --------- -------- ----------
1/1/1 Designated Forwarding 20000 128 P2P 342271 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 342271 0 0 0
#### MST2
Vlans mapped: 12
Bridge Address:10:4f:58:fc:14:40 Priority:32768
Root Address:90:20:c2:c0:bc:00 Priority:4096
Port:lag2, Cost:2000, Rem Hops:19
Port Role State Cost Priority Type BPDU-Tx BPDU-Rx TCN-Tx TCN-Rx
---------- -------------- ---------- -------- ---------- ------------ ---------- --------- -------- ----------
1/1/1 Designated Forwarding 20000 128 P2P 342268 0 0 0
1/1/3 Designated Forwarding 20000 128 P2P 342268 0 0 0
2/1/4 Designated Forwarding 20000 128 P2P 84464 0 0 0
lag1 Alternate Blocking 2000 64 P2P 10 3534 5 13
lag2 Root Forwarding 2000 64 P2P 9 634 2 4
Core-1
Core-1(config)# write memory
Copying configuration: [Success]
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches’ configuration as a custom checkpoint called Lab6-1_final.
Access-1
Access-VSF(config)# copy running-config checkpoint Lab6-1_final
Copying configuration: [Success]
Note that you need to create a single checkpoint for Access-1 and Access-2 as they
now behave as a single logical switch.
Core-1
Core-1(config)# copy running-config checkpoint Lab6-1_final
Copying configuration: [Success]
Core-2
Core-2(config)# copy running-config checkpoint Lab6-1_final
Copying configuration: [Success]
Lab 6.2: Configure an HPE Aruba Networking Virtual Switching eXtension environment
The BigStartup management team was amazed by the improvements in redundancy, performance, and
simplicity VSF and LAGs added to the network. In order to improve network availability and redun-
dancy, you have proposed to BigStartup to implement HPE Aruba Networking Virtual Switching eXten-
sion (VSX) on core switches, allowing the virtualization of the Layer 2 forwarding plane for distributed
link aggregation. It will also allow the implementation of redundancy features such as Active Gateway.
BigStartup accepted your proposal.
A senior network engineer has provided you with the configuration template you should use.
VSX allows the virtualization of a switch pair. This solution lets the switches present as one
virtualized switch in critical areas. Through the virtualization of the control plane of two
switches, they function as one device at Layer 2 and as independent devices at Layer 3.
From a datapath perspective, each device does an independent forwarding lookup to
decide how to handle the traffic. Some forwarding databases, such as MAC and ARP tables,
are synchronized between the two devices using a proprietary VSX control plane. Some of
the forwarding databases are built independently by each switch.
VSX implementation is covered in detail in the professional-level switching course.
Objectives
After completing this lab, you will be able to:
n Configure the Inter-Switch Link (ISL).
n Configure VSX Sync.
n Configure VSX keepalive.
Lab topology
The following lab topology will be used for your practical activities:
Lab 6.2: Configure an HPE Aruba Networking Virtual Switching eXtension environment 171
Task 6.2-1: Configure VSX
Objectives
In this task, you will configure the VSX between Core-1 and Core-2.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Launch a remote console to Core-1.
4. Verify LAG 256, created in the previous lab.
Core-1# configure terminal
Core-1(config)# show lacp interfaces
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Allowing all VLANs in a trunk is only recommended between a VSX pair of switches.
On uplink, the best practice is to allow only VLANs required on that link.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
10. Using the Remote Lab dashboard, connect to the Core-2 console.
11. Configure VSX on Core-2.
Core-2(config)# vsx
Core-2(config-vsx)# system-mac 02:01:00:00:00:01
Core-2(config-vsx)# inter-switch-link lag 256
Core-2(config-vsx)# role secondary
Core-2(config-vsx)# exit
Core-2(config)# virtual-mac 02:01:00:00:00:01
Switch roles
Each VSX switch must be configured with a role—primary or secondary. The roles do
not indicate which device is forwarding traffic at a given time as VSX is an active-
active forwarding solution. The roles are used to determine which device stays active
when there is a VSX split, such as when the ISL goes down, and for determining the
15. Navigate to the Core-2 console and check if the configuration sync command was auto-
matically added.
Core-2(config)# show running-config | begin vsx
vsx
system-mac 02:01:00:00:00:01
inter-switch-link lag 256
role secondary
vsx-sync stp-global vsx-global
!
!
https-server vrf mgmt
VSX keepalive
Keepalive is a Layer 3 interface that is used to exchange heartbeats between VSX peer switches.
The heartbeats are exchanged by using the User Datagram Protocol (UDP) and port 7678
(default). During an ISL failure, VSX switches use their keepalive connection to determine if both
VSX switches are up and running. This configuration helps the VSX switches find alternative
paths to the ISL link in the network so the two VSX switches can continue to stay in sync.
Configure each VSX peer switch with a keepalive connection to the other VSX peer switch. This
connection is established over a routed network (IPv4 currently) and is not required to be a ded-
icated peer-to-peer link unlike ISL. Keepalive packets are UDP-based.
Notice that, by default, any packet leaving the switch will be transmitted by the
"default VRF." To transmit a ping using the KA VRF, the vrf KA command needs to be
appended to the ping command.
20. Navigate to the Core-1 console and configure the VSX keepalive.
Core-1(config)# vsx
Core-1(config-vsx)# keepalive peer 10.1.15.2 source 10.1.15.1 vrf KA
Core-1(config-vsx)# exit
21. Navigate to the Core-2 console and configure the VSX keepalive.
Core-2(config)# vsx
Core-2(config-vsx)# keepalive peer 10.1.15.1 source 10.1.15.2 vrf KA
Core-2(config-vsx)# exit
Now both switches are using interface 1/1/47 and VRF KA for keepalive. If ISL inter-
faces go down but both switches remain up, switches will be able to avoid a split
brain.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Launch a remote console to Core-1.
You cannot change the mode of a multichassis LAG without removing the mul-
tichassis LAG first. To change a preexisting VSX LAG to a static VSX LAG, first
remove the VSX LAG with the no interface lag <LAG-ID> command. Then, enter
the interface lag <LAG-ID> multichassis static command.
Notice that the same LAG ID should be used for multichassis (VSX) LAGs on both
VSX switches.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
Note that all interfaces are up and running and state flags shows LAG 1 as healthy.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Notice that LAG 1 is not active (notice the "LACP-block" state, meaning that LACP
detected an inconsistency and blocked the ports to avoid a loop. This is correct
because the access VSF has two LAGs now pointing to Core-1 and another one to
Core-2.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Compare the output with the output you received on Core-1 when using the vsx-
peer command. The outputs are the same.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
Notice that all interfaces are now active. Now, logically, the topology has no loops or
blocked links since it simulates two switches with a single (virtual) logic connection.
Logical view
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current core and Access-1 switches’ configurations as a custom checkpoint called
Lab6-2_final.
Core-1
Core-1(config)# copy running-config checkpoint Lab6-2_final
Copying configuration: [Success]
Core-2
Core-2(config)# copy running-config checkpoint Lab6-2_final
Copying configuration: [Success]
Access-1
Access-VSF(config)# copy running-config checkpoint Lab6-2_final
Copying configuration: [Success]
In order to break this loop, the only alternative is to invoke the recovery mode by pressing
the Ctrl+c key sequence, taking the members into recovery mode.
**********************************************************************
WARNING! Entering emergency support login mode. This mode is for
support use only and the system will not be fully operational.
The system must be rebooted to restore full operation.
**********************************************************************
T11-Access-VSF login: admin
Password:
recovery#
In such cases, you have to recover the conductor and "reboot" the member. Otherwise, you
would have to set the switches into factory default using the vsf-factory-reset recovery
context command and configure them all over again.
recovery# ?
boot Reboot all or part of the system; configure default
bootparameters
copy Copy data or files to/from the switch
erase Erase device information or files
exit Exit current mode and change to previous mode
list Print command list
show Show running system information
start-shell Start Bash shell
vsf-factory-reset Clear all VSF configurations and boot as the primaryswitch
recovery#
In this lab, you will assign the standby role to Member 2 and simulate a failure on Member 1.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Open a console session to Access-1.
4. Assign the standby member role. Member 2 will reboot.
Access-VSF(config)# vsf secondary-member 2
This will save the configuration and reboot the specified switch.
Do you want to continue (y/n)? y
6. You will now simulate a failure on Access-1 by rebooting it. Access-2 should assume the Con-
ductor role. Reboot Access-1.
7. Navigate to the Access-2 console and log in. Enter the show vsf command.
Access-VSF# show vsf
Answer: Standalone.
What is the status of the fragment?
Answer: Conductor.
First, notice that the Access-2 console is now operational. At the end of Lab 6.1, it
was restricted to a small set of commands due to its "member" state in the VSF stack.
Notice that Member 1's status is not present, and Access-2 is now the Conductor
switch for the stack.
Answer: Standby.
9. Issue the vsf switchover command for restoring the conductor role to Member 1 as the con-
ductor switch.
Access-VSF# vsf switchover
This will cause an immediate switchover to the standby
and the conductor will reboot.
Do you want to continue (y/n)? y
10. Move to the Access-1 console. You will see that due to the "switchover" event, any previous con-
sole session that Member 1 had was closed and you will have to log in again.
5. Navigate to the Access-1 console and disable the physical port of the VSF link. This will trigger a
split brain event.
Access-VSF# configure terminal
Access-VSF(config)# interface 1/1/28
Access-VSF(config-if-vsf)# shutdown
This may cause the stack to split.
Continue (y/n)? y
8. Navigate to the Access-2 console, log in, and check the VSF status.
Note that Access-2 has the Conductor role and marked Access-1 as Not Present. This
means that both switches—Access-1 and Access-2, believed to be the Conductor
switches—keep their interfaces up, including LAG 1.
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
10. Verify the Core-2 LACP interfaces by appending vsx-peer to the command.
Core-1# show lacp interfaces vsx-peer
State abbreviations :
A - Active P - Passive F - Aggregable I - Individual
S - Short-timeout L - Long-timeout N - InSync O - OutofSync
C - Collecting D - Distributing
X - State m/c expired E - Default neighbor state
As you may see in the outputs, LAG 1 is active on both core switches as well on
access switches.
The problem you are experiencing is a result of having two stack fragments (Member
1 and Member 2) both acting as conductors and using not only the same con-
figuration, but also the same Layer 3 and Layer 2 addressing. Therefore, they are
sending identical LACP data units on the interfaces that are configured to be part of
the same LAG.
Since the core switches receive these incoming LACP data units as normal, they are
not aware of any failure and maintain their LAGs and forward traffic across them as
usual, based on the source and destination IP addresses.
Depending on what hash result the core switches calculate for each of the pings, the
traffic path could use a link to any of the four links.
The problem arises when one of the core switches receives a packet. Instead of send-
ing it straight to the access switch where the destination resides, it sends the packet
to the wrong switch as a result of the hashing algorithm. For example, if sending a
packet to PC1 through the Access-2 switch, then Access-2, not having any physical
connection to PC1, has no option but to drop the packet.
Although some traffic flows might work, many others will not. The unpredictable
nature of this outcome makes the network unusable when split brain takes place.
If your connectivity test from PC4 to PC1 is still working successfully, then it is likely
that the behavior explained previously is taking place on another of your pings.
13. Navigate back to the Access-2 console connection. You will notice the member switch will reboot
as part of the re-merge process.
Access-VSF#
Apr 29 21:56:22 vsfd[835]: RebootLibPh1: Reboot reason: Reboot of Member ID 2,
Lost merge
Split detection
Now you will enable management-port-based, split brain detection. When this feature is enabled,
the conductor and standby member will exchange broadcast-based heartbeats when they sense
a failure in the VSF links. If the standby member does not receive any of these messages, then it
concludes that the conductor itself has failed, not just the VSF links. Therefore, it keeps working
as normal. However, if the conductor is alive and continues to advertise split detect messages,
then the standby member’s fragment changes its status to Inactive and disables all its ports
except the management and VSF interfaces. This isolates it from the rest of the network and pre-
vents the cores from sending traffic to it.
Although this behavior will affect every endpoint connected to the inactive fragment, those con-
nected to the active one will not have any connection loss and will always be able to establish
connections with any destination in the network, with the exception of clients connected directly
to the inactive fragment.
14. Move back to the Access-1 console.
15. Enable split-detection.
T11-Access-VSF(config)# vsf split-detect mgmt
16. Enter the show vsf command and confirm Split Detection Method is mgmt.
Access-VSF(config)# show vsf
Continue (y/n)? y
Answer: Conductor.
What is the status of Member 2?
Answer: When a split brain is detected, segments where the conductor is not present will disable
its interfaces to avoid a split brain from happening.
23. Wait a couple of minutes for Access-2 to reboot, and verify that it has joined the stack again.
Access-VSF(config)# show vsf
2. Back up the current access switches’ configuration as a custom checkpoint called Lab6-3_final.
Access-1
Access-VSF(config)# copy running-config checkpoint Lab6-3_final
Copying configuration: [Success]
--------------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
--------------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default 1/1/3-1/1/44,1/1/48-1/1/56,
lag256
11 Employees up ok static lag1,lag256
12 Managers up ok static lag1,lag256
VRF: default
Answer: Four.
If you have not created any routes, why do you have four routes?
Four prefixes are published in the routing table after assigning the IP addresses.
They were automatically created as connected networks, meaning that the local
switch has interfaces connected to those networks. Remember that routing is
enabled by default on AOS-CX switches.
The routes with prefix length 32 are considered local and reference the IP addresses
just configured in the SVIs.
The /24 prefixes are the connected subnets discovered from having an interface with
an IP in those segments.
IP prefixes are expressed using the following format:
PREFIX/PREFIX_LENGTH, vrf VRF_NAME
via OUTBOUND_INTERFACE, [DISTANCE/METRIC], ROUTING_PROCESS
Notice: they all contain vrf "default." VRF stands for Virtual Routing and Forwarding,
the control plane virtual routing table the system uses to move traffic at Layer 3 in
the data plane. AOS-CX has two built-in VRFs: mgmt for management traffic and
default for data traffic. You will learn more about VRF in the upcoming modules.
Notice that your VMs have no gateway configured. Gateways are used to reach other
networks and subnets.
14. Start a ping to Core-1 SVI 11 (10.1.11.1). The ping should succeed.
15. Now try to ping PC3 (10.1.11.103). The ping should fail.
Answer: As you observed, PC4 was able to ping SVI 11, which resides on VLAN 11—the same
VLAN PC3 is connected to.
This is happening because PC3 has no gateway address, meaning PC4 knows how to reach PC3.
As you have tested using Core-1 as a gateway, PC4 was even able to ping VLAN 11. But PC3 has
no routes on how to answer that request to PC4, which is connected to another network (VLAN
12).
16. Repeat step 12 on PC3 and configure 10.1.11.1 as the default gateway address.
19. Navigate to the PC3 remote desktop, open a command prompt, and start a ping to PC1
(10.1.12.101) and PC4 (10.1.12.104). The ping should succeed.
8. Run the arp -d command to flush the ARP table in the host.
9. Run the arp -a command to display the ARP table in the host.
You will see gratuitous ARP messages coming from 10.1.12.1 (Core-1).
15. Start Wireshark, monitoring LAB NIC, and apply a filter looking for 10.1.12.104 (PC4). Filter: (arp
&& not arp.isgratuitous) || ip.addr == 10.1.12.104.
16. Run a custom ping on the command prompt using the following command: ping -n 1
10.1.12.104. This command will trigger a single ICMP echo towards PC4’s IP address.
18. To begin the analysis, keep in mind what devices are involved in the packet forwarding. Use the
following topology for reference.
Packets might be in a different order because there are limited resources assigned to
client VMs. Nonetheless, the following explanation should help you know the order in
which packets are sent.
Answer: This information varies on each VM. Find your local value on Wireshark. In this example,
the source MAC address is 00:50:56:b1:18:2e.
What is the Ethertype value?
The destination MAC is all Fs, which is the broadcast MAC address, while the source
is PC3’s MAC address. The Ethertype value is 0x0806 or ARP. This alerts the Layer 2
process to what kind of protocol or header comes next.
In Ethernet encapsulation, the destination MAC address is one of the first values in
the packet. This helps the Layer 2 switch start the forwarding decision and pro-
cessing of the frame as soon as it ingresses on the inbound port. This drastically
enhances the throughput of the device.
21. Expand and select the third row (ARP Payload). This is an ARP request.
Answer: It depends on your local environment. In this example the sender MAC is:
00:50:56:b1:18:e2
Who do they belong to?
Answer:PC3
What are the target MAC and IP addresses?
Answer: The target IP is: 10.1.11.1. The MAC address is: 00:00:00:00:00:00
Why is the MAC address all zeros?
The destination of the packet is not a local segment (10.1.11.103). Therefore, PC3
cannot reach it directly using Layer 2 but needs to send it to the default gateway
(10.1.11.1). The default gateway will take the packet and route it out using Layer 3.
In the ARP header, what are the sender MAC and IP addresses?
23. Select the echo (ping) request entry (frame #6 in the following figure), then expand the IP and
ICMP headers.
Why are the Layer 2 and Layer 3 source addresses the same device, while the Layer 2 and
Layer 3 destination addresses are different devices?
Time to Live is the maximum number of Layer 3 boundaries the packet will be able to
cross before getting dropped.
PC4
24. Move to PC4.
25. In Wireshark, select the packet where its destination equals "Broadcast" and expand the Address
Resolution Protocol row in the Packet Details section.
26. Select the ARP reply from PC4 to Core-2 (frame #3 in the following figure).
When PC4 generates the ARP reply, this goes to Core-1. Core-1 updates its ARP table and is
ready to deliver the ICMP echo message.
27. Select the ICMP echo message (frame #4 in the following figure), and focus on the Layer 2 and
Layer 3 addresses.
28. Select the second ARP request and inspect its contents.
Before replying, PC4 (as Core-1 and PC3 before it) needs to add its gateway MAC
address to its ARP table. That triggers the ARP request seen in this image. In entry
number 8, PC4 gets an ARP reply back from Core-1.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Using the Remote Lab dashboard, open a console connection to PC4.
4. Launch a command prompt and start a continuous ping to PC3 (10.1.11.103). The ping should
be successful.
6. Navigate back to PC4 and notice that the pings are failing, even though there are alternative
paths between PC4 and PC3.
7. Wait for Core-1 to become active again. The ping should start to work again.
8. To start the VSX active gateway configuration, you will start by adding IP interfaces to Core-2.
9. Connect to the Core-2 console and add the IP address to interface VLAN 11 and 12.
Core-2# configure terminal
Core-2(config)# interface vlan 11
Core-2(config-if-vlan)# ip addres 10.1.11.2/24
10. To simulate a failed switch, navigate back to the Core-1 console and reboot the switch.
Core-1(config)# boot system
Checking if the configuration needs to be saved...
11. Navigate to the PC4 remote desktop. Is the ping still working?
Why is the ping failing, even though you have a redundant Layer 3 switch available?
Answer: PC4 points at the Core-1 IP address as the default gateway; therefore, it has no external
connectivity while Core-1 is unreachable.
12. Stop the ping and enter the ipconfig command. Check the Lab NIC interface gateway.
Note that PC3 and PC4 point to the Core-1 IP address as the default gateway, which
means that, in case of Core-1 failure, they lose access to other networks. Also, notice
that, even though there is an alternative path, hosts cannot detect a gateway failure
and converge to a secondary gateway.
14. To provide gateway redundancy, HPE has developed the VSX active gateway feature. This fea-
ture allows both switches in a VSX pair to use the same virtual IP address and MAC address to
actively route host traffic, bringing not only redundancy but also load balance.
15. Navigate to the Core-1 console and configure active gateway for VLANs 11 and 12 as follows.
Core-1# configure terminal
Core-1(config)# interface vlan 11
Core-1(config-if-vlan)# active-gateway ip 10.1.11.254 mac 02:01:00:00:00:01
Core-1(config-if-vlan)# interface vlan 12
Notice that both VLANs use the same virtual MAC address, which is the same as the
switch's virtual-mac. This is a best practice that saves switch resources on running
multiple virtual MAC addresses.
16. Navigate to the Core-2 console and configure active gateway for VLANs 11 and 12 as follows.
Core-2(config)# interface vlan 11
Core-2(config-if-vlan)# active-gateway ip 10.1.11.254 mac 02:01:00:00:00:01
Core-2(config-if-vlan)# interface vlan 12
Core-2(config-if-vlan)# active-gateway ip 10.1.12.254 mac 02:01:00:00:00:01
Core-2(config-if-vlan)# exit
Notice that both switches use the same active gateway IP and MAC address. It helps
the client devices as they do not need to change their ARP table to point to a sec-
ondary/redundant gateway.
17. Change the PC3 gateway to VLAN 11's active gateway IP address (10.1.11.254).
18. Change the PC4 gateway to VLAN 12's active gateway IP address (10.1.12.254).
20. Connect to the Core-1 console, save the configuration, and reboot the switch.
Core-1(config)# write memory
Core-1(config)# boot system
Checking if the configuration needs to be saved...
21. Navigate back to PC4; the ping should work normaly during Core-1's reboot.
22. Wait for Core-1 to reboot and become active, then save the configuration and reboot Core-2.
Core-2(config)# write memory
Copying configuration: [Success]
Core-2(config)# boot system
Checking if the configuration needs to be saved...
As PC3 and PC4 point to the active gateway's virtual IP, a failed switch does not dis-
rupt the gateway services for hosts.
24. As you may note, no ping was lost during Core-1 or Core-2 reboot due to the VSX active gateway
technology.
Note that VSX is an advanced feature covered in detail in the Implementing AOS-CX
Switching course.
Core-1
Core-1(config)# write memory
Copying configuration: [Success]
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches’ configuration as a custom checkpoint called Lab7-1_final.
Access-1
No checkpoint is needed as no changes were made.
Core-1
Core-1(config)# copy running-config checkpoint Lab7-1_final
Copying configuration: [Success]
Core-2
Lab topology
The following lab topology will be used for your practical activities:
AOS-CX switches support port operation in routing or bridging mode. In this step,
you are using a routed port, as you have a single L3 connection between Router-A
and Core-1. By entering the routing command, you set the interface to act as a
routed (Layer 3) interface. Use the no routing command to configure an interface as
a bridged interface.
7. Test the connectivity from Core-1 to Router-A. The ping should succeed.
Core-1(config)# ping 10.1.250.1
PING 10.1.250.1 (10.1.250.1) 100(128) bytes of data.
108 bytes from 10.1.250.1: icmp_seq=1 ttl=64 time=1.64 ms
108 bytes from 10.1.250.1: icmp_seq=2 ttl=64 time=1.92 ms
108 bytes from 10.1.250.1: icmp_seq=3 ttl=64 time=1.71 ms
108 bytes from 10.1.250.1: icmp_seq=4 ttl=64 time=1.60 ms
108 bytes from 10.1.250.1: icmp_seq=5 ttl=64 time=1.78 ms
10. Configure interface 1/1/7 as a routed port and assign IP address 10.1.250.6/30.
Core-2(config-if)# routing
Core-2(config-if)# ip address 10.1.250.6/30
Core-2(config-if)# exit
11. Test the connectivity from Core-2 to Router-B. The ping should succeed.
Core-2(config)# ping 10.1.250.5
PING 10.1.250.1 (10.1.250.1) 100(128) bytes of data.
108 bytes from 10.1.250.5: icmp_seq=1 ttl=64 time=1.64 ms
108 bytes from 10.1.250.5: icmp_seq=2 ttl=64 time=1.92 ms
108 bytes from 10.1.250.5: icmp_seq=3 ttl=64 time=1.71 ms
108 bytes from 10.1.250.5: icmp_seq=4 ttl=64 time=1.60 ms
108 bytes from 10.1.250.5: icmp_seq=5 ttl=64 time=1.78 ms
5. Use the show ip route command and validate the route is listed.
Core-1(config)# show ip route
VRF: default
Answer: 1
What is the distance value and what is it for?
Answer: 0
Administrative distance: The routing switch uses this parameter to compare routes
Lab 8: Static routes
learned by different routing methods. It indicates how reliable the router considers
the method through which it discovered the route; a lower value indicates a more
trustworthy route. Administrative distance is not a factor if you are using only static
6. Ping the 8.8.8.8 IP address to test access to the internet. The ping should be successful.
Core-1(config)# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 100(128) bytes of data.
108 bytes from 8.8.8.8: icmp_seq=1 ttl=64 time=0.042 ms
108 bytes from 8.8.8.8: icmp_seq=2 ttl=64 time=0.047 ms
108 bytes from 8.8.8.8: icmp_seq=3 ttl=64 time=0.046 ms
108 bytes from 8.8.8.8: icmp_seq=4 ttl=64 time=0.047 ms
108 bytes from 8.8.8.8: icmp_seq=5 ttl=64 time=0.045 ms
Since there is no prefix in the routing table for the 8.8.8.8 IP address, what prefix is taking care of
routing this traffic?
Remote labs do not have access to the internet. We are using a couple of loopback
interfaces on Router-C to simulate external networks. Therefore, pinging to another
IP address from the internet will not work.
VRF: default
Even though Core-1 and Core-2 are part of a VSX pair, the management and control
planes are independent on both switches. This means that each device has its own
configuration. It provides VSX flexibility and improved resiliency. Configuration syn-
chronization can be manually enabled on a feature-by-feature basis; VSX is explained
in detail in the Implementing AOS-CX Switching course.
10. Use the show ip route command and validate the route is listed.
Core-2(config)# show ip route
VRF: default
11. Ping the 8.8.8.8 IP address to test access to the internet. The ping should be successful.
Core-2(config)# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 100(128) bytes of data.
108 bytes from 8.8.8.8: icmp_seq=1 ttl=64 time=0.039 ms
108 bytes from 8.8.8.8: icmp_seq=2 ttl=64 time=0.044 ms
108 bytes from 8.8.8.8: icmp_seq=3 ttl=64 time=0.038 ms
108 bytes from 8.8.8.8: icmp_seq=4 ttl=64 time=0.042 ms
108 bytes from 8.8.8.8: icmp_seq=5 ttl=64 time=0.042 ms
12. Navigate to the PC3 console and open the command prompt.
13. Ping the 8.8.8.8 IP address.
In the following steps, you will pretend to be the internet router administrator and
add return routes to Router-A and Router-B. Notice that, for simplicity, remote labs
use two virtual AOS-CX switches to mimic routers.
14. Using the remote lab interface, connect to Router-A. Log in using the following credentials:
n Username: admin
n Password: Aruba123!
15. Configure the missing static route: 10.1.0.0/16 via 10.1.250.2.
Router-A# configure terminal
Router-A(config)# ip route 10.1.0.0/16 10.1.250.2 bfd
You will learn more about Bidirectional Forwarding Detection (BFD) in the next task.
16. Using the remote lab interface, connect to Router-B. Log in using the following credentials:
n Username: admin
n Password: Aruba123!
17. Configure the missing static route: 10.1.0.0/16 via 10.1.250.2.
Router-B# configure terminal
Router-B(config)# ip route 10.1.0.0/16 10.1.250.6 bfd
18. Navigate back to PC3 and start a ping to 8.8.8.8. The ping should succeed.
Due to the utilization of link aggregation between the access switches stacked with VSF and the
core switches, any link could be used to transport the ping packets from PC3 to the core layer.
Also, due to the use of VSX active gateway, the core switch that receives the traffic will route it
forward. The combination creates a highly available and redundant environment. You will now
find which core switch is routing packets from PC3 to 8.8.8.8 and simulate an internet link failure.
3. Open a console connection to Core-1 and disable port 1/1/7.
Core-1 login: admin
Password:
Last login: 2024-05-13 12:52:39 from the console
User "admin" has logged in 7 times in the past 30 days
Core-1# configure terminal
Core-1(config)# interface 1/1/7
Lab 8: Static routes
Core-1(config-if)# shutdown
Notice that, even though you have a redundant connection, the communication was
broken since each core switch has no alternative route in case the default route to
the internet fails.
As the name suggests, static routes are static and not aware of changes in the net-
work. They are only removed/disabled when the interface used to reach the next hop
or the exit interface goes down. To create redundancy using static routes, you may
create a floating static route, which is a second route using another next hop or exit
interface and a higher administrative distance. This way, if the primary route fails, it
will be deactivated, and the second route will take place.
Since you have not added VLAN 10 to any port, how are Core-1 and Core-2 able to ping their
respective VLAN 10 addresses?
Lab 8: Static routes
Answer: VLAN 10 was automatically permitted on LAG 256 as it was configured to allow all
VLANs.
-----------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-----------------------------------------------------------------------
10 VLAN10 up ok static lag256
9. Navigate back to Core-1 and create a floating default route pointing to Core-2 (10.1.10.2).
Core-1(config)# ip route 0.0.0.0/0 10.1.10.2 distance 10
10. Navigate to Core-2 and create a floating default route pointing to Core-1 (10.1.10.1).
Core-2(config)# ip route 0.0.0.0/0 10.1.10.1 distance 10
Creating identical routes on two Layer 3 devices pointing to each other may lead to
Layer 3 loops. In our scenario, that would occur if both ISP links go down. In this
unlikely case, if Core-1 receives traffic to the internet, it would use Core-2 as the next
hop. Core-2, in the absence of its main internet link, would then send traffic back to
Core-1, which would repeat the same process over and over.
Although there is a built-in Layer 3 loop attenuation mechanism in the IP header,
Time to Live (TTL), monitoring the validity of the floating route through Service
Level Agreements* (SLAs)-based tracking is always recommended in order to pre-
vent this issue from happening. Otherwise, loop packets would consume data plane
resources before they die.
11. Verify the routing table of the core switch where you have interface 1/1/7 disabled.
Core-X(config)# show ip route
VRF: default
The use of static floating routes is helpful for small environments with just a few
routes. In larger environments, dynamic IP routing protocols such as OSPF are recom-
mended. As an alternative to floating routes, you can combine static routes with
either BGP conditional advertisement or IGP default route injection. This approach
prevents Layer 3 loops entirely. You will examine the IGP default route injection
approach in the next lab.
13. Navigate to the core switch where you have interface 1/1/7 disabled, and enable interface 1/1/7.
Core-X(config)# interface 1/1/7
Core-X(config-if)# no shutdown
Core-X(config-if)# exit
Core-X(config)# show interface brief | include 1/1/7
1/1/7 -- routed 1G-BT yes up
1000 --
VRF: default
Answer: The routing table only shows the active routes. Since the routes to Router-A and
Router-B have better distances, they are active, and therefore, they are displayed in the show ip
route output.
Only the optimal routes are imported to the switch routing table. As the route
through Core-2 has a higher administrative cost, it is not loaded to the routing table
until no other route to the same destination and with a better administrative distance
is available.
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches’ configuration as a custom checkpoint called Lab8_final.
Access-1
No checkpoint is needed as no changes were made.
Core-1
Core-1(config)# copy running-config checkpoint Lab8_final
Copying configuration: [Success]
Core-2
Core-2(config)# copy running-config checkpoint Lab8_final
Copying configuration: [Success]
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Using the Remote Lab dashboard, open a console connection to Core-1.
4. Create a loopback interface.
Core-1 login: admin
Password:
Last login: 2024-05-16 15:22:24 from the console
User "admin" has logged in 10 times in the past 30 days
Core-1# configure terminal
At this point, OSPF is up and running in Core-1. However, it is not sending hello mes-
sages yet because you have not enabled it on any interfaces. You will now enable it
on the link to Core-2.
Area : 0.0.0.0
----------------
Area Type : NormalStatus : Active
Total Interfaces : 1 Active Interfaces : 1
Passive Interfaces : 0 Loopback Interfaces : 0
SPF Calculation Count : 3
Area ranges :
Number of LSAs : 1 Checksum Sum : 17789
Answer: 10.1.1.1.
What is the state of the protocol?
Answer: Enabled.
How many areas are created and what is the area ID?
Answer: One.
What LSA type do you think it is?
Right now, Core-1 is sending hello messages out of Interface VLAN 10; however,
there is no other OSPF router on that segment yet. You will proceed to deploy the
counterpart on Core-2.
10. Using the Remote Lab dashboard, open a console connection to Core-2.
11. Create a loopback interface.
15. For more details on the neighbor, enter the show ip ospf neighbor detail command.
Core-2(config)# show ip ospf neighbors detail
VRF : default Process : 1
---------------------------------------------------------
Answer: Full
Answer: Core-1 was configured first, therefore it won the election as DR. When Core-2 joined,
since there was a DR already, it was elected the BDR.
In an OSPF network having two or more routers, one router is elected to serve as the
DR and another router to act as the BDR. All other routers in the area forward their
routing information to the DR and BDR, and the DR forwards this information to all
routers in the network. This action minimizes the amount of repetitive information
that is forwarded on the network by eliminating the need for each individual router in
the area to forward its routing information to all other routers in the network. If the
area includes multiple networks, each network elects its own DR and BDR.
In an OSPF network with no DR and no BDR, the neighboring router with the highest
priority is elected the DR, and the router with the next highest priority is elected the
BDR. If the DR goes off-line, the BDR automatically becomes the DR, and the router
with the next highest priority then becomes the new BDR. If multiple routing switches
on the same OSPF network are declaring themselves DRs, both priority and router ID
are used to select the DR and BDRs.
Priority is configurable using the ip ospf priority command at the interface level.
If two neighbors share the same priority, the router with the highest router ID is elec-
ted as the DR. The router with the next highest router ID is elected as the BDR.
Answer: 10.1.10.1.
Who created those LSAs?
Answer: Yes.
In order to confirm if they are the same version, you have to compare the LSID and
sequence number.
Right now, only one link is contained within the router LSA (10.1.10.0/30).
Answer: Yes.
Who?
10. Test Core-2 to Server Switch communication. The ping should work.
Core-2(config)# ping 10.1.250.14
PING 10.1.250.14 (10.1.250.14) 100(128) bytes of data.
108 bytes from 10.1.250.14: icmp_seq=1 ttl=64 time=13.3 ms
108 bytes from 10.1.250.14: icmp_seq=2 ttl=64 time=1.99 ms
108 bytes from 10.1.250.14: icmp_seq=3 ttl=64 time=2.04 ms
108 bytes from 10.1.250.14: icmp_seq=4 ttl=64 time=1.95 ms
108 bytes from 10.1.250.14: icmp_seq=5 ttl=64 time=1.86 ms
Answer: One.
Is there any device missing?
By looking at the configuration, it seems everything is in order. You will most likely
have to look at packet statistics in order to see what packets are being exchanged
between Core-2 and Server Switch.
Answer: The number of packets on your output may vary depending on how long it took you to
enter the show command. In the example, five hello packets were received.
Has Core-2 dropped any hello packets?
Answer: Yes.
Why?
Answer: Core-2 has dropped hello packets because of a hello interval mismatch. Although you
know Core-2 is running the default value of 10 seconds, you are not certain what interval value
Server Switch is using. You will have to run debugs in order to find out.
15. Clear the debug buffers.
Core-2(config)# clear debug buffer
Core-2(config)#
16. Display the ospfv2 debugs stored in buffers. This debug is on by default.
Core-2(config)# show debug buffer module ospfv2 | begin 10.1.1.3
2024-05-17:13:59:08.324847|hpe-routing|LOG_ERR|AMM|-|OSPFV2|OSPFv2_PACKET|OSPF
268698624 Hello packet with mismatched hello interval received from router
10.1.1.3.
2024-05-17:13:59:08.324869|hpe-routing|LOG_ERR|AMM|-|OSPFV2|OSPFv2_PACKET|My Hello
Interval = 10
2024-05-17:13:59:08.324884|hpe-routing|LOG_ERR|AMM|-|OSPFV2|OSPFv2_
PACKET|Neighboring Hello Interval = 20
2024-05-17:13:59:08.324900|hpe-routing|LOG_ERR|AMM|-|OSPFV2|OSPFv2_PACKET|(End of
Packet, OSPFv2 process Id = 1, VRF Name = default)
Answer: Debug output shows mismatched hello packets are being received.
Is there any complaint about contents in hello messages?
Answer: The hello timer on received packets is configured for 20 seconds, while the local hello
timer is configured for 10 seconds.
17. To connect to the server switch, you will use PC1. Using the Remote Lab dashboard, launch a
remote desktop connection to PC1.
18. Launch PuTTY using the icon in the desktop area.
19. Select the Server Switch session, click Load, and then click Open.
Authentication : No Passive : No
Answer: 20 seconds.
22. Decrease the hello interval from 20 to 10 seconds on interface 1/1/2.
ServerSwitch# configure terminal
ServerSwitch(config)# interface 1/1/2
ServerSwitch(config-if)# ip ospf hello-interval 10
ServerSwitch(config-if)# exit
Answer: Yes.
VRF: default
Right now, core switches have each other and have Server Switch as a neighbor.
Therefore, they should be receiving link state updates that include the server’s seg-
ment.
Answer: Server Switch (10.1.250.14) is the next hop for 10.1.1.3/32 and 10.254.1.0/24, its loop-
back and the servers’ segment respectively.
What are the administrative distance and metric for those segments?
Answer: For 10.1.1.3, administrative distance = 110, metric = 100. For 10.254.1.0/24, admin-
istrative distance = 110, metric = 200.
VRF: default
What is the next-hop IP address for those networks learned from the server switch?
Based on the outputs, both cores are using their direct link to the server switch to
reach segments that are beyond it.
This also means that traffic arriving on Core-1 to be routed to the server switch will
be forwarded using Core-1 interface 1/1/8, and traffic arriving on Core-2 to be
routed to the server switch will be forwarded using Core-2 interface 1/1/8.
30. Ping the Windows server IP address (10.254.1.21). The ping should be successful.
Core-1(config)# ping 10.254.1.21
PING 10.254.1.21 (10.254.1.21) 100(128) bytes of data.
108 bytes from 10.254.1.21: icmp_seq=1 ttl=127 time=6.73 ms
108 bytes from 10.254.1.21: icmp_seq=2 ttl=127 time=2.02 ms
108 bytes from 10.254.1.21: icmp_seq=3 ttl=127 time=2.11 ms
108 bytes from 10.254.1.21: icmp_seq=4 ttl=127 time=1.59 ms
108 bytes from 10.254.1.21: icmp_seq=5 ttl=127 time=2.29 ms
Answer: No.
33. Run a traceroute towards the Windows server.
Was it successful?
Answer: No.
Why?
Answer: Traffic is failing for the same reason the first test to the internet failed in the previous
lab. Communications are bidirectional; it is not enough to know how to reach the remote
destination, but is also necessary that the other end knows how to send the replies back.
Advertising the loopback interface, which is also used as the router ID, is considered
a best practice. It allows network administrators to easily reach a remote router
without needing to remember each interface's IP address.
Answer: Three.
Who do they belong to?
Answer: Core-1 is currently advertising five networks corresponding to: Interface VLAN 10, 11,
and 12, Interface 1/1/8, and Loopback 0.
7. Confirm segments 10.1.11.0/24 and 10.2.12.0/24 are now part of the OSPF routing process.
Core-1(config)# show ip ospf routes
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
10. Click Lab NIC under Access type: Connections. A new window will pop up.
12. In the Lab NIC Properties section, select Internet Protocol Version 4 (TCP/IPv4), then click
Properties.
.
What connection-specific DNS sufix did you get?
Answer: 10.254.1.21.
What IP address and subnet mask did you get?
Answer: 255.255.255.0.
What IPv4 address was assigned to PC3?
Answer: 10.1.11.103.
18. Click Close.
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches’ configuration as a custom checkpoint called Lab9-1-final.
Core-1
Core-1(config)# copy running-config checkpoint Lab9-1-final
Copying configuration: [Success]
Core-2
Core-2(config)# copy running-config checkpoint Lab9-1-final
Copying configuration: [Success]
5. Write down the costs for these four interfaces in Figure 9.2-1.
The only missing link cost is the Server segment. However, you were told that cost is
25.
This information can be used to predict traffic paths. For Core-2, there are two
options for reaching the servers: the path via Core-1 with a total cost of 225
(100+100+25) or the path through Server Switch with a total cost of 125 (100+25).
When running OSPF, if there are two paths of the same type (intra-area OSPF in this
case), the one with the lowest cost is preferred and published in both the OSPF rout-
ing table and also in the VRF (or global) routing table. Therefore, Core-2 uses the
server switch interface 1/1/2 (10.1.250.114) as its next hop.
Core-2(config)# show ip route ospf
VRF: default
Server Switch, on the other hand, has two options for reaching VLANs 11 and 12. It
can use Core-1 or Core-2. Each has a total cost of 200. You can inspect the routing
table to validate this.
(optional)
Origin Codes: C - connected, S - static, L - local
R - RIP, B - BGP, O - OSPF, D - DHCP
Type Codes: E - External BGP, I - Internal BGP, V - VPN, EV - EVPN
IA - OSPF internal area, E1 - OSPF external type 1
E2 - OSPF external type 2
VRF: default
How many next hops do the 10.1.11.0/24 and 10.1.12.0/24 networks have?
Answer: Two.
What is the cost in both cases?
(optional)
Core-2(config-if-vlan)# ip ospf cost 50
Core-2(config-if-vlan)# exit
16. Use the show ip ospf interface command for validating the change. Notice how the output
says the new value was configured.
Core-2(config)# show ip ospf interface vlan12
Codes: DR - Designated router BDR - Backup Designated router
VRF: default
How many next hops do the 10.1.11.0/24 and 10.1.12.0/24 networks have?
Answer: One.
What is the total cost to those prefixes?
Since Server Switch is virtual, the physical interface remains up. Server Switch has
not sensed the failure yet. You will have to wait 40 seconds before moving forward,
which is the value of the dead timer.
In production scenarios, you would normally rely on BFD to detect down neighbors
regardless of the state of the physical media. BFD is covered in the Implementing
AOS-CX Switching course.
(optional)
VRF: default
Answer: Core-2.
What is the total cost to that prefix?
6. In the filter type ospf and press Enter. That will instruct Wireshark to only present OSPF packets.
Wait a few seconds, and you will start to see hello packets every 10 seconds.
7. Stop the capture, select one of the packets, and expand the transport header row (Open Shortest
Path First), then OSPF Hello Packet underneath.
Answer: Two.
What packet type are you watching?
Answer: 10.1.1.1.
What is the area ID?
Answer: 255.255.255.0.
What is the dead interval?
Answer: 40 seconds.
What is included in the neighbor list?
There are a few attributes within the hello messages that are critical for successfully
establishing neighbor relationships.
n Attributes that must be different: Router ID
n Attributes that must be identical: Version, Area #, Authentication type and
data, Area flags, Subnet mask, Hello and Dead intervals
n Attributes that can be the same or different: Priority, Designated and Backup
Designated routers, and Neighbor List
When a neighbor relationship is not coming up between two OSPF routers that reside
within the same segment, step back and check these values before looking at any-
thing else.
(optional)
OSPF Router with ID (10.1.1.1) (Process ID 1 VRF default)
==========================================================
Answer: There are four entries, even though there are just two real neighbors: Core-2 (10.1.1.2)
and Server Switch (10.1.1.3).
11. Set the SVIs of VLAN 11 and 12 passive interfaces.
Core-1(config)# interface vlan 11-12
Core-1(config-if-vlan-<11-12>)# ip ospf passive
Core-1(config-if-vlan-<11-12>)# exit
Answer: Two.
13. Navigate to the Core-2 console.
14. Set the SVIs of VLAN 11 and 12 passive interfaces.
Core-2(config)# interface vlan 11-12
Core-2(config-if-vlan-<11-12>)# ip ospf passive
Core-2(config-if-vlan-<11-12>)# exit
Answer: Three.
Why do you have that number?
Answer: You have two fewer LSAs than before because as soon as the core switches stop seeing
each other, VLAN 11 and VLAN 12’s segments shift to stub. From OSPF’s topology perspective,
both networks will be seen as individually connected behind both switches.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Using the Remote Lab dashboard, open a console connection to Core-1.
4. Change the interface 1/1/8 network type to point-to-point.
(optional)
Core-1(config-if)# ip ospf network point-to-point
Core-1(config-if)# exit
5. Look at the neighbor relationships and focus on the one with the Server Switch.
Core-1(config)# show ip ospf neighbors
VRF : default Process : 1
===================================================
Answer: There is no role. Since the link is point to point, no DR election will happen from Core-
1’s perspective. Since the priority value loses relevance, it is omitted from the hello messages.
6. Change the interface VLAN 10 network type to point-to-point.
Core-1(config)# interface vlan 10
Core-1(config-if-vlan)# ip ospf network point-to-point
Core-1(config-if-vlan)# exit
Answer: You had three type 1 (Router) LSAs and three type 2 (Network) LSAs.
16. Inspect the routing table and focus on OSPF prefixes.
Core-2(config)# show ip route ospf
(optional)
Type Codes: E - External BGP, I - Internal BGP, V - VPN, EV - EVPN
IA - OSPF internal area, E1 - OSPF external type 1
E2 - OSPF external type 2
VRF: default
7. Use the show ip ospf lsdb command for validating the new number of links announced on
Core-2’s LSA.
Core-2# show ip ospf lsdb lsid 10.1.1.2
OSPF Router with ID (10.1.1.2) (Process ID 1 VRF default)
Notice that the number of links has increased from six to seven after the interface
loopback was added to the OSPF area.
Note that OSPF was already activated on the Server Switch loopback by the
NetAmateur consultant.
10. Display the OSPF routing table. You should see Core-1’s Router ID value listed in the output.
Core-2# show ip route ospf
(optional)
VRF: default
Default route injection uses external LSAs (LSA type 5). These LSAs are covered in more
detail in the Implementing AOS-CX Switching course.
In this task, you will first remove floating routes and replace them with OSPF default route injection.
Then, you will see what happens.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Using the Remote Lab dashboard, open a console connection to Core-2.
Core-2# configure terminal
Core-2(config)# router ospf 1
Core-2(config-ospf-1)# default-information originate
Core-2(config-ospf-1)# exit
When running show command filtering tools, the matching string is typically a single
word. However, you can match multiple words if you quote them all between " " char-
acters as in the example above, where we are looking for lines that contain the "ip
route" string.
0.0.0.0/0 (E2)
via 10.1.10.2 interface vlan10, cost 1 distance 110
10.1.1.2/32 (i) area: 0.0.0.0
via 10.1.10.2 interface vlan10, cost 100 distance 110
10.1.1.3/32 (i) area: 0.0.0.0
via 10.1.250.10 interface 1/1/8, cost 100 distance 110
10.1.10.0/30 (i) area: 0.0.0.0
directly attached to interface vlan10, cost 100 distance 110
10.1.11.0/24 (i) area: 0.0.0.0
directly attached to interface vlan11, cost 50 distance 110
10.1.12.0/24 (i) area: 0.0.0.0
directly attached to interface vlan12, cost 100 distance 110
10.1.250.8/30 (i) area: 0.0.0.0
directly attached to interface 1/1/8, cost 100 distance 110
10.1.250.12/30 (i) area: 0.0.0.0
via 10.1.10.2 interface vlan10, cost 200 distance 110
10.1.250.12/30 (i) area: 0.0.0.0
(optional)
10.254.1.0/24 (i) area: 0.0.0.0
via 10.1.250.10 interface 1/1/8, cost 125 distance 110
Answer: Yes.
8. Look for the 0.0.0.0/0 prefix in the routing table.
Core-1(config)# show ip route 0.0.0.0
VRF: default
10. Once more, look for the 0.0.0.0/0 prefix in the routing table.
Core-1(config-if)# show ip route 0.0.0.0
VRF: default
This new route can be used to forward traffic in case ISP1 fails.
Next, you will simulate a failure on the link to ISP2 and see what happens to the injected route.
11. Navigate back to the Core-2 console.
12. Remove the default floating route.
Core-2(config)# no ip route 0.0.0.0/0 10.1.10.1 distance 10
14. Confirm Core-2 has no default prefixes in the VRF routing table.
Core-2(config-if)# show ip route 0.0.0.0
Now validate that default route injection stops taking place because Core-2 does not have a
route injection entry in the VRF table.
15. Navigate back to the Core-1 console.
16. Look for the prefix 0.0.0.0/0 in the routing table.
Core-1(config-if)# show ip route 0.0.0.0
Answer: No.
17. Take a look into the OSPF process’s routing table.
Core-1(config-if)# show ip ospf routes 0.0.0.0/0
Codes: i - Intra-area route, I - Inter-area route
E1 - External type-1, E2 - External type-2
Answer: No.
Why?
Answer: No next-hop or exit interfaces are up for any default route, so they are not activated.
18. Now restore the ISP1 link and enable the route injection in Core-1, as well as confirming that
Core-2 is now learning the route via Core-1.
19. Enable interface 1/1/7.
Core-1(config-if)# no shutdown
Core-1(config-if)# exit
VRF: default
Answer: Yes.
What is the next hop?
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches’ configuration as a custom checkpoint called Lab9-2-final.
Core-1
Core-1(config)#copy running-config checkpoint Lab9-2-finalCopying configuration:
[Success]
Core-2
Core-2(config)#copy running-config checkpoint Lab9-2-finalCopying configuration:
[Success]
This table is used by the switch to map the received traffic with different priorities to
the switch local priority (LP). Notice that 802.1P (or CoS) has eight different pri-
orities and is part of the 802.1Q (VLAN tag) header. This means that CoS traffic
marking is only possible on tagged (trunk) links.
Notice as well that, by default, CoS values 2 to 7 match a local priority with the same
number. CoS priority 0, which is used as the default traffic priority, is mapped to local
priority 1, and CoS 1 is mapped to local priority 0. This allows network administrators
to classify some traffic as less critical (less priority) than the default network traffic.
<<Omitted output>>
Queue profile configuration is responsible for matching each local priority value to an
output queue, allowing the network administrator one more option to manipulate
traffic priority.
Once traffic is classified by the CoS, DSCP values, or QoS policy, it will receive a local
precedence value mapped to the port queues (output queues).
Once traffic is classified by the CoS, DSCP values, or QoS policy, it will receive a local
precedence value mapped to the port queues (output queues).
As you have learned, each port on an AOS-CX switch has eight queues, numbered
from 0 to 7, where higher-numbered queues should have better priority to be trans-
mitted, looking to avoid congestion, traffic loss, latency, and jitter.
This output shows the number of bytes transmitted by each queue from each switch
port.
Once the traffic is queued, it is time for the switch to use the queue man-
agement algorithm to select in which order packets will be transmitted. As you
may see, the default algorithm for switches is DWRR (deficit-weighted round
robin). Remember that different switch families may support different
algorithms. For more information, check the QoS guide for your specific switch
at the HPE Networking Support Portal (https://networkingsupport.hpe.com/).
Some of the most used/supported algorithms are:
n Strict priority queue (SPQ): Strict priority services all packets waiting in
a queue before servicing the packets in lower priority queues.
Notice that at the time of this writing, the CX 8325 Series with software
release 10.13.1000 has DWRR selected for all queues.
Answer: None.
Traffic priorities for networks can be carried in VLAN tags, using the CoS Priority
Code Point (PCP), or in IP packet headers, using the Differentiated Services Code
Point (DSCP). Whether these priorities affect how traffic is serviced depends on how
QoS trust mode is configured on the switch. QoS trust mode specifies how the switch
assigns local priority values to ingress packets. Trust mode can be set globally for all
interfaces, or individually for each interface. By default, trust mode is set to none,
meaning that any QoS information in the packet (CoS or DSCP) is ignored, and local
priority values are assigned from the CoS map value for code point 0. An exception to
this can be configured, allowing a QoS remark to be applied to DSCP values when
trust mode is none. When trust mode is set to CoS or DSCP, the switch translates the
QoS settings in VLAN tags (for CoS) or the DS field in an IP header (for DSCP) to
local priority values on the switch. Translation is controlled by the CoS map or DSCP
map tables.
12. Verify the global QoS Trust configuration one more time.
Core-1(config)# show qos trust
qos trust dscp
As you have non-tagged and routed links in your topology, the best practice is to set
the trust mode to DSCP, allowing frames to be classified by every switch in the path.
13. Repeat the previous step and set the QoS Trust mode to DSCP on Core-1 and Access-VSF
switches.
Answer: QoS prioritization happens on every host in the path. Leaving switches with no or bad
QoS configuration may cause frames to not receive the appropriate service (low latency, low jit-
ter, and no packet loss).
6. Review the current queue statistics on port 1/1/3; this is the port connected to PC3. Most queues
should have statistics that are close to 0.
Access-VSF#show interface 1/1/3 queuesInterface 1/1/3 is up
Admin state is up
Tx Bytes Tx Packets Tx Drops
Q0 0 0 0
Q1 0 0 0
Q2 0 0 0
Q3 0 0 0
Q4 0 0 0
Q5 0 0 0
Q6 0 0 0
Q7 465 3 0
11. Using the remote lab desktop, connect to the Core-1 console.
12. Start a ping to PC3 (10.1.11.103). The ping should be successful.
Core-1(config)# ping 10.1.11.103
PING 10.1.11.103 (10.1.11.103) 100(128) bytes of data.
108 bytes from 10.1.11.103: icmp_seq=1 ttl=128 time=0.723 ms
108 bytes from 10.1.11.103: icmp_seq=2 ttl=128 time=0.724 ms
108 bytes from 10.1.11.103: icmp_seq=3 ttl=128 time=0.655 ms
108 bytes from 10.1.11.103: icmp_seq=4 ttl=128 time=0.741 ms
108 bytes from 10.1.11.103: icmp_seq=5 ttl=128 time=0.732 ms
14. Click the packet with the source IP of Core-1 (10.1.11.1) and open the Internet Protocol and Dif-
ferentiated Services Codepoint sections. Check the DSCP value. Since no configuration was
done, this should be Default (0) at this point.
15. Navigate back to the Access-1 console and verify the interface 1/1/3 counters.
Access-VSF# show interface 1/1/3 queues
Interface 1/1/3 is up
Admin state is up
Tx Bytes Tx Packets Tx Drops
Q0 0 0 0
Q1 954 8 0
Q2 0 0 0
Q3 0 0 0
Q4 0 0 0
Q5 0 0 0
Q6 0 0 0
Q7 5314 34 0
Notice the increment in Q1 (Queue 1). As you have noticed in step 14, there was no priority mark-
ing on the packets. Why was Queue 1 selected?
16. Navigate back to PC3 and start the Wireshark trace. Click Continue without Saving to start the
trace.
19. On PC3, verify the received marked traffic. In Wireshark, stop the trace and verify the incoming
DSCP value of the ICMP request (make sure to select a request, not the reply).
Which queue was assigned to traffic marked with DSCP 46, also know as Expedited Forwarding
(EF)?
<<Omitted output>>
101101 45 5 green
101110 46 5 green EF
101111 47 5 green
<<Omitted output>>
22. Verify the QoS queue profile factory-default, which assigns an output queue to each local pri-
ority.
Access-VSF# show qos queue-profile factory-default
queue_num local_priorities name
--------- ---------------- ----
0 0 Scavenger_and_backup_data
1 1
2 2
3 3
4 4
5 5
6 6
7 7
2. Back up the current access switches’ configuration as a custom checkpoint called Lab10-final.
Core-1
Core-1(config)#copy running-config checkpoint Lab10-final
Copying configuration: [Success]
The vsx-sync command entered in the VLAN context enables the VSX pair of
switches to synchronize this VLAN configuration across both switches. You will learn
more about VSX in the Implementing AOS-CX Switching course.
-----------------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-----------------------------------------------------------------------------
1 DEFAULT_VLAN_1 up ok default 1/1/3-1/1/6,1/1/9-1/1/44,
1/1/48-1/1/56,lag256
10 VLAN10 up ok static lag256
11 Employees up ok static lag1,lag256
12 Managers up ok static lag1,lag256
254 MGMT up ok static lag256
VLAN 254 was not configured on Core-2. Why is it present in the system?
Answer: Due to the vsx-sync command entered on Core-1 (step 5), VLAN 254 was synchronized
between Core-1 and Core-2.
9. Configure VLAN 254's SVI.
Core-2# configure terminal
Core-2(config)# interface vlan 254
Core-2(config-if-vlan)# description MGMT
Core-2(config-if-vlan)# ip address 10.1.254.2/24
Core-2(config-if-vlan)# ip ospf 1 area 0
Core-2(config-if-vlan)# ip ospf passive
10. Test Core-2 to Core-1 communication over VLAN 254. The ping should succeed.
Core-2(config-if-vlan)# ping 10.1.254.1
PING 10.1.254.1 (10.1.254.1) 100(128) bytes of data.
108 bytes from 10.1.254.1: icmp_seq=1 ttl=64 time=13.0 ms
108 bytes from 10.1.254.1: icmp_seq=2 ttl=64 time=0.195 ms
108 bytes from 10.1.254.1: icmp_seq=3 ttl=64 time=0.146 ms
108 bytes from 10.1.254.1: icmp_seq=4 ttl=64 time=0.186 ms
108 bytes from 10.1.254.1: icmp_seq=5 ttl=64 time=0.202 ms
11. Configure VSX active gateway to provide gateway redundancy for VLAN 254.
By appending the vsx-peer to the display command, you receive the output from the
partner switch for the particular show command entered.
16. Using the Remote Lab dashboard, connect to the Access-1 console.
17. Log in.
18. Create VLAN 254 and configure SVI.
Access-VSF(config)# vlan 254
Access-VSF(config-vlan-254)# name MGMT
Access-VSF(config-vlan-254)# interface vlan 254
Access-VSF(config-if-vlan)# description MGMT
Access-VSF(config-if-vlan)# ip address 10.1.254.3/24
Access-VSF(config-if-vlan)# exit
21. Test communication to the Core-1 (10.1.254.1), Core-2 (10.1.254.2), and Active gateway
(10.1.254.254) IPs. The ping should succeed.
Access-VSF(config)# ping 10.1.254.1 repetitions 2
PING 10.1.254.1 (10.1.254.1) 100(128) bytes of data.
108 bytes from 10.1.254.1: icmp_seq=1 ttl=64 time=22.7 ms
108 bytes from 10.1.254.1: icmp_seq=2 ttl=64 time=0.183 ms
VRF: default
24. Configure a default route pointing to the VLAN 254 active gateway IP.
VRF: default
26. Try to ping the AD server (10.254.1.21). The ping should succeed.
Access-VSF(config)# ping 10.254.1.21
PING 10.254.1.21 (10.254.1.21) 100(128) bytes of data.
108 bytes from 10.254.1.21: icmp_seq=1 ttl=126 time=10.6 ms
108 bytes from 10.254.1.21: icmp_seq=2 ttl=126 time=2.37 ms
108 bytes from 10.254.1.21: icmp_seq=3 ttl=126 time=2.18 ms
108 bytes from 10.254.1.21: icmp_seq=4 ttl=126 time=2.34 ms
108 bytes from 10.254.1.21: icmp_seq=5 ttl=126 time=2.06 ms
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Using the Remote Lab dashboard, open a console connection to Access-1.
4. Test Access-VSF communication to the ClearPass server (10.254.1.23). The ping should suc-
ceed.
6. Define a new server group, and add the previously defined CPPM host.
Access-VSF(config)# aaa group server radius cppm
Access-VSF(config-sg)# server 10.254.1.23
Access-VSF(config-sg)# exit
Enabling interim accounting will ensure that the switch updates the RADIUS server
about the connected devices every five minutes and ensure that ClearPass has a view
of the currently connected devices in the network.
replay-protection disable indicates that the timestamp of the CoA packet will not
be inspected by the switch. In a real deployment, the replay protection should be
enabled. The default allowed time difference between the RADIUS host and the
switch is 300 seconds. Since in the lab, the time of the switch and CPPM may not be
in sync, the replay protection is disabled.
Steps
1. On your local computer, launch a web browser and enter the Aruba Training Lab web portal at
the URL: https://arubatraininglab.computerdata.com.
2. Log in using the credentials provided to you.
3. Using the Remote Lab dashboard, open a console connection to Access-1.
4. Enable 802.1X authentication on the switch and ensure it is using the previously defined RADIUS
server group.
Access-VSF(config)# aaa authentication port-access dot1x authenticator radius
server-group cppm
Access-VSF(config)# aaa authentication port-access dot1x authenticator enable
5. Navigate to the interface 1/1/3 context, configure the 802.1X authenticator context, and enable
802.1X on the port.
Authentication Details
----------------------
Status : Authenticating
Type : Pass-Through
EAP-Method : -
Auth Failure reason :
Time Since Last State Change : 18s
Authentication Statistics
-------------------------
Authentication : 1
Authentication Timeout : 0
EAP-Start While Authenticating : 0
EAP-Logoff While Authenticating : 0
Successful Authentication : 0
Failed Authentication : 0
Re-Authentication : 0
Successful Re-Authentication : 0
Failed Re-Authentication : 0
EAP-Start When Authenticated : 0
EAP-Logoff When Authenticated : 0
10. On PC3 (connected to port 1/1/3 of Access-1), make sure that the Windows service Wired
AutoConfig is running, as it is not started by default. Open a command prompt with admin-
istrator rights.
Now you will configure the Lab NIC for 802.1X authentication.
13. Right-click the network icon (top right corner) and select Open Network & Internet settings.
15. Double-click to open the Lab NIC properties. Click the Authentication tab and ensure that
Enable IEEE 802.1X authentication is selected.
17. Click Configure next to the EAP-MSCHAP v2 method. Make sure the option Automatically use
my Windows logon name and password (and domain if any) is unchecked.
18. Click OK to close the window.
25. Open the command prompt and ping the AD server (10.254.1.21). The ping should succeed.
Authentication Statistics
-------------------------
Authentication : 1
Authentication Timeout : 0
EAP-Start While Authenticating : 0
EAP-Logoff While Authenticating : 0
Successful Authentication : 1
Failed Authentication : 0
Re-Authentication : 0
Successful Re-Authentication : 0
Failed Re-Authentication : 0
EAP-Start When Authenticated : 0
EAP-Logoff When Authenticated : 0
Re-Auths When Authenticated : 0
Cached Re-Authentication : 0
28. Review the MAC address table. The client's MAC address should have been added by port-
access-security.
Access-VSF(config)# show mac-address-table
MAC age-time : 300 seconds
Note that you have entries for the user employee with login status as ACCEPT.
5. To enable MAC authentication globally on the switch, enter the aaa authentication port-
access mac-auth enable command.
Access-VSF(config)# aaa authentication port-access mac-auth enable
6. Enter the interface 2/1/4 context (connected to PC4). Then enter the MAC-auth context and
enable MAC authentication on the port.
Access-VSF(config)# interface 2/1/4
Access-VSF(config-if)# aaa authentication port-access mac-auth
Access-VSF(config-if-macauth)# enable
Access-VSF(config-if-macauth)# exit
Access-VSF(config-if)# exit
ClearPass has already been provisioned with PC4 MAC address to allow its authen-
tication using MAC authentication.
7. Verify that the MAC address of PC4 is now authenticated. The ClearPass system has been con-
figured to allow access for PC4's MAC address.
Access-VSF(config)# show aaa authentication port-access mac-auth interface 2/1/4
client-status
Authentication Details
----------------------
Status : Authenticated
Auth-Method : chap
Auth Failure reason :
Time Since Last State Change : 17s
Authentication Statistics
-------------------------
Authentication : 1
Authentication Timeout : 0
Successful Authentication : 1
Failed Authentication : 0
Re-Authentication : 0
Successful Re-Authentication : 0
Failed Re-Authentication : 0
Re-Auths When Authenticated : 0
Cached Re-Authentication : 0
8. Confirm the MAC address on the port is now dynamically learned reviewing the MAC address
table.
Access-VSF(config)# show mac-address-table
MAC age-time : 300 seconds
Number of MAC addresses : 12
Core-2
Core-2(config)# write memory
Copying configuration: [Success]
Access-1
Access-VSF(config)# write memory
Copying configuration: [Success]
2. Back up the current access switches’ configuration as a custom checkpoint called Lab11-final.
Core-1
Core-1(config)#copy running-config checkpoint Lab11-finalCopying configuration:
[Success]
Core-2
Core-2(config)#copy running-config checkpoint Lab11-finalCopying configuration:
[Success]
Access-1
Access-VSF(config)#copy running-config checkpoint Lab11-finalCopying configuration:
[Success]
The use of OOBM networks is common in data centers. However, in campus environments,
it is not as common due to the increased cost of having a separate network (including wir-
ing and switches) just for management. Nonetheless, in certain industries such as oil and
other critical environments, OOBM may still be used for campus deployments.
Steps
6. Assign 10.251.1.254 and 10.254.1.22 as the gateway and DNS servers, respectively.
Access-VSF(config-if-mgmt)# default-gateway 10.251.1.254
Access-VSF(config-if-mgmt)# nameserver 10.254.1.22
Access-VSF(config-if-mgmt)# exit
Notice that none of the switch interfaces are listed as the only port allowed in the
mgmt VRF, which is the management port.
Steps
1. Using the Remote Lab dashboard, open a console connection to Access-1.
2. Create a user group called "port-prov," then allow the following:
a. Access to the global configuration context.
b. Access to the first nine ports on both VSF members.
c. Change VLAN membership on those ports.
d. Enable ports.
e. Display a list of interfaces, VLANs, and user information.
Access-VSF(config)# user-group port-prov
Access-VSF(config-usr-grp-port-prov)# permit cli command "configure terminal"
Access-VSF(config-usr-grp-port-prov)# permit cli command "interface [1-2]/1/[1-9]$"
Access-VSF(config-usr-grp-port-prov)# permit cli command "vlan acces"
Access-VSF(config-usr-grp-port-prov)# permit cli command "no shutdown"
Access-VSF(config-usr-grp-port-prov)# permit cli command "show interface brief"
Access-VSF(config-usr-grp-port-prov)# permit cli command "show user information"
Access-VSF(config-usr-grp-port-prov)# permit cli command "show vlan"
Access-VSF(config-usr-grp-port-prov)# exit
Defining commands of different user groups support REGEX. For example, in the
second rule, [1-2] means that the character could take either the value 1 or 2. Like-
wise, [1-9] represents any number in the range between 1 and 9, and "$" means this
is the end of the line, and nothing else can follow.
4. Display the details of your group. You will notice all the rules you have defined with sequence
numbers in steps of 10.
Access-VSF(config)# show user-group port-prov
User Group Summary
==================
Name : port-prov
Type : configuration
Included Group : --
Number of Rules : 7
40 permit no shutdown
5. Create the cxf-local user account with password aruba123. Map the account to the port-prov
group you just created.
Access-VSF(config)# user cxf-local group port-prov password plaintext aruba123
6. Display the local user list. You will see only two accounts.
Access-VSF(config)# show user-list
USER GROUP
Although the scenario is asking for secure RBAC, the "admin" account should remain
untouched with no password. This eases the assistance and reset procedures that
the lab help desk might need to run.
<<Output omitted>>
12. Try the show user information command. You shall see the user you are using for this session
and the user group it belongs to.
Access-VSF# show user information
Username : cxf-local
Authentication type : local
User group : port-prov
User privilege level : N/A
User login session : ssh
-----------------------------------------------------------------------
VLAN Name Status Reason Type Interfaces
-----------------------------------------------------------------------
11 Employees up ok static 1/1/3,2/1/4,lag1
Shared-Secret: None
Timeout: 5
Auth-Type: pap
Retries: 1
Initial TLS Connection Timeout: 30
TLS Timeout: 5
Tracking Time Interval (seconds): 300
Tracking Retries: 1
Tracking User-name: radius-tracking-user
Tracking Password: None
Status-Server Time Interval (seconds): 300
Number of Servers: 1
AAA Server Status Trap: Disabled
---------------------------------------------------------------------------
SERVER NAME | TLS | PORT | VRF
---------------------------------------------------------------------------
10.254.1.23 | | 1812 | default
---------------------------------------------------------------------------
A RADIUS server was previously configured for the 802.1X and MAC authentication
labs.
3. Set the RADIUS group, then the local username database as authentication groups for SSH ser-
vices.
Access-VSF(config)# aaa authentication login ssh group cppm local
Access-VSF(config)#aaa authentication login https-server group cppm local
Answer: RADIUS.
To what user group does the user belong?
Answer: Administrators.
What is the privilege level?
Answer: Level 15
8. On PC3, open a web browser and navigate to ClearPass: https://10.254.1.23/tips.
9. Authenticate using the following credentials:
n Username: readonly
n Password: aruba123
Answer: 10.13.1000.
Are there any new logs?
Answer: It depends on your equipment; the example shows about 20% memory utilization on
Access-1 and 10% on Access-2.
What are the serial numbers of both units?
What physical ports are being used for the logical VSF link? Lab 12: Secure management access
14. Click EXPORT. This will download the file through the browser. The file will show up at the bot-
tom of the browser.
15. Click the gear icon in the top right corner, then select V10.13 API. This will open another browser
tab and display the AOS-CX REST API documentation.
2. Back up the current access switches’ configuration as a custom checkpoint called Lab12-final.
Access-1
Access-VSF(config)#copy running-config checkpoint Lab12-finalCopying configuration:
[Success]