Feature Guide
Feature Guide
Page 1 of 36
ConvergenceEndPoint(CEP) RADIUSSnooping
Note: The RADIUS Snooping user authentication feature is detailed in the Configuring RADIUS Snooping feature guide. The RADIUS Snooping feature guide can be found at: https://extranet.enterasys.com/downloads.
Authentication Overview
Note: See the Enterasys Matrix X Core Router Configuration Guide for X-Series switch authentication configuration information.
For information about... IEEE 802.1x Using EAP MAC-Based Authentication (MAC) Port Web Authentication (PWA) Convergence End Point (CEP) Multi-User And MultiAuth Authentication Remote Authentication Dial-In Service (RADIUS)
Refer to page... 3 3 3 4 4 8
Page 2 of 36
Authentication Overview
Page 3 of 36
Authentication Overview
ThemodularswitchessupportCEP.
Page 4 of 36
Authentication Overview
Multi-User Authentication
Multiuserauthenticationprovidesfortheperuserorperdeviceprovisioningofnetwork resourceswhenauthenticating.Itsupportstheabilitytoreceivefromtheauthenticationserver: Apolicytrafficprofile,basedontheuseraccountsRADIUSFilterIDconfiguration AbaseVLANID,basedontheRFC3580tunnelattributesconfiguration,alsoknownas dynamicVLANassignment
Whenasinglesupplicantconnectedtoanaccesslayerportauthenticates,apolicyprofilecanbe dynamicallyappliedtoalltrafficontheport.Whenmultiuserauthenticationisnotimplemented, andmorethanonesupplicantisconnectedtoaport,firmwaredoesnotprovisionnetwork resourcesonaperuserorperdevicebasis.Differentusersordevicesmayrequireadifferentset ofnetworkresources.ThefirmwaretracksthesourceMACaddressforeachauthenticatinguser regardlessoftheauthenticatingprotocolbeingused.Provisioningnetworkresourcesona peruserbasisisaccomplishedbyapplyingthepolicyconfiguredintheRADIUSFilterID,orthe baseVLANIDconfiguredintheRFC3580tunnelattributes,foragivenusersMACaddress.The RADIUSFilterIDandtunnelattributesarepartoftheRADIUSuseraccountandareincludedin theRADIUSAcceptmessageresponsefromtheauthenticationserver. Thenumberofallowedusersperportcanbeconfiguredusingthesetmultiauthportnumusers command.Theshowmultiauthportcommanddisplaysboththeallowednumberofusers configuredandthemaximumnumberofuserssupportedperportforthedevice.Theallowed numberofusersdefaultstothemaximumnumberofsupportedusersfortheportforamodular switchplatformandto1forthestackablefixedswitchandstandalonefixedswitchplatforms.
Note: Multi-user authentication on stackable fixed switch and standalone fixed switch platforms requires that the switch be the point of authentication, in order to apply policy.
Page 5 of 36
Authentication Overview
Figure 1
Switch
Radius Server
Authentication Credentials User 1 Authentication Credentials User 2
User 1
SMAC 00-00-00-11-11-11
Authentication Credentials User 3 Dynamic Admin Rule for Policy 1 SMAC = 00-00-00-11-11-11 ge.1.5 Dynamic Admin Rule for Policy 2 SMAC = 00-00-00-22-22-22 ge.1.5 Dynamic Admin Rule for Policy 3 SMAC = 00-00-00-33-33-33 ge.1.5 User1 Filter ID --> Policy X
User 2
SMAC 00-00-00-22-22-22
Port ge.1.5
Authentication Request Authentication Response
User 3
SMAC 00-00-00-33-33-33
MultiAuth Authentication
Authenticationmodesupportprovidesfortheglobalsettingofasingleauthenticationmode 802.1X(strictmode)ormultiplemodes(MultiAuth)peruserorportwhenauthenticating. Strictmodeistheappropriatemodewhenauthenticatingasingle802.1Xuser.Alltrafficonthe portreceivesthesamepolicyinstrictmode.WhenauthenticatingPWA,CEP,orMAC,youmust useMultiAuthauthentication,whetherauthenticatingasingleormultiplesupplicants. MultiAuthauthenticationsupportsthesimultaneousconfigurationofuptothreeauthentication methodsperuseronthesameport,butonlyonemethodperuserisactuallyapplied.When MultiAuthauthenticationportshaveacombinationofauthenticationmethodsenabled,andauser issuccessfullyauthenticatedformorethanonemethodatthesametime,theconfigured authenticationmethodprecedencewilldeterminewhichRADIUSreturnedFilterIDwillbe processedandresultinanappliedtrafficpolicyprofile.SeeSettingMultiAuthAuthentication Precedenceonpage 21forauthenticationmethodprecedencedetails. ThenumberofusersordevicesMultiAuthauthenticationsupportsdependsuponthetypeof device,whethertheportsarefixedaccessoruplink,andwhetherincreasedportcapacityorextra chassisusercapacityMUAlicenseshavebeenapplied.Seethefirmwarecustomerreleasenote thatcomeswithyourdevicefordetailsonthenumberofusersordevicessupportedperport. InFigure 2,multipleusersareauthenticatedonasingleporteachwithadifferentauthentication method.Inthiscase,eachuseronasingleportsuccessfullyauthenticateswithadifferent authenticationtype.Theauthenticationmethodisincludedintheauthenticationcredentialssent totheRADIUSserver.RADIUSlooksuptheuseraccountforthatuserbasedupontheSMAC.The FilterIDforthatuserisreturnedtotheswitchintheauthenticationresponse,andthe authenticationisvalidatedforthatuser.
Page 6 of 36
Authentication Overview
Figure 2
Switch
Radius Server
User 1
SMAC 00-00-00-11-11-11
802.1X
MAU Logic
User 2
SMAC 00-00-00-22-22-22
Port
Authentication Method MAC
User 3
SMAC 00-00-00-33-33-33
InFigure 3,fullMultiAuthauthenticationtakesplaceinthatmultipleusersonasingleportare validatedformorethanoneauthenticationmethod.Theappliedauthenticationandpolicyare basedupontheauthenticationmethodprecedencelevel.Onthefarrightcolumnofthefigure,the authenticationmethodsarelistedfromtoptobottominorderofprecedence(thedefaultorderis displayed).User1isauthenticatingwithboththe802.1xandPWAmethods,withtheCredit policy.Boththe802.1xandPWAauthenticationmethodsarevalidated,butonlythe802.1x MultiAuthsessionisapplied,becausethathasthehighestprecedence.User2isauthenticating withbothPWAandMACmethods,withtheSalespolicy.PWA,havingahigherprecedencethan MAC,istheMultiAuthsessionappliedforUser2.User3isaguestandisauthenticatingwiththe MACmethodonly.TheMACMultiAuthsession,withtheGuestpolicyisappliedforUser3.
Page 7 of 36
Authentication Overview
Figure 3
SMAC=User 1
SMAC=User 2
SMAC=User 3
Switch
MultiAuth Sessions
<User 1, 802.1x, Authenticated, PID=Credit, Applied>
Auth. Agent
802.1X
Credit Policy Role
<User 2, PWA, Authenticated, PID=Sales, Applied> <User 1, PWA, Authenticated, PID=Credit, Not Applied>
MAU Logic
<User 3, MAC, Authenticated, PID=Guest, Applied> <User 1, MAC, Authenticated, PID=Guest, Not Applied> <User 2, MAC, Authenticated, PID=Guest, Not Applied>
Port X
Guest Policy Role
TheRemoteAuthenticationDialInUserService(RADIUS)isanextensibleprotocolusedtocarry authenticationandauthorizationinformationbetweentheswitchandtheAuthenticationServer (AS).RADIUSisusedbytheswitchforcommunicatingsupplicantsuppliedcredentialstothe authenticationserverandtheauthenticationresponsefromtheauthenticationserverbacktothe switch.Thisinformationexchangeoccursoverthelinklayerprotocol. TheswitchactsasaclienttoRADIUSusingUDPport1812bydefault(configurableintheset radiuscommand).Theauthenticationservercontainsadatabaseofvalidsupplicantuseraccounts withtheircorrespondingcredentials.Theauthenticationserverchecksthattheinformation receivedfromtheswitchiscorrect,usingauthenticationschemessuchasPAP,CHAP,orEAP.The authenticationserverreturnsanAcceptorRejectmessagetotheswitchbasedonthecredential validationperformedbyRADIUS.Theimplementationprovidesenhancednetworksecurityby usingasharedsecretandMD5passwordencryption.
Page 8 of 36
Authentication Overview
Page 9 of 36
Authentication Overview
RFC 3580
EnterasysswitchessupporttheRFC3580RADIUStunnelattributefordynamicVLAN assignment.TheVLANTunnelAttributeimplementstheprovisioningofserviceinresponsetoa successfulauthentication.Onportsthatdonotsupportpolicy,thepacketwillbetaggedwiththe VLANID.TheVLANTunnelAttributedefinesthebaseVLANIDtobeappliedtotheuser.
TheTunnelTypeattributeindicatesthetunnelingprotocoltobeusedwhenthisattributeis formattedinRADIUSAccessRequestmessages,orthetunnelprotocolinusewhenthisattribute isformattedinRADIUSAccessAcceptmessages.SetTunnelTypeattributeparametersas follows: Type:Setto64forTunnelTypeRADIUSattribute Length:Setto6forsixbytelengthofthisRADIUSattribute Tag:Providesameansofgroupingattributesinthesamepacketwhichrefertothesame tunnel.Validvaluesforthisfieldarefrom0x01through0x1F,inclusive.Setto0ifunused. Unlessalternativetunneltypesareprovided,itisonlynecessaryfortunnelattributesto specifyasingletunnel.Asaresult,whereitisonlydesiredtospecifytheVLANID,thetag fieldshouldbesettozero(0x00)inalltunnelattributes.
Page 10 of 36
Authentication Overview
Value:Indicatesthetypeoftunnel.Avalueof0x0D(decimal13)indicatesthatthetunneling protocolisaVLAN.
TunnelMediumTypeindicatesthetransportmediumtousewhencreatingatunnelforthe tunnelingprotocol,determinedfromTunnelTypeattribute.SetTunnelMediumTypeattribute parametersasfollows: Type:Setto65forTunnelMediumTypeRADIUSattribute Length:Setto6forsixbytelengthofthisRADIUSattribute Tag:Providesameansofgroupingattributesinthesamepacketwhichrefertothesame tunnel.Validvalueforthisfieldare0x01through0x1F,inclusive.Setto0ifunused.Unless alternativetunneltypesareprovided,itisonlynecessaryfortunnelattributestospecifya singletunnel.Asaresult,whereitisonlydesiredtospecifytheVLANID,thetagfieldshould besettozero(0x00)inalltunnelattributes. Value:Indicatesthetypeoftunnel.Avalueof0x06indicatesthatthetunnelingmedium pertainsto802media(includingEthernet)
TunnelPrivateGroupIDattributeindicatesthegroupIDforaparticulartunneledsession.Setthe TunnelPrivateGroupIDattributeparametersasfollows: Type:Setto81forTunnelPrivateGroupIDRADIUSattribute Length:Settoavaluegreaterthanorequalto3. Tag:Providesameansofgroupingattributesinthesamepacketwhichrefertothesame tunnel.Validvaluesforthisfieldarefrom0x01through0x1F,inclusive.Setto0ifunused. Unlessalternativetunneltypesareprovided,itisonlynecessaryfortunnelattributesto specifyasingletunnel.Asaresult,whereitisonlydesiredtospecifytheVLANID,thetag fieldshouldbesettozero(0x00)inalltunnelattributes. String:Indicatesthegroup.FortheVLANIDintegervalue,itisencodedasastringusing ASCII.Forexample,theVLANIDintegervalue103wouldberepresentedas0x313033
Page 11 of 36
Authentication Overview
AproblemwithmovinganendsystemtoanewVLANisthattheendsystemmustbeissued anIPaddressonthenewVLANssubnettowhichithasbecomeamember.Iftheendsystem doesnotyethaveanIPaddress,thisisnotusuallyaproblem.However,iftheendsystemhas anIPaddress,theleaseoftheaddressmusttimeoutbeforeitattemptstoobtainanew address,whichmaytakesometime.TheIPaddressassignmentprocess,implementedby DHCP,andtheauthenticationprocessarenotconjoinedontheendsystem.Therefore,this leadstoendsystemspossessinganinvalidIPaddressafterdynamicVLANAuthorizationand lostIPconnectivityuntilitscurrentIPaddresstimesout.Furthermore,whenanewIPaddress iseventuallyassignedtotheendsystem,IPconnectivityisdisruptedforallapplicationson theendsystem.
Page 12 of 36
Authentication Overview
authorizationisenabledgloballyandontheauthenticatingusersport,theVLANspecifiedby thetunnelattributesisappliedtotheauthenticatinguser. IfVLANauthorizationisnotenabled,theVLANspecifiedbythepolicyprofileisapplied.See RFC3580onpage 10forinformationaboutVLANauthorization. IftheFilterIDattributesarepresentbutthetunnelattributesarenotpresent,thepolicy profilespecifiedbytheFilterIDisapplied,alongwiththeVLANspecifiedbythepolicy profile. IfthetunnelattributesarepresentbuttheFilterIDattributesarenotpresent,andifVLAN authorizationisenabledgloballyandontheauthenticatingusersport,thentheswitchwill checktheVLANtopolicymappingtable(configuredwiththesetpolicymaptable command): IfanentrymappingthereceivedVLANIDtoapolicyprofileisfound,thenthatpolicy profile,alongwiththeVLANspecifiedbythepolicyprofile,willbeappliedtothe authenticatinguser. Ifnomatchingmappingtableentryisfound,theVLANspecifiedbythetunnelattributes willbeappliedtotheauthenticatinguser. IftheVLANtopolicymappingtableisinvalid,thenthe etsysPolicyRFC3580MapInvalidMappingMIBisincrementedandtheVLANspecifiedby thetunnelattributeswillbeappliedtotheauthenticatinguser.
IfVLANauthorizationisnotenabled,thetunnelattributesareignored.
IfVLANauthorizationisnotenabled,theuserwillbeallowedontotheportwiththedefault policy,ifitexists.Ifnodefaultpolicyexists,theportVLANwillbeapplied.
Page 13 of 36
Configuring Authentication
Configuring Authentication
Thissectionprovidesdetailsfortheconfigurationofauthenticationmethods,MultiAuthand RADIUS.
For information about... Configuring IEEE 802.1x Configuring MAC-based Authentication Configuring Port Web Authentication (PWA) Configuring Convergence End Point (CEP) Configuring MultiAuth Authentication Configuring RADIUS Refer to page... 16 17 18 19 21 26
strict - authentication limited to 802.1x for a single user on a port. auth-opt - Authentication is optional based upon global and port configuration. Precedence from high to low: 802.1x, PWA, MAC, CEP. 0 - no timeout in effect.
MultiAuth precedence
MultiAuth session-timeout
Page 14 of 36
Configuring Authentication
Table 1
2.
5 seconds.
1800 seconds.
3.
radius timeout
20 seconds.
Both: management-access and network-access. Globally: Disabled. Per Port: Enabled. Untagged.
Page 15 of 36
Configuring Authentication
3.
set eapol [enable | disable] [auth-mode {auto | forced-auth | forced-unauth} port-string set dot1x {enable | disable}
4.
Page 16 of 36
Configuring Authentication
Procedure 1
Step 5. Task
If an entity deactivates due to the supplicant logging off, inability to authenticate, or the supplicant or associated policy settings are no longer valid, you can reinitialize a deactivated access entity. If necessary, reinitialize the specified entity. If the authentication for a supplicant times out or is lost for any reason, you can reauthenticate that supplicant. If necessary, reauthenticate the specified entity. Display IEEE 802.1x configuration.
6.
7.
2.
Set or clear the number of MAC authentication sessions supported on a port. The modular switch platform allows for the setting of the number of MAC authentication sessions supported on a port. Enable or disable MAC authentication on a port. By default, MAC authentication is disabled for all ports. MAC authentication must be enabled on the ports that will use it. Enable or disable MAC authentication globally on the device. By default, MAC authentication is globally disabled on the device. Set the MultiAuth mode.
3.
4.
5.
Page 17 of 36
Configuring Authentication
Procedure 2
Step 6. Task
Display MAC authentication configuration or status of active sessions. If a session or port requires reinitialization, reinitialize a specific MAC session or port.
7.
8.
3.
4.
5. 6.
Page 18 of 36
Configuring Authentication
Whenenhancedmodeisenabled,PWAwilluseaguestpasswordandguestusernametogrant networkaccesswithdefaultpolicyprivilegestouserswithoutestablishedloginnamesand passwords. Inordertoconfigureguestnetworkingprivileges,youneedtosetthegueststatus,username,and password.Youcansetgueststatusfornoauthentication,RADIUSauthentication,ordisabled. Whenyousetgueststatustonoauthentication,gueststatusisprovidedwithitsassociatedpolicy, butnoauthenticationtakesplace.WhenyousetgueststatustoRADIUSauthentication,guest statusisprovidedonlyafterasuccessfulauthenticationtakesplace.Ifguestnetworkingstatusis disabled,allsupplicantsmustbeauthenticatedwithavalidusernameandpasswordatthelogin page. Table 2describeshowtooptionallyenableguestnetworkingprivileges. Table 2
Task Optionally enable guest status without authentication Optionally enable guest status with authentication. Optionally disable guest status
Page 19 of 36
Configuring Authentication
Procedure 4
Step 3. 4. 5. Task
Specify the CEP device IP address and mask or set to unknown. Set the CEP detection group protocol. Set the maximum or minimum port for the TCP or UDP group protocol.
CEP Configuration
Command(s) show policy profile all set cep policy {cisco | h323 | siemens | sip} policy-index set cep port port-string cep-type enable set cep port port-string cep-type disable set ciscodp port { [status {disable | enable}] [ vvid {vlan-id | none | dot1p | untagged}] [trust-ext {trusted | untrusted}] [cos-ext value] } port-string
4.
5.
6.
7. 8.
Set the MultiAuth mode. Display CEP connections, detection, policy and port settings.
set multiauth mode multi show cep {connections | detection | policy | port}
Page 20 of 36
Configuring Authentication
3.
Page 21 of 36
Configuring Authentication
switchdevices).Youmaychangetheprecedenceforoneormoremethodsbysettingthe authenticationmethodsintheorderofprecedencefromhightolow.Anymethodsnotenteredare givenalowerprecedencethanthemethodsenteredintheirpreexistingorder.Forinstance,ifyou startwiththedefaultorderandonlysetPWAandMAC,thenewprecedenceorderwillbePWA, MAC,802.1x,andCEP. Giventhedefaultorderofprecedence(802.1x,PWA,MAC,andCEP),ifauserwastosuccessfully authenticatewithPWAandMAC,theauthenticationmethodRADIUSFilterIDappliedwouldbe PWA,becauseithasahigherpositionintheorder.AMACsessionwouldauthenticate,butits associatedRADIUSFilterIDwouldnotbeapplied. Procedure 8describessettingtheorderforMultiAuthauthenticationprecedence. Procedure 8
Step 1. Task Set a new order of precedence for the selection of the RADIUS Filter-ID that will be returned when multiple authentication methods are authenticated at the same time for a single user. Reset the order MultiAuth authentication precedence to the default values.
2.
Page 22 of 36
Configuring Authentication
2.
3.
Page 23 of 36
Configuring Authentication
Procedure 10
Step 4. Task
Reset the maximum amount of time a session can last before termination to the default value for the specified authentication method.
4.
Page 24 of 36
Configuring Authentication
Table 3
Task
Display MultiAuth authentication idle timeout values. Display MultiAuth authentication session timeout values. Display MultiAuth authentication trap settings.
TheVLANauthorizationtablewillalwayslistanytunnelattributesVIDsthathavebeenreceived forauthenticatedendsystems,butaVIDwillnotactuallybeassignedunlessVLANauthorization isenabledbothgloballyandontheauthenticatingport.DynamicVLANauthorizationoverrides theportPVID.DynamicVLANauthorizationisnotreflectedintheshowportvlandisplay.The VLANegresslistmaybestaticallyconfigured,enabledbaseduponthesetvlanauthorization egresscommand,orhavedynamicegressenabledtoallowfullVLANmembershipand connectivity. Procedure 12describessettingVLANauthorizationconfiguration. Procedure 12
Step 1. 2. 3. Task Enable or disable VLAN authorization both globally and per port. Reset VLAN authorization configuration to default values for the specified port-list or for all. Display VLAN authorization configuration settings for the specified port-list or for all.
Page 25 of 36
Configuring Authentication
Note: Dynamic policy profile assignment is supported on the Matrix E1 and modular switch platforms.
Configuring RADIUS
Youcanset,clear,anddisplayRADIUSconfigurationforbothauthenticationandaccounting.
Page 26 of 36
Configuring Authentication
3.
4.
5. 6. 7.
set radius {enable | disable} clear radius {[state] [retries] [timeout] [server [index | all] [realm {index | all}] show radius [state | retries | authtype | timeout | server [index | all]]
Page 27 of 36
Configuring Authentication
8.
Page 28 of 36
LAN Cloud 1
Modular Switch Router
Configure policies Enable RADIUS Enable multi-user authentication
Page 29 of 36
Figure 5
LAN Cloud 1
Stackable Switch
Configure policies Enable RADIUS Enable multi-user authentication
2 5
Public internet access PWA Authentication IP address: 10.10.10.201
Enable PWA Configure IP address Enable Enhance Mode Enable Guest Status for RADIUS Authentification Set Guest ID and Password Enable Port
Note: The modular switch and stackable fixed switch authentication examples are presented here as a single discussion. Any input and information that is not applicable to both platform groups is identified. All other information is applicable to both platform groups. The stackable fixed switch example discussion assumes a C3 device authentication functionality.
OurconfigurationexampleconsistsofthefollowingstepsasshowninFigure 4andFigure 5and describedinthesectionsthatfollow: 1. 2. 3. 4. Configuringpolicies,RADIUS,andMultiAuthauthenticationontheswitch. CreatingRADIUSuseraccountsontheauthenticationserver. Configuringfortheengineeringgroup802.1xenduserstations,includingtheIPphoneinthe stackablefixedswitchconfiguration. ConfiguringfortheengineeringgroupSiemensCEPdevicesforthemodularswitch configuration.ConfiguringtheprinterclusterMACauthenticationforthestackablefixed switchconfiguration.
Page 30 of 36
5. 6.
System(rw)->set multiauth mode multi System(rw)->set multiauth port mode force-auth ge.1.5-7 System(rw)->set multiauth port numusers 6 ge.1.5-7 System(rw)->set multiauth port mode force-auth ge.1.19-24 System(rw)->set multiauth port numusers 6 ge.1.19-24
EnablesMultiAuthauthenticationsystemandmoduletrapsforthemodularswitch configuration.
System(rw)->set multiauth trap system enabled System(rw)->set multiauth trap module enabled
Page 31 of 36
System(rw)->set dot1x enable System(rw)->set dot1x auth-config authcontrolled-portcontrol forced-auth ge.1.5 System(rw)->set dot1x auth-config authcontrolled-portcontrol forced-auth ge.1.19 System(rw)->set dot1x auth-config authcontrolled-portcontrol forced-auth ge.2.24
Thiscompletesthe802.1xenduserstationsconfiguration.
Page 32 of 36
System(rw)->set cep enable System(rw)->set cep policy siemens 9 System(rw)->set cep port ge.1.16-18 siemens enable
ThiscompletestheSiemensCEPenduserstationsconfiguration.
WiththeauthenticationserverconfiguredwithaRADIUSaccountforeachprinter,andtheprinter policypreconfigured,enterthefollowingCLIinput:
System(rw)->set macauthentication enable System(rw)->set macauthentication password enterasys System(rw)->set macauthentication significant-bits 24 System(rw)->set macauthentication port enable ge.1.3-4
ThiscompletestheprinterclusterMACauthenticationconfiguration.
Page 33 of 36
OncethepolicyandRADIUSaccountareconfigured,enterthefollowingCLIinputontheswitch:
System(rw)->set pwa enable System(rw)->set pwa ipaddress 10.10.10.101 System(rw)->set banner \Enterasys Networks Public Internet Access Station\ System(rw)->set pwa enhancemode enable System(rw)->set pwa guestatus authradius System(rw)->set pwa guestname guest System(rw)->set pwa guestpassword password System(rw)->set pwa portcontrol enable ge.1.6
ThiscompletestheAuthenticationconfigurationexample.
Page 34 of 36
Table 4
Term
IEEE 802.1x
MAC-based Authentication MultiAuth Authentication Multi-user Authentication Port Web Authentication (PWA) RADIUS Filter-ID
RADIUS Protocol
Supplicant
Page 35 of 36
Revision History
Date 05-14-2008 07-11-2008 02-04-2009 04-29-2009 06-23-2009 04-15-2011 Description New document Added Enterasys Registration mark and fixed Version date in some footers. Spelled out D-Series, G-Series, and I-Series when appropriate. Clarified stackable fixed switch support. Provided hybrid authentication discussion. Clarified Multi-user support for stackable fixed switch devices. Added S-Series and K-Series support. Numerous miscellaneous edits.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,SSERIESandanylogosassociatedtherewith, aretrademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.For
acompletelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx.
Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Flex-Edge
ThisdocumentdescribestheFlexEdgecapabilityontheEnterasysSSeriesplatform.
For information about... What is Flex-Edge Implementing Flex-Edge Flex-Edge Overview Terms and Definitions Refer to page... 1 1 2 3
What is Flex-Edge
FlexEdgeisthecapabilitytoclassifyandprioritizetrafficasitenterstheswitch,assertflow control,andensurethathigherprioritytrafficreceivedbytheswitchisforwardedtothepacket processoraheadoflowerprioritytraffic.WiththeseFlexEdgecapabilities,theswitchis significantlylessvulnerabletonetworkcongestionissuesatpeaktraffictimes.Trafficcriticalto ensuringthealwaysupoperationalstateofthenetworkandtomaintainingapplication continuityisidentifiedandprioritizedatingress,priortobeingpassedtothepacketprocessor. Networkhighavailabilityisassured,andimportantusersandapplicationsareguaranteed bandwidthandpriority. ThediversityofIPenableddevices,combinedwithrealtimeapplicationssuchasVoIP,videoand audiostreaming,andsoftwareondemand,haveexponentiallyincreasednetworktrafficvolume. Theintroductionofthesefunctionalitiescreatesaneedforbandwidthmanagementtoprevent portoversubscriptionandassurethatthelowestprioritypacketsaredroppedshouldport oversubscriptionoccur.FlexEdgeprovideskeycomponentsofthatbandwidthmanagement requirement. PacketclassificationandprioritizationishandledbytheadvancedMediaAccessControl(MAC) chip.Shouldcongestionstarttooccur,theMACchipiscapableofsendingaMACpauseoutthe congestingportrequestingthatdownstreamportstemporarilystopsendingtraffictothedevice. FlexEdgeforwardshigherprioritypacketstothepacketprocessoraheadoflowerpriority packets.AnydroppingofpacketsishandledinthepacketbufferbyQoS.
Implementing Flex-Edge
DropprecedenceistheonlyadministrativelyconfigurableFlexEdgeparameter.Allother FlexEdgeprocessingishardcoded.DropprecedenceisaCoSsettingthatisappliedtoapolicy rule.Dropprecedencecansetthepacketprioritytofavored,besteffort,orunfavored.
Page 1 of 5
Flex-Edge Overview
Flex-Edge Overview
AllSSeriesswitchessupporttheFlexEdgefeature,whichprovidesauniquemechanismforthe classificationoftrafficasitenterstheswitch. Figure 1onpage 2providesahighlevelviewofFlexEdgeprocessing.TheadvancedMACchip appliespacketclassificationandbandwidthcontroltotheingressingpackets.Ifrequired,the MACchipsendsaMACpausedownstreamtotemporarilystopthetrafficcomingattheport. Packetsclassifiedwiththehighestpriorityareforwardedtothepacketprocessorbeforepackets withalowerpriority.Packetbufferingprovidesreliefforcongestionattheegress.Ifpacketsmust bedropped,lowestprioritypacketsaredroppedinthepacketbufferbaseduponQoS configuration.Finally,packetsegressthedevicebaseduponpacketscheduling. Figure 1 Flex-Edge Processing
Page 2 of 5
TheonlyuserconfigurableaspectoftheFlexEdgefeatureisdropprecedence.Dropprecedenceis aCoSsettingsoption.CoSsettingsareassignedtoapolicyrule.InaFlexEdgecontext,drop precedenceislimitedtorulesthatapplytoasingleportandspecifyatrafficclassificationofeither portormacsource.Foranypacketsmatchingthepolicyrule,youcanassignoneofthree dropprecedenceprioritylevels: FavoredAdropprecedencevalueof0providesabetterchanceofbeingpassedonforpacket processingthantrafficcategorizedasbesteffort. BestEffortAdropprecedencevalueof1providesabesteffortlevelofprioritywithinthe FlexEdgepriorityscheme. UnfavoredAdropprecedencevalueof2providesasomewhatworsechanceofbeingpassed onforpacketprocessingthantrafficcategorizedasbesteffort.Thisisthelowestpossible prioritysettingwithintheFlexEdgemechanism.
Page 3 of 5
Table 1
Term
Flex-Edge
MAC pause Media Access Control (MAC) priority queuing QoS VoIP
Page 4 of 5
Revision History
Date December 02, 2010 Description New Document.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2010Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSSECURESTACKandanylogos associatedtherewith,aretrademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStates andothercountries. ForacompletelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
For information about... What is Link Aggregation Why Would I Use Link Aggregation in My Network How Can I Implement Link Aggregation Link Aggregation Overview Configuring Link Aggregation Link Aggregation Configuration Example Terms and Definitions
Refer to page... 1 2 2 3 10 12 21
Page 1 of 23
Page 2 of 23
LACP Operation
InordertoallowLACPtodeterminewhetherasetoflinksconnecttothesamedevice,andto determinewhetherthoselinksarecompatiblefromthepointofviewofaggregation,itis necessarytobeabletoestablish: Agloballyuniqueidentifierforeachdevicethatparticipatesinlinkaggregation. Ameansofidentifyingthesetofcapabilitiesassociatedwitheachportandwitheach aggregator,asunderstoodbyagivendevice. AmeansofidentifyingaLAGanditsassociatedaggregator.
Page 3 of 23
Figure 1displaysaLAGformationexamplecontainingthreedeviceswithfive100Mbpsportsand three1Gbportsconfigured.Forthisexample,allportsareoperatinginfullduplexmode,andthe adminkeyforallLAGportshasbeensetto100.DeviceAistheactorandthereforedetermines whichportswilljoinaLAG.DevicesBandCarethepartners. InourexampletwoLAGshaveformedbecausetheactorportsaresharedbetweentwopartner devices.AttemptingtoformasingleLAGusingalltheactorportswouldhavebrokentherule thatactorandpartnerportsmustoperateinparallel. Figure 1 LAG Formation
Device B
PARTNER
Port Speed
100M 100M 100M
Admin Key
100 100 100
1 2 3
ACTOR
Admin Key
100 100 200
Port Speed
100M 100M 100M
Device A
LAG 1
1 2 3
LAG 2
4 5 6 7 8
Device C
1 2 3 4 5 6 7 8
Page 4 of 23
Forthesereasons,LAG1(lag.0.1)isformedusingactorandpartnerports1and2. Actorports48ondeviceAdirectlyconnecttopartnerports48ondeviceC: Becauseallportsareoperatinginfullduplexmode,ruleoneissatisfiedforallfiveports. Investigatingportadminkeys,weseethatports46ondeviceAaresetto100(thesame settingasallLAGportsonthedevice),whileports7and8ondeviceAaresetto300and400, respectively.BecauseportadminkeysforallLAGsandthephysicalports46arethesame, physicalports46satisfyrule2.Becausetheadminkeysettingsforphysicalports7and8do notagreewithanyLAGadminkeysettingonthedevice,ports7and8cannotbepartofany LAG. Becauseports46forboththeactorandpartneroperateinparallelwitheachother,rule3is satisfiedfortheseports. Rule4issatisfied,regardlessofwhethersingleportLAGisenabled,becausetherearethree aggregatableportpairingsbetweendevicesAandC.
Forthesereasons,LAG2isformedusingactorandpartnerports46.
Note: Port speed is not a consideration in the forming phase for LAGs. LAG 2 contains 100Mbps and 1Gb port members.
Attached Ports
OnceaLAGisformed,twostepsmusttakeplacebeforetrafficcanpassovertheLAG: Thedevicethatwillchoosewhichportstomovetotheattachedstatemustbeidentified TheprocessofmovingthechosenportstotheLACPattachedstatemusttakeplace
AsystemID,madeupofthedeviceMACaddressandthesystempriority,isassociatedwitheach device.ThedevicewiththelowersystempriorityisinchargeofselectingtheLAGmembersto movetotheattachedstate.Ifasystemprioritytieoccurs,thesystemwiththelowerMACaddress valuebreaksthetie. OnlyLAGmemberswiththesameportspeedcanbemovedtotheattachedstate.Inacasewhere multiplespeedsarepresentinaLAG,theLAGmemberwiththelowestportpriorityonthedevice incharge,aswellasallothermemberswiththesameportspeedasthememberwiththelowest portpriority,areselectedandmovedtotheattachedstate.UsingLAG2inFigure 1onpage 4asan example,iftheLAG2memberportprioritiesaresetasshowninTable 1onpage 5,ports4and5 aremovedtotheattachedstate. Table 1 LAG2 Port Priority Assignments
Port Speed 100Mbps 100Mbps 1Gb Port Priority 200 300 300 Port Number 4 5 6
Page 5 of 23
Thisistruebecauseport4hasthelowestpriorityofthethreeportscurrentlyintheLAG,andport 5hasthesamespeedastheportwiththelowestpriorityintheLAG,regardlessofitspriority. Becauseport6hasbothadifferentspeedandahigherprioritythantheportwiththelowest priorityintheLAG,itisnotmovedtotheattachedstate. IfLAGmemberswithdifferentportspeedsshouldtieforthelowestportpriority,theLAG memberwiththelowestportnumberbreaksthetie.Inourexample,shouldallthreeportshave thesameportpriority,ports4and5wouldstillbetheportsmovedtotheattachedstatebecause port4hasthelowestportnumberandport5hasthesameportspeedasport4. Ifinourexampleyouwantedthereverseoutcomeofport6movedtotheattachedstateinsteadof ports4and5,settingport6toalowerprioritythanports4and5,aswellasenablingthesingle portLAGfeatureonthisdevice,wouldaccomplishthatgoal. AggregatableportsnotmovedtotheattachedstatearemadeavailabletoformanotherLAG providingaLAGresourceisavailableforthissystem.Port6inFigure 1onpage 4,wasnotmoved totheattachedstate.Theonlycriteriaport6doesnotmeettoformitsownLAGisrule4:beinga singleaggregatableport.ThesingleportLAGfeaturemustbeenabledforport6toformaLAG.If singleportLAGisenabledonthissystem,port6wouldformandattachtoLAG3.Figure 2 illustratesthethreeLAGsdescribedinthisexample. Figure 2 LAGs Moved to Attached State
Device B
PARTNER
Port Speed
100M 100M 100M
Admin Key
100 100 100
1 2 3
ACTOR
Admin Key
100 100 200
Port Speed
100M 100M 100M
Device A
LAG 1
1 2 3
LAG 2
100 100
100M 100M
4 5
LAG 3
Device C
1 2 3 4 5 6 7 8
6 7 8
Page 6 of 23
Port Priority
Page 7 of 23
Table 2
Term
Administrative State
A default partner system ID can be set. This is a default MAC address for the system partner. (Optional) LACP PDU processing can be enabled or disabled for this port.
Flow Regeneration
Note: The flow regeneration feature is supported on the N-Series and S-Series platforms only.
Theoutportalgorithmdeterminesthecriteriatobeusedfordataforwardingportselection.There arethreealgorithmcriteriatochoosefrom:
Page 8 of 23
Enterasys Platform S-Series Modues N-Series DFE Diamond Modules N-Series DFE Platinum Modules N-Series DFE Gold Modules N Standalone (NSA) Stackable switch (all platforms) Standalone switch platforms
Note: For stackable platforms, the number of LAGs supported is per stack. A stack of stackable switches operate as a single logical device.
Page 9 of 23
Disabled (disallows creation of a single port LAG) N-Series, B2, B3, C2, C3: Enabled S-Series, B5, C5: Disabled 30 second: frequency of LACP PDU transmission 90 seconds: period before declaring the partner port down
LACP Port Timeout State Port state determining the frequency of LACP PDU transmission and period before declaring the partner LACP port down if no response is received.
Procedure 1describeshowtoconfigurelinkaggregation.
Note: In Procedure 1, Step 6, setting flow regeneration, and Step 7, setting the output algorithm, are only supported on the N-Series and S-Series products. All other steps are supported by the N-Series, S-Series, stackable, and standalone switch products.
Procedure 1
Step 1. Task
In switch command mode, enable LACP on the device. LACP state is enabled by default for all devices. Optionally, change the system priority for the device. Optionally, change the administratively assigned key for each aggregation on the device. Optionally, enable single port LAGs on the device.
2. 3. 4.
set lacp asyspri value set lacp aadminkey port-string value set lacp singleportlag {enable | disable}
Page 10 of 23
Procedure 1
Step 5. Task
Optionally, modify the LAG port parameters. See Table 2 on page 7 for a description of port parameters. See Table 4 on page 10 for LACP port active state for your platform.
6. 7. 8.
Optionally, change how flows behave when a port joins or is removed from a LAG. Optionally, change the out-port behavior for flows over the LAG. Optionally, assign static ports to a LAG when the partner device only supports a non-LACP method of aggregation.
set lacp flowRegeneration {enable | disable} set lacp outportAlgorithm {dip-sip | da-sa | round-robin} set lacp static lagportstring [key] port-string
Page 11 of 23
Table 5
Task
Reset the LACP flow regeneration setting to its default value of disabled. Reset the LACP out-put algorithm setting to its default value of DIS-SIP.
show lacp singleportlag show port lacp port port-string {[status {detail | summary}] | [counters]} [sort {port | lag}] show lacp flowRegeneration show lacp outportAlgorithm
Page 12 of 23
LAG3providesanaggregateoffour1GbportsbetweentheC3stackableswitchesandthe server.
EachLAGconsistsoffourports.Theprimarygoaloftheaggregatesinthisexampleistoprovide linkandslotredundancyfortheaffecteddatastreams.Withthatinmind,LAGmembersare spreadbetweenavailablesystemslots.FouroutofthefiveS8availableslotsareusedproviding completeredundancyattheS8.AllthreeslotsareusedintheS3.Thefourportsfromtheserverto theC3stackableswitchesandtheC3stackableswitchestotheS8areevenlysplitbetweenthetwo stackableswitches. ForthisexamplewewillmanuallyconfiguretheLAGsthatwillformandpreventanyotherLAGs fromforming.BecausewehavespecificporttoLAGgoalsinmind,thefirstthingwewanttodo oneachdeviceistoensurethatLAGsformonlywhereweconfigurethem.Sincetheadminkey fortheLAGanditsassociatedportsmustagreefortheLAGtoform,aneasywaytoensurethat LAGsdonotautomaticallyformistosettheadminkeyforallLAGSonalldevicestoa nondefaultvalue.Thephysicalportswillinitiallyretainadminkeydefaults.Inourexample,the adminkeysforallLAGsaresettothehighestconfigurablevalueof65535.
Page 13 of 23
Figure 3
LAG Admin KEY 1 100 2 200 3 300 System Priority S8 32768 S3 100 SS 100 Server > 100
LAG1 Stackable
S3 to S8 PORTS ge.1.1 ge.1.2 ge.2.1 ge.3.1 Admin KEY 100
LAG2
S3 Edge Switch
Stackable to S8 PORTS ge.1.1 ge.1.2 ge.2.1 ge.2.2 Admin KEY 200 Stackable to Server PORTS fe.1.1 fe.1.2 fe.2.1 fe.2.2 Admin KEY 300
LAG3
End-Users
End-Users
Server to Stackable PORTS NIC1 NIC2 NIC3 NIC4 Admin KEY 300
Page 14 of 23
Table 7
Device
S8 Distribution Switch
S3 Edge Switch
100
C3 Stackable Switch
200
300
Server
300
WhichdevicedeterminesportselectionfortheLAGisanoptionalconsideration.Ifsystem prioritiesremainatthedefaultvalue,thelowestMACaddressdevicedeterminesportselection fortheLAG.Forpurposesofthisexample,wewillsetthesystempriorityoftheS3to100to ensureitwillcontrolportselectionforLAG1,insteadoftheS8.TheC3stackableswitchsystem prioritywillbesetto100toensureitwillcontrolportselectionforLAG2,insteadoftheS8.Forthe stackableswitchtocontrolportselectionforLAG3requiresthatyouensurethattheserverhasa systempriorityhigherthan100. EachLAGinourexampleismadeupofphysicalportsofthesamespeed,sothereisnoneedtoset theportprioritytoanondefaultvalue.Theonlyportvaluetobechangedistheadminkeyfor eachphysicalportandeachLAG.ThesemodificationsaredetailedinTable 7onpage 15.
Page 15 of 23
GiventhattheintentoftheexampleistohavethreeLAGsof4portseach,thereisnoneedto enablethesingleportLAGfeature.OncetheLAGsinitiate,theywillpersistacrossresets.Should onlyasingleportbeactiveafterareset,theLAGwillformregardlessofthesingleportLAG featuresetting. FlowregenerationisenabledfortheS8andS3inourexample.Thissettingwillensurethatshould aLAGportbecomedisabledandthenbecomeactiveagain,LACPwillredistributeexistingflows overalltheportsinthenewLAG.Thestackableswitchdoesnotsupportflowregeneration. Theoutputalgorithmdefaultstoselectingtheoutputportbaseduponthedestinationandsource IPaddress.Thissettingwillnotbechangedinourexample.Inanycase,notethatthestackable switchdoesnotsupporttheoutputalgorithmfeature.
LAGs1and2willformontheS8soweneedtosettheadminkeysfortheseLAGs:
S8(rw)->set lacp aadminkey lag.0.1 100 S8(rw)->set lacp aadminkey lag.0.2 200
LACPportstateisdisabledbydefaultontheS8,sowewillenableLACPportstatehere.Wenext wanttosettheadminkeysandportenableLACPfortheS8physicalports:
S8(rw)->set S8(rw)->set S8(rw)->set S8(rw)->set S8(rw)->set S8(rw)->set S8(rw)->set S8(rw)->set port port port port port port port port lacp lacp lacp lacp lacp lacp lacp lacp port port port port port port port port ge.1.1 ge.2.1 ge.3.1 ge.4.1 ge.1.2 ge.2.2 ge.3.2 ge.4.2 aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey 100 100 100 100 200 200 200 200 enable enable enable enable enable enable enable enable
BecausewewanttheS3andtheC3stackabletobeinchargeofportselection,thesystempriority fortheS8willbeleftatthedefaultvalueof32768.WenextenableflowregenerationontheS8:
S8(rw)->set lacp flowRegeneration enable
LAG1willformontheS3soweneedtosettheadminkeyforthisLAG:
S3(rw)->set lacp aadminkey lag.0.1 100
LACPportstateisdisabledbydefaultontheS3,sowewillenableLACPportstatehere.Wenext wanttosettheadminkeysandportenableLACPfortheS3physicalports:
S3(rw)->set S3(rw)->set S3(rw)->set S3(rw)->set port port port port lacp lacp lacp lacp port port port port ge.1.1 ge.1.2 ge.2.1 ge.3.1 aadminkey aadminkey aadminkey aadminkey 100 100 100 100 enable enable enable enable
Page 16 of 23
NextwewanttochangethesystempriorityfortheS3sothatitwillbeinchargeofportselection onLAG1:
S3(rw)->set lacp asyspri 100
WenextenableflowregenerationontheS3:
System(rw)->set lacp flowRegeneration enable
LAGs2and3willformonthestackableswitchsoweneedtosettheadminkeyforthisLAG:
C3(rw)->set lacp aadminkey lag.0.2 200 C3(rw)->set lacp aadminkey lag.0.3 300
LACPportstateisenabledbydefaultontheC3,sowedonothavetoenableLACPportstatehere. Wenextwanttosettheadminkeysforthestackableswitchphysicalports:
C3(rw)->set C3(rw)->set C3(rw)->set C3(rw)->set C3(rw)->set C3(rw)->set C3(rw)->set C3(rw)->set port port port port port port port port lacp lacp lacp lacp lacp lacp lacp lacp port port port port port port port port ge.1.1 ge.1.2 ge.2.1 ge.2.2 ge.1.3 ge.1.4 ge.2.3 ge.2.4 aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey aadminkey 200 200 200 200 300 300 300 300
Nextwewanttochangethesystempriorityforthestackableswitchsothatitwillbeinchargeof portselectiononLAGs2and3:
C3(rw)->set lacp asyspri 100
Thiscompletestheexample1configuration.
Page 17 of 23
chassis.ThefirstLAGconsistsoftwo1Gbports.ThesecondLAGconsistsofeight100Mbpsports. Inthisexamplewewillensurethatthetwo1GbportLAGformsbeforetheeight100Mbsport LAG. SeeFigure 4onpage 19foranillustrationofthisexample,includingport,keyandportpriority assignments. TheLAGconfigurationwillensurethatthetwo1GbportsattachtothefirstavailableLAG (LAG1).Theeight100MbpsportswillthenattachtothesecondavailableLAG(LAG2) WhichdevicedeterminesportselectionfortheLAGisanoptionalconsideration.Forthis example,systemprioritiesarenotmodified,thelowestMACaddressdevicewilldetermineport selectionfortheLAG. Therearetwophysicalportspeedsinourexample,100Mbpsand1Gb.ALAGonlymovesportsof thesamespeedtotheattachedstate.Selectingtheportstomovetoattachedstateisbasedupon thelowestportpriority.Ifportprioritiesarethesame,thelowestportnumberbreaksthetie.For ourexample,wewanttoensurethatthe1GbportsaremovedtotheattachedstatforLAG1.Port priorityfor1Gbportsissetto100.Portpriorityfor100Mbpsportsisleftatthedefaultvalueof 32768. TheadminkeyforeachphysicalportandLAGintheexampleissetto100.Thisensuresthat LAGswillformforeachsetofports. ForthisexamplewewillallowsingleportLAGstoform.ThesingleportLAGfeaturewillbeset toenabledforbothdevices. Flowregenerationisenabledforbothdevicesinourexample.Thissettingwillensurethatshould aLAGportdropoutandthenbecomeactiveagain,LACPwillredistributeexistingflowsoverall theportsinthenewLAG. Theoutputalgorithmdefaultstoselectingtheoutputportbaseduponthedestinationandsource IPaddress.Thissettingwillnotbechangedinourexample.
Page 18 of 23
Figure 4
Example 2 Configuration
S3 Upstream Switch
Upstream to Edge PORTS ge.1.1-4 Port Priority 32768 ge.2.1-4 Port Priority 32768 ge.2.1 Port Priority 100 ge.3.1 Port Priority 100 Admin KEY all ports 100
LAG1
LAG2
KEY 100
KEY 100
Edge to Upstream PORTS fe.1.1-8 Port Priority 32768 ge.2.1 Port Priority 100 ge.3.1 Port Priority 100 Admin Key for all ports 100
N3 Edge Switch
End-Users
Page 19 of 23
WenextenablesingleportLAGsonthisdevice:
System(rw)->set lacp singleportlag enable
WenextenableflowregenerationontheN3:
System(rw)->set lacp flowRegeneration enable
LACPportstateisdisabledbydefaultontheS3,sowewillenableLACPportstatehere.Wenext wanttosettheadminkeysandportenableLACPfortheS3physicalportsassociatedwithLAG1:
S3(rw)->set S3(rw)->set S3(rw)->set S3(rw)->set port port port port lacp lacp lacp lacp port port port port ge.2.1 ge.3.1 ge.1.1 ge.1.2 aadminkey aadminkey aadminkey aadminkey 100 100 100 100 enable enable enable enable
Page 20 of 23
WenextenablesingleportLAGsonthisdevice:
S3(rw)->set lacp singleportlag enable
WenextenableflowregenerationontheS3:
S3(rw)->set lacp flowRegeneration enable
Thiscompletestheexample2configuration.
LAG
LACPDU
Page 21 of 23
Table 8
Term
Admin Key
Port Priority
System Priority
Page 22 of 23
Revision History
Date December 05, 2008 December 02, 2010 Description New Document. Update for S-Series, B5, and C5 platforms.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2010Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYS,SSERIESandanylogos associatedtherewith,aretrademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStates andothercountries. ForacompletelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Note: Link flap detection is not supported on Enterasys Matrix X-Series devices.
For information about... What is Link Flap Detection? Why Would I Use Link Flap Detection in My Network? How Do I Implement Link Flap Detection? Configuring Link Flap Detection
Refer to page... 1 1 1 2
Page 1 of 4
Procedure 1
Step 1. Task
In switch mode, enable ports for sending SNMP trap messages when their link status changes. By default, all ports on your Enterasys device are enabled to send SNMP trap messages indicating changes in their link status (up or down).
2.
Enable link flap detection either globally or on specific ports. By default, link flap is disabled globally.
set linkflap globalstate {disable | enable} set linkflap portstate {disable | enable} [port-string] set linkflap interval port-string interval_value set linkflap threshold port-string threshold_value
3.
(Optional) Set the time interval (in seconds) for accumulating link flapping instances. By default, this value is set to 10 seconds. (Optional) Set the number of link flapping instances necessary to trigger the link flap action. By default, this value is five link flapping instances. (Optional) Set how the Enterasys device will react to excessive link flapping: Disable the port Generate a Syslog entry Generate an SNMP trap message All of the above By default, all of the above actions occur in reaction to excessive link flapping. To clear reactions to excessive link flapping, use the clear command.
4.
5.
clear linkflap action [port-string] {disableInterface | gensyslogentry | gentrap | all} set linkflap downtime port-string downtime_value
6.
(Optional) Set the time interval, in seconds, that one or more ports will be disabled after excessive link flapping. By default, this value is 300 seconds.
RefertothedevicesCLIReferenceGuideorConfigurationGuideformoreinformationabouteach command.
Page 2 of 4
Thenetworkadministratoralsosetsvaluesfortheinterval,threshold,anddowntimeontheports.
Matrix(rw)->set linkflap interval ge.1.1-12 20 Matrix(rw)->set linkflap threshold ge.1.1-12 8 Matrix(rw)->set linkflap downtime ge.1.1-12 600
Ifthelinkflapthresholdisexceededwithinthelinkflapinterval(eightlinkflapconditionswithin 20seconds,asconfiguredabove),theMatrixNdevicewill,bydefault,disabletheport(for600 seconds,asconfiguredabove)andgeneratebothasyslogentryandanSNMPtrap.Thesedefault actionscanbechangedbyusingtheset linkflap actioncommand. TheMatrixNdevicedisablesportsge.1.1andge.1.2whenexcessivelinkflappingoccursonthe ports.Thenetworkadministratorcancheckthestatusoftheportsandthenumberoflinkflap conditionsthatoccurredbyusingtheshow linkflap metricscommand. Whiletheportsaredisabled,thenetworkadministratorreplacesthepotentiallyfaultyEthernet cablesconnectingtheportstothePoEdevices.Thenetworkadministratorthenenablestheports.
Matrix(rw)->clear linkflap down ge.1.1-2
IfnoadditionalpowerlossesoccuronthePoEdevicesandnoadditionallinkflappingconditions occur,thenetworkadministratordisableslinkflapdetectiononthePoEports.
Matrix(rw)->set linkflap portstate disable ge.1.1-12
RefertothedevicesCLIReferenceGuideorConfigurationGuideforadescriptionoftheoutputof eachcommand.
Page 3 of 4
Revision History
Date 01-29-09 Description New document
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2009Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSNETSIGHT,SECURESTACK, ENTERASYSSECURESTACK,LANVIEW,WEBVIEW,andanylogosassociatedtherewith,aretrademarksor registeredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Foracompletelistof Enterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
What is LSNAT?
LSNATisaloadbalancingroutingfeature.Itprovidesloadsharingbetweenmultipleservers groupedintoserverfarmsthatcanbetailoredtoanindividualserviceorallservices,without requiringanymodificationtoclientsorservers.ExamplesofwellknownservicesareHTTPon port80,SMTP(email)onport25,orFTPonport21.LSNATisdefinedinRFC2391. TherearethreeLSNATconfigurationcomponents: Theclientthatisrequestingaservicefromtheserver Thevirtualserver,configuredontheLSNATrouter,thatinterceptstheservicerequestand determinesthephysical(real)servertherequestwillbeforwardedto Theserverfarmthatisalogicalentitycontainingthemultiplerealservers,oneofwhichwill servicetheclientsrequest
Figure 1onpage 2providesthefollowingexampleofanLSNATdeployment: 1. 2. Arequestforserviceissentbytheclienttotheserverfarm. ThedestinationaddressfortheservicerequestisthevirtualserversuniqueVirtualIP(VIP) address.AVIPaddresscanbeanIPaddressoranIPaddressandportaddresscombination. ThesameIPaddresscanbeusedformultiplevirtualserversifadifferentportaddressisused. TheLSNATconfiguredrouterrecognizestheVIPaddressandknowsthatLSNATmustselect arealservertoforwardtherequestto. Beforeforwardingtherequest,basedupontheserverloadbalancingprocessconfigured (roundrobinisdisplayed),LSNATselectstherealserverforthisrequest.LSNATchangesthe destinationIPaddressfromtheVIPaddresstotheaddressoftheselectedrealservermember
Page 1 of 28
3.
September 8, 2010
Figure 1
LSNAT Overview
ServerFarm
2
Real Server IP Address Request VIP to Real IP Address Translation LSNAT Configured Virtual IP Address
3 4
Real Server IP Address Server Response Packet
Router
Global Internet
5
Response Real al IP to VIP Address Translation Client
September 8, 2010
Page 2 of 28
ServerandTCP/UDPportverificationcanensurethattheportsusedbyLSNATareoperational. TCP/UPDportserviceverificationiscapableofdeterminingwhetheraserverisactivebefore creatingasession.Thisfeatureeliminatesthepointoffailurevulnerabilitybyautomatically recognizingaserverisdownandtakingitoutoftheLSNATloadbalancingprocess. SecurityisimprovedsinceonlytheVIPisknown,notthespecificserveraddresses,ensuringthat onlytheappropriatetrafficgoestotheservers. LSNATimprovesnetworkperformancebylevelingtrafficovermanysystems.UsingLSNATin conjunctionwithAggregateLinksremovestheperformancebottleneckandreliabilityconcernsof onephysicallinktoaserverbybundlingmultiplelinks,withfailoverifalinkgoesdown. UtilizingtheIPPolicyandQoSfeaturesoftheSSeriesandNSeriesdeviceswiththeLSNAT featurefurtherimprovestheperformanceandsecurityofthenetwork.WhentiedwiththeVirtual RedundantRouterProtocol(VRRP),thenetworkbecomesevenmorereliableandsecure. Forallthesereasons,LSNATisidealforenterpriseaccountwebservers,applicationservers,or databaseservers.
3.
4.
5.
Managearealserverbyoptionallyclearingloadbalancingconnectionsorstatistics
September 8, 2010
Page 3 of 28
LSNAT Overview
LSNAT Overview
ThissectionprovidesanoverviewoftheLSNATcomponents.
Notes: LSNAT is currently supported on the Enterasys S-Series and N-Series products. This document details the configuration of LSNAT for these products. LSNAT is an advanced routing feature that must be enabled with a license key on the N-Series router. An advanced routing license is currently not required on the S-Series platform. If you have purchased an advanced license key, and have enabled routing on the device, you must activate your license as described in the configuration guide that comes with your Enterasys N-Series product in order to enable the LSNAT command set. If you wish to purchase an advanced routing license, contact Enterasys Networks Sales. A minimum of 256 MB of memory is required on all modules in order to enable LSNAT. See the SDRAM field of the show system hardware command to display the amount of memory installed on a module. An N-Series module memory can be upgraded to 256 MB using the DFE-256MB-UGK memory kit.
TheLSNATconfigurationismadeupofoneormoreserverfarms,eachcontainingmultiplereal serversthatfacetheclientthroughaconfiguredvirtualserver.AllaspectsofanLSNAT configurationrelatetotheconfigurationormanagementofoneofthesethreeLSNATcomponents: serverfarm,realserver,andvirtualserver. Figure 2onpage 5presentsanLSNATpacketflow.Arequestforservicesissentbytheclientto theVirtualserverIPaddress(VIP)ontheLSNATconfiguredrouter.Thesourceaddressforthis requestistheclientIPaddress.ThedestinationaddressfortherequestistheLSNATconfigured VIPaddress.TheLSNATconfiguredrouterrecognizestheVIPaddressandbasedupontheserver loadbalancingprocessconfigured(roundrobinisdisplayed)LSNATchangesthedestination addressfromtheVIPaddresstotheaddressofoneoftherealservermembersoftheserverfarm associatedwiththeVIPaddress.Thepacketisforwardedtotheselectedrealserver. Whentherealserversendsaresponsebacktotheclient,LSNATseestherealserveraddressand translatesitbacktotheVIPaddressbeforeforwardingthepacketontotheclient.
September 8, 2010
Page 4 of 28
LSNAT Overview
Figure 2
10.10.125.1:80
Router
10.10.125.3:80
Global Internet
VIP194.56.13.2:80
Client IP196.86.100.12:125
Round Robin
Theroundrobinalgorithmtreatsallserversequallybyorderingtheserversandselectingthem oneatatimeforeachnewsessionrequest.Whenitgetstothelastrealserverintheordering,it startsatthebeginningagain.
September 8, 2010
Page 5 of 28
LSNAT Overview
Least Connections
Theleastconnectionsalgorithmalwaysassignsthenextsessiontotheserverwiththeleast numberofactivesessionscurrentlyassigned.
Stickiness
StickinessreferstotheabilityofavirtualservertoassociatetheclientsourceIPaddress(and optionally,destinationIPanddestinationUDP/TCPportnumber)IPnetworktupleinformationto arealserver. Avirtualserverusingstickinesswillcreateastickyentrywhenitcreatesabinding.Thesticky entrycontainsamappingoftheIPnetworktupleinformationandtherealserverthatwas selected.Thebindingscancomeandgobutthestickyentriespersistusingaseparateidletimer. Whenanewrequestisprocessedbyavirtualserver,thestickytableischeckedforanentry matchingthevirtualserversstickytype.Ifanentryisfound,thentheloadbalancingalgorithmis skippedandtherequestismappedtothestickyentrysindicatedrealserver. Inthiswayavirtualserverassociatesparticularclientstoarealserverforaslongasthesticky entryremainsinthetable. Astickyentrywillonlystartagingwhenithasnoassociatedbindings.
Failure Detection
ItisimportantforLSNATtoknowwhetheraserverisdownsoitcanberemovedfromtheserver selectionprocess.Thereareanumberofmethodstodeterminewhetherarealserverisupor downbeforebeingselectedforapotentialLSNATsession: PingTherealserverispinged. TCP/UDPPortServiceVerificationTheapplicationserviceportisverified. ApplicationContentVerification(ACV)Thecontentofanapplicationisverified.
September 8, 2010
Page 6 of 28
LSNAT Overview
Ping
Realserverfailuredetectioncanbeconfiguredforpingonly.Inthiscase,therealserverispinged beforeasessioniscreated.
September 8, 2010
Page 7 of 28
LSNAT Overview
September 8, 2010
Page 8 of 28
LSNAT Overview
addressthatreturnstrafficbackthroughtheLSNATrouter.SincetheclientIPaddressesare usuallyunknowntotherealserver,mostrealserversendupsettingtheirdefaultroutertothe LSNATrouter.IftheLSNATrouterisnotconfiguredasthedefaultrouter,theLSNATrouterand realservermustbelocatedsomewhereinthenetworktopologythatguaranteesthatreturntraffic flowsthroughtheLSNATrouter. Ifinstead,theclientIPaddressisNATed,thisallowstherealserverstobelocatedanywhereina network,sincethepacketsfromroutertorealserverwillbesourceNATedwithanIPaddress ownedbytherouteritself. UsethesourcenatpoolcommandtospecifyaNATpooltouseforsourceNATing.TheNATpool isusedinanoverloadmode.
September 8, 2010
Page 9 of 28
Configuring LSNAT
Configuring UDP-One-Shot
ManyUDPapplicationssendonlytwopacketsintheformofarequestandareply.Forsuch applicationsitisawasteofresourcestosetupanewbindingandhardwareconnectionforevery requestandthenleteachbindingidleageout.WithUDPoneshotconfigured,abindingis createdandtherequestpacketissent.Thereceptionofareplypacketbackcausesthebindingto bedeletedwithinonesecond.BindingscreatedbyUDPoneshotwillnotresultintheinstallation ofahardwareconnection. UsetheudponeshotcommandinSLBvirtualserverconfigurationcommandmodetoenable UDPoneshotonavirtualserver.
Configuring LSNAT
ThissectionprovidesdetailsfortheconfigurationofLSNATontheEnterasysSSeriesand NSeriesproducts. Table 1listsLSNATparametersandtheirdefaultvalues. Table 1 Default LSNAT Parameters
Description The port number for the FTP control port for all virtual servers. The load balancing algorithm for this server farm. Method used to determine the state of a real server. The ICMP Ping failure detection interval. The number of times an ICMP ping failure will result in a retry. Specifies an application failure detection interval in seconds. Specifies the number of times a TCP application failure will result in a retry. Application port monitoring faildetect type. Default Value 21 Round Robin Ping 5 seconds 4 15 seconds 4 TCP
Parameter Port Number (FTP) Predictor Faildetect Type Ping Interval Ping Retries application failure interval application failure retries Failure Detection Application
September 8, 2010
Page 10 of 28
Configuring LSNAT
Table 1
exact
Unlimited
Weight
Service Type
None
Resource Bindings Reals Server Farms Sticky Entries VIP Addresses Virtual Servers
September 8, 2010
Page 11 of 28
Configuring LSNAT
WhendifferentVIPsaccessthesamerealserverindifferentserverfarms,thepersistencelevel mustbesetthesame.
Inordertousestickiness,thefollowingconfigurationcriteriaarerequired: Stickinessmustbeconfiguredforthevirtualserver. Therealserversinthisserverfarmaretobeusedforallservices.Theserversarenotallowed tobeusedwithotherserverfarmstosupportothervirtualserverservices.Thereisone exceptiontothisrule,describedinthenextbulletitem. StickinessmeansallTCPportsorallUDPportsonthevirtualserveraresupported,butnot both.YoucancreatetwovirtualserverswitheitherthesameIPaddressanddifferentports,or differentIPaddresses(oneforTCPprotocols/portsandoneforUDPprotocols/ports)anduse thesamerealservers(withdifferentserverfarmnames).ThatwayallTCPandUDPportsare supportedbythesamesetofrealservers. Port0inthevirtualserverhastobeusedtosupportthisserviceandisreservedforthis purpose.
3.
inservice
2.
faildetect {type {both | ping | app [tcp | udp] | acv [tcp | udp] | none}} | ping-int seconds ping-retries number | app-int seconds app-retries number
September 8, 2010
Page 12 of 28
Configuring LSNAT
Procedure 2
Step 3. Task
In SLB real server configuration command mode, if application or verification error handling was selected, set the verification string that will be used for this real servers application verification. In SLB real server configuration command mode, if application or verification error handling was selected, set the verification reply string that will be used for this real servers application verification. In SLB real server configuration command mode, if required, set the verification quit string for when the protocol requires the user to issue a command to close the session. In SLB real server configuration command mode, optionally set an exact application verification reply string index for when the contents of the response is not known to you. In SLB real server configuration command mode, optionally limit the maximum number of active connections for this real server. In SLB real server configuration command mode, optionally configure a weight for this real server to be used by the round robin load balancing algorithm. In SLB real server configuration command mode, enable each real server for service.
4.
5.
6.
7.
maxconns maximum-number
8.
weight weight-number
9.
inservice
3.
serverfarm serverfarm-name
September 8, 2010
Page 13 of 28
Configuring LSNAT
Procedure 3
Step 4. Task
In SLB virtual server configuration command mode, configure the virtual server IP address (VIP) or proceed to the next step and configure a range of virtual server IP addresses. You must specify whether the VIP uses TCP or UDP. For TCP ports you can optionally specify the FTP service; for UDP ports you can optionally specify the TFTP service. In SLB virtual server configuration command mode, if you did not configure a VIP in the preceding step, configure a range of virtual server IP addresses. You must specify whether the VIPs will use TCP or UDP. For TCP ports you can optionally specify the FTP service; for UDP ports you can optionally specify TFTP service. In SLB virtual server configuration command mode, optionally configure a client source NAT pool to source NAT the traffic through the virtual server with the IP addresses from the NAT pool. In SLB virtual server configuration command mode, enable the virtual server for service In SLB virtual server configuration command mode, optionally configure this virtual server to participate in VRRP state changes. Specify the VLAN on which the VRRP is configured and the virtual router ID associated with the routing interface for this VRRP. In SLB virtual server configuration command mode, optionally restrict access to this virtual server to configured clients. In SLB virtual server configuration command mode, optionally configure UDP application connections to delete the binding when the reply packet is received. Bindings created by UDP-one-shot will not result in the installation of a hardware connection. In SLB virtual server configuration command mode, optionally configure the stickiness type. In SLB virtual server configuration command mode optionally configure the sticky entry timeout value for this virtual server. In global configuration command mode, optionally allow specific clients to access the load balancing real servers in a particular LSNAT server farm without address translation. In router command mode, optionally clear sticky entries or remove bindings.
5.
6.
7. 8.
9.
10.
udp-one-shot
11. 12.
13.
14.
clear ip slb {sticky | bindings} {all | id id | match {sip | *} {sport | *} {dip | *} {dport | *}}
September 8, 2010
Page 14 of 28
Configuring LSNAT
show ip slb vservers [detail | virtserver-name] show ip slb statistics show ip slb bindings {match [ip-address | *] | id id | summary} show ip slb info show ip slb sticky {match sip port dip port | id id | summary} show ip slb statistics-sticky
September 8, 2010
Page 15 of 28
Server Farms
Forboththepublicproductbasedandenterpriseinternalserverfarms,theenterpriseITclients willhavedirectaccesstotheserverswithoutanyaddresstranslationrequired.Allotherclients thathaveaccessrightstotheseserverfarmswillbeaddresstranslated.
September 8, 2010
Page 16 of 28
September 8, 2010
Page 17 of 28
Figure 3
September 8, 2010
Page 18 of 28
September 8, 2010
Page 19 of 28
System(rw-config-slb-real)->faildetect acv-command HEAD / HTTP/1.1\\r\\nHost: www.myproduct.com\\r\\n\\r\\n System(rw-config-slb-real)->faildetect acv-reply 200 OK System(rw-config-slb-real)->faildetect read-till-index 100 System(rw-config-slb-real)->weight 2 System(rw-config-slb-real)->inservice System(rw-config-slb-real)->exit System(rw-config-slb-sfarm)->exit System(rw-config)->
September 8, 2010
Page 20 of 28
September 8, 2010
Page 21 of 28
September 8, 2010
Page 22 of 28
September 8, 2010
Page 23 of 28
September 8, 2010
Page 24 of 28
ThiscompletestheLSNATconfigurationexample.
port service verification predictor real server request packet response packet server farm session sticky type
sticky mode Virtual IP (VIP) address virtual server weighted round robin
September 8, 2010
Page 25 of 28
Revision History
Date 11/14/2008 04/16/2009 09/08/2010 Description New document. Added 256MB minimum memory requirement on all modules statement. Updated for S-Series. Added new resource-limits table.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2010Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSSSERIESandanylogosassociated therewith,aretrademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandother countries.ForacompletelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
September 8, 2010
Page 26 of 28
September 8, 2010
Page 28 of 28
Configuring Multicast
ThisdocumentprovidesinformationaboutconfiguringandmonitoringmulticastonEnterasys MatrixNSeries,EnterasysSecureStack,DSeries,GSeries,andISeriesdevices.
Note: For information on Enterasys Matrix X-Series support, refer to the Enterasys Matrix X Secure Core Router Configuration Guide.
For information about... What Is Multicast? Why Would I Use Multicast in My Network? How Do I Implement Multicast? Understanding Multicast Configuring Multicast
Refer to page... 1 1 2 2 15
What Is Multicast?
Multicastisaonesourcetomanydestinationsmethodofsimultaneouslysendinginformation overanetworkusingthemostefficientdeliverystrategyovereachlink.Onlytheendstationsthat explicitlyindicateaneedtoreceiveagivenmulticaststreamwillreceiveit. Applicationsthattakeadvantageofmulticastincludevideoconferencing,streamingvideo, corporatecommunications,distancelearning,anddistributionofsoftware,stockquotes,and news. Multicasttechnologyincludesthefollowingprotocols: InternetGroupManagementProtocol(IGMP) DistanceVectorMulticastRoutingProtocol(DVMRP) ProtocolIndependentMulticast(PIM)
Page 1 of 32
ForPIM,youmustalsoconfigureaunicastroutingprotocol,suchasOSPF.
Understanding Multicast
Asdescribedintheprecedingoverview,multicastallowsasourcetosendasinglecopyofdata usingasingleIPaddressfromawelldefinedrangeforanentiregroupofrecipients(amulticast group).AsourcesendsdatatoamulticastgroupbysimplysettingthedestinationIPaddressof thedatagramtobethemulticastgroupaddress.Sourcesdonotneedtoregisterinanywaybefore theycanbeginsendingdatatoagroup,anddonotneedtobemembersofthegroupthemselves. Routersbetweenthesourceandrecipientsusethegroupaddresstoroutethedata,forwarding duplicatedatapacketsonlywhenthepathtorecipientsdiverges. Hoststhatwishtoreceivedatafromthemulticastgroupjointhegroupbysendingamessagetoa multicastrouteronalocalinterface,usingamulticastgroupmembershipdiscoveryprotocol,such asIGMP.Formoreinformation,seeInternetGroupManagementProtocol(IGMP)onpage2. Multicastrouterscommunicateamongthemselvesusingamulticastroutingprotocol,suchas DVMRPorPIMSM.Theseprotocolscalculateamulticastdistributiontreeofrecipientstoensure that: multicasttrafficreachesallrecipientsthathavejoinedthemulticastgroup multicasttrafficdoesnotreachnetworksthatdonothaveanysuchrecipients(unlessthe networkisatransitnetworkonthewaytootherrecipients) thenumberofidenticalcopiesofthesamedataflowingoverthesamelinkisminimized.
Formoreinformation,seeDistanceVectorMulticastRoutingProtocol(DVMRP)onpage5and ProtocolIndependentMulticast(PIM)onpage10.
Page 2 of 32
Understanding Multicast
IGMPusesthreekeycomponentstocontrolmulticastmembership: SourceAserverthatsendsanIPmulticastdatastreamwithaparticularmulticast destinationIPandMACaddress.AservermaynothavedirectIGMPinvolvement,asitoften doesnotreceiveamulticaststream,butonlysendsamulticaststream. QuerierAdevicethatperiodicallysendsoutqueriesinsearchofmulticasthostsona directlyconnectednetwork.IfmultiplequeriersarepresentontheLAN,thequerierwiththe lowestIPaddressassumestherole. HostAclientendstationthatsendsoneoftwoIGMPmessagestoaquerier: JoinmessageIndicatesthehostwantstoreceivetransmissionsassociatedtoa particularmulticastgroup. LeavemessageIndicatesthehostwantstostopreceivingthemulticasttransmissions. IGMP Querier Determining Group Membership
IGMP Querier
Figure 1
IGMP Query
IGMP Membership
Router for 224.1.1.1
IGMP Membership
Router for 226.7.8.9
Member of 224.1.1.1
Member of 226.7.8.9
AsshowninFigure 1,amulticastenableddevicecanperiodicallyaskitshostsiftheywantto receivemulticasttraffic.IfthereismorethanonedeviceontheLANperformingIPmulticasting, oneofthesedevicesiselectedquerierandassumestheresponsibilityofqueryingtheLANfor groupmembers. BasedonthegroupmembershipinformationlearnedfromIGMP,adevicecandeterminewhich(if any)multicasttrafficneedstobeforwardedtoeachofitsports.AtLayer3,multicastswitch devicesusethisinformation,alongwithamulticastroutingprotocol,tosupportIPmulticasting acrosstheInternet. IGMPprovidesthefinalstepinIPmulticastdelivery.Itisonlyconcernedwithforwarding multicasttrafficfromthelocalswitchdevicetogroupmembersonadirectlyattachedsubnetwork orLANsegment. IGMPneitheraltersnorroutesanyIPmulticastpackets.SinceIGMPisnotconcernedwiththe deliveryofIPmulticastpacketsacrosssubnetworks,anexternalIPmulticastdeviceisneededifIP multicastpacketshavetoberoutedacrossdifferentsubnetworks.
Page 3 of 32
Understanding Multicast
Router 1
Solicited Join
3 2
Network A
4 5
Host 1
1
Switch 1 Multicast Server
6 2
Router 2
7 8
Host 2
Page 4 of 32
Understanding Multicast
EachrouterperformsanIGMPforwardingchecktoseeifthereareanyhoststhatwanttojoin themulticastgrouponitslocallyattachednetwork.Eachrouterdropsmulticastpacketsuntil ahostjoinsthegroupusingoneofthefollowingmessages: solicitedjoin(sentinresponsetoanIGMPqueryproducedbytheroutersinterface) InFigure 2,thistypeofexchangeoccursbetweenRouter1andHost1when: (3) Router1sendsaquerytopotentialHost1. (4) Host1respondswithajoinmessage. (5) Router1forwardsthemulticaststream. unsolicitedjoin(sentasarequestwithoutreceivinganIGMPqueryfirst) InFigure 2,thistypeofexchangeoccursbetweenRouter2andHost2when: (6) Host2sendsajoinmessagetoRouter2. (7) Router2forwardsthemulticaststreamtoHost2. (8) Whenitnolongerwantstoreceivethestream,Host2candooneofthefollowing: SendaleavemessagetoRouter2. TimeouttheIGMPentrybynotrespondingtofurtherqueriesfromRouter2.
Page 5 of 32
Understanding Multicast
Probe Messages
EachDVMRPenabledinterfacetransmitsmulticastprobepacketstoinformotherDVMRP routersthatitisoperational.Probemessagesaresentevery10secondsoneveryinterfacerunning DVMRP.Thesemessagesprovide: AmechanismforDVMRPdevicestolocateeachother.Probemessagescontainalistofthe neighborsdetectedforeachenabledinterface.Ifnoneighborsarefound,thenetworkis consideredtobealeafnetwork. AmechanismforDVMRPdevicestodeterminethecapabilitiesofneighboringdevices. ProbemessagescontainflagsaboutneighborsDVMRPcapabilitiesandversioncompliance. Akeepalivefunctionforquicklydetectingneighborloss.Ifaprobemessagefroman adjacentneighborisnotseenwithin35seconds,theneighboristimedout.
Page 6 of 32
Understanding Multicast
Route Table
EachDVMRPenableddevicebuildsaDVMRProutetabletomaintainroutestoallnetworks involvedinDVMRProuting.Asshowninthefollowingexample,theDVMRProutetablecontains asourcenetwork,hopcount,routeuptime,neighborexpirationtime,associatedinterface,and associatedIPaddress.
matrix(router-config)# show ip dvmrp route 6.0.0.0/8, [70/2], uptime 00:00:29, expires 00:01:51 via ge.2.1, 1.1.1.1
Inthisexample,network6.0.0.0/8isrunningDVMRPandis2hopsaway,learnedfrominterface ge.2.1,whichhastheIPaddress1.1.1.1.
Route Reports
DVMRPenableddevicessendroutereportpacketstoadjacentDVMRPdevicesevery60seconds. WhenaDVMRPdevicereceivesone,itcheckstoverifythatthereportisfromaknownneighbor beforeprocessing. Thefirsttimeadeviceseesitsownaddressinaneighborsprobepacket,itsendsaunicastcopyof itsentireroutingtabletotheneighbortoreducestartuptime. Theroutereportpacketcontainsdataaboutallnetworks/routesofwhichthesendingdeviceis aware.Thisinformationisusedtodeterminethereversepathbacktoaparticularmulticast source.EveryDVMRPdevicekeepsaseparatemetricassociatedwitheachroute.Thismetricis thesumofallinterfacemetricsbetweenthedeviceoriginatingthereportandthesourcenetwork. DVMRPdevicesacceptroutereportsforaggregatedsourcenetworksinaccordancewithclassless interdomaindevices(CIDR).Thismeansthat,ifapruneorgraftisreceivedonadownstream interfaceforwhichthesourcenetworkisaggregated,thenapruneorgraftshouldbesent upstream(tothemulticastsource). IfaDVMRPdevicehasalargenumberofDVMRProutes,itwillspreadroutereportsacrossthe routeupdateinterval(60seconds)toavoidbottlenecksinprocessingandroutesynchronization issues. Forthepurposeofpruning,DVMRPneedstoknowwhichdownstreamroutesdependonthe deviceforreceivingmulticaststreams.Usingpoisonreverse,theupstreamroutermaintainsa tableofthesourcenetworkandalldownstreamdevicesthataredependentontheupstream device.
Mroute Table
DVMRPenableddevicesusethemroutetabletomaintainasourcespecificforwardingtree. WhenaDVMRPdeviceisinitialized,itassumestheroleofthedesignatedforwarderforallofits locallyattachednetworks.Beforeforwardinganypackets,alldevicesuseIGMPtolearnwhich networkswouldliketoreceiveparticularmulticastgroupstreams.Inthecaseofashared network,thedevicewithalowerinterfacemetric(aconfigurablevalue),orthelowerIPaddress willbecomethedesignatedforwarder. ADVMRPdeviceforwardsmulticastpacketsfirstbydeterminingtheupstreaminterface,and thenbybuildingthedownstreaminterfacelist.Ifadownstreamrouterhasnohostsforamulticast stream,itsendsaprunemessagetotheupstreamrouter.Iftheupstreamroutersoutboundlistis nowempty,itmaysendaprunemessagetoitsupstreamrouter. Ifadownstreamdevicehasprunedamulticastgroupthatahostwouldliketonowreceive,the downstreamdevicemustsendaDVMRPgraftmessagetoitsupstreamdevice.TheDVMRPgraft willtraversethesourcespecificmulticastdeliverytreetothedevicethatisreceivingthisstream.
Page 7 of 32
Understanding Multicast
Prune Messages
IfadevicereceivesadatagramthathasnoIGMPgroupmemberspresent,andallthedownstream networksareleafnetworks,thedevicesendsaprunepacketupstreamtothesourcetree. Whensendingapruneupstream,thedevice: 1. Decidesiftheupstreamneighboriscapableofreceivingprunes. 2. 3. Ifitisnot,thenthesendingdeviceproceedsnofurther. Ifitis,thenthesendingdeviceproceedsasfollows.
4.
Formsandtransmitsthepackettotheupstreamneighborforthesource.
Page 8 of 32
Understanding Multicast
4.
5.
6.
7.
Graft Messages
Leafdevicessendgraftmessageswhenthefollowingoccur: Anewlocalmemberjoinsagroupthathasbeenprunedupstreamandthisdeviceisthe designatedforwarderforthesource. Anewdependentdownstreamdeviceappearsonaprunedbranch. Adependentdownstreamdeviceonaprunedbranchrestarts. AgraftretransmissiontimerexpiresbeforeagraftACKisreceived.
Ensuresthegraftmessagecontainsatleastthecorrectamountofdata. SendsbackagraftACKtothesender.
Page 9 of 32
Understanding Multicast
4.
DVMRP Multicast
Multicast Traffic
Prune
Graft Prune*
IGMP Join
New Host
Existing Host
Page 10 of 32
Understanding Multicast
PIM,asharedtreetechnology,designatesarouterastherendezvouspoint(RP),whichistheroot ofasharedtreeforaparticulargroup.AllsourcessendpacketstothegroupviatheRP(thatis, trafficflowsfromthesendertotheRP,andfromtheRPtothereceiver).BymaintainingoneRP rootedtreeinsteadofmultiplesourcerootedtrees,bandwidthisconserved. Figure 4illustratesthePIMtrafficflow. Figure 4 PIM Traffic Flow
7 3 1
DR
Source
RP
Receiver
1.
ThesourcesDRregisters(thatis,encapsulates)andsendsmulticastdatafromthesource directlytotheRPviaaunicastroutingprotocol(number1infigure).TheRPdeencapsulates eachregistermessageandsendstheresultingmulticastpacketdownthesharedtree. Thelasthoprouter(thatis,thereceiversDR)sendsamulticastgroup(*,G)joinmessage upstreamtotheRP,indicatingthatthereceiverwantstoreceivethemulticastdata(number2 infigure).ThisbuildstheRPtree(RPT)betweenthelasthoprouterandtheRP. TheRPsendsanS,Gjoinmessagetothesource(number3infigure).Itmaysendthejoin messageimmediately,orafterthedatarateexceedsaconfiguredthreshold.Thisallowsthe administratortocontrolhowPIMSMusesnetworkresources. Thelasthoprouterjoinstheshortestpathtree(SPT)andsendsanS,Gjoinmessagetothe source.(number4infigure).ThisbuildstheSPT. Nativemulticastpackets(thatis,nonregisteredpackets)aresentfromthesourcesDRtothe receiveronitsSPT(number5infigure),whileregisteredmulticastpacketscontinuetobesent fromthesourcesDRtotheRP. AprunemessageissentfromthelasthoproutertotheRP(number6infigure).
2.
3.
4. 5.
6.
Page 11 of 32
Understanding Multicast
7.
Aprunemessage(registerstop)issentfromtheRPtothesourcesDR(number7infigure). OncetrafficisflowingdowntheSPT,theRPTisprunedforthatgivenS,G.
Key Features
KeyfeaturesofPIMSMarethefollowing: usesIGMPtopropagategroupmembershipinformation sendshellomessagestodetermineneighborpresenceandconfiguration sendsjoin/prunemessagestodeterminetheneedtoretainmulticastrouteinformationfora particulargrouponaninterlace sendsassertmessagestoresolveconflictsthatoccurregardinginboundinterfaces usesroutesintheMulticastRoutingInformationBase(MRIB)toperformitsreversepath forwardingcheck
Message Types
EnterasysPIMSMenableddevicesusethefollowingmessagetypes: HelloThesemessagesannouncethesenderspresencetootherPIMSMdevices.Thehello packetincludesoptionssuchas: Holdtimethelengthoftimetokeepthesenderreachable Designatedrouter(DR)priorityusedtodesignatewhichPIMSMdevicewillacton behalfofsourcesandreceiversinthePIMSMdomain
Page 12 of 32
Understanding Multicast
RegisterStopThesemessagesareusedbytheRPtotellthesourcesDRtostopregistering trafficforaparticularsource. Join/Prune(J/P)Thesemessagescontaininformationongroupmembershipreceivedfrom downstreamrouters. PIMSMadoptsRPFtechnologyinthejoin/pruneprocess.Whenamulticastpacketarrives, therouterfirstjudgesthecorrectnessofthearrivinginterfaces: Ifthepacketisasourceaddress/multicastgroup(S,G)entry(ontheshortestpathtree (SPT)),thenthecorrectinterfaceisthereversepathforwarding(RPF)interfacetowards thesource. IfthepacketisnotanS,Gentry(ontheRPtree(RPT)),thenthecorrectinterfaceisthe RPFinterfacetowardstheRP.
ArouterdirectlyconnectedtothehostsisoftenreferredtoasaleafrouterorDR.Theleaf routerisresponsibleforsendingtheprunemessagestotheRP,informingittostopsending multicastpacketsassociatedwithaspecificmulticastgroup.WhentheRPreceivestheprune message,itwillnolongerforwardthemulticasttrafficouttheinterfaceonwhichitreceived theprunemessage. AssertThesemessagesindicatethatthedevicereceivedadatapacketonitsoutbound (receiving)interfaceforthegroup.TheyreportthemetricordistancetothesourceorRPto helpthedeviceidentifythemostdirectpathtotherootofthetree.Ifmultipleroutersclaimto havethemostdirectpathtothesourceorRP,eachdevicesendsitsownassertmessageand therouterwiththebestmetricwins.Theotherdevicewillthenremovethatlinkfromits outboundinterfacelistforthegroup. BootstrapThesemessagesaresentbythePIMSMrouterthathasbeenelectedasthe bootstraprouter(BSR)toinformallPIMSMroutesoftheRP/groupmappings. CandidateRPmessageThesemessagesaresentbytheconfiguredcandidateRProutersto theBSRtoinformtheBSRofitsRP/groupcandidacy.
A small number of routers within a PIM domain are configured as candidate BSRs, and each C-BSR is given a BSR priority. All C-BSRs multicast bootstrap messages (BSMs) containing their priority to the ALL-PIM-ROUTERS group. When a C-BSR receives a bootstrap message from a C-BSR with a higher priority, it stops sending. This continues until only one C-BSR remains sending bootstrap messages, and it becomes the elected BSR for the domain.
Page 13 of 32
Understanding Multicast
Table 1
Term
PIM routers configured to participate as RPs for some or all groups. C-RPs send C-RP Advertisement messages to the BSR. The messages contain the list of group prefixes for which the C-RP is willing to be the RP. Once the PIM-SM routers receive the BSRs message, the routers use a common hashing algorithm to hash the C-RP address, group, and mask together to identify which router will be the RP for a given group. A C-RP router must also learn which PIM-SM router is the BSR. Each designated candidate-BSR (C-BSR) asserts itself as the BSR, then defers once it receives a preferable BSR message. Eventually, all C-RPs send their messages to a single BSR, which communicates the Candidate RP-set to all PIM-SM routers in the domain.
Static RP
If a BSR is not used to distribute RP set information, RP-to-group mappings are configured statically on each router. Static RP configuration and use of bootstrap routers are mutually exclusive. You should not configure both in a PIM-SM domain because such configuration could result in inconsistent RP sets. Statically configured RP set information will take precedence over RP set information learned from a BSR.
A designated router is elected from all the PIM routers on a shared network. DRs are responsible for encapsulating multicast data from local sources into PIM-SM register messages and for unicasting them to the RP. The router with the highest priority wins the DR election. In the case of a tie, the router with the highest IP address wins. A contiguous set of routers that implement PIM and are configured to operate within a common boundary defined by PIM multicast border routers. A router that connects a PIM domain to other multicast routing domains.
Page 14 of 32
Configuring Multicast
Configuring Multicast
ThissectionprovidesthefollowinginformationaboutconfiguringmulticastonEnterasysMatrix NSeries,SecureStack,DSeries,GSeries,andISeriesdevices.
For information about... Configuring IGMP Configuring DVMRP Configuring PIM Refer to page... 15 20 24
Note: For information on Enterasys Matrix X-Series support, refer to the Enterasys Matrix X Secure Core Router Configuration Guide.
Configuring IGMP
IGMPisconfiguredinswitchmodeonEnterasysMatrixNSeriesdevices.OnSecureStack, DSeries,GSeries,andISeriesdevices,IGMPcanbeconfiguredindependentlyattheswitchlevel (Layer2)forIGMPsnooping.OnSecureStackC2andC3devicesandGSeriesdevices,IGMPcan alsobeconfiguredattherouterlevel(Layer3)fordetermininghostmembershipondirectly attachedsubnets.AtLayer2,IGMPcanbeenabledforVLANs,regardlessofwhetheritisenabled onroutedinterfaces.If,however,IGMPisenabledonaroutedinterface,andtheroutedinterface isaroutedVLAN,thenIGMPmustalsobeenabledattheswitchlevel.
Remove IGMP configuration settings for one or more VLANs. Create a new static IGMP entry or add one or more new ports to an existing entry.
Page 15 of 32
Configuring Multicast
Table 2
Task
Delete a static IGMP entry or remove one or more ports from an existing entry. Change the IGMP classification of received IP frames. Clear the binding of IP protocol ID to IGMP classification. Set the number of multicast groups supported by the Enterasys Matrix N-Series deviceto either 4096 or 16,384.
Table 3liststheLayer2IGMPconfigurationcommandsforSecureStack,DSeries,GSeries,andI Seriesdevices. Table 3 Layer 2 IGMP Configuration Commands (SecureStack, D-Series, G-Series, and ISeries Devices)
Task Enable or disable IGMP on the system. Enable or disable IGMP on one or all ports. Configure the IGMP group membership interval time for the system. Configure the IGMP query maximum response time for the system. Configure the IGMP multicast router expiration time for the system. Create a new static IGMP entry or add one or more new ports to an existing entry. Delete a static IGMP entry or remove one or more new ports from an existing entry. Clear all IGMP snooping entries. Command set igmpsnooping adminmode {enable | disable} set igmpsnooping interfacemode portstring {enable | disable} set igmpsnooping groupmembershipinterval time set igmpsnooping maxresponse time set igmpsnooping mcrtrexpire time set igmpsnooping add-static group vlanlist [modify] [port-string] set igmpsnooping remove-static group vlan-list [modify] [port-string] clear igmpsnooping
Page 16 of 32
Configuring Multicast
Page 17 of 32
Configuring Multicast
2. 3.
In switch mode, enable IGMP on each VLAN interface. In switch mode, enable IGMP querying on each of the VLANs specified in step 2.
FormoreinformationonIGMPCLIcommands,refertoyourdevicesCLIReferenceGuideor ConfigurationGuide,asapplicable.
Page 18 of 32
Configuring Multicast
Display IGMP counter information. Display the number of multicast groups supported by the Enterasys Matrix N-Series device.
Page 19 of 32
Configuring Multicast
Configuring DVMRP
DVMRP Configuration Commands
Table 9liststheDVMRPconfigurationcommandsforEnterasysMatrixNSeriesdevices. Table 9
Task Enable or disable DVMRP on an interface.
Configure the metric associated with a set of destinations for DVMRP reports.
Page 20 of 32
Configuring Multicast
Page 21 of 32
Configuring Multicast
2.
ip dvmrp enable
Figure 5
VLAN 3 VLAN 1
Router R2
192.40.0.1
192.0.1.2
192.0.1.1
192.20.0.1
Router R1 Configuration
FortheVLAN1interface,whichprovidesconnectiontoRouterR2,anIPaddressisassignedand DVMRPisenabled.FortheVLAN2interface,whichprovidesconnectiontothehostnetwork,an IPaddressisassignedandDVMRPisenabled.
matrix->router matrix->router#enable matrix->router(config)#interface vlan 1 matrix->router(config-if(Vlan 1))#ip address 192.0.1.2 255.255.255.0 matrix->router(config-if(Vlan 1))#ip dvmrp matrix->router(config-if(Vlan 1))#no shutdown matrix->router(config-if(Vlan 1))#exit matrix->router(config)#interface vlan 2 matrix->router(config-if(Vlan 2))#ip address 192.40.0.1 255.255.255.0 matrix->router(config-if(Vlan 2))#ip dvmrp matrix->router(config-if(Vlan 2))#no shutdown matrix->router(config-if(Vlan 2))#exit
Page 22 of 32
Configuring Multicast
Router R2 Configuration
FortheVLAN1interface,whichprovidesconnectiontotheRouterR1,anIPaddressisassigned andDVMRPisenabled.FortheVLAN3interfacewhichprovidesconnectiontothehostnetwork, anIPaddressisassignedandDVMRPisenabled.
matrix->router matrix->router#enable matrix->router(config)#interface vlan 1 matrix->router(config-if(Vlan 1))#ip address 192.0.1.1 255.255.255.0 matrix->router(config-if(Vlan 1))#ip dvmrp matrix->router(config-if(Vlan 1))#no shutdown matrix->router(config-if(Vlan 1))#exit matrix->router(config)#interface vlan 3 matrix->router(config-if(Vlan 3))#ip address 192.20.0.1 255.255.255.0 matrix->router(config-if(Vlan 3))#ip dvmrp matrix->router(config-if(Vlan 3))#no shutdown matrix->router(config-if(Vlan 3))# exit
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,foranexampleof eachcommandsoutput.
Page 23 of 32
Configuring Multicast
Configuring PIM
PIM-SM Configuration Commands
Table 13liststhePIMSMsetcommandsforEnterasysMatrixNSeriesdevices. Table 13
Task Enable PIM-SM on a routing interface. Use the no command to disable PIM-SM. Enable the router to announce its candidacy as a BootStrap Router (BSR). Use the no command to remove the router as a BSR candidate. Set the priority for which a router will be elected as the designated router (DR). Use the no command to disable the DR functionality. Set a static rendezvous point (RP) for a multicast group. Use the no command to remove the static RP configuration. Enable the router to advertise itself as a PIM candidate rendezvous point (RP) to the BSR. Use the no command to remove the router as an RP candidate.
Set the administrative mode of PIM-SM multicast ip pimsm routing across the router to enabled. By default, no ip pimsm PIM-SM is globally disabled. Use the no command to disable PIM (across the entire stack, if applicable). Create a manual RP IP address for the PIM-SM router. Use the no command to remove a previously configured RP. Enable PIM-SM multicast routing on a routing interface. By default, PIM is disabled on all IP interfaces. Use the no command to disable PIM on the specific interface. Configure the transmission frequency of hello messages, in seconds, between PIM-enabled neighbors. Use the no command to reset the hello interval to the default, 30 seconds. ip pimsm staticrp ipaddress groupadress groupmask no ip pimsm staticrp ipaddress groupadress groupmask ip pimsm enable no ip pimsm enable
Page 24 of 32
Configuring Multicast
Page 25 of 32
Configuring Multicast
If static RP set distribution is desired, configure the static RP set information in global configuration mode. The RP set information must be the same on all PIM routers in the network. Note: Static RP set distribution cannot be combined with BSR RP set distribution in the same PIM domain. Routers with statically configured RP set information discard RP set information learned from a BSR.
5.
In interface configuration mode, configure PIMSM on the Matrix N-Series router interfaces that will run PIM-SM.
ip pim sparse-mode
In global configuration mode, enable PIM-SM on the device. In global configuration mode, if desired, create a manual RP IP address for the PIM-SM router. In interface configuration mode, enable PIM-SM on the devices VLAN interfaces that will run PIM-SM.
Page 26 of 32
Configuring Multicast
Example Configuration
Figure 6illustratesthePIMSMconfigurationoffourEnterasysMatrixNSeriesroutersshownin theexamplescriptsbelow.ThisconfigurationincludesconfiguringapreferredandabackupBSR forthetopology,aswellastwoRPsforspecificmulticastgroupsandabackupRPforallgroups. Figure 6 PIM-SM Configuration with Bootstrap Router and Candidate RPs
VLAN 9
172.2.2/24
Router R2
VLAN 3
172.1.2/24
VLAN 5
172.2.4/24
VLAN 2
VLAN 7
Router R1
172.1.1/24
Router R4
VLAN 8
172.4.4/24
172.1.3/24
172.3.4/24
VLAN 4
VLAN 6
Router R3
172.3.3/24
VLAN 10
Router R1 Configuration
Onthisrouter,IGMPisenabledonVLAN2,whichconnectstohosts,andPIMSMisenabledon allinterfaces.IGMPisusedtodeterminehostgroupmembershipondirectlyattachedsubnets. NotethatIGMPisenabledinswitchmodeonEnterasysMatrixNSeriesrouters. VLAN2isconfiguredasthebackupcandidateRPforallmulticastgroupsbyusingthedefaultRP priorityof192.NotethattheCRPwiththesmallestpriorityvalueiselected. Alternatively,youcouldconfigurealoopbackinterfaceasacandidateRP,toavoidthe dependencyonaparticularinterface.
R1>Router(config)#router id 1.1.1.1 R1>Router(config)#interface vlan 2 R1>Router(config-if(Vlan 2))#ip address 172.1.1.1 255.255.255.0 R1>Router(config-if(Vlan 2))#no shutdown R1>Router(config-if(Vlan 2))#exit R1>set igmp enable 2 R1>set igmp query-enable 2 R1>Router(config)#ip pim rp-candidate 172.1.1.1 224.0.0.0 240.0.0.0 R1>Router(config)#interface vlan 2 R1>Router(config-if(Vlan 2))#ip pim sparse-mode R1>Router(config-if(Vlan 2))#exit
Page 27 of 32
Configuring Multicast
R1>Router(config)#interface vlan 3 R1>Router(config-if(Vlan 3))#ip address 172.1.2.1 255.255.255.0 R1>Router(config-if(Vlan 3))#no shutdown R1>Router(config-if(Vlan 3))#ip pim sparse-mode R1>Router(config-if(Vlan 3))#exit R1>Router(config)#interface vlan 4 R1>Router(config-if(Vlan 4))#ip address 172.1.3.1 255.255.255.0 R1>Router(config-if(Vlan 4))#no shutdown R1>Router(config-if(Vlan 4))#ip pim sparse-mode R1>Router(config-if(Vlan 4))#exit
Router R2 Configuration
Onthisrouter,PIMSMisenabledonallinterfaces.VLAN9isconfiguredasacandidateBSRand isassignedapriorityhigherthanthedefaultof0.NotethattheCBSRwiththelargestpriority valueiselected. VLAN9isalsoconfiguredasacandidateRPforthemulticastgroup224.2.2.0/24.Itspriorityisset to2,whichwillmostlikelymakeittheelectedRPforthatparticulargroup,sincetheCRPwith thesmallestpriorityvalueiselected.(NotethatRouterR3hasanRPcandidatepriorityvalueof3 forthatgroup.) Again,alternatively,youcouldconfigurealoopbackinterfaceasacandidateBSRorRP,toavoid thedependencyonaparticularinterface.
R2>Router(config)#router id 1.1.1.2 R2>Router(config)#interface vlan 3 R2>Router(config-if(Vlan 3))#ip address 172.1.2.2 255.255.255.0 R2>Router(config-if(Vlan 3))#no shutdown R2>Router(config-if(Vlan 3))#ip pim sparse-mode R2>Router(config-if(Vlan 3))#exit R2>Router(config)#interface vlan 9 R2>Router(config-if(Vlan 9))#ip address 172.2.2.2 255.255.255.0 R2>Router(config-if(Vlan 9))#no shutdown R2>Router(config-if(Vlan 9))#ip pim bsr-candidate vlan 9 priority 2 R2>Router(config-if(Vlan 9))#ip pim sparse-mode R2>Router(config-if(Vlan 9))#exit R2>Router(config)#ip pim rp-candidate 172.2.2.2 224.2.2.0 255.255.255.0priority 2 R2>Router(config)#interface vlan 8 R2>Router(config-if(Vlan 8))#ip address 172.2.3.2 255.255.255.0 R2>Router(config-if(Vlan 8))#no shutdown R2>Router(config-if(Vlan 8))#ip pim sparse-mode R2>Router(config-if(Vlan 8))#exit R2>Router(config)#interface vlan 5 R2>Router(config-if(Vlan 5))#ip address 172.2.4.2 255.255.255.0 R2>Router(config-if(Vlan 5))#no shutdown R2>Router(config-if(Vlan 5))#ip pim sparse-mode R2>Router(config-if(Vlan 5))#exit
Page 28 of 32
Configuring Multicast
Router R3 Configuration
Onthisrouter,PIMSMisenabledonallinterfaces.VLAN10isconfiguredasabackupcandidate BSR,byleavingitspriorityatthedefaultof0. VLAN10isalsoconfiguredasabackupcandidateRPformulticastgroup224.2.2.0/24,bysetting itspriorityvalueslightlyhigher(3)thanthepriorityconfiguredonR2forthesamegroup(2) (sincetheCRPwiththesmallestpriorityvalueiselected).
R3>Router(config)#router id 1.1.1.3 R3>Router(config)#interface vlan 4 R3>Router(config-if(Vlan 4))#ip address 172.1.3.3 255.255.255.0 R3>Router(config-if(Vlan 4))#no shutdown R3>Router(config-if(Vlan 4))#ip pim sparse-mode R3>Router(config-if(Vlan 4))#exit R3>Router(config)# interface vlan 8 R3>Router(config-if(Vlan 8))#ip address 172.2.3.3 255.255.255.0 R3>Router(config-if(Vlan 8))#no shutdown R3>Router(config-if(Vlan 8))#ip pim sparse-mode R3>Router(config-if(Vlan 8))#exit R3>Router(config)#interface vlan 10 R3>Router(config-if(Vlan 10))#ip address 172.3.3.3 255.255.255.0 R3>Router(config-if(Vlan 10))#no shutdown R3>Router(config-if(Vlan 10))#ip pim bsr-candidate vlan 10 R3>Router(config-if(Vlan 10))#ip pim sparse-mode R3>Router(config-if(Vlan 10))#exit R3>Router(config)#ip pim rp-candidate 172.3.3.3 224.2.2.0 255.255.255.0 priority 3 R3>Router(config)#interface vlan 6 R3>Router(config-if(Vlan 6))#ip address 172.3.4.3 255.255.255.0 R3>Router(config-if(Vlan 6))#no shutdown R3>Router(config-if(Vlan 6))#ip pim sparse-mode R3>Router(config-if(Vlan 6))#exit
Router R4 Configuration
ThisrouterdoesnotplayanyspecialroleinPIMSM,exceptthatithashostsdirectlyconnectedto it.IGMPisenabledontheinterfacethatconnectstohostsandPIMSMisenabledonallinterfaces.
R4>Router(router-config)#router id 1.1.1.4 R4>Router(config)#interface vlan 5 R4>Router(config-if(Vlan 5))#ip address 172.2.4.4 255.255.255.0 R4>Router(config-if(Vlan 5))#no shutdown R4>Router(config-if(Vlan 5))#ip pim sparse-mode R4>Router(config-if(Vlan 5))#exit R4>Router(config)#interface vlan 6 R4>Router(config-if(Vlan 6))#ip address 172.3.4.4 255.255.255.0 R4>Router(config-if(Vlan 6))#no shutdown R4>Router(config-if(Vlan 6))#ip pim sparse-mode R4>Router(config-if(Vlan 6))#exit
Page 29 of 32
Configuring Multicast
R4>Router(config)#interface vlan 7 R4>Router(config-if(Vlan 7))#ip address 172.4.4.4 255.255.255.0 R4>Router(config-if(Vlan 7))#no shutdown R4>Router(config-if(Vlan 7))#ip pim sparse-mode R4>Router(config-if(Vlan 7))#exit
show ip pimsm neighbor [vlan-id] show ip pimsm rp {group-address groupmask | all | candidate} show ip pimsm rphash group-address
Page 30 of 32
Table 16
Task
Display the PIM-SM static RP information. Display the IP multicast routing table.
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,foradescriptionof theoutputofeachcommand.
Revision History
Date 09-02-08 04-16-09 Description New document Added 256MB minimum memory requirement for PIM.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2009Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYSNETWORKS,ENTERASYSSECURENETWORKS,NETSIGHT,ENTERASYS NETSIGHT,ENTERASYSMATRIX,andanylogosassociatedtherewith,aretrademarksorregisteredtrademarks ofEnterasysNetworks,Inc.,intheUnitedStatesand/orothercountries.ForacompletelistofEnterasys trademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Page 1 of 18
Page 2 of 18
NAT Overview
NAT Overview
ThissectionprovidesanoverviewofNATconfiguration.
Notes: NAT is currently supported on the S-Series and N-Series products. This document details the configuration of NAT for the S-Series and N-Series products. NAT is an advanced routing feature that must be enabled with a license key on the N-Series router. An advanced routing license is currently not required on the S-Series platform. If you have purchased an advanced license key, and have enabled routing on the device, you must activate your license as described in the configuration guide that comes with your Enterasys N-Series product in order to enable the NAT command set. If you wish to purchase an advanced routing license, contact Enterasys Networks Sales. A minimum of 256 MB of memory is required on all modules in order to enable NAT. See the SDRAM field of the show system hardware command to display the amount of memory installed on a module. An N-Series module memory can be upgraded to 256 MB using the DFE-256MB-UGK memory kit.
NAT Configuration
AtraditionalNATconfigurationismadeupofaprivatenetworkorintranet,apublicnetwork, andarouterthatinterconnectsthetwonetworks.Theprivatenetworkismadeupofoneormore hostsanddeviceseachassignedaninside(internal)addressthatisnotintendedtobedirectly connectabletoapublicnetworkhostordevice.Thepublicnetworkhostsordeviceshaveoutside (external)uniquelyregisteredpublicaddresses.Therouterinterconnectingtheprivateandpublic networkssupporttraditionalNAT.ItisNATsresponsibilitytotranslatetheinsideaddresstoa uniqueoutsideaddresstofacilitatecommunicationwiththepublicnetworkforintranetdevices. NATallowstranslationsbetweenIPaddresses.NAPTallowstranslationsbetweenmultipleinside addressesandtheirassociatedportsandasingleoutsideIPaddressanditsassociatedports.NAT andNAPTsupportbothstaticanddynamicinsideaddresstranslation.
Page 3 of 18
NAT Overview
WhenServer1respondstoClient1,itspacketarrivesattheNATrouterwithClient1stranslated addressof200.1.1.1asthedestinationaddress,butleavestheNATrouterwithClient1sactual addressof10.1.1.1asthedestinationaddress.Server1sresponseisdeliveredtoIPaddress10.1.1.1. Figure 1 Basic NAT Static Inside Address Translation
External Public Network DA: 200.1.1.50 SA: 200.1.1.1 Server1 200.1.1.50 DA: 200.1.1.1 SA: 200.1.1.50
NAT ROUTER
DA: 200.1.1.50 SA: 10.1.1.1 DA: 10.1.1.1 SA: 200.1.1.50 Client1 10.1.1.1
Page 4 of 18
NAT Overview
Figure 2
External Public Network DA: 200.1.1.50:80 SA: 200.1.1.1:1025 DA: 200.1.1.1:1025 SA: 200.1.1.50:80
Internal Private Network DA: 200.1.1.50:80 SA: 10.1.1.2:125 DA: 10.1.1.2:125 SA: 200.1.1.50:80
NAT ROUTER
Client1 Walkthrough:
ApacketarrivesattheNATrouterfromClient1withasourceaddressof10.1.1.1,butleavesthe NATrouterwithasourceaddressfromtheassignedpool,inthiscase:200.1.1.2.Inbothcasesthe destinationisforServer1sIPaddressof200.1.1.50.FromServer1spointofview,Client1sIP addressis200.1.1.2.Server1doesntknowanythingaboutitsactualIPaddressof10.1.1.1. WhenServer1respondstoClient1,itspacketarrivesattheNATrouterwithClient1stranslated addressof200.1.1.2asthedestinationaddress,butleavestheNATrouterwithClient1sactual addressof10.1.1.1asthedestinationaddress.Server1sresponseisdeliveredtoIPaddress10.1.1.1.
Page 5 of 18
NAT Overview
Figure 3
External Public Network DA: 200.1.1.50 SA: 200.1.1.1 DA: 200.1.1.1 SA: 200.1.1.50 DA: 200.1.1.50 SA: 200.1.1.2 Server1 200.1.1.50 DA: 200.1.1.2 SA: 200.1.1.50
Internal Private Network DA: 200.1.1.50 SA: 10.1.1.2 DA: 10.1.1.2 SA: 200.1.1.50
NAT ROUTER
Client2 10.1.1.2
DA: 200.1.1.50 SA: 10.1.1.1 DA: 10.1.1.1 SA: 200.1.1.50 Client1 10.1.1.1
Client2 Walkthrough:
ApacketarrivesattheNATrouterfromClient2withasourceaddressof10.1.1.2,butleavesthe NATrouterwiththeremainingavailablesourceaddressfromtheassignedpool,inthiscase: 200.1.1.1.InbothcasesthedestinationisforServer1sIPaddressof200.1.1.50.FromServer1s pointofview,Client2sIPaddressis200.1.1.1.Server1doesntknowanythingaboutitsactualIP addressof10.1.1.2. WhenServer1respondstoClient2,itspacketarrivesattheNATrouterwithClient2stranslated addressof200.1.1.1asthedestinationaddress,butleavestheNATrouterwithClient2sactual addressof10.1.1.2asthedestinationaddress.Server1sresponseisdeliveredtoIPaddress10.1.1.2.
Page 6 of 18
NAT Overview
Client1 Walkthrough:
ApacketarrivesattheNATrouterfromClient1withasourceaddressof10.1.1.1:125,butleaves theNATrouterwithasourceaddressof200.1.1.1:1024.Inbothcasesthedestinationisfor Server1sIPaddressof200.1.1.50:80.FromServer1spointofview,Client1sIPaddressis 200.1.1.1:1024.Server1doesntknowanythingaboutitsactualIPaddressof10.1.1.1:125. WhenServer1respondstoClient1,itspacketarrivesattheNATrouterwithClient1stranslated addressof200.1.1.1:1024asthedestinationaddress,butleavestheNATrouterwithClient1s actualaddressof10.1.1.1:125asthedestinationaddress.Server1sresponseisdeliveredtoIP address10.1.1.1:125. Figure 4 Basic NAPT Dynamic Inside Address Translation
Internal Private Network DA: 200.1.1.50:80 SA: 10.1.1.2:125 DA: 10.1.1.2:125 SA: 200.1.1.50:80
External Public Network DA: 200.1.1.50:80 SA: 200.1.1.1:1025 DA: 200.1.1.1:1025 SA: 200.1.1.50:80 DA: 200.1.1.50:80 SA: 200.1.1.1:1024 Server1 200.1.1.50 DA: 200.1.1.1:1024 SA: 200.1.1.50:80
NAT ROUTER
Client2 10.1.1.2
DA: 200.1.1.50:80 SA: 10.1.1.1:125 DA: 10.1.1.1:125 SA: 200.1.1.50:80 Client1 10.1.1.1
Client2 Walkthrough:
ApacketarrivesattheNATrouterfromClient2withasourceaddressof10.1.1.2:125,butleaves theNATrouterwithasourceaddressof200.1.1.1:1025.Inbothcasesthedestinationisfor Server1sIPaddressof200.1.1.50:80.FromServer1spointofview,Client2sIPaddressis 200.1.1.1:1025.Server1doesntknowanythingaboutitsactualIPaddressof10.1.1.2:125. WhenServer1respondstoClient2,itspacketarrivesattheNATrouterwithClient2stranslated addressof200.1.1.1:1025asthedestinationaddress,butleavestheNATrouterwithClient1s actualaddressof10.1.1.2:125asthedestinationaddress.Server1sresponseisdeliveredtoIP address10.1.1.2:125.
Page 7 of 18
NAT Overview
NAT Timeouts
Themaximumtimeoutvalueinsecondsperflowisconfigurableforthefollowingflowtypes: Dynamictranslation UDPandTCP ICMP DNS FTP
Page 8 of 18
Configuring NAT
NAT Binding
ANATflowhastwodevicesassociatedwithitthatareincommunicationwitheachother:the clientdevicebelongingtotheinside(private)networkandtheserverdevicebelongingtothe outside(public)network.EachactiveNATflowhasabindingresourceassociatedwithit.Each flowisbaseduponthefollowingcriteria: IfitisanonFTPNATflow: SourceIPAddressTheinsideclientIPaddress DestinationIPAddressTheoutsideserverIPaddress
Enabling NAT
Whentrafficsubjecttotranslationoriginatesfromorisdestinedtoaninterface,thatinterfacemust beenabledforNAT.Iftheinterfaceispartoftheinternalprivatenetwork,itshouldbeenabledas aninsideinterface.Iftheinterfaceispartoftheexternalpublicnetwork,itshouldbeenabledasan outsideinterface.
Configuring NAT
ThissectionprovidesdetailsfortheconfigurationofNATontheSSeriesandNSeriesproducts. Table 1listsNATparametersandtheirdefaultvalues. Table 1 Default NAT Parameters
Description Specifies that NAT should be enabled on this interface as a local private network interface. Specifies that NAT should be enabled on this interface as an external public network interface. Identifies a group of NAT IP addresses used by the dynamic address binding feature for NAT translation. Specifies the start and end of a range of IP addresses for this NAT pool. Default Value None
Parameter Inside NAT Interface Type Outside NAT Interface Type Pool Name
None
None
None
Specifies a list of IP addresses to None translate when enabling dynamic translation of inside source addresses.
Page 9 of 18
Configuring NAT
Table 1
Parameter Overload
Local IP Address Global IP Address Local Port Global Port Timeout UDP timeout TCP timeout ICMP timeout DNS timeout FTP timeout
None None None None 240 seconds 240 seconds 240 seconds 240 seconds 240 seconds 240 seconds
Resource Global Bindings IP Addresses Pools Port Mapped Addresses Static Rules
Page 10 of 18
Configuring NAT
2. 3.
ip nat inside source static local-ip global-ip ip nat inside source static {tcp | udp} local-ip local-port global-ip global-port
2.
access-list list-number {deny | permit} source ip nat pool name start-ip-address end-ip-address {netmask netmask | prefix-length prefix-length} ip nat inside source [list access-list] pool pool-name [overload | interface vlan vlan-id [overload]]
3.
4.
Optionally specify a non-default NAT FTP control port. ip nat ftp-control-port port-number Configure the maximum number of translation entries. ip nat translation max-entries number
Page 11 of 18
Table 3
Task
Clear dynamic NAT translations. Clear a specific active simple NAT translation. Clear a specific dynamic NAT translation. Set NAT router limits
Page 12 of 18
NAT ROUTER
Page 13 of 18
System(su-config-intf-vlan.0.10)->exit System(rw-config)->
EnableNAToutsideinterface:
System(rw-config)->interface vlan 100 System(su-config-intf-vlan.0.100)->ip nat outside System(su-config-intf-vlan.0.100)->exit System(rw-config)->
EnabletheNAPTstatictranslationoftheinsidesourceaddress:
System(rw-config)->ip nat inside source static tcp 10.1.1.2:125 200.1.1.2:1025
Page 14 of 18
Figure 6
Internal Private Network DA: 200.1.1.50 SA: 10.1.1.1 DA: 10.1.1.1 SA: 200.1.1.50 VLAN 10
NAT ROUTER
Client1 10.1.1.1
DA: 200.1.1.50 SA: 10.1.1.2 DA: 10.1.1.2 SA: 200.1.1.50 Client2 10.1.1.2
VLAN 20 DA: 200.1.1.50:80 SA: 10.1.1.3:125 DA: 10.1.1.3:125 SA: 200.1.1.50:80 Client3 10.1.1.3 VLAN 20 DA: 200.1.1.50:80 SA: 10.1.1.4:125 DA: 10.1.1.4:125 SA: 200.1.1.50:80 Client4 10.1.1.4
Page 15 of 18
EnableNAToutsideinterface:
System(rw-config)->interface vlan 100 System(su-config-intf-vlan.0.100)->ip nat outside System(su-config-intf-vlan.0.100)->exit System(rw-config)->interface vlan 200 System(su-config-intf-vlan.0.200)->ip nat outside System(su-config-intf-vlan.0.200)->exit System(rw-config)->
Defineinsideaddressaccesslist2forNAPTclients:
System(rw-config)->access-list 2 permit host 10.1.1.3 System(rw-config)->access-list 2 permit host 10.1.1.4 System(rw-config)->
Page 16 of 18
DefinetheNATPoolfortheNAPTclients:
System(rw-config)->ip nat pool naptpool 200.1.1.3 200.1.1.3 netmask 255.255.255.0 System(rw-config)->
EnabletheNAPTdynamictranslationoftheinsidesourceaddress:
System(rw-config)->ip nat inside source list 2 pool naptpool overload
ThiscompletestheNATconfigurationexample.
Page 17 of 18
Revision History
Date 09/24/2008 02/12/2009 04/16/2009 09/08/2010 Description New document In ip nat inside source context made clear that VLAN option was for an outside VLAN. Input an advanced routing license notice that includes the 256 MB requirement on all modules statement. Updated for S-Series. Added new resource-limits table.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2010Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSSSERIESandanylogosassociated therewith,aretrademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandother countries.ForacompletelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
For information about... What is Neighbor Discovery? Why Would I Use Neighbor Discovery in My Network? How Do I Implement Neighbor Discovery? Understanding Neighbor Discovery Configuring LLDP
Refer to page... 1 1 2 2 7
EnterasysDiscoveryProtocol,fordiscoveringEnterasysdevices CiscoDiscoveryProtocol,fordiscoveringCiscodevices
Page 1 of 14
Page 2 of 14
Figure 1
Discovery MIB Port Device ge. 1.1 IP phone ge. 1.2 PC ge. 1.4 IP switch
PSTN
Im a switch
Im a switch
Im a switch
Im a switch
Im a switch
Im a switch
Im a switch Im an IP phone
Im an IP-PBX
Im an IP phone
LLDP-MED
TheLLDPMediaEndpointDiscovery(LLDPMED)extensionofLLDPisdefinedtoshare informationbetweenmediaendpointdevicessuchasIPtelephones,mediagateways,media servers,andnetworkconnectivitydevices. EitherLLDPorLLDPMED,butnotboth,canbeusedonaninterfacebetweentwodevices.A switchportusesLLDPMEDwhenitdetectsthatanLLDPMEDdeviceisconnectedtoit. LLDPMEDprovidesthefollowingbenefits: AutodiscoveryofLANpolicies,suchasVLANID,802.1ppriority,andDiffServcodepoint settings,leadingtoplugandplaynetworking.ThisissupportedonEnterasysMatrixNSeries devicesonly. Devicelocationandtopologydiscovery,allowingcreationoflocationdatabasesand,inthe caseofVoIP,provisionofE911services.ThisissupportedonEnterasysMatrixNSeries devicesonly. ExtendedandautomatedpowermanagementofPoweroverEthernetendpoints Inventorymanagement,allowingnetworkadministratorstotracktheirnetworkdevicesand todeterminetheircharacteristics,suchasmanufacturer,softwareandhardwareversions,and serialorassetnumbers.
Im an IP phone
Im a PC
Page 3 of 14
TherearetwoprimaryLLDPMEDdevicetypes(asshowninFigure 2onpage5): Networkconnectivitydevices,whichareLANaccessdevicessuchasLANswitch/router, bridge,repeater,wirelessaccesspoint,oranydevicethatsupportstheIEEE802.1ABandMED extensionsdefinedbythestandardandcanrelayIEEE802framesviaanymethod. Endpointdevices,whichhavethreedefinedsubtypesorclasses: LLDPMEDGenericEndpoint(ClassI)Allendpointproductsthat,whilerequiringthe baseLLDPdiscoveryservicesdefinedinthestandard,donotsupportIPmediaoractas anendusercommunicationdevice,suchasIPcommunicationscontrollers,other communicationrelatedservers,oranydevicerequiringbasicservices.Discoveryservices definedinthisclassincludeLANconfiguration,devicelocation,networkpolicy,power management,andinventorymanagement. LLDPMEDMediaEndpoint(ClassII)AllendpointproductsthathaveIPmedia capabilitiesbutthatmaynotbeassociatedwithaparticularenduser,suchasvoice/media gateways,conferencebridges,andmediaservers.Capabilitiesincludeallofthe capabilitiesdefinedforGenericEndpoint(ClassI)andareextendedtoincludeaspects relatedtomediastreaming.Discoveryservicesdefinedinthisclassincludemediatype specificnetworklayerpolicydiscovery. LLDPMEDCommunicationEndpoint(ClassIII)Allendpointproductsthatactasan endpointusercommunicationdevicesupportingIPmedia.Capabilitiesincludeallofthe capabilitiesdefinedfortheGenericEndpoint(ClassI)andMediaEndpoint(ClassII) devicesandareextendedtoincludeaspectsrelatedtoenduserdevices,suchasIP phones,PCbasedsoftphones,andothercommunicationdevicesthatdirectlysupportthe enduser.
Page 4 of 14
Figure 2
LLDP-MED
LLDP-MED Network Connectivity Devices: Provide IEEE 802 network access to LLDP-MED endpoints (for example, L2/L3 switch)
LLDP-MED Generic Endpoints (Class I): Basic participant endpoints in LLDP-MED (for example, IP communications controller)
IP Network Infrastructure
(IEEE 802 LAN)
LLDP-MED Media Endpoints (Class ll): Supports IP media streams (for media gateways, conference bridges)
LLDP-MED Communication Device Endpoints (Class III): Support IP communication end user (for example, IP phone, soft phone)
Page 5 of 14
LLDPDU Frames
AsshowninFigure 3,eachLLDPDUframecontainsthefollowingmandatoryTLVs: ChassisIDThechassisidentificationforthedevicethattransmittedtheLLDPpacket. PortIDTheidentificationofthespecificportthattransmittedtheLLDPpacket.The receivingLLDPagentjoinsthechassisIDandtheportIDtocorrespondtotheentity connectedtotheportwherethepacketwasreceived. TimetoLiveThelengthoftimethatinformationcontainedinthereceiveLLDPpacketwill bevalid. EndofLLDPDUIndicatesthefinalTLVoftheLLDPDUframe. Frame Format
IEEE 802.3 LLDP frame format
DA LLDP_Multicast address 6 octets SA MAC address 6 octets
LLDP Ethertype
Figure 3
88-CC 2 octets
LLDPDU format
Chassis ID TLV Port ID TLV (M) (M) Time to Live TLV (M) Optional TLV ... Optional TLV
End of LLDPDU TLV (M)
EachLLDPDUframecanalsocontainthefollowingoptionalTLVs: PortDescriptionTheportfromwhichtheLLDPagenttransmittedtheframe. SystemNameThesystemsadministrativelyassignedname. SystemDescriptionIncludesthesystemsname,hardwareversion,OSlevel,and networkingsoftwareversion. SystemCapabilitiesAbitmapthatdefinestheprimaryfunctionsofthesystem.The currentlydefinedcapabilitiesinclude,amongotherthings,WLANaccesspoint,router,and telephone. ManagementAddressTheIPorMACaddressassociatedwiththelocalLLDPagentthat maybeusedtoreachhigherlayerentities.
Page 6 of 14
Configuring LLDP
802.3LANinterfaceextensionsTLVsdescribeattributesassociatedwiththeoperationofan 802.3LANinterface: MAC/PHYConfiguration/StatusAdvertisesthebitrateandduplexcapabilityofthe sending802.3node,thecurrentduplexandbitratingofthesending802.3node,and whetherthesesettingsweretheresultofautonegotiationduringlinkinitiationormanual override. PowerViaMDIAdvertisesthepowerviaMDIcapabilitiesofthesending802.3node. LinkAggregationAdvertiseswhetherthelinkiscapableofbeingaggregated,whether itiscurrentlyinanaggregation,and,ifitisinanaggregation,theportoftheaggregation. MaximumFrameSizeAdvertisesthemaximumsupported802.3framesizeofthe sendingstation.
LLDPMEDextensionTLVs: CapabilitiesIndicatesthenetworkconnectivitydevicescapabilities. NetworkPolicyUsedtoconfiguretagged/untaggedVLANID/L2priority/DSCPon LLDPMEDendpoints(forexample,IPphones). LocationIdentificationProvidesthelocationidentifierinformationtocommunication endpointdevices,basedontheconfigurationofthenetworkconnectivitydeviceitis connectedto. ExtendedPowerviaMDIEnablesadvancedpowermanagementbetweenLLDPMED endpointsandnetworkconnectivitydevices. InventoryManagementIncludeshardwarerevision,firmwarerevision,software revision,serialnumber,manufacturername,modelname,andassetID.
Configuring LLDP
LLDP Configuration Commands
Table 1listsLLDPconfigurationcommands.Thetableindicateswhichcommandsaredevice specific. Table 1
Task Set the time, in seconds, between successive LLDP frame transmissions initiated by changes in the LLDP local system information. Default value is 30 seconds.
Page 7 of 14
Configuring LLDP
Table 1
Task
Set the time-to-live value used in LLDP frames sent by this device. The time-to-live for LLDPDU data is calculated by multiplying the transmit interval by the hold multiplier. The default value is 4. Set the minimum interval between LLDP notifications sent by this device. LLDP notifications are sent when a remote system change has been detected. The default value is 5 seconds. Set the number of fast start LLDPDUs to be sent when an LLDP-MED endpoint device is detected. Network connectivity devices transmit only LLDP TLVs in LLDPDUs until they detect that an LLDPMED endpoint device has connected to a port. At that point, the network connectivity device starts sending LLDP-MED TLVs at a fast start rate on that port. The default value is 3. Enable or disable transmitting and processing received LLDPDUs on a port or range of ports. Enable or disable sending LLDP traps when a remote system change is detected. Enable or disable sending an LLDP-MED trap when a change in the topology has been sensed on the port (that is, a remote endpoint device has been attached or removed from the port). Configure LLDP-MED location information on a port or range of ports. Currently, only Emergency Call Services (ECS) Emergency Location Identification Number (ELIN) is supported. ELIN is a special phone number used to indicate location, and is assigned and associated with small geographies in the organization.It is one of the forms of identification that the location identification TLV provides. This command applies to Enterasys Matrix N-Series devices only. Select the optional LLDP and LLDP-MED TLVs to be transmitted in LLDPDUs by the specified port or ports.
set lldp port status {tx-enable | rxenable | both | disable} port-string set lldp port trap {enable | disable} port-string set lldp port med-trap {enable | disable} port-string
set lldp port tx-tlv {[all] | [portdesc] [sys-name] [sys-desc] [sys-cap] [mgmtaddr] [vlan-id] [stp] [lacp] [gvrp] [mac-phy] [poe] [link-aggr] [max-frame] [medcap] [med-pol] [medloc] [med-poe]} port-string set lldp port network-policy {all | voice | voice-signaling | guest-voice | guest-voice-signaling | softphone-voice | video-conferencing | streaming-video | video-signaling} [state {enable | disable}] [ tag {tagged | untagged}] [vid {vlan-id | dot1p}] [cos cos-value] [dscp dscp-value] port-string
Configure network policy for a set of applications on a port or range of ports. The policies configured with this command are sent in LLDPDUs as LLDP-MED Network Policy TLVs. Multiple Network Policy TLVs can be sent in a single LLDPDU. This command applies to Enterasys Matrix N-Series devices only.
Page 8 of 14
Configuring LLDP
Table 1
Task
Return the port status to the default value of both (both transmitting and processing received LLDPDUs are enabled). Return the port LLDP trap setting to the default value of disabled. Return the port LLDP-MED trap setting to the default value of disabled. Return the port ECS ELIN location setting to the default value of null. This command applies to Enterasys Matrix N-Series devices only. Return network policy for a set of applications on a port or range of ports to default values. This command applies to Enterasys Matrix N-Series devices only.
clear lldp port trap port-string clear lldp port med-trap port-string clear lldp port location-info elin port-string
clear lldp port network-policy {all | voice | voice-signaling | guest-voice | guest-voice-signaling | softphone-voice | video-conferencing | streaming-video | video-signaling} {[state ] [ tag ] [vid ] [cos ] [dscp ] } portstring clear lldp port tx-tlv {[all] | [portdesc] [sys-name] [sys-desc] [sys-cap] [mgmtaddr] [vlan-id] [stp] [lacp] [gvrp] [mac-phy] [poe] [link-aggr] [max-frame] [medcap] [med-pol] [medloc] [med-poe]} port-string
Clear the optional LLDP and LLDP-MED TLVs to be transmitted in LLDPDUs by the specified port or ports to the default value of disabled.
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,formoreinformation abouteachcommand.
Page 9 of 14
Configuring LLDP
2.
Enable/disable specific ports to: Transmit and process received LLDPDUs Send LLDP traps Send LLDP-MED traps set/clear lldp port status set/clear lldp port trap set/clear lldp port med-trap set/clear lldp port location-info set/clear lldp port network-policy set/clear lldp tx-tlv
3. 4. 5.
Configure an ECS ELIN value for specific ports. Configure Network Policy TLVs for specific ports. Configure which optional TLVs should be sent by specific ports. For example, if you configured an ECS ELIN and/or Network Policy TLVs, you must enable those optional TLVs to be transmitted on the specific ports.
2.
Enable/disable specific ports to: Transmit and process received LLDPDUs Send LLDP traps Send LLDP-MED traps set/clear lldp port status set/clear lldp port trap set/clear lldp port med-trap set/clear lldp tx-tlv
3.
Page 10 of 14
Configuring LLDP
show lldp port tx-tlv [port-string] show lldp port location-info [portstring]
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,foradescriptionof theoutputofeachcommand.
Page 11 of 14
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,formoreinformation abouteachcommand.
ThisexampleshowshowtoenabletheCDPforportge.1.2:
Router1(rw)->set cdp state enable ge.1.2
ThisexampleshowshowtodisabletheCDPforportge.1.2:
Router1(rw)->set cdp state disable ge.1.2
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,foradescriptionof theoutputofeachcommand.
Page 12 of 14
set ciscodp port { [status {disable | enable}] [ vvid {<vlan-id> | none | dot1p | untagged}] [trust-ext {trusted | untrusted}] [cos-ext value] } <portstring> clear ciscodp { [status | timer | holdtime | port {status | vvid | trust-ext | cos-ext}] } <port-string>
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,formoreinformation abouteachcommand.
Display global Cisco Discovery Protocol information. show ciscodp Display summary information about the Cisco Discovery Protocol on one or more ports. Display Network Neighbor Discovery information from all supported discovery protocols. show ciscodp port info [port-string] show neighbors [port-string]
RefertothedevicesCLIReferenceGuideorConfigurationGuide,asapplicable,foradescriptionof theoutputofeachcommand.
Page 13 of 14
Revision History
Date 09-29-08 10-15-08 Description New document Corrected trademark list and template issues
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2008Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSNETSIGHT,SECURESTACK, ENTERASYSSECURESTACK,LANVIEW,WEBVIEW,andanylogosassociatedtherewith,aretrademarksor registeredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Foracompletelistof Enterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Configuring NetFlow
ThisdocumentdescribestheNetFlowfeatureanditsconfigurationonEnterasysNSeries, SSeries,KSeries,andXSeriesmodularswitches.
For information about... What Is NetFlow? Why Would I Use It in My Network? How Can I Implement NetFlow? Understanding Flows Configuring NetFlow on the Enterasys S-Series, N-Series, and K-Series Modules Configuring NetFlow on the X-Series Router Terms and Definitions NetFlow Version 5 Record Format NetFlow Version 9 Templates Refer to page... 1 1 2 4 6 11 14 14 15
What Is NetFlow?
NetFlowisaflowbaseddatacollectionprotocolthatprovidesinformationaboutthepacketflows beingsentoveranetwork.NetFlowcollectsdatabyidentifyingunidirectionalIPpacketflows betweenasinglesourceIPaddress/portandasingledestinationIPaddress/port,usingthesame Layer3protocolandvaluesfoundinafixedsetofIPpacketfieldsforeachflow.NetFlowcollects identifiedflowsandexportsthemtoaNetFlowcollector.UptofourNetFlowcollectorscanbe configuredonasupporteddevice.ANetFlowmanagementapplicationretrievesthedatafromthe collectorforanalysisandreportgeneration.
Page 2 of 21
Figure 1
Captured Flows
HTTP Flow
Voice over IP
...
Voice over IP
...
Enable NetFlow
Enable NetFlow
LAN Cloud
Enable NetFlow
Independent Flows
NetFlow export packets sent to the collector/management application based upon a flow expiration criteria Management Application Installed
TocompleteaNetFlownetworkprofile,enableNetFlowonallportswherepacketflows aggregate.AtthetopofFigure 1youwillfindanabbreviatedsampleoftheindependentflow recordsthatarecapturedateachNetFlowenabledport.Theseflowrecordswillberetained locallyinacacheuntilaflowexpirationcriteriahasbeenmet.Asshown,whenoneoftheflow expirationcriteriaismet,NetFlowexportpacketsarethensenttotheNetFlowcollectorserver(s), whereacollectorandmanagementapplicationhasbeeninstalled.Themanagementapplication willprocesstherecordsandgenerateusefulreports.Thesereportsprovideyouwithaclear pictureoftheflowsthattraverseyournetwork,baseduponsuchdatapointsassourceand destinationaddress,startandendtime,application,andpacketpriority. ThefollowingstepsprovideahighleveloverviewofaNetFlowimplementation: 1. DeterminethebusinessornetworkpurposeoftheinformationNetFlowwillprovideyou.
Page 3 of 21
Understanding Flows
2.
Chooseuptofourcollectorsandamanagementapplication,suchasEnterasysSIEMor NetSightRelease4.1orhigher,bestsuitedforthepurposeforwhichyouarecollectingthe data.InstalltheapplicationontheNetFlowcollectorserver(s). IdentifythepathsusedbythedatatobecollectedbyNetFlow. IdentifythechokepointinterfaceswheretheIPpacketflowsyouwantNetFlowtocapture aggregate. EnableNetFlowontheidentifiedinterfaces. IdentifyuptofourNetFlowcollectorserversbyconfiguringtheIPaddressforeachcollector. UsethedatareportinggeneratedbytheNetFlowmanagementapplicationtoaddressthe purposedeterminedinstep1.
3. 4. 5. 6. 7.
Understanding Flows
TheconceptofaflowiscriticaltounderstandingNetFlow.AflowisastreamofIPpacketsin whichthevaluesofafixedsetofIPpacketfieldsisthesameforeachpacketinthestream.Aflow isidentifiedbyasetofkeyIPpacketfieldsfoundintheflow.Eachpacketcontainingthesame valueforallkeyfieldsisconsideredpartofthesameflow,untilflowexpirationoccurs.Ifapacket isviewedwithanykeyfieldvaluethatisdifferentfromanycurrentflow,anewflowisstarted baseduponthekeyfieldvaluesforthatpacket.TheNetFlowprotocolwilltrackaflowuntilan expirationcriteriahasbeenmet,uptoaconfigurednumberofcurrentflows. Thedatacapturedforeachflowisdifferent,basedontheNetFlowexportversionformat supportedbythenetworkdevice.Thisdatacanincludesuchitemsaspacketcount,bytecount, destinationinterfaceindex,startandendtime,andnexthoprouter.SeeNetFlowVersion5Record Formatonpage 14forNetFlowVersion5templatedatafielddescriptionsandNetFlowVersion9 Templatesonpage 15forNetFlowVersion9templatedatafielddescriptions.
Page 4 of 21
Understanding Flows
Figure 2providesagraphicdepictionofhowthesetimersinteract.Flows1and3showasingle longlastinglogicalflow.Flow1timesoutandexpiresat30minutes,theactivetimerlength. Becausetheflowexpires,anexportpacketissenttotheNetFlowcollector.Flow3continuesthis longlastingflowforanother10minutes.Attime40minutestheflowends.The40secondinactive timerinitiatesandexpiresat40minutesand40secondsresultinginanexportpackettothe NetFlowcollectorforflow3.AttheNetFlowcollector,themanagementapplicationjoinsthetwo flowsintoasinglelogicalflowforpurposesofanalysisandreporting. Flow2isa7.5minuteflowthatneverexpirestheactivetimer.Itbeginsat2.5minutesandendsat 10minutes.At10minutestheinactivetimercommencesandexpirestheflowat10minutesand40 seconds.Atthistime,NetFlowsendsanexportpacketfortheflowtotheNetFlowcollectorfor processing. Figure 2 Flow Expiration Timers
Flow Expiration
Flows Flow 1
Flow 1 expires
Flow 2
Flow 2 expires
Flow 3
2.5 Min.
30 Min.
Page 5 of 21
Page 6 of 21
Page 7 of 21
WhentransmittingNetFlowVersion5reports,themoduleusesNetFlowinterfaceindexes. NormallythesewouldbeactualMIB2ifIndexvalues,buttheVersion5recordformatlimitsthe valuesto2bytes,whichisnotsufficienttohold4byteifIndexes.NetFlowcollectorapplications thatusethein/outinterfaceindexestogatherSNMPdataabouttheinterface(suchasifName) musttranslatetheinterfaceindexesusingtheEnterasysMIBetsysNetFlowMIB (1.3.1.6.1.4.1.5624.1.2.61). WithNetFlowversion9,packetsaremadeupoftemplatescontainingasetofdatarecords. Templatesaresentaftertheperiodconfiguredforthetemplatetimeoutwhenamoduleor collectionserverfirstbootsup.Datarecordsforversion9cannotbeprocessedwithoutan uptodatetemplate.Collectorsignoreincomingpacketsuntilatemplatearrives.Templatesare refreshedperiodicallybaseduponapacketrefreshrateandtimeoutperiod.Settingthe appropriaterefreshrateforyoursystemmustbedetermined,sincethedefaultsettingsofa 20packetrefreshrateanda30minutetimeoutmaynotbeoptimalforyourenvironment.See ConfiguringNetFlowExportVersionRefreshonpage 8. NetFlowVersion9recordsgeneratedbymodulesusetrueMIB2ifIndexvaluessincethetemplate mechanismpermitstransmissionof4byteifIndexes.Version9alsouses8bytepacketandbyte counters,sotheyarelesslikelytorollover.Checkwithyourcollectorprovidertodetermineif theyprovidethenecessarysupport. ThecurrentEnterasysVersion9implementation: Doesnotsupportaggregationcaches. Provides15IPv4and15IPv6predefinedtemplates.TheSSeriesfirmwareautomatically selectstheappropriatetemplateforeachflowdependingonwhethertheflowisroutedor switched,whetheritisaTCP/UDPpacketornot,andcontainsfieldsappropriatetothedata recordssupportedinthetemplate.SeeTable 6onpage 216foralistingoftheheaderfields supportedbytheNetFlowVersion9templates.SeeTable 7onpage 217foralistingofthe basedatarecordfieldssupportedbyallNetFlowVersion9templates.SeeTable 8onpage 217 foralistingoftheadditionaltemplatespecificdatarecordfieldssupportedbytheNetFlow Version9templates.SeeTable 9onpage 218foralistingofIPv4andIPv6Version9NetFlow templatesbytemplateIDanddescription.
Page 8 of 21
Thedefaultbehaviorisforthetemplatetobesentafter20flowreportpacketsaresent.Sincedata recordpacketsaresentoutperflow,alongFTPflowmaycausethetemplatetimeouttimerto expirebeforethemaximumnumberofpacketsaresent.Inanycasearefreshofthetemplateis sentattimeoutexpirationaswell. Settingtheappropriaterefreshrateforyoursystemmustbedetermined,becausethedefault settingsofa20flowreportrefreshrateanda30minutetimeoutmaynotbeoptimalforyour environment.Forexample,aswitchprocessinganextremelyslowflowrateof,say,20flowreports perhalfhour,wouldrefreshthetemplatesonlyeveryhalfhourusingthedefaultsettings,whilea switchsending300flowreportpacketspersecondwouldrefreshthetemplates15timesper second. Enterasysrecommendsthatyouconfigureyoursystemsoitdoesnotrefreshtemplatesmoreoften thanoncepersecond. UsethesetnetflowtemplatecommandtosettheNetFlowexporttemplaterefreshrateand timeoutforthissystem. UsetheclearnetflowtemplatecommandtoresettheNetFlowexporttemplaterefreshrateand timeouttothedefaultvalues.
Page 9 of 21
3.
4. 5. 6.
Optionally, change NetFlow record format System(rw)->set netflow export-version between version 5 and version 9 for this system. version If using version 9, optionally modify the number of export packets sent that cause a template to be retransmitted by an individual module and/or the length of the timeout period, in minutes, after which a template is retransmitted by all modules in the system. Optionally, enable NetFlow Version 9 optional MAC and VLAN export data. Verify any configuration changes made. System(rw)->set netflow template {[refresh-rate packets] [timeout minutes]
7. 8.
System(rw)->set netflow export-data {enable | disable} {mac | vlan} System(rw)->show netflow config
Page 10 of 21
Export Version
Version 5
Timeout-period
30 minutes
Page 11 of 21
4.
5.
9. 10.
Disabling NetFlow
TodisableNetFlowonaport,useeitherofthefollowingcommands:
set netflow port port-string disable clear netflow port port-string
Page 12 of 21
Whenyouexecutetheclearnetflowallcommand,allNetFlowsettingsarereturnedtotheir defaultcondition.InthecaseoftheglobalNetFlowcachesetting,thedefaultisdisabled.
TodisplayNetFlowstatisticsonaperportbasis:
show netflow statistics port-string
TodisplayflowcountersforthecurrentcachedNetFlowinformation,onasystemwideor IOMspecificbasis:
show netflow cache-flow [slot-id]
Parameter Cache Status Sampling Rate Engine ID Engine Type Administrative Interface Destination IP Destination UDP port Export Version
Export Interval
30 minutes
peer AS 84 KB Disabled
Page 13 of 21
Flow Flow Record Inactive Flow Timer NetFlow Cache NetFlow Collector
NetFlow Export
NetFlow Version 5 Header Data Field count sys_uptime unix_secs Field Contains Number of flows exported in this packet (1-30). Current time in milliseconds since the export device booted. Current count of seconds since 0000 UTC 1970.
Page 14 of 21
Table 4
Table 5
NetFlow Version 5 Data Record Format Data Field srcaddr dstaddr nexthop input output dPkts dOctets first last srcport dstport pad1 tcp_flags prot tos src_as dst_as src_mask dst_mask pad2 Field Contains Source IP address of the device that transmitted the packet. IP address of the destination of the packet. IP address of the next hop router. SNMP index of input interface. SNMP index of output interface. Number of packets in the flow. Total number of Layer 3 bytes in the packets of the flow. SysUptime at start of flow. SysUptime at the time the last packet of the flow was received. TCP/UDP source port number or equivalent. TCP/UDP destination port number or equivalent. Unused (zero) bytes. Cumulative OR of TCP flags. IP protocol type (for example, TCP = 6; UDP = 17). IP type of service (ToS). Autonomous system number of the source, either origin or peer. Autonomous system number of the destination, either origin or peer. Source address prefix mask bits. Destination address prefix mask bits. Unused (zero) bytes.
Page 15 of 21
datarecordfieldsdefinedintheNetFlowstandard.Thecontentsofthesedatarecordfieldsare usedbythecollectorsoftwareapplicationforflowanalysis.Tenbasedatarecordfieldsare includedinallVersion9templates.Uptoanadditionalsevendatarecordfieldsareincludedin theappropriatetemplates. ThemodularswitchplatformimplementationoftheNetFlowVersion9templatesaredetailedin thefollowingtables: Table 6onpage 16providesalistinganddescriptionofthesupportedNetFlowVersion9 headerfields Table 7onpage 17providesalistinganddescriptionofthesupportedNetFlowVersion9base datarecordfields Table 8onpage 17providesalistingofthesupportedadditionaltemplatespecificdatarecord fields Table 9onpage 18providesthetemplateIDandageneraldescriptionofeachmodularswitch Version9template
Table 6onpage 16detailstheNetFlowVersion9templateheaderfieldssupportedbyallVersion9 templates. Table 6 NetFlow Version 9 Template Header Support
NetFlow Version 9 Header Data Field Format Version Flow Record Count Description NetFlow template Version 9 The total number of records in the export packet, which is the sum of the options flow set records, template flowset records, and data flowset records. Time in milliseconds since this device was first booted. Time in seconds since 0000 UTC 1970, at which the export packet leaves the exporter. Incremental sequence counter of all export packets sent from the exporter. This is an accumulative count that lets the collector know if any packets have been missed. Engine Type (1 = Line Card). Engine ID (One based module slot number). Templates All Templates All Templates
Source ID
All Templates
Page 16 of 21
specificdatarecordsareonlysupportedbyIPv4templates.IPv6specificdatarecordsareonly supportedbyIPv6templates. Table 7 NetFlow Version 9 Template Data Record Field Support
NetFlow Version 9 Base Data Record Fields Data Field SIP Description (Source) IPv4 or IPv6 address of the device that transmitted the packet. (Destination) IPv4 or IPv6 address of the destination device. MIBII 32-bit ID of the interface on which the packet was transmitted. MIBII 32-bit ID of the interface on which the packet was received. Templates 256 - 271 IPv4 addresses 272 - 287 IPv6 addresses 256 - 271 IPv4 addresses 272 - 287 IPv6 addresses All templates All templates
DIP
Dest IfIndex Source IfIndex Packet Count Byte Count Start Time Last Time IP Protocol Source TOS
The number of packets switched through this flow. All templates The number of bytes switched through this flow. sysUptime in milliseconds at which the first packet of this flow was switched. sysUptime in milliseconds at which the last packet of this flow was switched. IP protocol for this flow. (Source) Type of service field value for this flow. All templates All templates All templates All templates All templates
Table 8detailstheadditionalNetFlowVersion9datarecordfieldsspecifictoagivenVersion9 template. Table 8 NetFlow Version 9 Additional Template Specific Data Record Field Support
NetFlow Version 9 Additional Template Specific Data Record Fields Data Field Source MAC Description Source MAC addresses for this flow. Templates IPv4: 257, 259, 261, 263, 265, 267, 269, 271 IPv6: 272, 274, 276, 278, 280, 282, 284, 286 Destination MAC Destination MAC addresses for this flow. IPv4: 257, 259, 261, 263, 265, 267, 269, 271 IPv6: 272, 274, 276, 278, 280, 282, 284, 286 Source VLAN Source VLAN ID associated with the ingress interface for this flow. IPv4: 258, 259, 262, 263, 266, 267, 270, 271 IPv6: 273, 274, 277, 278, 281, 282, 285, 286
Page 17 of 21
Table 8
NetFlow Version 9 Additional Template Specific Data Record Fields Data Field Destination VLAN Description Destination VLAN ID associated with the egress interface for this flow. Templates IPv4: 258, 259, 262, 263, 266, 267, 270, 271 IPv6: 273, 274, 277, 278, 281, 282, 285, 286 Layer 4 Source Port TCP/UDP source port numbers (for example, FTP, Telnet, or equivalent). IPv4: 260, 261, 262, 263, 268, 269, 270, 271 IPv6: 275, 276, 277, 278, 283, 284, 285, 286 Layer 4 Destination Port TCP/UDP destination port numbers (for example, FTP, Telnet, or equivalent). IPv4: 260, 261, 262, 263, 268, 269, 270, 271 IPv6: 275, 276, 277, 278, 283, 284, 285, 286 Next Hop Router Specifies the BGP IPv4 or IPv6 next-hop address. IPv4: 264, 265, 266, 267, 268, 269, 270, 271 IPv6: 279, 280, 281, 282, 283. 284, 285, 286
IPv4 Version 9 Templates Template ID 256 257 258 259 Description Base switch template containing IPv4 base data record entries. Switch and MAC ID template containing IPv4 base data record entries, along with source and destination MAC addresses. Switch and VLAN ID template containing IPv4 base data record entries and source and destination VLAN IDs. Switch, MAC ID, and VLAN ID template containing IPv4 base data record entries, along with source and destination MAC addresses and source and destination VLAN IDs. Switch and Layer 4 port template containing IPv4 base data record entries, along with source and destination Layer 4 ports. Switch, Layer 4 port, and MAC ID template containing IPv4 base data record entries, along with source and destination layer 4 ports and source and destination MAC addresses. Switch, Layer 4 port, and VLAN ID template containing IPv4 base data record entries, along with source and destination Layer 4 ports and source and destination VLAN IDs. Switch, Layer 4 port , MAC ID, and VLAN ID template containing IPv4 base data record entries, along with source and destination Layer 4 port, source and destination MAC addresses and source and destination VLAN IDs.
260 261
262
263
Page 18 of 21
Table 9
264 265 266 267
268 269
270
271
IPv6 Version 9 Templates 272 273 274 275 Base switch template containing IPv6 base data record entries. Switch and MAC ID template containing IPv6 base data record entries, along with source and destination MAC addresses. Switch and VLAN ID template containing IPv6 base data record entries and source and destination VLAN IDs. Switch, MAC ID, and VLAN ID template containing IPv6 base data record entries, along with source and destination MAC addresses and source and destination VLAN IDs. Switch and Layer 4 port template containing IPv6 base data record entries, along with source and destination Layer 4 ports. Switch, Layer 4 port, and MAC ID template containing IPv6 base data record entries, along with source and destination layer 4 ports and source and destination MAC addresses. Switch, Layer 4 port, and VLAN ID template containing IPv6 base data record entries, along with source and destination Layer 4 ports and source and destination VLAN IDs. Switch, Layer 4 port , MAC ID, and VLAN ID template containing IPv6 base data record entries, along with source and destination Layer 4 port, source and destination MAC addresses and source and destination VLAN IDs. Switch and IPv6 route ID template containing IPv6 base data record entries, along with the route next hop.
276 277
278
279
280
Table 9
281 282 283
284 285
286
287
Page 20 of 21
Revision History
Date May 18, 2011 July 28, 2008 October 15, 2008 January 23, 2009 July 15, 2010 May 18, 2011 Description First Release. Added Enterasys Registration mark. Corrected Tradmarks list. Cosmetic changes only. Updated for S-Series platform. Updated for Release 7.21 changes and K-Series platform.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSSSERIES,ENTERASYSNETSIGHT,LANVIEW, WEBVIEW,andanylogosassociatedtherewith,aretrademarksorregisteredtrademarksof Enterasys Networks, Inc.,intheUnitedStatesandothercountries. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
For information about... What is PoE? Why Would I Use PoE in My Network? How Do I Implement PoE? Configuring PoE
Refer to page... 1 1 2 4
What is PoE?
PoE,definedinIEEEstandards802.3afand802.3at,referstotheabilitytoprovide48Vdc(for 802.3af)or54Vdc(for802.3at)operationalpowerthroughanEthernetcablefromaswitchor otherdevicethatcanprovideaPoEcompliantportconnectiontoapowereddevice(PD). ExamplesofPDsarethefollowing: VoiceoverIPdevicessuchasPoEcompliantdigitaltelephones Pan/Tilt/Zoom(PTZ)IPsurveillancecameras DevicesthatsupportWirelessApplicationProtocol(WAP)suchaswirelessaccesspoints
June 3, 2011
Page 1 of 14
Table 1
Class 0 1 2 3 4
TheswitchfirmwaredeterminesthepoweravailableforPoEbasedonhardwareconfiguration, powersupplystatus,andpowersupplyredundancymode.Thesystemcalculatesandreservesthe correctamountofpowerrequiredbytheinstalledhardwarecomponentsandthenmakesthe balanceofpoweravailableforPoE.Whenanychangeismadetothehardwareconfiguration, powersupplystatus,orredundancymode,thefirmwarerecalculatesthepoweravailableforPoE. OntheSSeries,NSeries,andKSeriesswitches,youcanalsomanuallyconfigurethemaximum percentageofPoEpoweravailabletothechassisasapercentageofthetotalinstalledPoEpower withthesetinlinepoweravailablecommand.(ThisfeatureisnotconfigurableontheGSeries.)If thepowerneededorrequestedexceedsthepoweravailable,thesystemwillgenerateatrapto notifythesystemmanager,iftrapsareenabled. ThepoweravailableforPoEisdistributedbasedontheconfiguredallocationmode,setwiththe setinlinepowermodecommand:
June 3, 2011
Page 2 of 14
Automaticmode,inwhichavailablepowerisdistributedevenlytoPoEcapablemodules basedonPoEportcount.(Thisisthedefaultmode.)Anychangeinavailablepower,duetoa changeinpowersupplystatusorredundancymodeortotheadditionorremovalofmodules, willtriggeranautomaticredistributionofpower. Manualmode,inwhichthepowerbudgetforeachPoEcapablemoduleismanually configured,usingeitherCLIcommandsortheMIBs.Thesumofthewattageconfiguredfor eachmodulecannotexceedthetotalpoweravailableontheswitchforPoE. ThepowerbudgetforeachPoEcapablemodulecanbeconfiguredmanuallyontheGSeries withthecommandsetinlinepowerassignandontheSSeries,NSeries,andKSerieswith thecommandsetinlinepowerassigned. Theconfiguredwattageassignmentsareusedtocalculateeachslotspercentageoftotal availablepower.IfthetotalavailablePoEpowerisreduced,aredistributionofavailable powerwilloccur,applyingthecalculatedpercentages.
ForeachPoEcapablemoduleorswitch(fortheproductslistedabove),youcanconfigurehowits PoEcontrollermakespoweravailabletoattachedpowereddevices(PDs).Onapermodulebasis, youcanconfigure: Realtimemode,inwhichthePoEcontrollercalculatesthepowerneededbyaPDbasedon theactualpowerconsumptionoftheattacheddevices. Classmode,inwhichthePoEcontrollermanagespowerbasedontheIEEE802.3af/.3at definitionoftheclasslimitsadvertisedbytheattacheddevices,withtheexceptionthatfor class0andclass4devices,actualpowerconsumptionwillalwaysbeused.Inthismode,the maximumamountofpowerrequiredbyadeviceintheadvertisedclassisreservedforthe port,regardlessoftheactualamountofpowerbeingusedbythedevice.
June 3, 2011
Page 3 of 14
Configuring PoE
Configuring PoE
Table 2liststhePoEsettingsthatyoucanconfigurethroughtheCLIoneachPoEcompliant Enterasysdevice. Table 2 PoE Settings Supported on Enterasys Devices
G-Series D-Series N-Series K-Series X X X X X X S-Series X X X X X X
B3
C2
A2
A4
B2
B5
C3 X X X X
Setting Port-specific PoE parameters SNMP traps PoE usage threshold PD detection method System power redundancy System power allocation Module power allocation PD power management
X X X X
X X X X
X X X X
X X X X
X X X X
X X X X
X X X X X
C5
X X X X
X X X X X X X
X X X
X X X
RefertotheappropriatedevicespecificPoEconfigurationprocedure. StackablefixedswitchesA2,A4,B2,B3,C2,andC3:Procedure 1onpage5 StandaloneDSeries:Procedure 1onpage5 StackablefixedswitchesB5andC5:Procedure 2onpage6 StandaloneGSeries:Procedure 3onpage7 ModularNSeries,SSeries,andKSeries:Procedure 4onpage10
Note: You must be logged on to the Enterasys device with read-write access rights to use the commands shown in the procedures in the following sections.
June 3, 2011
Page 4 of 14
Configuring PoE
Stackable A2, A4, B2, B3, C2, C3 and Standalone D-Series Devices
Procedure 1
Step 1. Task Configure PoE parameters on ports to which PDs are attached. admin Enables (auto) or disables (off) PoE on a port. The default setting is auto. priority Sets which ports continue to receive power in a low power situation. If all ports have the same priority and the system has to cut power to the PDs, the PDs attached to the lowest numbered ports have the highest priority for receiving power. The default setting is low. type Associates an alias with a PD, such as siemens phone. 2. 3. (Optional) Enable SNMP trap messages on the device. The default setting is enabled. (Optional) Set the PoE usage threshold on the device. Valid values are 11100 percent. The default setting is 80 percent. (Optional) Specify the method the Enterasys device uses to detect connected PDs. auto (default) The Enterasys device first uses the IEEE 802.3af/at standards resistor-based detection method. If that fails, the device uses the proprietary capacitor-based detection method. ieee The Enterasys device uses only the IEEE 802.3af/at standards resistor-based detection method. set inlinepower trap {disable | enable} unit-number set inlinepower threshold usage-threshold unit-number set inlinepower detectionmode {auto | ieee}
4.
RefertothedevicesConfigurationGuideorCLIReferenceGuideformoreinformationabouteach command.
June 3, 2011
Page 5 of 14
Configuring PoE
4.
June 3, 2011
Page 6 of 14
Configuring PoE
Procedure 2
Step 6. Task
(Optional on C5 only) Set the power redundancy mode on the system if two power supplies are installed. redundant (default) The power available to the system equals the maximum output of the lowest rated supply (400W or 1200W). If two supplies are installed in redundant mode, system power redundancy is guaranteed if one supply fails. non-redundant The combined output of both supplies is available to the system. In this mode, a power supply failure may result in a system reset. Also called additive mode. If two power supplies are installed, the power supply LEDs on the devices front panel indicate whether the power supplies are in redundant mode (green LEDs) or non-redundant mode (amber LEDs).
RefertothedevicesConfigurationGuideorCLIReferenceGuideformoreinformationabouteach command.
G-Series Devices
Procedure 3
Step 1. Task Configure PoE parameters on ports to which PDs are attached. admin Enables (auto) or disables (off) PoE on a port. The default setting is auto. priority Sets which ports continue to receive power in a low power situation. If all ports have the same priority and the system has to cut power to the PDs, the PDs attached to the lowest numbered ports have the highest priority for receiving power. The default setting is low. type Associates an alias with a PD, such as siemens phone. 2. 3. (Optional) Enable SNMP trap messages on the module. The default setting is enabled. (Optional) Set the PoE usage threshold on the module. Valid values are 11100 percent. Use the clear command to reset the PoE usage threshold on a specified module to the default value of 80 percent. set inlinepower trap {disable | enable} module-number set inlinepower threshold usage-threshold module-number clear inlinepower threshold module-number
June 3, 2011
Page 7 of 14
Configuring PoE
Procedure 3
Step 4. Task
(Optional) Specify the method the Enterasys device uses to detect connected PDs. auto (default) The Enterasys device first uses the IEEE 802.3af/at standards resistor-based detection method. If that fails, the device uses the proprietary capacitor-based detection method. ieee The Enterasys device uses only the IEEE 802.3af/at standards resistor-based detection method.
5.
(Optional) Set the power redundancy mode on the system if two power supplies are installed. redundant (default) The power available to the system equals the maximum output of the lowest rated supply (400W or 1200W). If two supplies are installed in redundant mode, system power redundancy is guaranteed if one supply fails. non-redundant The combined output of both supplies is available to the system. In this mode, a power supply failure may result in a system reset. Also called additive mode. If two power supplies are installed, the power supply LEDs on the devices front panel indicate whether the power supplies are in redundant mode (green LEDs) or non-redundant mode (amber LEDs).
6.
(Optional) Set the PoE management mode on a specified module. realtime (default) Manages power based on the actual power consumption of the ports. class Manages power based on the IEEE 802.3af/at definition of the class upper limit for each attached PD, except classes 0 and 4, for which the actual power consumption is used. In this mode, the maximum amount of power required by a PD in the advertised class is reserved for the port, regardless of the actual amount of power being used by the device.
June 3, 2011
Page 8 of 14
Configuring PoE
Procedure 3
Step 7. Task
(Optional) Configure the allocation mode for system power available for PoE. auto (default) Available power is distributed evenly to PoE modules based on PoE port count. A change in available power, due to a change in power supply status or redundancy mode or to the addition or removal of modules, triggers an automatic redistribution of power to the PoE controller on each PoE-capable module. manual The power budget for each PoE module is configured manually, using the set inlinepower assign command. The configured wattage assignments are used to calculate each modules percentage of total available power. If the total available PoE power changes, a redistribution of available power occurs, applying the calculated percentages. In manual mode, power recalculations do not occur under the following circumstances: A PoE module is added. The new module has a power budget of zero until it is manually provisioned. Since the sum of the manually provisioned wattages cannot exceed the total system power available, you may have to adjust existing budgets to free up power for the new module. A PoE module is removed. In this case, the assumption is that the removed module will be replaced with a new module that should receive the same amount of PoE power.
8.
(Only if the set inlinepower mode command is set to manual) Assign specific wattage to a PoE module. If the set inlinepower mode command is set to manual, you must assign power to each PoE module; otherwise, the module ports will not receive power. The sum of the wattage configured for each module cannot exceed the total power available for PoE on the Enterasys device. If a G-Series device is configured for non-redundant mode (set system power) and manual mode (set inlinepower mode) and a power supply fails, the G-Series device redistributes the remaining power to the modules. When power is restored on the failed power supply, however, you must manually reconfigure the power for each module.
June 3, 2011
Page 9 of 14
Configuring PoE
Procedure 3
Step Task
Use the clear command to clear the power value manually assigned to one or more modules.
RefertothedevicesCLIReferenceGuideformoreinformationabouteachcommand.
June 3, 2011
Page 10 of 14
Configuring PoE
Procedure 4
Step 4. Task
(Optional) Set the PoE usage threshold on a module. Valid values are 199 percent. Use the clear command to reset the PoE usage threshold on a specified module to the default value of 80 percent.
5.
(Optional) Set the maximum percentage of total PoE power available that a chassis can withdraw from the total PoE power detected. Use the clear command to reset the percentage of the total power available to a chassis to the default value of 100.
6.
(Optional) Set the PoE management mode on a specified module. realtime (default) Manages power based on the actual power consumption of the ports. class Manages power based on the IEEE 802.3af definition of the class upper limit for each attached PD, except classes 0 and 4, for which the actual power consumption is used. In this mode, the maximum amount of power required by a PD in the advertised class is reserved for the port, regardless of the actual amount of power being used by the device. Use the clear command to reset the PoE management mode on a specified module back to the default setting.
7.
(Optional) Configure the allocation mode for system power available for PoE. auto (default) Available power is distributed evenly to PoE modules based on PoE port count. Any change in available power, due to a change in power supply status or redundancy mode or to the addition or removal of modules, triggers an automatic redistribution of power to the PoE controller on each PoE module. manual The power budget for each PoE module is configured manually, using the set inlinepower assigned command. The configured wattage assignments are used to calculate each modules percentage of total available power. If the total available PoE power changes, a redistribution of available power occurs, applying the calculated percentages. Use this command to reset chassis power allocation to the default mode.
June 3, 2011
Page 11 of 14
Configuring PoE
Procedure 4
Step 8. Task
(Only if the set inlinepower mode command is set to manual) Assign specific wattage to a PoE module. If the set inlinepower mode command is set to manual, you must assign power to each PoE module; otherwise, the module ports will not receive power. If the value set with this command is greater than the maximum power percentage specified with the set inlinepower available command, a warning will display in the show inlinepower output. If you execute these parameters, a ratio of assigned power is applied to each module. Use the clear command to clear the power value manually assigned to one or more modules.
RefertothedevicesConfigurationGuideformoreinformationabouteachcommand.
TomakepoweravailableforallthePDsconnectedtothemoduleinslot2,thenetwork administratormustfirstchangethesettingofthesetinlinepowermodecommand:
G3(su)->set inlinepower mode manual
June 3, 2011
Page 12 of 14
Configuring PoE
RefertothedevicesCLIReferenceGuideorConfigurationGuideforadescriptionoftheoutputof eachcommand.
June 3, 2011
Page 13 of 14
Configuring PoE
Revision History
Date 03-02-2009 06-03-2011 Description New document Revised to add A4, B5, C5, S-Series, K-Series
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,andanylogosassociatedtherewith,are trademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Fora completelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
June 3, 2011
Page 14 of 14
Configuring Policy
ThisdocumentdescribestheEnterasyspolicyfeatureanditsconfigurationonEnterasysMatrix NSeries,EnterasysSecureStack,DSeries,GSeries,andISeriesswitchdevices.
Note: See the Enterasys Matrix X Router Configuration Guide for X Router policy configuration information.
For information about... What is Policy? Why Would I Use Policy in My Network? How Can I Implement Policy? Policy Overview Configuring Policy Policy Configuration Example Terms and Definitions
Refer to page... 1 1 2 2 15 21 31
What is Policy?
PolicyisacomponentofSecureNetworksthatprovidesfortheconfigurationofrolebased profilesforsecuringandprovisioningnetworkresourcesbasedupontheroletheuserordevice playswithintheenterprise.Byfirstdefiningtheuserordevicerole,networkresourcescanbe granularlytailoredtoaspecificuser,system,service,orportbasedcontextbyconfiguringand assigningrulestothepolicyrole.ApolicyrolecanbeconfiguredforanycombinationofClassof Service,VLANassignment,classificationruleprecedence,logging,accounting,ordefault behaviorbaseduponL2,L3,andL4packetfields.Hybridauthenticationallowseitherpolicyor dynamicVLANassignment,orboth,tobeappliedthroughRADIUSauthorization.
Page 1 of 32
Securitycanbeenhancedbyallowingonlyintendedusersanddevicesaccesstonetwork protocolsandcapabilities.Someexamplesare: EnsuringthatonlyapprovedstationscanuseSNMP,preventingunauthorizedstationsfrom viewing,reading,andwritingnetworkmanagementinformation Preventingedgeclientsfromattachingnetworkservicesthatareappropriatelyrestrictedto datacentersandmanagedbytheenterpriseITorganizationsuchasDHCPandDNSservices IdentifyingandrestrictingroutingtolegitimateroutingIPaddressestopreventDoS, spoofing,dataintegrityandotherroutingrelatedsecurityissues EnsuringthatFTP/TFTPfiletransfersandfirmwareupgradesonlyoriginatefromauthorized fileandconfigurationmanagementservers PreventingclientsfromusinglegacyprotocolssuchasIPX,AppleTalk,andDECnetthat shouldnolongerberunningonyournetwork
Policy Overview
Introduction
Thissectionprovidesanoverviewofpolicyconfiguration.PolicyisimplementedonanEnterasys platformbyassociatingusersanddevicesinthenetworkwithdefinedenterpriseroles(suchas sales,engineering,oradministration)thatareconfiguredinapolicyrole.Thepolicyroleis associatedwithrulesthatdefinehownetworkresourceswillbeprovisionedandcontrolledfor rolemembers,aswellashowsecuritywillbeappliedtotherolemember.Anadministrative profileassociatesaspecificrolemembertrafficclassificationwithapolicyrole.
Note: In a CLI configuration context, the policy role is configured within a policy profile using the set policy profile command. Through out this discussion, policy role and policy profile mean the same thing.
Page 2 of 32
Policy Overview
Page 3 of 32
Policy Overview
networkaccessandresourceusagealignwiththesecurityrequirements,networkcapabilities,and legitimateuserneedsasdefinedbythenetworkadministrator.
Policy Roles
Defining a Policy Role
Thepolicyroleisacontainerthatholdsallaspectsofpolicyconfigurationforaspecificrole.Policy rolesareidentifiedbyanumericprofileindexvaluebetween1andthemaximumnumberofroles supportedontheplatform.Pleaseseeyourdevicesfirmwarereleasenotesforthemaximum numberofrolessupported.Policyrolesareconfiguredusingthesetpolicyprofilecommand. Policyconfigurationiseitherdirectlyspecifiedwiththesetpolicyprofilecommandoris associatedwiththerolebyspecifyingtheprofileindexvaluewithinthecommandsyntaxwhere thegivenpolicyoptionisconfigured.Forexample,whenconfiguringapolicymaptableentry usingthesetpolicymaptablecommand(seeVLANtoPolicyMappingonpage 5),thecommand syntaxrequiresthatyouidentifythepolicyrolethemaptableentrywillbeassociatedwith,by specifyingtheprofileindexvalue. Whenmodifyinganexistingpolicyrolethedefaultbehavioristoreplacetheexistingrolewiththe newpolicyroleconfiguration.Usetheappendoptiontolimitthechangetotheexistingpolicy roletotheoptionsspecifiedintheenteredcommand. Apolicyrolecanalsobeidentifiedbyatextnameofbetween1and64characters.Thisnamevalue isusedbytheRADIUSfilterIDattributetoidentifythepolicyroletobeappliedbytheswitch withasuccessfulauthentication.
Page 4 of 32
Policy Overview
Adding Tagged, Untagged, and Forbidden Ports to the VLAN Egress Lists
TheVLANEgresslistcontainsalistofportsthataframeforthisVLANcanexit.Specifiedports areautomaticallyassignedtotheVLANegresslistforthispolicyroleastagged,untagged,or forbidden.
VLAN-to-Policy Mapping
Enhanced Policy
VLANtoPolicymappingprovidesforthemanualconfigurationofaVLANtoPolicyassociation thatcreatesapolicymaptableentrybetweenthespecifiedVLANandthespecifiedpolicyrole.A policymaptableholdstheVLANtoPolicymappings.WhenanincomingtaggedVLANpacketis seenbytheswitch,alookupofthepolicymaptabledetermineswhetheraVLANtopolicy mappingexists.Ifthemappingexists,theassociatedpolicyisappliedtothispacket. Thisfeaturecanbeusedatthedistributionlayerinenvironmentswherenonpolicycapableedge switchesaredeployedandthereisnopossibilityofapplyingEnterasyspolicyattheedge.Tagged framesreceivedatthedistributionlayerinterfaceforaVLANwithanentryinthepolicymaptable willhavetheassociatedpolicyappliedtotheframe.
Page 5 of 32
Policy Overview
Note: VLAN-to-Policy mapping is supported on the B3, C3, and G3 switches for firmware releases 6.3 and greater.
UsethesetpolicymaptablecommandspecifyingasingleVLANIDorrangeofIDsandthepolicy profileindextocreateapolicymaptableentry.
Page 6 of 32
Policy Overview
AppliesboththefilterIDandtheVLANtunnelattributesifallattributesexist
Usethesetpolicyinvalidactioncommandtospecifyadefaultactiontotakewhenaskedtoapply aninvalidorunknownpolicy.
Classification Rules
Classificationrulesassociatespecifictrafficclassificationsorpolicybehaviorswiththepolicyrole. Therearetwoaspectsofclassificationruleconfiguration: Theassociationofatrafficclassificationwithapolicyrolebyassigningthetrafficclassification toanadministrativeprofile. Theassignmentofpolicyrulesthatdefinedesiredpolicybehaviorsforthespecifiedtraffic classificationtype.
Page 7 of 32
Policy Overview
Policyrulesarebasedontrafficclassifications.Table 1onpage 8providesthesupportedpolicy ruletrafficclassificationcommandoptionsanddefinitions.AnXintheenhancedrulecolumn specifiesthatthistrafficclassificationruleisonlysupportedonenhancedpolicyplatforms.All othertrafficclassificationsaresupportedbystandardpolicy. AdetaileddiscussionofsupportedtrafficclassificationsisavailableintheTrafficClassification RulessectionoftheNetSightPolicyManageronlinehelp. Table 1 Administrative Policy and Policy Rule Traffic Classifications
Description Classifies based on MAC source address. Classifies based on MAC destination address. Classifies based on source IPX address. Classifies based on destination IPX address. Classifies based on source IPX socket. Classifies based on destination IPX socket. Classifies based on transmission control in IPX. Classifies based on IPX packet type. Classifies based on source IP address with optional post-fixed port. Classifies based on destination IP address with optional post-fixed port. Classifies based on IP fragmentation value. Classifies based on UDP source port and optional post-fix IP address. Classifies based on UDP destination port and optional post-fix IP address. Classifies based on TCP source port and optional post-fix IP address. Classifies based on TCP destination port and optional post-fix IP address. Classifies based on ICMP type. Classifies based on Type of Service field in IP packet. Classifies based on protocol field in IP packet. Classifies based on type field in Ethernet II packet. Classifies based on DSAP/SSAP pair in 802.3 type packet. Classifies based on VLAN tag. Classifies based on Tag Control Information. Classifies based on port-string. Attribute ID 1 2 3 4 5 6 7 8 12 13 14 15 16 17 18 19 21 22 25 26 27 28 31 X X X X X X X X X Enhanced Rule
Traffic Classification macsource macdest ipxsource ipxdest ipxsourcesocket ipxdestsocket ipxclass ipxtype ipsourcesocket ipdestsocket ip frag udpsourceportip udpdestportip tcpsourceportip tcpdestportip icmptype iptos ipproto ether llcDsapSsap vlantag tci port
Page 8 of 32
Policy Overview
Note: The optional post-fixed port traffic classification listed in Table 1 for IP, UDP, and TCP source and destination port traffic classifications is supported on DFE blades only.
Page 9 of 32
Policy Overview
storagedoespersistafteraresetofthedevice.Usethestoragetypeoptiontospecifythedesired storagetypeforthispolicyruleentryinanenhancedpolicycontext.
Policy Accounting
Enhanced Policy
Policyaccountingisanenhancedpolicycapabilitythatcontrolsthecollectionofclassificationrule hits.Ifahitoccursonapolicyrule,policyaccountingflagsthatthehithasoccurredandwill remainflaggeduntilcleared.Policyaccountingisenabledbydefault.Policyaccountingcanbe enabledordisabledusingthesetpolicyaccountingcommand.
Page 10 of 32
Policy Overview
Non-Edge Protocols
Policy Effect Every network needs DHCP. Automatically mitigate the accidental or malicious connection of a DHCP server to the edge of your network to prevent DoS or data integrity issues, by blocking DHCP on the source port for this device. DNS is critical to network operations. Automatically protect your name servers from malicious attack or unauthorized spoofing and redirection, by blocking DNS on the source port for this device. RIP, OSPF, and BGP topology protocols should only originate from authorized router connection points to ensure reliable network operations. Routers and default gateways should not be moving around your network without approved change processes being authorized. Prevent DoS, spoofing, data integrity and other router security issues by blocking router source MAC and router source IP addresses at the edge. Prevent data theft and worm propagation by blocking SMTP at the edge. Only approved management stations or management data collection points need to be speaking SNMP. Prevent unauthorized users from using SNMP to view, read, or write management information. Ensure file transfers and firmware upgrades are only originating from authorized file and configuration management servers.
Page 11 of 32
Policy Overview
Table 2
Protocol
Legacy Protocols
Page 12 of 32
Policy Overview
Table 3
Enhanced
Invalid Policy Action- The ability to set a drop, forward, or default-policy behavior based upon an invalid action. Port Disable Action - The ability to disable a port upon first rule hit. See Disable in Table 4. Precedence Reordering - The ability to reorder traffic classification precedence for a policy role.
Table 4providesacrossreferenceofstandard( )andenhanced(X)policycapabilitytotraffic classificationrule. Table 4 Policy Capability to Traffic Classification Rule Cross-Reference
D y n a m i c X X X X X X X X X X X X X X X X F o r w a r d S y s l o g X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X D i s a b l e X X X X X X X X X X X X X X X X
Traffic Classification Rule MAC Source Address MAC Destination Address IPX Source Address IPX Destination Address IPX Source Socket IPX Destination Socket IPX Transmission Control IPX Type Field IP Source Address IP Destination Address IP Fragmentation UPD Port Source UDP Port Destination TCP Port Source TCP Port Destination ICMP Packet Type
A d m i n X X X X X X X X X X X X X X X X
V L A N X X X X X X X X X X X X X X X X
C o S
D r o p
T r a p X X X X X X X X X X X X X X X X
Page 13 of 32
Policy Overview
Table 4
Traffic Classification Rule Time-To-Live (TTL) IP Type of Service IP Protocol Ether II Packet Type LLC DSAP/SSAP/CTRL VLAN Tag TCI-Overwrite Port String
A d m i n X X X X X X X
V L A N X X X
C o S X
D r o p X
T r a p X X X X X X X X
Page 14 of 32
Configuring Policy
Configuring Policy
Thissectionpresentsconfigurationproceduresandtablesincludingcommanddescriptionand syntaxinthefollowingpolicyareas:profile,classification,anddisplay. Procedure 1describeshowtoconfigurepolicyrolesandrelatedfunctionality. Procedure 1
Step 1. Task In switch command mode, create a policy role. name - (Optional) Specifies a name for this policy profile; used by the filter-ID attribute. This is a string from 1 to 64 characters. pvid-status - (Optional) Enables or disables PVID override for this policy profile. If all the classification rules associated with this profile are missed, then this parameter, if specified, determines the default VLAN for this profile. pvid - (Optional) Specifies the PVID to assign to packets, if PVID override is enabled and invoked as the default behavior. cos-status - (Optional) Enables or disables Class of Service override for this policy profile. If all the classification rules associated with this profile are missed, then this parameter, if specified, determines the default CoS assignment. cos - (Optional) Specifies a CoS value to assign to packets, if CoS override is enabled and invoked as the default behavior. Valid values are 0 to 255. egress-vlans - (Optional) Specifies the port to which this policy profile is applied should be added to the egress list of the VLANs defined by egress-vlans. Packets will be formatted as tagged. forbidden-vlans - (Optional) Specifies the port to which this policy profile is applied should be added as forbidden to the egress list of the VLANs defined by forbidden-vlans. Packets from this port will not be allowed to participate in the listed VLANs. untagged-vlans - (Optional) Specifies the port to which this policy profile is applied should be added to the egress list of the VLANs defined by untagged-vlans. Packets will be formatted as untagged.
Page 15 of 32
Configuring Policy
Procedure 1
Step Task
append - (Optional) Appends any egress, forbidden, or untagged specified VLANs to the existing list. If append is not specified, all previous settings for this VLAN list are replaced clear - (Optional) Clears any egress, forbidden or untagged VLANs specified from the existing list. tci-overwrite - (Optional) Enhanced policy that enables or disables TCI (Tag Control Information) overwrite for this profile. When enabled, rules configured for this profile are allowed to overwrite user priority and other classification information in the VLAN tags TCI field. If this parameter is used in a profile, TCI overwrite must be enabled on ports. See Step 3 below. precedence - (Optional) Enhanced policy that assigns a rule precedence to this profile. Lower values will be given higher precedence. 2. Optionally, for enhanced policy capable devices, assign the action the device will apply to an invalid or unknown policy. default-policy - Instructs the device to ignore this result and search for the next policy assignment rule. drop - Instructs the device to block traffic. forward - Instructs the device to forward traffic. Optionally, for enhanced policy capable devices, enable or disable the TCI overwrite function on one or more ports. Optionally, for enhanced policy capable devices, enable or disable policy accounting, which flags classification rule hits. Optionally, for enhanced policy capable devices, set the rule usage and extended format syslog policy settings. machine-readable - (Optional) Sets the formatting of rule usage messages to raw data that a user script can format according to the needs of the enterprise, otherwise message is set to human readable. extended-format - (Optional) Sets the control to include additional information in the rule usage syslog messages, otherwise the original rule usage syslog message format is used. set policy invalid action {default-policy | drop | forward}
3.
set port tcioverwrite port-string {enable | disable} set policy accounting {enable | disable} set policy syslog [machine-readable] [extended-format]
4.
5.
Page 16 of 32
Configuring Policy
Procedure 1
Step 6. Task
Optionally, for enhanced policy capable devices, set a policy maptable entry that associates a VLAN with a policy profile. This option is also supported by the B3, C3, and G3 for releases 6.3 and greater. Optionally, set a policy maptable response. tunnel - Applies the VLAN tunnel attribute. policy - Applies the policy specified in the filter-ID. both - An enhanced policy option that applies either or all the filter-ID and VLAN tunnel attributes or the policy depending upon whether one or both are present. This option is also supported by the B3, C3, and G3 for releases 6.3 and greater.
7.
Page 17 of 32
Configuring Policy
Procedure 2
Step Task
trap - (Optional) An enhanced policy that enables or disables sending SNMP trap messages on first rule use. disable-port - (Optional) An enhanced policy that enables or disables the ability to disable the ingress port on first rule use. 2. In switch command mode, optionally configure policy rules to associate with a policy role. See Table 1 on page 8 for traffic classification-type descriptions and enhanced policy information. See the set policy rule command discussion in the command reference guide that comes with your device for traffic classification data and mask information. port-string - (Optional) Applies this policy rule to a specific ingress port. N-Series devices with firmware versions 3.00.xx and higher also support the set policy port command as an alternative way to assign a profile rule to a port. storage-type - (Optional) An enhanced policy that adds or removes this entry from non-volatile storage. vlan - (Optional) Classifies this rule to a VLAN ID. drop | forward - (Optional) Specifies that packets within this classification will be dropped or forwarded. cos - (Optional) Specifies that this rule will classify to a Class-of-Service ID. Valid values are 0 - 255. A value of -1 indicates that no CoS forwarding behavior modification is desired. syslog - (Optional) An enhanced policy that enables or disables sending of syslog messages on first rule use. trap - (Optional) An enhanced policy that enables or disables sending SNMP trap messages on first rule use. disable-port - (Optional) An enhanced policy that enables or disables the ability to disable the ingress port on first rule use. 3. 4. Optionally, for enhanced policy capable devices, assign a policy role to a port. Optionally, for enhanced policy capable devices, assign a list of allowed traffic rules that can be applied to the admin profile for one or more ports. set policy port port-name admin-id set policy allowed-type port-string traffic-rule rule-list [append | clear] set policy rule profile-index classification-type [data] [mask mask] [port-string port-string] [storage-type {non-volatile | volatile}] [vlan vlan] | [drop | forward] [admin-pid admin-pid] [cos cos] [syslog {enable | disable}][trap {enable | disable}] [disable-port {enable | disable}]
Page 18 of 32
Configuring Policy
Procedure 2
Step 5. Task
Optionally, for enhanced policy capable devices, enable or disable the the ability to clear rule usage information if operational status up is detected on any port. Optionally, for enhanced policy capable devices, set the status of dynamically assigned policy role options.
6.
show policy syslog [machine-readable] [extended-format] show policy maptable vlan-list show port tcioverwrite [port-string]
show policy rule [attribute] | [all] | [admin-profile] | [profile-index] [porthit] classification-type [data] [mask mask] [port-string port-string] [rule-status {active | not-inservice | not-ready}] [storage-type {non-volatile | volatile}] [vlan vlan] | [drop | forward] [dynamic-pid dynamic-pid] [cos cos] [admin-pid admin-pid] [syslog {enable | disable}] [-verbose] [trap {enable | disable}] [disable-port {enable | disable}] [usage-list] [display-if-used] show policy capability show policy allowed-type port-string [-verbose]
In switch command mode, display all policy classification capabilities for this device. In switch command mode, display a list of currently supported traffic rules applied to the administrative profile for one or more ports.
Page 19 of 32
Configuring Policy
Table 5
Task
In switch command mode, display a count of the number of times the device has dropped syslog or trap rule usage notifications on ports. In switch command mode, display disabled ports for all rule entries. In switch command mode, display the current state of the autoclear feature. In switch command mode, display status of dynamically assigned roles.
show policy disabled-ports show policy autoclear {all | link | interval | profile | ports} show policy dynamic {[syslog-default] [trap-default]}
Page 20 of 32
Profile: Name: Ports: PVID: CoS: Profile: Name: Ports: VLAN: CoS: 2 student ge.1.1-10 10 8 Services: 10.10.50.0/24 Admin: 10.10.60.0/24 Faculty: 10.10.70.0/24
Guest
Students
Profile: Name: Ports: VLAN: CoS: 3 phoneSS ge.1.1-10 11 10
Enhanced Policy: Policy Accounting enabled Policy Syslog machine-readable Policy Invalid Action default-policy Port TCI Overwrite ge.1.1-10
N5 Distribution Switch/Router
Profile: Name: Ports: Data: 7 distribution ge.1.1-26 Cos 11
4 faculty ge.1.1-10 10 8
Faculty
Services
Profile: Name: Ports: PVID: Default CoS: Phone: Setup: Payload: VLAN:
6 services ge.1.1-10 0 4 10 8
Page 21 of 32
Roles
Theexampledefinesthefollowingroles: guestUsedasthedefaultpolicyforallunauthenticatedports.ConnectsaPCtothenetwork providinginternetonlyaccesstothenetwork.Providesguestaccesstoalimitednumberof N3portstobeusedspecificallyforinternetonlyaccess.Policyisappliedusingtheportlevel defaultconfiguration,orbyauthentication,inthecaseoftheN3portinternetonlyaccessPCs. studentConnectsadormroomPCtothenetworkthroughaStudentSecureStackC3port. AconfiguredCoSratelimitsthePC.Configuredrulesdenyaccesstoadministrativeand facultyservers.ThePCauthenticatesusingRADIUS.Hybridauthenticationisenabled.The studentpolicyroleisappliedusingthefilterIDattribute.ThebaseVLANisappliedusingthe tunnelattributesreturnedintheRADIUSresponsemessage.Ifallrulesaremissed,the settingsconfiguredinthestudentpolicyprofileareapplied. phoneSSConnectsadormroomorfacultyofficeVoIPphonetothenetworkusinga SecureStackport.AconfiguredCoSratelimitsthephoneandappliesahighpriority.The phoneauthenticatesusingRADIUS.Hybridauthenticationisenabled.Policyisappliedusing thefilterIDreturnedintheRADIUSresponsemessage.ThebaseVLANisappliedusingthe tunnelattributesreturnedintheRADIUSresponsemessage.Ifallrulesaremissed,the settingsconfiguredinthephoneSSpolicyprofileareapplied. facultyConnectsafacultyofficePCtothenetworkthroughaFacultySecureStackC3port. AconfiguredCoSratelimitsthePC.Aconfiguredruledeniesaccesstotheadministrative servers.ThePCauthenticatesusingRADIUS.Hybridauthenticationisenabled.Thefaculty policyroleisappliedusingthefilterIDattribute.ThebaseVLANisappliedusingthetunnel attributesreturnedintheRADIUSresponsemessagefortheauthenticatinguser.Ifallrules aremissed,thesettingsconfiguredinthefacultypolicyprofileareapplied. phoneN3ConnectsaservicesVoIPphonetothenetworkusinganN3port.Aconfigured CoSratelimitsthephoneforbothsetupandpayload,andappliesahighpriority.Thephone authenticatesusingRADIUS.Tunnelauthenticationisenabled.ThebaseVLANisapplied usingthetunnelattributesreturnedintheRADIUSresponsemessage.Policyisappliedusing amaptableconfiguration.Ifallrulesaremissed,thesettingsconfiguredinthephoneN3 policyprofileareapplied. servicesConnectsaservicesPCtothenetworkthroughanN3port.AconfiguredCoSrate limitsthePC.Servicesaredeniedaccesstoboththestudentandfacultyservers.ThePC authenticatesusingRADIUS.ThebaseVLANisappliedusingthetunnelattributesreturned intheRADIUSresponsemessagefortheauthenticatinguser.Theservicespolicyroleis appliedusingapolicymaptablesetting.Thepolicyaccounting,syslog,invalidactionandTCI overwriteenhancedpoliciesareenabledforthisrole.Ifallrulesaremissed,thesettings configuredintheservicespolicyprofileareapplied. distributionTheDistributionpolicyroleisappliedatthedistributionlayerprovidingrate limiting.
Policy Domains
Itisusefultobreakuppolicyimplementationintologicaldomainsforeaseofunderstandingand configuration.Forthisexample,itisusefultoconsiderfourdomains:basicedge,standardedgeon theSecureStacks,premiumedgeontheN3,andpremiumdistribution.
Page 22 of 32
Basic Edge
Protocolsnotappropriatetotheedgeshouldbeblocked.ForthisexamplewewillblockDHCP, DNS,SNMP,SSH,TelnetandFTPattheedgeonthedataVLAN.Wewillforwarddestinationport DHCPandDNSandsourceportforIPaddressrequesttofacilitateautoconfigurationandIP addressassignment.SeeBlockingNonEdgeProtocolsattheEdgeNetworkLayeronpage 11fora listingofprotocolsyoushouldconsiderblockingattheedge.
Standard Edge
PlatformssupportingstandardpolicywillberatelimitedusingaconfiguredCoSthatwillbe appliedtothestudentandfaculty,andphoneSSpolicyroles.Thoughlistedasanenhancedpolicy feature,theSecureStackC3supportsthehybridauthenticationenhancedpolicycapability.Hybrid authenticationwillbeenabled.
Premium Edge
PlatformssupportingenhancedpolicywillberatelimitedusingaconfiguredCoSthatisapplied totheservicesandphoneN3policyrole.Thepremiumedgewillbeenabledforthefollowing enhancedpolicycapabilities: PolicyAccounting Syslogruleusageenabledandsettomachinereadable Invalidpolicyactionsettodrop TCIoverwriteenabled
Premium Distribution
ThedistributionlayerswitchrouterwillberatelimitedusingaconfiguredCoS.Premium distributionwillbeenabledforthefollowingenhancedpolicycapabilities: PolicyAccounting SyslogRuleUsageenabledandsettomachinereadable Invalidpolicyactionsettodrop TCIoverwriteenabled
Platform Configuration
ThissectionwillprovidetheCLIbasedpolicyconfigurationonthefollowingplatforms: StudentSecureStackC3 FacultySecureStackC3 ServicesN3 DistributionSwitch
Page 23 of 32
Createtheguestpolicyprofileonallplatforms:
Enterasys(rw)->set policy profile 1 name guest pvid-status enable pvid 0 cos-status enable cos 4
Guestpolicyallowsinternettraffic.TCPdestinationPorts80,8080,and443willbeallowedtraffic forwarding.
Enterasys(rw)->set policy rule 1 tcpdestportIP 80 mask 16 forward Enterasys(rw)->set policy rule 1 tcpdestportIP 443 mask 16 forward Enterasys(rw)->set policy rule 1 tcpdestport 8080 mask 16 forward
Page 24 of 32
ARPforwardingisrequiredonetherport0x806.
Enterasys(rw)->set policy rule 1 ether 0x806 mask 16 forward
CreateapolicyrolethatappliesaCoS8todataVLAN10andconfiguresittoratelimittrafficto 1Mwithamoderatepriorityof5.
StudentC3(rw)->set policy profile 2 name student pvid-status enable pvid 10 cos-status enable cos 8
Page 25 of 32
Page 26 of 32
CreateapolicyrolethatappliesaCoS8todataVLAN10andconfiguresittoratelimittrafficto 1Mwithamoderatepriorityof5.
FacultyC3(rw)->set policy profile 4 name faculty pvid-status enable pvid 10 cos-status enable cos 8
Page 27 of 32
Page 28 of 32
ServicesN3(rw)->set policy profile 6 name services pvid-status enable pvid 0 cos-status enable cos 4 tci-overwrite enable
ApplyaCoS8todataVLAN10andconfigureittoratelimittrafficto1Mandmoderatepriority of5forservicesIPsubnet10.10.30.0mask28.Wewillalsoenabletrapsandsyslogforthissubnet.
ServicesN3(rw)->set policy rule 6 ipsourcesocket 10.10.30.0 mask 28 syslog enable trap enable vlan 10 cos 8
Page 29 of 32
DistributionN5(rw)->set policy profile 7 name distribution cos-status enable cos 4 tci-overwrite enable
Thiscompletesthepolicyconfigurationforthisschoolexample.
Page 30 of 32
Hybrid Authentication An authentication feature that allows the switch to use both the filter-ID and tunnel attributes in the RADIUS response message to determine how to treat the authenticating user. Policy A component of Secure Networks that provides for the configuration of a role based profile for the securing and provisioning of network resources based upon the function the user or device plays within the enterprise network. A logical entity that can be configured to provide VLAN to policy role mappings. A logical container for the rules that define a particular policy role. A logical container providing for the specification of policy behaviors associated with a policy role. The grouping of individual users or devices into a logical behavioral profile for the purpose of applying policy. A numeric traffic classification value, associated with the policy role, the ordering of which on a precedence list determines the sequence in which classification rules are applied to a packet. Enterasys policy features that apply to all platforms that support policy. A policy feature, when enabled in a policy role, allows for the overwrite of the current user priority and other classification information in the VLAN tags TCI field. A network element such as MAC or IP address, packet type, port, or VLAN used as the basis for identifying the traffic to which the policy will be applied. Untagged VLAN frames are classified to the VLAN associated with the port it enters. Tagged VLAN frames are classified to the VLAN specified in the VLAN tag; the PVID is ignored. An aspect of RFC3580 that provides for the inclusion of the VLAN tunnel attribute in the RADIUS Access-Accept packet defining the base VLAN-ID to be applied to the authenticating user or device. A configured list of ports that a frame for this VLAN can exit.
Standard Policy TCI Overwrite Traffic Classification Untagged and Tagged VLAN VLAN Authorization
Page 31 of 32
Revision History
Date 05-18-2009 Description New Document.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2009Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSNETSIGHT,SECURESTACK, ENTERASYSSECURESTACK,andanylogosassociatedtherewith,aretrademarksorregisteredtrademarksof Enterasys Networks, Inc.,intheUnitedStatesandothercountries.ForacompletelistofEnterasystrademarks,see
http://www.enterasys.com/company/trademarks.aspx.
Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Manytomany
Dependingonyournetwork,portsthatyoucanconfiguretoparticipateinmirroringinclude physicalports,virtualportsincludingLinkAggregationGroup(LAG)andhostportsVLAN interfaces,andintrusiondetectionportsthataremembersofaLAG.Formoreinformation,refer toOverviewofPortMirroringConfigurationsonEnterasysSwitchesonpage4. Youcanuseportmirroringforanalyzingbidirectionaltrafficandensuringconnectivitybetween, forexample,adepartmentalswitchanditshighspeeduplinktoyourbackboneswitchasshown inFigure 1. Figure 1 Using Port Mirroring to Monitor a Departmental Switch
Page 2 of 15
Figure 2
Themanytooneconfigurationinthisexamplewouldbepossiblebysettingaportmirroronthe backbonebetweensourceports1.2,2.2and2.1todestinationport1.1.
Refertothefollowingsectiontodeterminetheporttypesandcapacitiesforportmirroring supportedonyourEnterasysdevice.
Page 3 of 15
Table 1
Switch
Note: Source and target ports of a one-to-many and a many-to-one mirror cannot overlap.
LAG Mirrors
Note: This function is not supported on X-Series modular devices, or on stackable or standalone fixed switch devices.
EachNSeries,SSeries,andKSeriesmoduledesignatesaspecificnumberofvirtuallink aggregationportswhichtheLinkAggregationControlProtocol(LACP)canusetodynamically groupmultiplephysicalportsintoonelogicallink.Onceunderlyingphysicalports(suchasfe.x.x orge.x.x)areassociatedwithanaggregatorport,theresultingaggregationisrepresentedasone LinkAggregationGroup(LAG)withalag.x.xportdesignation. Devicespecificcapacitiesareasfollows: NSeriesDFEPlatinum,Diamond,andNSA48portsdesignatedintheCLIaslag.0.1 throughlag.0.48. NSeriesDFEGold4portsdesignatedintheCLIaslag.0.1throughlag.0.4. SSeries127LAGssupported,lag.0.1throughlag.0.127 KSeries36LAGssupported,lag.0.1throughlag.0.36
Page 4 of 15
IDS Mirrors
Note: This function is supported only on N-Series Platinum and Diamond, S-Series, and K-Series switches.
SinceIDSdevicesarenormallybandwidthlimited,theybenefitfromdistributionofmirroreddata acrossmultipleports(forexample,aGigabitportmirroredtomultipleFastEthernetports). AnIDSmirrorisaonetomanyportmirrorthathasbeendesignedforusewithanIntrusion DetectionSystem.Thetarget(destination)portofanIDSmirrormustbeavirtualLAGportthat youadministrativelysetcalledastaticLAG.Onceconfigured,anIDSmirrorloadsharestraffic amongalldestinationportsintheLAGyousetastheportmirror. ThesystemhashesthesourceportconversationbasedonsourceanddestinationIP(SIP/DIP) addresspairsandsendsthesamepairsoutthesamephysicalportinthedestinationmirror.This way,eachIDSdevicewillseealloftheconversationsbetweenaDIP/SIPandwillnotduplicatethe sameinformationoutmultipledestinationports.WhenIDSmirroringisenabled,thesystem performsaLayer3lookupforallframes.AllnonIPtraffic(includingcontrolframes)issenttoan arbitrary,designatedphysicaloutport.ThisportisincludedintheDIP/SIPhashlist.Ifthe switchdetectsafailureofanyofthephysicalportsintheLAG,itwillautomaticallyredistribute theDIP/SIPconversationsamongtheremainingportsintheLAG.WithIDSmirroring,source trafficisloadsharedamongalldestinationportstoensurenopacketloss. WhenconfiguringIDSmirroringonyourNSeriesDiamondorPlatinum,SSeries,orKSeries device,youmusttakeintoconsiderationthefollowing: OnlyoneIDSmirrorisallowedperchassis. Asofrelease5.xx.xx,mirroringofmultiple(unlimitednumberof)sourceportstoanIDS destinationportissupported. TendestinationportsmustbereservedforanIDSmirror. AllDIP/SIPpairswillbetransmittedoutthesamephysicalport. AllnonIPtrafficwillbemirroredoutthefirstphysicalportinaLAG.Thisportwillalsobe usedforIPtraffic. PortfailureorlinkrecoveryinaLAGwillcauseanautomaticredistributionoftheDIP/SIP conversations.
RefertoExample:ConfiguringanIDSMirroronpage 14formoreinformation.
Page 5 of 15
VLAN Mirrors
Note: This function is supported only on N-Series, S-Series, and K-Series devices.
Avoiding Bottlenecks
Itisespeciallyimportanttonotoversubscribeportsinamirroringconfigurationbecausethiscan causebottlenecksandwillresultindiscardedtraffic. If,forexample,thereare10usersinVLAN1,eachattachedtoa10Mbpsport,whenyoumirrored VLAN1toanother10Mbpsporttowhichyoursnifferisattached,theprobeswitchwould probablyhavetodroppacketsatthedestinationport.Sinceyourpurposeinconfiguring mirroringistoseeallofthetrafficforVLAN1,itwouldbebetterinthisscenariotoattachthe sniffertoa100Mbpsport.
Page 6 of 15
Thereisnorestrictiononthenumberofsourceportsthatcanbeincludedinamirrortoa destinationport.Thenumberofactivedestinationortargetportsallowedatanygiventimeis devicespecific.RefertoTable 1foralistofsupportandcapacityforeachdevice. Onceconfigured,allpackets(network,data,control,etc.)receivedbytheswitchwillbemirrored. Erroredpacketswillnotbemirrored.UnlessyoudisableSpanningTreeondestinationports,they willcontinuetofunctionasactivebridgeports,inaccordancewiththeSMON(Switch Monitoring)standard. UsethecommandsinthenextsectionstoperformthefollowingtasksonyourNSeries,SSeries, andKSeriesdevices: ReviewingPortMirroring(page7) SettingPortorVLANMirroring(page7) ClearingPortMirroring(page8)
Examples
Thisexampleshowsthatnoportmirrorsareconfiguredonthedevice:
enterasys(rw)->show port mirroring No Port Mirrors configured. IGMP Multicast Mirror status Disabled
Page 7 of 15
displaytheVTAPport.Tocreatetheportmirrorusethesetportmirroringcreatecommand specifyingtheVTAPandthemirroredport.
Note: IGMP mirroring functionality (igmp-mcast) is not supported on N-Series Gold devices.
Ifnotspecified,bothreceivedandtransmittedframeswillbemirrored.
Examples
Thisexampleshowshowtocreateaportmirrortomirrorframestransmittedoutportfe.1.4to portfe.1.11:
enterasys(rw)->set port mirroring enable fe.1.4 fe.1.11 tx
ThisexampleshowshowtoconfiguremirroringfromVLANs5and6todestinationport1inslot 2ofaDFEchassis(fe.2.1):
enterasys(rw)->set vlan interface 5-6 create enterasys(rw)->set port mirroring create vtap.0.5-6 fe.2.1 Note: If you configure a port mirror on an uplink (tagged) port, make sure the port is assigned to egress frames with that VLAN tag. For more information about configuring VLANs, refer to your products Configuration Guide.
X-Series
TheXSeriesRouterallowsyoutomirror(orredirect)receivedandtransmittedtrafficbeing switchedonaportforthepurposesofnetworktrafficanalysisandconnectionassurance.When portmirroringisenabled,oneportbecomesamonitorportforanotherportwithinthesystem. TheXRoutersupportsonetoone,onetomany,manytoone,andmanytomanymirroringof trafficreceivedandtraffictransmittedonphysicalIOMports. Portsmustbeinswitchmodeinordertoparticipateinmirroring.
Notes: VLAN, IDS, and LAG mirroring are not supported on the X-Series.
Page 8 of 15
ClearingPortMirroring(page10)
Examples
Thisexampleshowsthatportsge.4.1throughge.4.5aremirroredtoportge.4.32,amanytoone mirror,thatthemirrorisadministrativelyenabledandoperationally(linked)enabled,andthat onlyreceivedframesarebeingmonitored:
enterasys(switch-ro)-> show port mirroring Source -----ge.4.1 ge.4.2 ge.4.3 ge.4.4 ge.4.5 Destination -----------ge.4.32 ge.4.32 ge.4.32 ge.4.32 ge.4.32 Direction --------Rx only Rx only Rx only Rx only Rx only AdminStatus ----------enabled enabled enabled enabled enabled OperStatus ---------enabled enabled enabled enabled enabled
Portsmustbeinswitchmodeinordertoparticipateinamirroringrelationship.
Examples
Thisexamplecreatesamanytooneportmirroringofreceivedandtransmittedframeswithports ge.6.23throughge.6.25asthesourceportsandge.6.26asthetargetport.Notethatmirroringof bothreceivedandtransmittedframesisthedefault.
enterasys(switch-su)-> set port mirroring create ge.6.23-25 ge.6.26 enterasys(switch-su)-> show port mirroring Source Destination Direction AdminStatus ------------ ------------ --------- ----------ge.6.23 ge.6.26 Rx and Tx enabled ge.6.24 ge.6.26 Rx and Tx enabled ge.6.25 ge.6.26 Rx and Tx enabled
Thisexampleshowshowtodisableoneofthepreviouslycreatedmirroringrelationships:
enterasys(switch-su)-> set port mirroring disable ge.6.23 ge.6.26 enterasys(switch-su)-> show port mirroring Source Destination Direction AdminStatus ------------ ------------ --------- ----------ge.6.23 ge.6.26 Rx and Tx disabled ge.6.24 ge.6.26 Rx and Tx enabled ge.6.25 ge.6.26 Rx and Tx enabled
Page 9 of 15
Example
Thefollowingexampleclearsportmirroringbetweensourceportge.6.23andtargetportge.6.26:
enterasys(switch-su)-> show port mirroring Source Destination Direction AdminStatus ------------ ------------ --------- ----------ge.6.23 ge.6.26 Rx and Tx enabled ge.6.24 ge.6.26 Rx and Tx enabled ge.6.25 ge.6.26 Rx and Tx enabled OperStatus ---------enabled enabled enabled
matrix-x(switch-su)-> clear port mirroring ge.6.23 ge.6.26 matrix-x(switch-su)-> show port mirroring Source Destination Direction AdminStatus OperStatus ------------ ------------ --------- ----------- ---------ge.6.24 ge.6.26 Rx and Tx enabled enabled ge.6.25 ge.6.26 Rx and Tx enabled enabled
Note: One-to-many mirroring, many-to-many mirroring, and IDS, LAG, and VLAN mirroring are not supported.
Usethiscommandtocreateanewmirroringrelationship,ortoenableordisableanexisting mirroringrelationship:
set port mirroring {create | disable | enable}
Page 10 of 15
Usethiscommandtoclearaportmirroringconfiguration:
clear port mirroring source destination
Thefollowingprocedureshowshowtocreateandverifythisconfiguration: 1. 2. AssignIPaddress172.16.210.15toanNSeriesPlatinumDFE.
Platinum(su)->set ip address 172.16.210.15
AssignIPaddress172.16.210.25toanNSeriesGoldDFE.
Gold(su)->set ip address 172.16.210.25
3.
LogontoNetsightConsole.
4.
Ontheconsolemainscreen,expandMyNetworkinthefiledirectorytree,rightclickAll Devices,andselectAddDevice.
Page 11 of 15
TheAddDevicescreendisplays.
5. 6. 7. 8.
9.
Rightclickonport1(fe.1.1showninFigure 3)andselectRMONEthernetStatistics.
Page 12 of 15
15. Verifythemirroringconfiguration.
Platinum(su)->show port mirroring Port Mirroring ============== Source Port = fe.1.1 Target Port = fe.1.5 Frames Mirrored = Rx and Tx Port Mirroring Admin status = enabled Port Mirroring Oper status = enabled
Page 13 of 15
AsstatedintheoverviewaboutIDSMirrorsonpage5,NSeriesDiamondandPlatinumDFEs,S Series,andKSeriessupportIDSmirroringonportsthataremembersofaLinkAggregation Group(LAG).ThemaximumofphysicalportsallowedperLAGportisplatformspecific.Only manuallyformed(static)LAGscanbeusedasmirroreddestinationports. Procedure 1showshowtocreateastaticLAGandthencreateanIDSmirrortothatLAGport destination.Inthisexample,portsge.1.1throughge.1.5areadministrativelysettoformlag.0.21, whichisthensettomirrortrafficfromportge.1.10. FormoreinformationoncommandparametersusedinLAGconfiguration,refertotheLink AggregationsectioninyourproductsConfigurationGuideorCLIReference.
Note: When creating a static LAG for port mirroring, you must assign a unique admin key to aggregating ports. If ports other than the desired underlying physical ports share the same admin key value, aggregation will fail or undesired aggregations will form.
Procedure 1
Step 1. Task
Create a static LAG aggregating ports ge.1.1 through ge.1.5 into LAG port 21 and assign a unique admin key to that LAG port. Create a port mirror between source port ge.1.10 and the static LAG.
2.
Page 14 of 15
Revision History
Date 01-16-08 02-20-08 03-12-08 07-28-08 02-04-09 04-16-09 05-04-2011 Description New document Corrected product naming conventions. Added statement that VLAN mirroring is not supported on SecureStacks and switches. Added Enterasys Registration mark. Spelled out D-Series, G-Series, and I-Series when appropriate. Added note: port mirrors are automatically enabled on all platforms upon creation. Added S-Series and K-Series, other minor changes.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,andanylogosassociatedtherewith,are trademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Fora
completelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx.
Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
For information about... What Is Quality of Service? Why Would I Use It in My Network? How Can I Implement Quality of Service? Quality of Service Overview CoS Hardware Resource Configuration Feature Differences by Platform The QoS CLI Command Flow QoS Policy-Based Configuration Example Terms and Definitions
Refer to page... 1 2 2 2 13 28 29 31 36
Youconfigurepacketpreferenceandforwardingtreatmentbaseduponaflowssensitivityto delay,delayvariation(jitter),bandwidth,availability,andpacketdrop.
Note: A flow is a stream of IP packets in which the value of a fixed set of IP packet fields is the same for each packet in the stream. Each packet containing the same value for all of these fields is considered part of the same flow, until flow expiration occurs. If a packet is viewed with any set member field value that is different from any current flow, a new flow is started based upon the set field values for that packet.
TheseQoSabilitiescollectivelymakeupaClassofService(CoS).Theremainderofthissection willdescribeCoSanditscomponents.
Note: The following overview and configuration discussion will take place in an S-Series context. See Feature Differences by Platform on page 28 for a listing of CoS feature differences.
Page 2 of 38
TheCoSconfigurationofeachqueueorporthardwareresourceisoptional.TxQshavethree configurablequeueoptions:queuemapping,queuerateshapingandqueuescheduling.IRL,ORL, andfloodcontroleachhaveasingleconfigurableratelimitingporthardwareresourceoption. CoSconfigurationisappliedtotheingressingpacketbaseduponthepackets802.1priority,port, andpolicysettings. Howthefirmwaretreatsapacketasittransitsthelinkdependsuponthepriorityandforwarding treatmentsconfiguredintheCoSassignedtothepacket.Upto256uniqueCoSentriescanbe configured.CoSentries07areconfiguredbydefaultwithan802.1ppriorityassignedanddefault forwardingtreatment.CoSentries07cannotberemoved.CoSentries07arereservedfor mappingan802.1pprioritytoaCoSindex.CoSentries8255canbeconfiguredandusedbypolicy forthefollowingservices: 802.1ppriority IPTypeofService(ToS)marking PriorityTransmitQueue(TxQ)withconfigurableforwardingbehavior Inbound(IRL)and/oroutbound(ORL)ratelimiter Outboundrateshaperpertransmitqueue Floodcontrol
CoS Reference
Page 3 of 38
Table 1
Term
CoS Settings
UsetheCoSsettingsconfigurationwhenmappingthepriorityoftheingressingpackettoa hardwareresourcereference,floodcontrolstate,dropprecedencebehavior,or802.1priorityor ToSremarking.
Page 4 of 38
Figure 1
Drop-Precedence
DropPrecedenceindicatesapreferencefordroppingpackets,oftenusedinassociationwith weightedfairqueuing.ThisSSeriesonlyfeatureusestheconfiguredvaluetoprioritizepackets onthequeue.Dropprecedencecansetthepacketprioritytofavored,besteffort,orunfavored. DropprecedencehasaspecialmeaningwithinaFlexEdgecontext.Packetsassigneda dropprecedencevalueareassigneda4thlevelofpriorityintheFlexEdgemechanism,andare limitedtorulesappliedtoasingleport.SeetheFlexEdgefeatureguideforadetailedFlexEdge dropprecedencediscussion.TheFlexEdgefeatureguidecanbefoundat https://extranet.enterasys.com/downloads.
CoS Reference
UsetheCoSreferenceconfigurationifyouneedto: Mapatransmitqueuereferencetoanysupportedtransmitqueueontheport. MapaCoSsettingIRLorORLreferencetoanIRLorORLportresourceratelimiter.
TheCoSreferenceconfigurationissetbyspecifyingthetypeofhardwareresourceforthe reference(TxQ,IRL,ORL),theportgroupthereferenceisbeingappliedto,andthehardware
Page 5 of 38
resourcereferenceconfiguredinCoSsettings,andtheactualTxQorratelimitingportresourcefor thismapping.
Page 6 of 38
Port Resources
UsetheCoSportresourceconfigurationlayertoassociateactualratelimitervaluestoaportgroup andhardwareresource.ConfigureCoSportresourcebyidentifyingtheCoShardwareresource type(TxQ,IRL,ORL,offloodcontrol),portgroup,andportresource,followedbyaratelimiter,or inthecaseofTxQ,arateshaper. Theratelimitorrateshaperisspecifiedasaunitandadatarate.Theunitspecifieseithera percentageofthetotalorapacketspersecondvaluefollowedthethedatarateasanumericvalue. Forexample10,000packetspersecondwouldbeexpressedasunitppsrate10000.Thedefault unitsettingispercentage.Ifonlyrateisspecified,theratevalueisapercentage. TxQSettingaTxQrateshapermeansthatallpacketsabovethespecifiedratelimitarefirst buffered.Onlywhenthebufferfillsarepacketsdropped. TxQratelimitingprovidesforsettingataildropbehavior,bywhichtransmitframesare discardedfromthetailofthequeue. TxQrateshapingisdirectlyconfiguredusingCoSportresourcesconfiguration.TheCoS settingandCoSreferenceconfigurationsdonotapplytoTxQrateshaping. IRLSettinganIRLratelimitermeansthatpacketsingressingtheportwillnotbeallowedto exceedtheratespecifiedbytheratelimiter.Iftherateisexceeded,youcanspecifywhether packetsthatexceedtheratelimitshouldbedroppedandwhethertheportshouldbedisabled. Youcanenableordisablesyslogandtrapfeatures. IRLportresourcesarefirstreferencedusingtheCoSsettingsandCoSreference configurations.PortsareappliedtothespecifiedCoSportresourcesusingtheCoSport configuration. ORLSettinganORLratelimitermeansthatoutboundpacketsabovethespecifiedthreshold arenottransmitted.Iftherateisexceeded,youcanspecifywhetherpacketsthatexceedthe ratelimitshouldbedroppedandwhethertheportshouldbedisabled,andenableordisable syslogandtrapfeatures. ORLportresourcesarefirstreferencedusingtheCoSsettingsandCoSreference configurations.PortsareappliedtothespecifiedCoSportresourcesusingtheCoSport configuration. FloodcontrolSettingafloodcontrolratelimitermeansthatreceivedpacketsofthespecified typethatexceedthefloodcontrolthresholdwillbepreventedfromegressinganyport. Configurablepackettypesare: unknownunicast multicast broadcast
Iftherateisexceeded,youcanspecifywhethertheportshouldbedisabled.Youcanenableor disablesyslogandtrapfeatures.
Port Configuration
TheCoSportconfigurationlayerappliesaportlisttotheportgroup.ConfigureCoSport configurationbyidentifyingtheCoShardwareresourcetype(TxQ,IRL,ORL,orfloodcontrol) andportgroupforthisportconfiguration,anameforthisconfiguration,aportlistofports assignedtothisportgroup,andwhethertheportlistshouldclearedorbeappendedtoany existingportlist.TxQportconfigurationcanalsobeconfiguredforTxQscheduling.
Page 7 of 38
TxQ Scheduling
TxQscanbeconfiguredforTxQscheduling,alsoreferredtoasweightedfairqueuing.See WeightedFairQueuingonpage 9foradetaileddiscussionofweightedfairqueuing.See PreferentialQueueTreatmentforPacketForwardingonpage 8foradetaileddiscussionofall queuetreatmenttypessupported. TxQschedulingisconfiguredinCoSportconfigurationusingthearbsliceorarbpercentage options.ThearbsliceoptionsegmentstheTxQschedulingtimeslicepoolbynumericvalues.The arbpercentageoptionsegmentstheTxQschedulingtimeslicepoolbyapercentageofthepool. WhenconfiguringTxQschedulingavalueisspecifiedforallqueuesinTxQorderfromlowestto highest.A0isenteredforanyqueue(configurableorLLQ)notimeslicesareallocatedto.All entriesinaconfigurationmustadduptoeitherthetotalnumberofslicessupportedor100percent dependinguponthechosenoption.Usetheshowportconfigtxqcommandtodisplaythetotal numberofslicessupportedforyourdevice.Bydefault,thetotalnumberoftimeslicesisspecified forthehighestuserconfigurable(nonLLQ)queue. IfyouareusingadefaultTxQconfigurationforthisportgroup(youareneitherremappingCoS prioritiesnorTxQs),TxQschedulingcanbeconfigureddirectlyinCoSportconfigurationwithout CoSsettings,reference,orportresourceconfiguration.
Page 8 of 38
Figure 2
Page 9 of 38
accesstoitspercentageoftimeslicessolongastherearepacketsinthequeue.Thenqueue2has accesstoitspercentageoftimeslices,andsoonroundrobin.Weightedfairqueuingassuresthat eachqueuewillgetatleasttheconfiguredpercentageofbandwidthtimeslices.Thevalueof weightedfairqueuingisinitsassurancethatnoqueueisstarvedforbandwidth.Thedownsideof weightedfairqueuingisthatpacketsinahighpriorityqueue,withlowtolerancefordelay,will waituntilallotherqueueshaveusedthetimeslicesavailabletothembeforeforwarding.So weightedfairqueuingwouldnotbeappropriateforapplicationswithhighsensitivitytodelayor jitter,suchasVoIP. Figure 3 Weighted Fair Queuing Packet Behavior
Hybrid Queuing
Hybridqueuingcombinesthepropertiesofbothstrictpriorityandweightedfairqueuing. Figure 4onpage 11,depictshybridqueuing.Theconfigurationisforstrictpriorityqueuingon queue3andweightedfairqueuingfortheremainingqueues,withqueue2receiving50percentof theremainingtimeslices,andtheotherqueuesreceiving25percenteach.Thebenefitofhybrid queuingisthatqueuesconfiguredasstrictwillreceiveallthebandwidththatisavailableinthe orderoftheirpriorityuntilempty.Remainingbandwidthwillbeusedbytheweightedfairqueues baseduponthetimeslicepercentagesconfigured.Thedownsideremainsthatanytimestrict priorityqueuingisused,shouldthestrictpriorityqueuesneverfullyempty,remainingqueues willbestarvedofbandwidth.
Page 10 of 38
Figure 4
Rate Limiting
Ratelimitingisusedtocontroltherateoftrafficentering(inbound)and/orleaving(outbound)a switchperCoS.Ratelimitingallowsforthethrottlingoftrafficflowsthatconsumeavailable bandwidth,intheprocessprovidingroomforotherflows.Ratelimitingguaranteesthe availabilityofbandwidthforothertrafficbypreventingtheratelimitedtrafficfromconsuming morethantheassignedamountofanetworksresources.Ratelimitingaccomplishesthisby settingacaponthebandwidthutilizationofspecifictypesofbothinboundandoutboundtraffic. Whenaratelimithasbeenexceeded,theCoScanbeconfiguredtoperformoneorallofthe following:recordaSyslogmessage,sendanSNMPtraptoinformtheadministrator,and automaticallydisabletheport. Figure 5onpage 12illustrateshowburstytrafficisclippedabovetheassignedthresholdwithrate limitingapplied.
Page 11 of 38
Figure 5
Flood Control
CoSbasedfloodcontrol,isaformofratelimitingthatpreventsconfiguredportsfrombeing disruptedbyatrafficstorm,byratelimitingspecifictypesofpacketsthroughthoseports.When floodcontrolisenabledonaport,incomingtrafficismonitoredoveronesecondintervals.During aninterval,theincomingtrafficrateforeachconfiguredtraffictype(unknownunicast,broadcast, ormulticast)iscomparedwiththeconfiguredtrafficfloodcontrolrate,specifiedinpacketsper second.If,duringaonesecondinterval,theincomingtrafficofaconfiguredtypereachesthe trafficfloodcontrolrateconfiguredontheport,CoSbasedfloodcontroldropsthetrafficuntilthe intervalends.Packetsarethenallowedtoflowagainuntilthelimitisagainreached.
Rate Shaping
RateShapingthrottlestherateatwhichaporttransmits(outbound)queuedpackets.RateShaping bufferspacketsreceivedabovetheconfiguredrateonaperCoSbasis,ratherthandroppingthem. Onlywhenbuffercapacityisexceededarepacketsdropped.Rateshapingmaybeconfiguredfora CoSonaport,foran802.1ppriorityonaport,orforallClassesofServiceonaport. Figure 6onpage 13illustrateshowburstytrafficissmoothedoutwhenitburstsabovethe assignedthresholdwithrateshapingapplied.
Page 12 of 38
Figure 6
Rateshapingretainsexcesspacketsinaqueueandthenschedulesthesepacketsforlater transmissionovertime.Therefore,thepacketoutputrateissmoothedandburstsintransmission arenotpropagatedasseenwithratelimiting. Rateshapingcanbeimplementedformultiplereasons,suchascontrollingbandwidth,tooffer differinglevelsofservice,ortoavoidtrafficcongestiononotherlinksinthenetworkbyremoving theburstinesspropertyoftrafficthatcanleadtodiscardedpackets.Rateshapingisimportantfor realtimetraffic,wherepacketlossisextremelydetrimentaltotheseapplications.Insteadof discardingtrafficimposedbyratelimiting,delaysareinducedintoitstransmissionbyretaining thedataforfuturetransmission.However,thedelaysmustalsobeboundedtothedegreethatthe trafficissensitivetodelays.
Page 13 of 38
Page 14 of 38
Priority ---------0 1 2 3 4 5 6 7
ToS ------* * * * * * * *
TxQ ----1 2 3 4 5 6 7 8
IRL ----* * * * * * * *
ORL ----* * * * * * * *
Drop Prec Flood-Ctrl --------- ---------* * * * * * * * Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled
UsetheshowcosreferencetxqcommandtodisplaytheCoSreferenceconfigurationforport group1.0:
System(su)->show cos reference txq 1.0
Queue
----------- --------- ---- -----------1.0 1.0 1.0 1.0 0 1 2 3 txq txq txq txq 0 0 2 3
Page 15 of 38
1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0
4 5 6 7 8 9 10 11 12 13 14 15
txq txq txq txq txq txq txq txq txq txq txq txq
4 5 6 7 9 8 8 8 8 8 9 10
UsetheshowcosportconfigtxqcommandtodisplaytheCoSportlayerconfiguration:
System(su)->show cos port-config txq 1.0
* Percentage/queue (if any) are approximations based on [(slices/queue) / total number of slices]
Transmit Queue Port Configuration Entries ---------------------------------------------------------------------Port Group Name Port Group Port Type Assigned Ports Arbiter Mode Slices/queue :WFQConfiguration :1 :0 :ge.1.3,5,22 :Low Latency Queue :Q [ 0]: LLQ :Q [ 4]: :Q [ 8]: 10 30 Q [ 1]: Q [ 5]: 0 15 Q [ 2]: Q [ 6]: 0 15 Q [ 3]: Q [ 7]: 10 20
10% Q [ 5]:
Q [10]: LLQ
----------------------------------------------------------------------
Page 16 of 38
CoSportConfigurationCLIinput:
System(su)->set cos port-config txq 0.0 ports ge.2.1-16,18-48;tg.2.101-104 System(su)->set cos port-config txq 2.0 name txqRateShaper ports ge.2.17
Priority ---------0 1 2
ToS ------* * *
TxQ ----0 2 4
IRL ----* * *
ORL ----* * *
Page 17 of 38
3 4 5 6 7
3 4 5 6 7
* * * * *
6 8 10 12 14
* * * * *
* * * * *
* * * * *
Note: When a CoS show command displays a default TxQ listing, TxQ numbering is based upon a 16 queue display. 8 user configurable queues are listed as even numbers from 0 to 14.
Queue
----------- --------- ---- -----------2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 2.0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 txq txq txq txq txq txq txq txq txq txq txq txq txq txq txq txq 0 1 2 3 4 5 6 7 8 8 8 8 8 8 9 10
Usetheshowcosportresourcetxqcommandtodisplaythenewrateshaperconfigurationfor queue8forportgroup2.0:
System(su)->show cos port-resource txq 2.0
Rate
----------- -------- ---- ---- ---------2.0 2.0 2.0 0 1 2 txq txq txq perc none perc none perc none
Page 18 of 38
3 4 5 6 7 8 9 10
perc none perc none perc none perc none perc none perc 50 perc none perc none
* Percentage/queue (if any) are approximations based on [(slices/queue) / total number of slices]
Transmit Queue Port Configuration Entries ---------------------------------------------------------------------Port Group Name Port Group Port Type Assigned Ports Arbiter Mode Slices/queue :txqRateShaper :2 :0 :ge.2.17 :Low Latency Queue :Q [ 0]: LLQ :Q [ 4]: 0 Q [ 1]: Q [ 5]: 0 0 Q [ 2]: Q [ 6]: 0 0 Q [ 3]: Q [ 7]: 0 0
0% Q [ 2]: 0% Q [ 6]:
0% Q [ 5]:
Q [10]: LLQ
----------------------------------------------------------------------
IRL Configuration
Inboundratelimiters(IRL)allowyoutoconfigureaporttopreventtheportfromprocessing trafficaboveacertainthreshold.Inthisexample,wearegoingtoconfigureportgroup1.0,ports ge.1.3,ge.1.5andge.1.22,todiscardpacketsitreceiveswhenthepacketmapstoCoSIndex1 (802.1priority1)andthethresholdgoesabove10,000packetspersecond. TheremainderofthissectiondetailsanIRLconfigurationthat: Specifiestheportgroup Assignsportstotheportgroup MapstheratelimiterdataunitandratetotheIRLratelimiter MapstheratelimitertotheIRLreference
Page 19 of 38
Priority ---------0 1 2 3
ToS ------* * * *
TxQ ----0 2 4 6
IRL ----* 0 * *
ORL ----* * * *
Page 20 of 38
4 5 6 7
4 5 6 7
* * * *
8 10 12 14
* * * *
* * * *
* * * *
Usetheshowcosreferenceirlcommandforportgroup1.0todisplaytheCoSreferencetorate limitermapping:
System(su)->show cos reference irl 1.0
Group Index Reference Type Rate Limiter ----------- --------- ---- -----------1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl 0 none none none none none none none none none none none none none none none none none none none none none none none none none none none none none none none
Page 21 of 38
Usetheshowcosportresourceirlcommandtodisplaythedatarateandunitoftheratelimiter forport1.0:
System(su)->show cos port-resource irl 1.0
Rate
Rate Limit Type Action --------------- -----drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop drop S none none none none none none none none none none none none none none none none none none none none none none none
----------- -------- ---- ---- ---------1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl irl pps 10000
perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none perc none
Usetheshowcosportconfigirlcommandtodisplaytheportgroupnameandassignedportsfor portgroup1.0:
System(su)->show cos port-config irl 1.0
Inbound Rate Limiting Port Configuration Entries ---------------------------------------------------------------------Port Group Name Port Group Port Type Assigned Ports :S-Series 24 IRL :1 :0 :ge.1.3,5,22
Page 22 of 38
---------------------------------------------------------------------System(su)->
ORL Configuration
Outboundratelimiters(ORL)allowyoutoconfigureaporttopreventtheportfromtransmitting trafficaboveacertainthreshold.Inthisexample,wearegoingtoconfigureportge.1.22tolimitthe amountofpacketsittransmitswhenthepacketismarkedasCoSIndex0(802.1priority0)toa thresholdof5,000packetspersecond. TheremainderofthissectiondetailsanORLconfigurationthat: Specifiestheportgroup Assignsaporttotheportgroup MapstheratelimiterdataunitandratetotheORLratelimiter MapstheratelimitertotheORLreference MapstheORLreferencetotheCoSsetting802.1priority EnablesCoS Providesrelatedshowcommanddisplays
Page 23 of 38
Priority ---------0 1 2 3 4 5 6 7
ToS ------* * * * * * * *
TxQ ----0 2 4 6 8 10 12 14
IRL ----* * * * * * * *
ORL ----1 * * * * * * *
Drop Prec Flood-Ctrl --------- ---------* * * * * * * * Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled
UsetheshowcosreferenceorlcommandtodisplaytheratelimitertoORLreferencemapping:
System(su)->show cos reference orl 1.0
Group Index Reference Type Rate Limiter ----------- --------- ---- -----------1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 orl orl orl orl orl orl orl orl orl orl orl orl orl orl orl orl none 1 none none none none none none none none none none none none none none
Page 24 of 38
Usetheshowcosportresourceorlcommandtodisplaytheratelimiterunitandrateforthe configuredORLresource:
System(su)->show cos port-resource orl 1.0
Rate
Rate Limit Type Action --------------- -----drop drop drop drop none none none none
----------- -------- ---- ---- ---------1.0 1.0 1.0 1.0 0 1 2 3 orl orl orl orl perc none pps 5000
Usetheshowcosportconfigorlcommandtodisplaytheportgroupnameandassignedportsfor portgroup1.0.
System(su)->show cos port-config orl 1.0
Outbound Rate Limiting Port Configuration Entries ---------------------------------------------------------------------Port Group Name Port Group Port Type Assigned Ports :S-Series 4 ORL :1 :0 :ge.1.22
---------------------------------------------------------------------System(su)->
Page 25 of 38
Priority ---------0 1 2 3 4 5 6 7
ToS ------* * * * * * * *
TxQ ----0 2 4 6 8 10 12 14
IRL ----* * * * * * * *
ORL ----* * * * * * * *
Drop Prec Flood-Ctrl --------- ---------* * * * * * * * Disabled Disabled Disabled Enabled Disabled Disabled Disabled Disabled
Usetheshowcosportresourcefloodctrlcommandtodisplaythefloodcontrolunitandrateto floodcontrolresourcemapping:
System(su)->show cos port-resource flood-ctrl 1.0
Rate
----------- -------- ---- ---- ---------1.0 1.0 1.0 1 2 3 fld fld fld pps 3000
Page 26 of 38
Usetheshowcosportconfigfloodctrlcommandtodisplaytheportgroupnameandassigned portsforportgroup1.0.
System(su)->show cos port-config flood-ctrl 1.0
Flood Rate Limiting Port Configuration Entries ---------------------------------------------------------------------Port Group Name Port Group Port Type Assigned Ports :S-Series Flood Ctrl :1 :0 :ge.1.3
---------------------------------------------------------------------System(su)->
Port -----------ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ge.1.1 ...
Type ---irl irl irl irl irl irl irl irl irl irl irl
Page 27 of 38
29 30 31
0 0 0
Violationsarealsodisplayedbyresourceandportusingtheshowcosportresourcecommand. Violatingportsaredisplayedattheendoftheresourcetable.
TxQs
AllSSeriesmodulessupport11queues NSeriesPorttype0supports16queues,Porttype1supports4queues CoSTxQfeaturesarenotsupportedonallotherplatforms
IRLs
AllSSeriesmodulessupport24inboundratelimiters. NSeriesporttype0supports32inboundratelimiters,porttype1supports8inboundrate limiters. EnterasysStackableswitches,DSeries,GSeries,andISeriesdevicessupport99inboundrate limiters. EnterasysStackableswitches,DSeries,GSeries,andISeriesonlysupporttheIRLKbpsunit option. FortheC3andC5devices,IRLconfigurationisonlysupportedwithinapolicyrolecontext. ConfigurationofIRLswithinrulesarenotsupported.Inamixedstack,C3CoSfeature limitationsapply.C5scannotbemixedwithC3sandC2sinastack.
Page 28 of 38
ORLs
AllSSeriesmodulessupport4outboundratelimiters EnterasysNSeries,StackableSwitches,DSeries,GSeries,andISeriesdevicesdonotsupport outboundratelimiters
2.
Set the CoS transmit queue port group configuration by mapping a physical port list to a port group for purposes of TxQ configuration. Optionally associate a name and the configuration of a TxQ weighted fair queue behavior configuration. Verify the new configuration. Set the CoS inbound rate-limit port group configuration by mapping a physical port list to a port group for purposes of IRL configuration, optionally allowing the association of a name for this configuration. Verify the new configuration. Set the CoS outbound rate-limit port group configuration by mapping a physical port list to a port group for purposes of ORL configuration, optionally allowing the association of a name for this configuration. Verify the new configuration. Set the CoS flood control limit port group configuration by mapping a physical port list to a port group for purposes of flood control configuration, optionally allowing the association of a name for this configuration. Verify the new configuration. Configure a Class of Service transmit queue port resource entry, by mapping a port group with a transmit queue and applying a TxQ rate shaping value to the mapping. Verify configuration changes.
set cos port-config txq group-type-index [name name] [ports port-list] [append] | [clear] [arb-slice slice-list] [arb-percentage percentage-list] show cos port-config txq port_group.port_type
3.
set cos port-config irl port_group.port_type name name ports ports_list show cos port-config irl
4.
set cos port-config orl port_group.port_type name name ports ports_list show cos port-config orl
5.
set cos port-config flood-ctrl port_group.port_type name name ports ports_list show cos port-config flood-ctrl
6.
set cos port-resource txq port_group.port_type tx_queue unit unit rate rate show cos port-resource txq port_group.port_type
Procedure 1
Step 7. Task
Configure a CoS inbound rate limiting index entry, by mapping a port group with a rate-limit value, along with the ability to optionally set syslog, trap, and/or disable port behaviors should the limit be exceeded. This index is used by the rate-limit option when setting an IRL cos reference. Configure a CoS outbound rate limiting index entry, by mapping a port group with a rate-limit value, along with the ability to optionally set syslog, trap, and/or disable port behaviors should the limit be exceeded. This index is used by the rate-limit option when setting an ORL cos reference. Configure a CoS flood control index entry, by mapping a port group with a traffic type such as multicast or broadcast, along with the ability to optionally set syslog, trap, and/or disable port behaviors should the limit be exceeded. This index is used by the rate-limit option when setting a flood control cos reference. Set a CoS transmit queue reference configuration, by mapping a port group to a queue resource ID and associating the mapping with a transmit reference. Verify the new CoS reference configuration. Set a CoS inbound rate limiting reference configuration, by mapping a port group with a rate limiter resource ID and associating the mapping with an IRL reference. Verify the new CoS reference configuration. Set a CoS outbound rate limiting reference configuration, by mapping a port group with a rate limiter resource ID and associating the mapping with an ORL reference. Verify the new CoS reference configuration. Modify a currently configured CoS or create a new CoS. Verify the new CoS configuration. All TxQ to port group mappings are associated with the transmit queue reference. All IRL to port group mappings are associated with the inbound rate limiter reference. Enable CoS state for the system. Verify the new CoS state.
8.
set cos port-resource orl port_group.port_type index unit unit rate rate syslog setting trap setting disable-port setting show cos port-resource orl port_group.port_type
9.
set cos port-resource flood-ctrl port_group.port_type traffic-type unit unit rate rate syslog setting trap setting disable-port setting show cos port-resource flood-ctrl port_group.port_type set cos reference txq port_group.port_type reference queue queue show cos reference txq port_group.port_type
10.
11.
set cos reference irl port_group.port_type reference rate-limit IRLreference show cos reference irl port_group.port_type
12.
set cos reference orl port_group.port_type reference rate-limit IRLreference show cos reference orl port_group.port_type
13.
set cos settings cos-list [priority priority] [tos-value tos-value] [txq-reference txq-reference] [irl-reference irl-reference] [orl-reference orl-reference] [drop-precedence drop-precedence] [flood-ctrl state] show cos settings set cos state enable show cos state
14.
Page 30 of 38
Tosimplifythisdiscussionoftheconfigurationprocess,thisexampleislimitedtotheVoIP configurationcontext.Table 2providesasetofsamplevaluesforpriority,IRL,andtransmitqueue acrossanumberofrealworldtraffictypes.Thistablecanbeusedasanaidinthinkingabouthow youmightwanttoapplyCoSacrossyournetwork.Notethatscavengerclassistrafficthatshould betreatedaslessthanbesteffort:externalwebtraffic,forinstance. Table 2 CoS Sample Values By Traffic Type
Transmit Queue IRL Name Priority Edge Loop Detect Scavenger Best Effort Bulk Data Critical Data Network Control Network Management RTP Voice/Video 0 0 1 2 3 4 5 6 1 Mbps 7 25 Mbps 3 3 25% 25% 40 PPS 2 Mbps 1 Mbps 2 2 1Mbps 25% 25% 1 1 80% 45% 45% 10 PPS 15 Mbps Core 10 PPS 0 0 10% 5% 5% Queue # Edge Core Shaping Edge Core WFQ Edge Core
Page 31 of 38
Figure 7
VLAN 21 Data
ge.1.2-5
Core Edge
ge.1.10 IP addr:10.0.0.1
ge.1.10-13 Policy Profile: Ports: Default: CoS: egress-vlans: tci-overwrite: ToS: Rate Limit Physical queue: VolPCore-VLAN12 ge.1.10-3 CoS 5 9 12 enabled 184 1024 kbps 2 H.323 CEP: Policy Profile: Ports: Default: CoS: tci-overwrite: tcidestIP Port 1720: Rate Limit Tos Physical queue: Authentication H323CallSetup ge.1.10 CoS 5 10 enabled 10.0.01 1024 kbps 184 2
Edge Router
VLAN 11 Data
VLAN 12 VoIP
Page 32 of 38
UsingNetSightPolicyManager,configurethepolicyrolesandrelatedservicesasfollows:
Create a Rate-limiter
Createaratelimitasfollows: Inboundratelimitof25mbps Applyittoportgrouptypes32/8/100forindex0
Create a Rule
CreateaLayer2trafficclassificationruleforVLANID22withintheVoIPCoreservice. AssociateCoS8astheactionfortherule.
Page 33 of 38
Create a Rate-limiter
Createaratelimitasfollows: Inboundratelimitof1mbps Applyittoportgrouptypes32/8/100forindex0
Create a Rule
CreateaLayer2trafficclassificationruleforVLANID22withintheVoIPEdgeservice. AssociateCoS9astheactionfortherule.
Create a Rate-limiter
Createaratelimitasfollows: Inboundratelimitof5pps Applyittoportgrouptypes32/8/100forindex1
ToS:B8 SpecifyIRLindex1toassociatethisCoStotheratelimit
Router 1
ThepolicyrolecreationdiscussedaboveisappropriateforRouter1asfollows: ApplyroleVoIPCoreVLAN22toportsge.1.25.
Switch 1
VoIPEdgeandH323CallSetuprolesareappliedtoSwitch1asfollows: ApplyroleVoIPEdgeVLAN12toportsge.1.1013. ApplyroleH323CallSetuptoportge.1.10
Page 35 of 38
s-series(rw)->set policy rule admin-profile vlantag 12 mask 12 port-string ge.1.10-13 admin-pid 1 s-series(rw)->set policy rule 1 vlantag 12 mask 12 vlan 12 cos 9 s-series(rw)->set cos port-resource irl 2.1 0 unit mbps rate 1 s-series(rw)->set cos reference irl 2.1 9 rate-limit 0 s-series(rw)->set cos 9 priority 5 tos-value 184.0 txq-reference 8 irl-reference 1 s-series(rw)->set policy profile 2 name H323CallSetup cos 5 tci-overwrite enable s-series(rw)->set policy rule admin-profile port ge.1.10 mask 16 port-string ge.1.10 admin-pid 2 s-series(rw)->set policy rule 1 tcpdestportIP 1720:10.0.0.1 cos 10 port-string ge.1.10 s-series(rw)->set cos port-resource irl 3.1 2 unit pps rate 5 s-series(rw)->set cos reference irl 3.1 10 rate-limit 1 s-series(rw)->set cos 10 priority 5 tos-value 184.0 txq-reference 8 irl-reference 2 s-series(rw)->set cos state enable
Port Group Port Type Priority Quality of Service (QoS) Rate Limiting
Page 36 of 38
Table 3
Term
Rate Shaping
Page 37 of 38
Revision History
Date January 28,2008 February 22, 2008 September 18, 2008 January 23, 2009 May 09, 2011 Description Initial Release of the Document Modifications due to product branding changes. Modifications due to product branding changes and minor template updates. Cosmetic changes only. Updated for S-Series, IRL, ORL, flood control, and Flex-Edge features, plus major rewrite of overview information.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,LANVIEW,WEBVIEW,SSERIESandany logosassociatedtherewith,aretrademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnited Statesandothercountries.ForacompletelistofEnterasystrademarks,see http://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Configuring RADIUS-Snooping
Thischapterprovidesthefollowinginformationaboutconfiguringandmonitoring RADIUSSnoopingonEnterasysNSeries,SSeries,andKSeriesmodularswitches.
For information about... What is RADIUS-Snooping? Why Would I Use RADIUS-Snooping in My Network? How Can I Implement RADIUS-Snooping? RADIUS-Snooping Overview Configuring RADIUS-Snooping RADIUS-Snooping Configuration Example Terms and Definitions Refer to page... 1 2 2 2 6 8 10
What is RADIUS-Snooping?
RADIUSSnooping(RS)isoneoftheEnterasysMultiAuthsuiteofauthenticationmethods.See theConfiguringAuthenticationFeatureGuideforadetaileddiscussionoftheotherauthentication methodssupportedbyEnterasysmodularswitches.RSresidesonthedistributiontierswitch, allowingformanagementofanydirectlyconnectededgeswitchthatusestheRADIUSprotocolto authenticateanetworkendstation,butdoesnotsupportthefullcomplementoftheEnterasys SecureNetworkscapabilities. TheRADIUSclientedgeswitchinitiatesanauthenticationrequest,bysendingaRADIUSrequest totheRADIUSserverthatresidesupstreamofthedistributiontierswitch.Byinvestigatingthe RADIUSrequestframes,RScandeterminetheMACaddressoftheenduserdevicebeing authenticated.ThenetworkadministratorcreatesauseraccountontheRADIUSserverforthe enduserthatincludesanypolicy,dynamicVLANassignment,andotherRADIUSandRS attributesforthisendstation.ByinvestigatingtheRADIUSresponsefromtheRADIUSserver,RS canbuildaMutiAuthsessionasthoughtheenduserweredirectlyconnectedtothe distributiontierdevice. SessionsdetectedbyRSfunctionidenticallytolocalauthenticatedsessionsfromtheperspectiveof theEnterasysMultiAuthframework,withtheexceptionthatRScannotforceareauthentication event;itcanonlytimeoutthesession.
Page 1 of 12
WithRSenabledonthedistributiontierswitch,theseSecureNetworkscapabilitiescanbe configuredbythenetworkadministratoronanenduserbasis.
RADIUS-Snooping Overview
ThissectionprovidesanoverviewofRADIUSSnoopingconfigurationandmanagement.
Note: RADIUS-Snooping is currently only supported on Enterasys modular switch products. A minimum of 256 MB of memory is required on all DFE modules in the switch, in order to enable RADIUS-Snooping. See the SDRAM field of the show system hardware command to display the amount of memory installed on a module. Module memory can be upgraded to 256 MB using the DFE-256MB-UGK memory kit.
Page 2 of 12
RADIUS-Snooping Overview
RADIUS-Snooping Configuration
MultiAuth Configuration
MultiAuthmustbeenablediftheRADIUSSnoopingconfigurationinvolvestheauthenticationof morethanasingleuseronaport.Therearetwoaspectstomultiauthenticationina RADIUSSnoopingconfiguration: TheglobalMultiAuthmodemustbechangedfromthedefaultmodeofstricttomulti,in ordertoauthenticatemultipledownstreamusers. TheMultiAuthportmodemustbesettoauthoptforbothupstream(totheRADIUSserver) anddownstream(totheauthenticatingswitch)ports.SettingglobalMultiAuthtomultisets thedefaultportvaluefromauthopttoforceauth.Resetthemodefortheaffectedportsto authopt.
SeetheConfiguringUserAuthenticationfeatureguideathttps://extranet.enterasys.com/downloads/ foracompletediscussiononMultiAuthconfiguration.
Enabling RADIUS-Snooping
RSisenabledgloballyonthedistributiontierswitch.Itisalsoenabledonthedistributiontier switchportsdirectlyattachedtotheedgeswitchthattheRADIUSrequestframestransit,fromthe edgeswitchtotheRADIUSserver,aswellastheportstheresponseframestransit,fromthe RADIUSserverbacktotheedgeswitch.
Page 3 of 12
RADIUS-Snooping Overview
RADIUS-Snooping Management
RADIUSSnoopingmanagementoptionsareavailableto: TerminateallRSsessionsoronaperportorMACaddressbasis ResetallRSconfigurationtoitsdefaultsettings ClearallRADIUSSnoopingflowtableentriesorperindexentry DisplayRSstatistics
Page 4 of 12
RADIUS-Snooping Overview
Figure 1
RADIUS-Snooping Overview
RADIUS Server
Edge Switch
Page 5 of 12
Configuring RADIUS-Snooping
Configuring RADIUS-Snooping
ThissectionprovidesdetailsfortheconfigurationofRADIUSSnoopingontheEnterasysmodular switchproducts. Table 1listsRSparametersandtheirdefaultvalues. Table 1 Default Authentication Parameters
Description Specifies the maximum number of allowed RS sessions from all RADIUS clients, on a per port basis. Specifies traffic drop behavior for this port. Enables or disables RS on the distribution-tier switch in a system context or on this port in a port context. Enables or disables packet drop in a port context. Specifies the global MultiAuth mode. The numeric ID of a RADIUS-Snooping flow table entry. Specifies the MultiAuth authentication mode on a per port basis. Specifies the number of seconds that the firmware waits, from the time it successfully snoops a RADIUS request frame, for a RADIUS response frame from the RADIUS server, before terminating the session. Specifies the RADIUS secret for this RADIUS-Snooping flow table entry. Specifies the RADIUS UDP port. Standard refers to the default value. Default Value 8, 128, or 256 depending upon the system license for this device Disabled Disabled
Parameter authallocated
drop enable/disable
No secret 1812
RADIUS-Snooping Configuration
Command(s) set multiauth mode multi set multiauth port mode auth-opt port-string set radius-snooping enable
Page 6 of 12
Configuring RADIUS-Snooping
Procedure 1
Step 4. Task
Enable RADIUS-Snooping on each distribution-tier switch port over which RADIUS request and response frames transit. Configure RADIUS-Snooping flow table index entries. Optionally modify the RADIUS-Snooping timeout setting.
5.
6.
Managing RADIUS-Snooping
Table 2describeshowtomanageRADIUSSnoopingonthedistributiontierswitch. Table 2
Task To terminate active sessions on the system for the specified port or MAC address. To reset all RS configuration to its default value on this system. To clear all entries or the specified index entry from the RS flow table.
Managing RADIUS-Snooping
Command(s) set radius-snooping initialize {port port-string | mac-address} clear radius-snooping all clear radius-snooping flow {all | index}
To display a general overview of the global RS status. To display the RS status for the specified port. To display information for all or the specified flow index entry. To display a summary of sessions for the specified port or MAC address.
show radius-snooping show radius-snooping port port-string show radius-snooping flow {index | all} show radius-snooping session {port port-string | mac mac-address}
Page 7 of 12
RADIUS Server
50.50.50.60
Network Core
Layer 2 Switch
Index 1 Flows
Distribution-Tier Switch
Index 2 Flows
Authenticating Devices
Authenticating Devices
Page 8 of 12
SettheMultiAuthauthenticationmodeforeachport
System(su)->set multiauth port mode auth-opt ge.1.5-10,15-24
EnableRSonthissystem:
System(su)->set radius-snooping enable
EnableRSandsetconfigurationforportsonthissystem
System(su)->set radius-snooping port enable drop enabled authallocated 256 ge.1.5-10 System(su)->set radius-snooping port enable drop enabled authallocated 256 ge.1.15-24
ConfigureRSflowtableentries
System(su)->set radius-snooping flow 1 10.10.10.10 50.50.50.50 1812 mysecret System(su)->set radius-snooping flow 2 10.10.10.20 50.50.50.60 1812 mysecret
ConfigureRStimeoutforthissystem
System(su)->set radius-snooping timeout 15
Page 9 of 12
ThiscompletestheRADIUSSnoopingconfigurationexample.
RADIUS-Snooping
Page 10 of 12
Revision History
Date 11/07/2008 04/16/2009 06/03/2011 Description New Document. Added 256 MB on all modules requirement. Added MultiAuth configuration information. Updated for S-Series and K-Series.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,LANVIEW,WEBVIEW,SSERIES,andany logosassociatedtherewith,aretrademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnited Statesandothercountries.ForacompletelistofEnterasystrademarks,see http://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Page 12 of 12
Configuring SNMP
ThischapterprovidesthefollowinginformationaboutconfiguringandmonitoringSNMPon EnterasysNSeries,SSeries,andKSeriesmodularswitches,ASeries,BSeries,CSeries stackablefixedswitches,andDSeries,GSeries,andISeriesstandalonefixedswitches
For information about... What Is SNMP? Why Would I Use SNMP in My Network? How Do I Implement SNMP? SNMP Overview SNMP Support on Enterasys Devices Configuring SNMP Reviewing SNMP Settings Refer to page... 1 1 2 2 4 8 21
Note: For information about configuring SNMP on the X-Series, refer to the X-Series Configuration Guide.
What Is SNMP?
TheSimpleNetworkManagementProtocol(SNMP)isanapplicationlayerprotocolthatfacilitates theexchangeofmanagementinformationbetweennetworkdevices.Themostwidelyused managementprotocolonInternetProtocol(IP)networks,ithelpsyoumonitornetwork performance,troubleshootproblems,andplanfornetworkgrowth. SNMPssimplicityliesinthefactthatitusesabasicsetofcommandmessagestorelay notificationsofeventsanderrorconditionsoveraconnectionlesscommunicationlink. Mostnetworkdevicessupportthethreeversionsoftheprotocol:SNMPv1,SNMPv2c,and SNMPv3.Thelatestversion,SNMPv3,providesenhancedsecurityandadministrativefeaturesas describedinthisdocument.
Page 1 of 27
Acommonmanagementplatformsupportedbymanynetworkdevices
SNMP Overview
ItishelpfultounderstandthefollowingSNMPcomponentsdescribedinthissection:
For information about... Manager/Agent Model Components Message Functions Access to MIB Objects Refer to page... 2 2 3
Message Functions
SNMPusesfivebasicmessagetypes(Get,GetNext,GetResponse,Set,andTrap)tocommunicate betweenthemanagerandtheagent.TheGetandGetNextmessagesallowthemanagertorequest
Page 2 of 27
SNMP Overview
informationforaspecificvariable.Theagent,uponreceivingaGetorGetNextmessage,willissue aGetResponsemessagetothemanagerwitheithertheinformationrequestedoranerror indicationaboutwhytherequestcannotbeprocessed. ASetmessageallowsthemanagertorequestachangetoaspecificvariable.Theagentthen respondswithaGetResponsemessageindicatingthechangehasbeenmadeoranerror indicationaboutwhythechangecannotbemade. Atraporinformmessageallowstheagenttospontaneouslyinformthemanagerofan importanteventinthenetwork. TheSNMPmanagerandagentuseinformationintheMIBtoperformtheoperationsdescribedin Table 1. Table 1 SNMP Message Functions
Function Retrieves a value from a specific variable. Retrieves a value from a variable within a table.1 Retrieves large blocks of data, such as multiple rows in a table, that would otherwise require the transmission of many small blocks of data. Replies to a get-request, get-next-request, and set-request sent by a management station. Stores a value in a specific variable. Unsolicited message sent by an SNMP agent to an SNMP manager when an event has occurred.
1. With this operation, an SNMP manager does not need to know the exact variable name. A sequential search is performed to find the needed variable from within a table. 2. The get-bulk operation is only supported in SNMPv2c or later. 3. Inform notifications are only supported in SNMPv3.
Page 3 of 27
User-Based
SNMPv3providesaUserBasedSecurityModel(USM)whichreliesonausernamematchfor authenticatedaccesstonetworkmanagementcomponents. RefertoSecurityModelsandLevelsonpage 7formoreinformation.
Versions Supported
EnterasysdevicessupportthreeversionsofSNMP: Version1(SNMPv1)ThisistheinitialimplementationofSNMP.RefertoRFC1157forafull descriptionoffunctionality. Version2(SNMPv2c)ThesecondreleaseofSNMP,describedinRFC1907,hasadditions andenhancementstodatatypes,countersize,andprotocoloperations. Version3(SNMPv3)ThisisthemostrecentversionofSNMP,andincludessignificant enhancementstoadministrationandsecurity.ThemajordifferencebetweenSNMPv3and earlierversionsisthatv3providesaUserBasedSecurityModel(USM)toassociateuserswith managedaccesstosecurityinformation.Inadditiontobettersecurityandbetteraccess
Page 4 of 27
UnlikeSNMPv1andSNMPv2c,inSNMPv3,theconceptofSNMPagentsandSNMPmanagersno longerapply.TheseconceptshavebeencombinedintoanSNMPentity.AnSNMPentityconsists ofanSNMPengineandSNMPapplications.AnSNMPengineconsistsofthefollowingfour components: DispatcherSendsandreceivesmessages. MessageprocessingsubsystemAcceptsoutgoingPDUsfromthedispatcherand preparesthemfortransmissionbywrappingtheminamessageheaderandreturning themtothedispatcher.Alsoacceptsincomingmessagesfromthedispatcher,processes eachmessageheader,andreturnstheenclosedPDUtothedispatcher. SecuritysubsystemAuthenticatesandencryptsmessages. AccesscontrolsubsystemThiscomponentdetermineswhichusersandwhich operationsareallowedaccesstomanagedobjects.
Page 5 of 27
Table 2
Term engine ID group inform
OID
security level
security model
An authentication strategy that is set up for an SNMP user and the group in which the user resides. A combination of a security model and a security level determines which security mechanism is employed when handling an SNMP frame. Specifies whether an SNMP user entry will be stored in volatile or nonvolatile memory. A list of SNMP notify values that link a target (managment station IP) address to specific SNMP notifications. A unique identifier and a specific IP address that will receive SNMP notification messages. Controls where and under what circumstances SNMP notifications will be sent. This entry can be bound to a target IP address allowed to receive SNMP notification messages. A notification message sent by an SNMPv1 or v2c agent to a network management station, a console, or a terminal to indicate the occurrence of a significant event, such as when a port or device goes up or down, when there are authentication failures, and when power supply errors occur. A person registered in SNMPv3 to access management information. In v1 and v2c, a user is set with the community name string. User-Based Security Model, the SNMPv3 authenticatiion model which relies on a user name match for access to network management components. View-based Access Control Model, which determines remote access to SNMP managed objects, allowing subsets of management information to be organized into user views.
trap
Page 6 of 27
Table 2
Term view
authPriv
MD5 or SHA
DES
Access Control
InadditiontotheSecurityModelsandLevelsdescribedabove,theEnterasysimplementationof SNMPalsoprovidesaViewbasedAccessControlModel(VACM),whichdeterminesremote accesstomanagedobjects.VACMallowsyoutoorganizesubsetsofmanagementinformationinto views.Managementinformationthatisinausersviewgivestheuserthecorrespondingaccess leveltothatmanagementinformation:eitherread,write,ornotify.Individualuserscanbe organizedintogroupsforwhomyoucanpredefinewhatviewsareavailablebasedonthe securitymodelandsecuritylevelusedtorequestaccess.Inthisway,VACMallowsyoutopermit ordenyaccesstoanyindividualitemofmanagementinformationdependingonausersgroup membershipandthelevelofsecurityprovidedbythecommunicationschannel.
Page 7 of 27
Configuring SNMP
Configuring SNMP
ThissectionprovidesthefollowinginformationaboutconfiguringSNMPonEnterasysdevices:
For information about... Configuration Basics How SNMP Processes a Notification Configuration SNMP Defaults Configuring SNMPv1/SNMPv2c Configuring SNMPv3 Configuring Secure SNMP Community Names Refer to page... 8 8 9 10 11 18
Configuration Basics
CompletinganSNMPconfigurationonanEnterasysdeviceinvolvesdefininguserswhowillbe authorizedtoreceiveSNMPnotificationsaboutnetworkevents,associatingsecurity(target) paramenters,accessrightsandMIBviewstothoseusers,andspecifyinganIPaddresswherethey willreceivenotifications.Thebasicstepsinthisprocessare: 1. CreatinganamethatwillactasanSNMPuserpassword: 2. 3. 4. 5. 6. 7. ThiswillbeacommunitynameforanSNMPv1orv2cconfiguration,or. AusernameforanSNMPv3configuration.
CreatingagroupfortheusernamedinStep 1. CreatingaccessrightsfortheusergroupnamedinStep 2. DefiningMIBview(s)fortheusergroup. Creatingatargetparametersentrytoassociatesecurityandauthorizationcriteriatotheusers createdinStep 1. VerifyingifanyapplicableSNMPnotificationentriesexist,orcreatinganewone.Youwilluse thisentrytosendSNMPnotificationmessagestotheappropriatetargetsconfiguredinStep 5. CreatingatargetaddressentrytobindamanagementIPaddressto: ThenotificationentryandtagnamecreatedinStep 6,and ThetargetparametersentrycreatedinStep 5.
Note: Commands for configuring SNMP on Enterasys devices are independent during the SNMP setup process. For instance, target parameters can be specified when setting up optional notification filters even though these parameters have not yet been created with the set snmp targetparams command. The steps in this section are a guideline to configuring SNMP and do not necessarily need to be executed in this order.
Page 8 of 27
Configuring SNMP
1. 2.
Determinesifthekeysfortrapdoorsdoexist.ThekeythatSNMPislookingforisthe notificationentrycreatedwiththesetsnmpnotifycommand. Searchesforthedoorsmatchingsuchakeyandverifiesthatthedoorisavailable.Ifso,this dooristaggedorboundtothenotificationentry.Itwasbuiltusingthesetsnmptargetaddr command,whichspecifiesthemanagementstationIPaddresstowhichthisdoorleads,and theprocedure(targetparams)tocrossthedoorstep Verifiesthatthedescriptionofhowtostepthroughthedooris,infact,there.Theagentchecks targetparamsentriesanddeterminesthisdescriptionwasmadewiththesetsnmp targetparamscommand,whichtellsexactlywhichSNMPprotocoltouseandwhat communityorusernametoprovide. Verifiesthatthespecifiedname,configuredusingeitherthesetsnmpcommunityorsetsnmp usercommandisavailable. Sendsthenotificationmessagetothetargetaddress.
3.
4. 5.
SNMP Defaults
Device Start Up Configuration
Bydefault,SNMPv1isconfiguredonEnterasysswitches.Table 4liststhedefaultconfiguration parameters,whichincludeasinglecommunitynamepublicgrantingreadwriteaccesstothe wholeMIBtreeforbothSNMPv1andSNMPv2c. Table 4 Default Enterasys SNMP Configuration
Default Value public rw (read-write) public v1 all (for read, write, and notify access) all (entire MIB tree)
Parameter Community name Group access privileges Group user name Security model Security access rights MIB view
Page 9 of 27
Configuring SNMP
Configuring SNMPv1/SNMPv2c
Creating a New Configuration
Procedure 1showshowtocreateanewSNMPv1orSNMPv2cconfiguration.Thisexample assumesthatyouhaventanypreconfiguredcommunitynamesoraccessrights.
Note: The v1 parameter in this example can be replaced with v2 for SNMPv2c configuration.
Procedure 1
Step 1. 2. 3. Task
Create a community name. Create a security model (VACM) group using the community name you assigned in step 1. Set security access rights for the VACM group.
4. 5.
Set MIB view attributes. Specify the target parameters for SNMP notification message generation. Specify the target address to which SNMP notification messages generated using the specified target parameters will be sent. Specify a name for this notification entry and bind it to the target address.
6.
7.
Example
ThefollowingexampleisanEnterasysNSeriesdeviceconfigurationusingthestepsin Procedure 1.Itshowshowto: Createthecommunitynamepublic. AssignthepublicusertothegroupnamedgroupRWandtheSNMPv1securitymodel. Specifythat,ifSNMPmessagesarereceivedwiththepublicnamestring,theviewRWfor readrequests,writerequests,andnotifyrequestswillbeappliedtothisuser. FortheviewRW,includetheMIBsubtreedenotedwithOID1and0.0,andexcludeview accesstosubtreedenotedwithOID1.3.6.1.6.3.13.1(whichisthenotificationMIB). Assignatargetparametersentry,TVv1public,forsecuritylevelprocessingtothepublic communityname. CreateatargetaddressentrynamedTVTrapatIPaddress10.42.1.10,whichwillusesecurity andauthorizationcriteriacontainedinthetargetparametersentrycalledTVv1public,.and bindtheseparameterstogetherwithatagentrycalledTVTrapTag.
enterasys(su)->set snmp community public enterasys(su)->set snmp group groupRW user public security model v1
Page 10 of 27
Configuring SNMP
enterasys(su)->set snmp access groupRW security-model v1 read RW write RW notify RW enterasys(su)->set snmp view viewname RW subtree 1 enterasys(su)->set snmp view viewname RW subtree 0.0 enterasys(su)->set snmp view viewname RW subtree 1.3.6.1.6.3.13.1 excluded enterasys(su)->set snmp targetparams TVv1public user public security-model v1 message processing v1 enterasys(su)->set snmp targetaddr TVTrap 10.42.1.10 param TVv1public taglist TVTraptag enterasys(su)->set snmp notify TVTrap tag TVTrapTag
Note: Any use of the parameter 'All' must be exactly as shown in this example. Any other variation (including, but not limited to, values such as 'all' or 'ALL') will not be valid.
Youcanmodifythisdefaultconfigurationasshowninthefollowingexamples.
Usethiscommandtoremovethepubliccommunitynamefromthedefaultconfiguration:
enterasys(su)->clear snmp community public Note: You can leave the set snmp group groupRW user public security-model v1 statement in the default configuration in case you want to re-activate the public community name at some point, or can clear it as well.
RefertoConfiguringSecureSNMPCommunityNamesonpage18foradescriptionofa recommendedconfigurationthatwillpreventunsecuredaccesstoSNMPinformation.
Configuring SNMPv3
Procedure 2showshowtocompleteabasicSNMPv3configuration.Foradditionalconfiguration information,referto: ConfiguringanSNMPv3InformorTrapEngineIDonpage14 ConfiguringanSNMPViewonpage15
Page 11 of 27
Configuring SNMP
Procedure 2
Step 1. Task
Create an SNMPv3 user and specify authentication, encryption, and security credentials. If remote is not specified, the user will be registered for the local SNMP engine. If authentication is not specified, no authentication will be applied. If privacy is not specified, no encryption will be applied.
2.
Create a user group and add the user created in Step 1. If storage type is not specified, nonvolatile will be applied.
set snmp group groupname user user security-model usm [volatile | nonvolatile]
3.
Set security access rights for the group. If security level is not specified, no authentication will be applied. Only one context, the default context, is supported in this release. There is no need to configure this parameter. If read view is not specified none will be applied. If write view is not specified, none will be applied. If notify view is not specified, none will be applied. If storage type is not specified, entries will be stored as permanent and will be held through device reboot.
set snmp access groupname securitymodel usm [noauthentication | authentication | privacy] [exact | prefix] [read readviewname] [write writeviewname] [notify notifyviewname] [volatile | nonvolatile]
4.
Define views created in Step 3. If not specified, mask will be set to ff:ff:ff:ff. If not specified, subtree use will be included. If storage type is not specified, nonvolatile (permanent) will be applied.
set snmp view viewname viewname subtree subtree [mask mask] [included | excluded] [volatile | nonvolatile]
5.
Set SNMP target parameters. If not specified, security level will be set to noauthentication. If not specified, storage type will be set to nonvolatile.
set snmp targetparams targetparams user user security-model usm message-processing v3 [noauthentication | authentication | privacy] [volatile | nonvolatile]
Page 12 of 27
Configuring SNMP
Procedure 2
Step 6. Task
Set the SNMP target address for notification message generation. If not specified, udpport will be set to 162. If not specified, mask will be set to 255.255.255.255. If not specified, timeout will be set to 1500 (15 seconds). If not specified, number of retries will be set to 3. If taglist is not specified, none will be set. If not specified, storage type will be nonvolatile.
7.
Set SNMP notification parameters. If not specified, message type will be set to trap. If not specified, storage type will be set to nonvolatile.
set snmp notify notify tag tag [trap | inform] [volatile | nonvolatile]
ThefollowingexampleisanEnterasysNSeriesdeviceconfigurationusingthestepsin Procedure 2.Itshowshowto CreatetheuserEnterasys_user,specifyingauthentication,encryption,andsecurity credentials. AssignEnterasys_usertotheEnterasysgroupandassociateittotheSNMPv3securitymodel, usm. Specifythat,ifSNMPmessagesarereceivedwithauthenticationandencryption,theview, readViewforreadrequests,andtheviewwriteViewforwriterequestswillbeappliedtothis usergroupbasedontheUSMsecuritymodel. FortheviewwriteView,includetheMIBsubtreedenotedwithOID1,andexcludethesubtree denotedbyOID1.3.6.1.4.1.5624.1.2.16. AssignanSNMPv3targetparametersentrynamedenterasysntotheEnterasys_userusing theUSMsecuritymodel. CreateatargetaddressentrynamedEnterasys_NetworksatIPaddress172.29.10.1whichwill usesecurityandauthorizationcriteriacontainedinatargetparametersentrycalled enterasysn,andbindtheseparameterstogetherwithatagentrycalledv3TrapTag.
enterasys(su)-> set snmp user Enterasys_user authentication md5 my_authentication privacy my_privacy enterasys(su)-> set snmp group Enterasys user Enterasys_user security-model usm enterasys(su)-> set snmp access Enterasys security-model usm privacy read readView write writeView enterasys(su)-> set snmp view viewname readView subtree 1 enterasys(su)-> set snmp view viewname writeView subtree 1 enterasys(su)-> set snmp view viewname writeView subtree 1.3.6.1.4.1.5624.1.2.16 excluded enterasys(su)-> set snmp targetparams enterasysn user Enterasys_user security-model usm message-processing v3
Page 13 of 27
Configuring SNMP
enterasys(su)-> set snmp targetaddr Enterasys_Networks 172.29.10.1 param enterasysn taglist v3TrapTag enterasys(su)-> set snmp notify SNMPv3TrapGen tag v3TrapTag inform
Inform EngineIDs
IntheEnterasysSNMPimplementation,thereceiversEngineIDvalueisusedbyboththesender andreceivertopropagateinformnotifications.InordertosendandreceiveSNMPv3informsin theirmostsecureform(withauthenticationandprivacyenabled),youmustconfigureauserID andcorrespondingreceiverEngineIDonthesenderasshownintheexampleinProcedure 3.This exampleassumesthatNetSightConsoleisthereceiver,andanNSeriesswitchisthesender.
Note: The following file location and EngineID are provided as examples. Your settings will vary.
Configuring an EngineID
Command(s) Refer to Configuring an SNMPv3 Inform or Trap Engine ID on page 14. C:\Program Files\Enterasys Networks\NetSight Shared\snmptrapd.conf oldEngineID 0x800007e5804f190000d232aa40
3.
Page 14 of 27
Configuring SNMP
Procedure 3
Step 4. Task
Configuring an EngineID
Command(s) set snmp user v3user remote 800007e5804f190000d232aa40 authentication md5 md5passwd privacy despasswd Note: You can omit the 0x from the EngineID. You can also use the colon notation like this: 80:00:07:e5:80:4f:19:00:00:d 2:32:aa:40
On the N-Series switch, define the same user as in the above example (v3user) with this EngineID and with the same Auth/Priv passwords you used previously.
5.
Navigate to and display the user configuration on the management station. (This assumes that you have already created the user in Netsight Console, so you will only need to add it to the configuration file of the trap daemon.) Using any plain text editor, add this line to the configuration file.
6.
Trap EngineID
Tousetrapsinsteadofinformnotifications,youwouldchangetheprecedingconfigurationas follows: 1. 2. Usethiscommandtospecifytrapnotifications:
set snmp notify v3notify tag v3tag trap
Whenyouarefinishedmodifyingtheconfiguration,savethefileandrestarttheSNMPTrap ServiceusingNetsightServicesManager.
Note: When installed on a Unix platform, the NetSight server must be manually restarted.
Page 15 of 27
Configuring SNMP
enterasys(su)->clear snmp view All 1 enterasys(su)->clear snmp view All 0.0 enterasys(su)->set snmp view viewname All subtree 1.3.6.1.2.1 enterasys(su)->set snmp view viewname All subtree 1.3.6.1.2.1.2 excluded enterasys(su)->show snmp view View Name = All Subtree OID = 1.3.6.1.2.1 Subtree mask = View Type = included Storage type = nonVolatile Row status = active View Name Subtree OID Subtree mask View Type Storage type Row status = = = = = = All 1.3.6.1.2.1.2 excluded nonVolatile active
Page 16 of 27
Configuring SNMP
Example
Thisexampleshowsyouhowtousethemask parametertosignificantlyrefineyourquery output,sothatonlydataforspecifiedportsisreturned.Forthisexample,assumethatNSeries slot1port12isofinterest. ThefirsttenoctetsoftheetherStatsEntry(1.3.6.1.2.1.16.1.1.1)mustmatchexactlyasspecified.The nextoctet,representingeachofthe21possibleleaveswithinthatbranch,neednotmatchexactly. Theremainder,representingtheportnumber,mustmatchexactlyasspecified. Thebitrepresentationsforthiswouldbe1111111111011111,or0xffdf.IftheactualOIDstring beingmaskedislongerthanthespecifiedbits,themissingbitstotherightareassumedtobe1s.It isthusonlynecessarytomakethemasklongenough(inincrementsof8bitbytes)todesignate, witha0bit,anydesiredwildcardOIDstringoctets. ThefollowingisanSNMPViewusingthesespecifications,startingwithadefaultconfiguration.
enterasys(su)->show snmp view View Name = All Subtree OID = 1 Subtree mask = View Type = included Storage type = nonVolatile Row status = active View Name Subtree OID Subtree mask View Type Storage type Row status = = = = = = All 0.0 included nonVolatile active
enterasys(su)->clear snmp view All 1 enterasys(su)->set snmp view viewname All subtree 1.3.6.1.2.1.16.1.1.1.0.1012 mask ff:df enterasys(su)->show snmp view View Name = All Subtree OID = 0.0 Subtree mask = View Type = included Storage type = nonVolatile Row status = active
Page 17 of 27
Configuring SNMP
View Name Subtree OID Subtree mask View Type Storage type Row status
= = = = = =
AnSNMPqueryoftheetherStatsEntrybranchusingthecommunitynameassociatedwiththis definedviewwoulddisplayaresultsimilertothefollowing.
Object etherStatsIndex etherStatsDataSource etherStatsDropEvents etherStatsOctets etherStatsPkts etherStatsBroadcastPkts etherStatsMulticastPkts etherStatsCRCAlignErrors etherStatsUndersizePkts etherStatsOversizePkts etherStatsFragments etherStatsJabbers etherStatsCollisions etherStatsPkts64Octets etherStatsPkts65to127Octets etherStatsPkts128to255Octets etherStatsPkts256to511Octets etherStatsPkts512to1023Octets etherStatsPkts1024to1518Octets etherStatsOwner etherStatsStatus Instance 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 1012 Type INTEGER OBJECT ID Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter Counter OCTET STRING INTEGER Value 1012 1.3.6.1...11012 54323 302877211 1592774 793487 729406 0 0 0 0 0 0 0 458931 55190 656909 57 1 monitor valid(1)
Page 18 of 27
Configuring SNMP
2.
Create v1/v2c public and private community names and security names.
set snmp community privatecommunityname securityname readwrite-securityname set snmp community publiccommunityname securityname readonly-securityname
3.
Create user groups and bind them to the security names created in Step 2.
set snmp group admin-groupname user admin-username set snmp group read-only-groupname user read-only-securityname security-model v1 set snmp group read-write-groupname user read-write-securityname security-model v1 set snmp group read-only-groupname user read-only-securityname security-model v2c set snmp group read-write-groupname user read-write-securityname security-model v2c
4.
Using the admin-username assinged in Step 3, create the v3 user and define authentication keys.
Page 19 of 27
Configuring SNMP
Procedure 4
Step 5. Task
Using the viewnames assigned in Step 1, create restricted views for v1/v2c users, and unrestricted views for v3 users.
6.
Exclude the following from the restricted view snmpUsmMIB (which contains v3 user names, but no passwords) snmpVacmMIB (which contains SNMP view configurations) snmpCommunityTable (which contains community names)
set snmp view viewname unsecuredviewname subtree 1.3.6.1.6.3.15 excluded set snmp view viewname unsecuredviewname subtree 1.3.6.1.6.3.16 excluded set snmp view viewname unsecuredviewname subtree 1.3.6.1.6.3.18.1.1 excluded
Example
ThefollowingexampleshowsanNSeriesdeviceconfigurationusingthestepsinProcedure 4.
enterasys(su)->set snmp access gAdmin security-model usm privacy exact read vSecured write vSecured notify vSecured enterasys(su)->set snmp access gReadOnlyV1V2C security-model v1 exact read vUnsecured enterasys(su)->set snmp access gReadOnlyV1V2C security-model v2c exact read vUnsecured enterasys(su)->set snmp access gReadWriteV1V2C security-model v1 exact read vUnsecured write vUnsecured enterasys(su)->set snmp access gReadWriteV1V2C security-model v2c exact read vUnsecured write vUnsecured enterasys(su)->set snmp community cnPrivate securityname sn_v1v2c_rw enterasys(su)->set snmp community cnPublic securityname sn_v1v2c_ro enterasys(su)->set snmp group gReadOnlyV1V2C user sn_v1v2c_ro security-model v1 enterasys(su)->set snmp group gReadWriteV1V2C user sn_v1v2c_rw security-model v1 enterasys(su)->set snmp group gReadOnlyV1V2C user sn_v1v2c_ro security-model v2c enterasys(su)->set snmp group gReadWriteV1V2C user sn_v1v2c_rw security-model v2c enterasys(su)->set snmp group gAdmin user it-admin security-model usm enterasys(su)->set snmp user it-admin authentication sha auth_key privacy priv_key enterasys(su)->set snmp view viewname vSecured subtree 1 enterasys(su)->set snmp view viewname vSecured subtree 0.0 enterasys(su)->set snmp view viewname vUnsecured subtree 1 enterasys(su)->set snmp view viewname vUnsecured subtree 0.0 enterasys(su)->set snmp view viewname vUnsecured subtree 1.3.6.1.6.3.15 excluded enterasys(su)->set snmp view viewname vUnsecured subtree 1.3.6.1.6.3.16 excluded enterasys(su)->set snmp view viewname vUnsecured subtree 1.3.6.1.6.3.18.1.1 excluded
Page 20 of 27
Refer to page...
21 21 22 23 23 23 24 24 24 25 25 25 26
Community
UsethiscommandtodisplaySNMPv1/SNMPv2ccommunitynamesandstatus.Notethatthe namefieldisobscuredforsecuritypurposes:
show snmp community name
Example
enterasys(su)->show snmp community name Name = ************ Security name = public Context = default context Transport tag = Storage type = nonVolatile Status = active
Context
Usethiscommandtodisplaythe contextlistconfigurationforSNMPviewbasedaccesscontrol:
show snmp context
Example
enterasys(su)->show snmp context --- Configured contexts: default context (all mibs)
Page 21 of 27
Counters
UsethiscommandtodisplaySNMPtrafficcountervalues:
show snmp counters
Example
enterasys(su)->show snmp counters --- mib2 SNMP group counters: snmpInPkts = 396601 snmpOutPkts = 396601 snmpInBadVersions = 0 snmpInBadCommunityNames = 0 snmpInBadCommunityUses = 0 snmpInASNParseErrs = 0 snmpInTooBigs = 0 snmpInNoSuchNames = 0 snmpInBadValues = 0 snmpInReadOnlys = 0 snmpInGenErrs = 0 snmpInTotalReqVars = 403661 snmpInTotalSetVars = 534 snmpInGetRequests = 290 snmpInGetNexts = 396279 snmpInSetRequests = 32 snmpInGetResponses = 0 snmpInTraps = 0 snmpOutTooBigs = 0 snmpOutNoSuchNames = 11 snmpOutBadValues = 0 snmpOutGenErrs = 0 snmpOutGetRequests = 0 snmpOutGetNexts = 0 snmpOutSetRequests = 0 snmpOutGetResponses = 396601 snmpOutTraps = 0 snmpSilentDrops = 0 snmpProxyDrops = 0 --- USM Stats counters: usmStatsUnsupportedSecLevels = 0 usmStatsNotInTimeWindows = 0 usmStatsUnknownUserNames = 0 usmStatsUnknownEngineIDs = 0 usmStatsWrongDigests = 0 usmStatsDecryptionErrors = 0
Page 22 of 27
Engineid
UsethiscommandtodisplaySNMPengineproperties:
show snmp engineid
Example
enterasys(su)->show snmp engineid EngineId: 80:00:15:f8:03:00:e0:63:9d:b5:87 Engine Boots = 12 Engine Time = 162181 Max Msg Size = 2048
Groups
UsethiscommandtodisplaySNMPgroups:
show snmp group groupname group name
Example
enterasys(su)-> show snmp Security model = Group name = Security/user name = Storage type = Status xxxxxxx = group groupname Enterasys USM Enterasys Enterasys_user nonVolatile active
Example
enterasys(su)-> show snmp access Enterasys Group = Security model = Security level = Read View = Write View = Notify View = Context match = Storage type = Status xxxxxxxxx= Enterasys USM authPriv readView writeView "default context" (exact) nonVolatile active
Page 23 of 27
Example
enterasys(su)-> show snmp targetparams enterasys Target Parameter Name Security Name Message Proc. Model Security Level Storage type Status xxxx = = = = = = enterasys Enterasys_user USM authNoPriv nonVolatile active
Example
enterasys(su)-> show snmp targetaddr Target Address Name = Enterasys_user Tag List = IP Address = 172.29.10.1 UDP Port# = 162 Target Mask = 255.255.255.255 Timeout = 1500 Retry count = 3 Parameters = enterasys Storage type = nonVolatile Status xxxx = active
Notify
UsethiscommandtodisplaytheSNMPnotifyconfiguration:
show snmp notify
Example
enterasys(su)->show snmp notify --- SNMP notifyTable information --Notify name = 1 Notify Tag = Console Notify Type = trap Storage type = nonVolatile Status xxxxx = active Notify name Notify Tag Notify Type Storage type = = = = 2 TrapSink trap nonVolatile
Page 24 of 27
Status
xxxxx = active
Notify Filter
UsethiscommandtodisplaySNMPnotifyfilterinformation,identifyingwhichprofileswillnot receiveSNMPnotifications:
show snmp notifyfilter [profile] [subtree oid-or-mibobject] [volatile | nonvolatile]
Example
enterasys(su)->show snmp notifyfilter --- SNMP notifyFilter information --Profile = pilot1 Subtree = 1.3.6 Subtree mask Filter type = included Storage type = nonVolatile Status xxxxx = active
Notify Profile
UsethiscommandtodisplaySNMPnotifyprofileinformation:
show snmp notifyprofile [profile] [targetparam targetparam] [volatile | nonvolatile]
Example
enterasys(su)->show snmp notifyprofile area51 --- SNMP notifyProfile information --Notify Profile = area51 TargetParam = v3ExampleParams Storage type = nonVolatile Status xxxxx = active
Users
UsethiscommandtoisplaySNMPv3users:
show snmp user user
Example
enterasys(su)->show snmp user Enterasys_user EngineId xxxxxxxxxxxxxxx= Username = Auth protocol = Privacy protocol = Storage type = Status xxxxxxxxxxxxxxxxx= 80:00:15:f8:03:00:e0:63:9d:cb:89 Enterasys_user usmHMACMD5AuthProtocol usmDESPrivProtocol nonVolatile active
Page 25 of 27
Views
UsethiscommandtodisplaySNMPviews:
show snmp view viewname
Example
enterasys(su)->show snmp view readView View Name = Subtree OID = Subtree mask = View Type = Storage type = Status xxxx= readView 1 included nonVolatile active
Page 26 of 27
Revision History
Date 05-30-08 07-28-08 12-08-08 03-28-2011 Description New document. Added Enterasys registration mark. Made minor edits. Updated to include S-Series, K-Series, and minor terminiology changes.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,andanylogosassociatedtherewith,are trademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Fora
completelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx.
Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Note: For information about configuring Spanning Tree on the X-Series, refer to the X-Series Configuration Guide.
Page 1 of 29
wouldcontinuetocirculateendlesslybetweenbothswitchingdevices.WithoutSpanningTree blockingoneofthelinks,therewouldbenothingatlayer2tostopthisloopfromhappeningand unnecessarilyconsumingnetworkmemory.Asadministrator,youwouldbeforcedtomanually disableoneofthelinksbetweenSwitch1and2fortheFigure 1networktooperate. Figure 1 Redundant Link Causes a Loop in a Non-STP Network
WithSpanningTreerunningonyournetworkdevices,therewouldbenoneedforyouto manuallydisablelinks.STPwouldautomaticallyblockoneoftheredundantpaths,asshownin Figure 2,restoringasmoothdatatransferbetweenSwitch1and2andendusers.Intheeventthat theprimary(unblocked)pathfailed,STPwouldplacetheblockedpathbackintoserviceand blockthefailedlink.Whenenabled,itwoulddothisautomatically,withoutadministrative intervention. Figure 2 Loop Avoided When STP Blocks a Duplicate Path
STP Overview
EnterasysswitchdevicessupporttheSpanningTreeProtocol(STP),RapidSpanningTreeProtocol (RSTP),andMultipleSpanningTreeProtocol(MSTP)asdefinedinthefollowingstandardsand describedinthisdocument: IEEE802.1D(SpanningTreeProtocol) IEEE802.1w(RapidSpanningTreeProtocol)
Page 2 of 29
STP Overview
IEEE802.1s(MultipleSpanningTreeProtocol) IEEE802.1t(Updateto802.1D)
Note: MSTP and RSTP are fully compatible and interoperable with each other and with legacy STP.
Asdescribedpreviously,STPresolvestheproblemsofphysicalloopsinanetworkbyestablishing oneprimarypathbetweenanytwodevices.Itdoesthisbyenablingswitchingdevicestoexchange informationusingBridgeProtocolDataUnit(BPDU)messages.STPusesBPDUstodesignatea bridgeforeachswitchedLANsegment,andonerootbridgefortheSpanningTree.Theroot bridgeisthelogicalcenteroftheSpanningTreeandisusedtodeterminewhichpathstoblockand whichtoopen. IfyouarefamiliarwithSTPoperationandwishtoadjustthedefaultsinyournetwork,youcan determinethetopologyoftheSpanningTreebyadjustingthebridgepriority,portpriority,and pathcost.Thebridgepriorityassignsthebridgesrelativeprioritycomparedtootherbridges.The portpriorityassignstheportspriorityinrelationtotheotherportsonthesamebridge.Bydefault, theportcostisavalueassignedtotheportbasedonthespeedoftheport.Thefasterthespeed,the lowerthecost.Thishelpstodeterminethequickestpathbetweentherootbridgeandaspecified destination.Thesegmentattachedtotherootbridgenormallyhasapathcostofzero. EachbridgehasaBridgeIdentification(BID),whichisderivedfromthebridgesMACaddress andbridgepriority.ThebridgewiththelowestBIDbecomestherootbridge.
Page 3 of 29
STP Features
EnterasysswitchingdevicesprovideseamlessSpanningTreefunctionalityby: CreatingasingleSpanningTreefromanyarrangementofswitchingorbridgingelements. Compensatingautomaticallyforthefailure,removal,oradditionofanyswitchingdevicein anactivedatapath. Achievingportchangesinshorttimeintervals,whichestablishesastableactivetopology quicklywithminimalnetworkdisturbance. Usingaminimumamountofcommunicationsbandwidthtoaccomplishtheoperationofthe SpanningTreeProtocol. Reconfiguringtheactivetopologyinamannerthatistransparenttostationstransmittingand receivingdatapackets. ManagingthetopologyinaconsistentandreproduciblemannerthroughtheuseofSpanning TreeProtocolparameters. IncreasingsecurityandreliabilitywithSpanGuard,asdescribedbelowandin UnderstandingandConfiguringSpanGuardonpage20.
Page 4 of 29
SpanGuard
TheEnterasysSpanGuardfeaturehelpsprotectyournetworkfromtwosituationsthatcancausea DenialofServicecondition:repeatedtopologychangenotificationsandanunwantedbridgebeing insertedintoandforcingtrafficthroughthetopology. SpanGuardincreasessecurityandreliabilitybypreventingSpanningTreerespansthatcanoccur whenBPDUsarereceivedonedge(user)ports,andnotifiesnetworkmanagementthattheywere attempted. IfaSpanGuardenabledportreceivesaBPDU,itbecomeslockedandtransitionstotheblocking state.Itwillonlytransitionoutoftheblockingstateafteragloballyspecifiedtimeorwhenitis manuallyunlocked. Bydefault,SpanGuardisgloballydisabledonNSeries,SSeries,stackable,andstandaloneswitch devicesandmustbegloballyenabledtooperateonalluserports.Forconfigurationinformation, refertoUnderstandingandConfiguringSpanGuardonpage 20.
Loop Protect
TheLoopProtectfeaturepreventsorshortcircuitsloopformationcausedbyredundantpathsin yournetworkbyrequiringportstoreceivetype2BPDUs(RSTP/MSTP)onpointtopointinter switchlinks(ISLs)beforetheirstatesareallowedtobecomeforwarding.Further,ifaBPDU timeoutoccursonaport,itsstatebecomeslisteninguntilaBPDUisreceived. Inthisway,bothupstreamanddownstreamfacingportsareprotected.Whenarootoralternate portlosesitspathtotherootbridgeduetoamessageageexpiration,ittakesontheroleof designatedportandwillnotforwardtrafficuntilaBPDUisreceived.Whenaportisintendedto bethedesignatedportinanISL,itconstantlyproposesandwillnotforwarduntilaBPDUis received,andwillreverttolisteningifitfailstogetaresponse.Thisprotectsagainst misconfigurationandprotocolfailurebytheconnectedbridge. Bydefault,theLoopProtectfeatureisgloballydisabledonEnterasysswitchdevicesandmustbe globallyenabledtooperateonallports.Forconfigurationinformation,refertoUnderstanding andConfiguringLoopProtectonpage 22.
Updated 802.1t
IEEE802.1tisenabledbydefaultonEnterasysswitchdevices.ThisupdatedSpanningTree protocolsupportsmultipleSpanningTrees,moreswitchportdensityandfasterportspeeds. 802.1tincludesthefollowingupdates: Newbridgeidentifierencoding(4bitpriority,12bitsystemIDextension,48bitbridge address) Newportidentifierencoding(4bitpriority,12bitportnumber) Bridgedetectionstatemachine(foredgeportidentification) Pathcostdefaultvalues(switchbetweenoldandnewdefaultvalues)
Page 5 of 29
Page 6 of 29
Table 2
Typically,switchportsareeitherinblockingorforwardingstate.Asstatedpreviously,a forwardingportisaportthathasthelowestpathcosttotherootbridge.Aportwillneverbe placedinforwardingstateunlesstherearenoredundantlinksandSpanningTreedeterminesthat itisthebestpathtotherootbridge.Ifthenetworktopologychanges(forexample,duetoafailed linkortheadditionofanewswitchingdevicetothenetwork),theportsonaswitchwillbein listeningandlearningstates.Blockingportsareusedtopreventnetworkloops.Onceaswitch determinesthebestpathtotherootbridge,allotherportswillbeinblockingstate.Blockedports donotforwardframes,buttheystillreceiveBPDUs.Ifaswitchdeterminesthatablockedport shouldnowbethedesignatedport,itwillgointolisteningstate.ItwillcheckalltheBPDUsto makesurealoopwillnotbecreatedoncetheportgoestoforwardingstate.
MSTP Operation
MSTPmakesitpossibleforVLANswitchingdevicestousemultipleSpanningTrees,allowing trafficbelongingtodifferentVLANstoflowoverpotentiallydifferentpathswithintheLAN.It buildsupontheadvancementsofRSTPwithitsdecreasedtimefornetworkrespans.MSTPs principleobjectiveistoincreasebandwidthutilizationbyallowing: FramesassignedtodifferentVLANstofollowdifferentdataroutes PortstoblockforsomeSpanningTreesandforwardforothers EveryISLinthetopologytobeforwardingforatleastoneSpanningTree
Page 7 of 29
MST Region
AnMSTregionisagroupofdevicesthatareconfiguredtogethertoformalogicalregion.The MSTregionpresentsitselftotherestofthenetworkasasingleswitchingdevice,whichsimplifies administration.Pathcostisonlyincrementedwhentrafficentersorleavestheregion,regardless ofthenumberofdeviceswithintheregion.EachLANcanonlybeamemberofoneregion. Figure 3showsthattheMSTregionappearsasasingleswitchingdevicetoDevices1and2,but reallyconsistsofthreedevices. Figure 3 Example of an MST Region
Device 1
Device 2
MST Region
Page 8 of 29
Example
ThisexampleshowshowtodisplayMSTIconfigurationidentifierinformation.Inthiscase,this bridgebelongstoRegion1:
Enterasys->show spantree mstcfgid MST Configuration Identifier: Format Selector: Configuration Name: Revision Level: 0 Region1 88
Page 9 of 29
Figure 5
MSTI 2
3
Legend:
Physical Link Blocked VLANs
Page 10 of 29
Figure 6
Region 1
1 2
Region 2
6 8
Region 3
9
12
10
11
Master Port
Master Port
Table 3
MSTI / Region MSTI 1 in Region 1 MSTI 2 in Region 1 MSTI 1 in Region 2 MSTI 1 in Region 3 MSTI 2 in Region 3
Page 11 of 29
Specifyingactivewilldisplayinformationforport(s)thathavereceivedBPDUssinceboot. 2. 3. Ifnecessary,globallyenableSpanningTree:
set spantree stpmode ieee8021
ReviewthestatusofSpanningTreeononeormoreports:
show spantree portadmin [port port-string]
4.
Ifnecessary,reenableSpanningTreeononeormoreports:
set spantree portadmin port-string enable
Example
ThisexampleshowshowtodisplaythedevicesSpanningTreeconfiguration:
Enterasys->show spantree stats SID Spanning tree mode Designated Root Designated Root Priority Designated Root Cost Designated Root Port Root Max Age Root Hello Time Root Forward Delay Bridge ID MAC Address Bridge priority Bridge Max Age Bridge Hello Time Bridge Forward Delay Topology Change Count Time Since Top Change - 1 - enabled - 00-e0-63-6c-9b-6d - 0 - 1 - ge.5.1 - 20 sec - 2 sec
Note: By default, Spanning Tree is enabled globally on N-Series, S-Series, stackable, and standalone switch devices and enabled on all ports.
Page 12 of 29
Usethecommandsinthefollowingsectionstoadjustthesedefaults.
Note: Poorly chosen adjustments to these parameters can have a negative impact on network performance. Please refer to the IEEE 802.1D specification for guidance.
Validsidvaluesare04094.Ifnotspecified,SID0willbeassumed.
Page 13 of 29
Validpriorityvaluesare0240(inincrementsof16)with0indicatinghighpriority. Validsidvaluesare04094.Ifnotspecified,SID0willbeassumed.
Validsidvaluesare04094.Ifnotspecified,SID0willbeassumed.
Notes: Please refer to the IEEE 802.1D specification for guidance in setting appropriate cost values for your port speeds. By default, legacy path cost is disabled. Enabling the device to calculate legacy path costs affects the range of valid values that can be administratively assigned. To check the status of legacy path cost, use show spantree legacypathcost. To disable legacy path cost, if necessary use set spantree legacypathcost disable.
BPDU Interval Hello time (bridge and ports) Forward delay Maximum age time
Page 14 of 29
2. 3.
Ifnecessary,reenablebridgehellomode:
set spantree bridgehellomode enable
Setanewhellotimeinterval:
set spantree hello interval
Validintervalvaluesare110.
Ifnecessary,disablebridgehellomode:
set spantree bridgehellomode disable
Setanewhellotimeintervalforoneormoreports:
set spantree porthello port-string interval
Validintervalvaluesare10100
Validdelayvaluesare430.
Page 15 of 29
Validagingtimevaluesare640(seconds).
WhenSNMPtrapmessagingisconfiguredandthebackuprootfunctionisenabled,atrap messagewillbegeneratedwhenthebackupbecomesthenewrootofthenetwork.
Page 16 of 29
2. 3.
Ifdesired,enableedgeportdetection:
set spantree autoedge enable
Displaytheedgeportoperatingstatusofoneormoreport(s):
Page 17 of 29
Configuring MSTP
Configuring MSTP
InorderforMSTPtoprovidemultipleforwardingpaths,thefollowingmusthappen: Theconfigurationidentifiermustmatchonallbridgeswithintheregion. Allbridgesmustbewithinthesameregion. AllbridgesmustbeconnectedtoMSTPawarebridges.(Theycanbeconnectedusingashared mediasuchasarepeaterprovidedthatasingleSpanningTreedevicedoesnotresideonthat LAN).
Note: A single Spanning Tree device between two MSTP bridges will terminate the ability to have multiple forwarding paths.
Page 18 of 29
Configuring MSTP
Figure 7
Monitoring MSTP
UsethecommandsinTable 6tomonitorMSTPstatisticsandconfigurationsonNSeries,SSeries, stackable,andstandaloneswitchdevices.Youcanalsousetheshowcommandsdescribedin ReviewingandEnablingSpanningTreeonpage11toreviewinformationrelatedtoall SpanningTreeprotocolactivity. Table 6
Task Verify that MSTP is running on the device. Display the maximum configurable MSTIs allowed on the device.
Page 19 of 29
Table 6
Task
Display a list of MSTIs configured on the device. Display the mapping of one or more filtering database IDs (FIDs) to Spanning Trees. Since VLANs are mapped to FIDs, this shows to which SID a VLAN is mapped. Display the Spanning Tree ID(s) assigned to one or more VLANs. Display MST configuration identifier elements, including format selector, configuration name, revision level, and configuration digest. Display protocol-specific MSTP counter information.
What Is SpanGuard?
AsdescribedpreviouslyintheoverviewofSpanGuardonpage5,thisfeatureenablesEnterasys switchingdevicestodetectunauthorizedbridgesinyournetwork,resolvingthethreatofrepeated topologychangenotificationsornewrootbridgeannouncementscausingaDenialofService (DoS)condition.ItpreventsSpanningTreerespansthatcanoccurwhenBPDUsarereceivedon userportsandnotifiesyou(networkmanagement)theywereattempted. IfaSpanGuardenabledportreceivesaBPDU,itbecomeslockedandtransitionstotheblocking state.Itwillonlytransitionoutoftheblockingstateafteragloballyspecifiedtimeorwhenitis manuallyunlocked. Bydefault,SpanGuardisgloballydisabledonNSeries,SSeries,stackable,andstandaloneswitch devicesandmustbegloballyenabledtooperateonalluserports.Forconfigurationinformation, refertoConfiguringSpanGuardonpage 21.
Page 20 of 29
Configuring SpanGuard
UsethefollowingcommandstoconfiguredeviceportsforSpanGuard,toenabletheSpanGuard function,andtoreviewSpanGuardstatusonthedevice.
UsethiscommandtoadjusttheSpanGuardtimeoutvalue.Thissetsthelengthoftimethata SpanGuardaffectedportwillremainlocked:
set spantree spanguardtimeout timeout
Page 21 of 29
Page 22 of 29
Page 23 of 29
Figure 8
Figure 9showsthat,withoutLoopProtect,afailurecouldbeassimpleassomeoneaccidentally disablingSpanningTreeontheportbetweenSwitch2and3.Switch3sblockingporteventually transitionstoaforwardingstatewhichleadstoaloopedcondition. Figure 9 Spanning Tree Without Loop Protect
Page 24 of 29
Page 25 of 29
Defaultvalueis0,whichmeansthattrapsarenotsent.
Note: A port can become locked if a configured number of Loop Protect events occur during the configured window of time. Once a port is forced into blocking (locked), it remains locked until manually unlocked with the clear spantree lplock command. Display the Loop Protect capability of a link partner for one or more ports.
show spantree lpcapablepartner [port port-string]
Page 26 of 29
Table 8
Task
Display the reason for placing a port in a nonforwarding state due to an exceptional condition.
Example
ThefollowingexampleshowsaswitchingdevicewithLoopProtectenabledonportlag.0.2,SID 56:
Enterasys->show spantree lp port lag.0.2 sid 56 LoopProtect is enabled on port lag.0.2, SID 56 Enterasys->show spantree lplock port lag.0.2 sid 56 LoopProtect Lock status for port lag.0.2, SID 56_ is UNLOCKED Enterasys->show spantree lpcapablepartner port lag.0.2 Link partner of port lag.0.2_is LoopProtect-capable. Enterasys->show spantree nonforwardingreason port lag.0.2 Port lag.0.2 has been placed in listening or blocking state on SID 0 by the LoopProtect feature.
BID BPDU
Page 27 of 29
Table 9
Term FID
Page 28 of 29
Revision History
Date 01-16-2008 02-20-2008 07-28-2008 01-20-2009 03-14-2011 Description New document. Corrected product naming conventions. Modifications due to product branding changes. Corrected description of Spanning Tree instance capacities. Updated to include S-Series and K-Series devices.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,andanylogosassociatedtherewith,are trademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Fora
completelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx.
Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Configuring Syslog
ThisdocumentprovidesthefollowinginformationaboutconfiguringandmonitoringSyslogon EnterasysNSeries,SSeries,andKSeriesmodularswitches,ASeries,BSeries,CSeries stackablefixedswitches,andDSeries,GSeries,andISeriesstandalonefixedswitches.
For information about... What Is Syslog? Why Would I Use Syslog in My Network? How Do I Implement Syslog? Syslog Overview Syslog Operation on Enterasys Devices Syslog Components and Their Use Interpreting Messages Configuring Syslog Refer to page... 1 1 2 2 2 3 6 6
Note: For information about logging on the X-Series, refer to the X-Series Configuration Guide.
What Is Syslog?
Syslog,shortforSystemLogging,isastandardforforwardinglogmessagesinanIPnetworkthat istypicallyusedfornetworksystemmanagementandsecurityauditing.Thetermoftenappliesto boththeactualSyslogprotocol,aswellastheapplicationsendingSyslogmessages. AsdefinedinRFC3164,theSyslogprotocolisaclient/servertypeprotocolwhichenablesastation ordevicetogenerateandsendasmalltextualmessage(lessthan1024bytes)toaremotereceiver calledtheSyslogserver.MessagesaretransmittedusingUserDatagramProtocol(UDP)packets andarereceivedonUDPport514.Thesemessagesinformaboutsimplechangesinoperational statusorwarnofmoresevereissuesthatmayaffectsystemoperations.
Page 1 of 13
Syslog Overview
Developersofvariousoperatingsystems,processes,andapplicationsdeterminethecircumstances thatwillgeneratesystemmessagesandwritethosespecificationsintotheirprograms.Messages canbegeneratedtogivestatus,eitheratacertainperiodoftime,oratsomeotherinterval,suchas theinvocationorexitofaprogram.Messagescanalsobegeneratedduetoasetofconditions beingmet.Typically,developersquantifythesemessagesintooneofseveralbroadcategories, generallyconsistingofthefacilitythatgeneratedthem,alongwithanindicationoftheseverityof themessage.Thisallowssystemadministratorstoselectivelyfilterthemessagesandbepresented withthemoreimportantandtimesensitivenotificationsquickly,whilealsohavingtheabilityto placestatusorinformativemessagesinafileforlaterreview. Switchesmustbeconfiguredwithrulesfordisplayingand/orforwardingeventmessages generatedbytheirapplications.Inaddition,Syslogserversneedtobeconfiguredwith appropriaterulestocollectmessagessotheycanbestoredforfuturereference.Thisdocument willdescribehowtocompletethesekeyconfigurationstepsonNSeries,SSeries,stackable,and standaloneswitchplatforms.
Page 2 of 13
todisplaymessagesatavarietyofdifferentseveritylevelsaboutapplicationrelatederror conditionsoccurringonthedevice. Youcandecidetohaveallmessagesstoredlocally,aswellastohaveallmessagesofahigh severityforwardedtoanotherdevice.Youcanalsohavemessagesfromaparticularfacilitysentto someoralloftheusersofthedevice,anddisplayedonthesystemconsole.Forexample,youmay wantallmessagesthataregeneratedbythemailfacilitytobeforwardedtooneparticularSyslog server.Howeveryoudecidetoconfigurethedispositionoftheeventmessages,theprocessof havingthemsenttoaSyslogcollectorgenerallyconsistsof: Determiningwhichmessagesatwhichseveritylevelswillbeforwarded. Definingoneormoreremotereceivers(Syslogservers/consoledisplays).
Page 3 of 13
Table 1
Term Severity
Application
Client software applications running on devices that can generate Syslog messages.
Enterasys supported applications and their associated CLI mnemonic values include: CLI - Command Line Interface SNMP - Simple Network Management Protocol Webview - Enterasys Web-based system management System - System messages RtrFe - Router Forwarding Engine Trace - Trace logging RtrLSNat - Load Share Network Address Translation FlowLimt - Flow limiting UPN - User Personalized Networks AAA - Authentication, Authorization and Accounting Use the show logging application all command to list supported applications and the corresponding CLI numeric or mnemonic values you can use to configure application logging on your devices.
Syslog server
Enterasys devices allow up to 8 server IP addresses to be configured as destinations for Syslog messages. By default, Syslog server is globally enabled, with no IP addresses configured, at a severity level of 8.
Page 4 of 13
Figure 1
YES
YES
NO
YES
SYSTEM: Resetting DFE for loss of master module CLI: User:admin logged in from 121.20.142.190(telnet)
DefaultapplicationsettingsintheexampleinFigure 1havenotbeenmodified.Therefore,an emergencymessagetriggeredbyasystemresetduetolossofthemastermoduleisforwardedto Syslogdestinations.TheCLIrelatedmessagenotifyingthatauserhasloggedinremotelyisalso forwarded.ConfiguredSyslogserver(s)willreceiveallforwardedmessagessincetheirdefault severitythresholdisat8(acceptingmessagesatallseveritylevels). Anymessagesgeneratedbyapplicationsatseveritylevels7and8arenotforwardedinthis example.Forinstance,forwardingdoesnotoccurforanAAAauthenticationrelateddebugging messagewithinformationaboutRADIUSaccesslevelprocessingforaparticularuser.Ifatsome pointintimeitbecomesnecessary,forexample,tologallAAAauthenticationrelatedmessage activityandtosaveittoafilesoauthenticationdetailscanbetracked,theadministratorcanallow thatspecificapplicationtoforwarddebuggingmessagestoaSyslogserver,aswellastothe consoleandpersistentfilestorage. Formoreinformationonhowtoconfigurethesebasicsettings,refertoSyslogCommand Precedenceonpage7,andtheConfigurationExamplesonpage11.
Page 5 of 13
Interpreting Messages
Interpreting Messages
EverysystemmessagegeneratedbytheEnterasysswitchplatformsfollowsthesamebasicformat:
<facility/severity> time stamp address application [slot] message text
Example
ThisexampleshowsSysloginformationalmessages,displayedwiththeshowloggingbuffer command.Itindicatesthatmessagesweregeneratedbyfacilitycode16(local4)atseveritylevel5 fromtheCLIapplicationonIPaddress10.42.71.13.
Switch1(rw)->show logging buffer <165>Sep 4 07:43:09 10.42.71.13 CLI[5]User:rw logged in from 10.2.1.122 (telnet) <165>Sep 4 07:43:24 10.42.71.13 CLI[5]User: debug failed login from 10.4.1.100 (telnet)
Component
Facility/Severity
Example Code
<165> = Numerical code indicating a message from facility local4 at severity 5.
Sep
4 07:43:09
10.42.71.13 CLI (5) = Slot 5 in the chassis. User: debug failed login from 10.4.1.100 (telnet)
Configuring Syslog
Usetheproceduresinthissectiontoperformthefollowingloggingconfigurationtasks: SyslogCommandPrecedence(page7) ConfiguringSyslogServer(s)(page7) ModifyingSyslogServerDefaults(page8) ReviewingandConfiguringLoggingforApplications(page9) EnablingConsoleLoggingandFileStorage(page10) ConfigurationExamples(page11)
Page 6 of 13
Configuring Syslog
Syslog Component Command Logging defaults set logging default {[facility facility] [severity severity] [port port]}
Server settings
set logging server index ip-addr ipaddr [facility facility] [severity severity] [descr descr] [port port] state enable | disable
Application settings
Indexisavaluefrom1to8thatspecifiestheservertableindexnumberforthisserver. 2. (Optional)Verifytheserverconfiguration:
show logging server [index]
Ifindexisnotspecified,informationforallconfiguredSyslogserverswillbedisplayed.
Page 7 of 13
Configuring Syslog
Example
Thissampleoutputfromtheshowloggingservercommandshowsthattwoservershavebeen addedtothedevicesSyslogserverlist.TheseserversareusingthedefaultUDPport514toreceive messagesfromclientsandareconfiguredtologmessagesfromthelocal1andlocal2facilities, respectively.Loggingseverityonbothserversissetat5(acceptingmessagesatseveritylevels5 through1).Usingthecommandsdescribedinthenextsection,thesesettingscanbechangedona perserverbasis,orforallservers.
Switch1(rw)->show logging server IP Address Facility Severity Description Port Status ------------------------------------------------------------------------1 132.140.82.111 local1 warning(5) default 514 enabled 2 132.140.90.84 local2 warning(5) default 514 enabled
Usethefollowingcommandstochangethesesettingseitherduringorafterenablinganewserver.
Page 8 of 13
Configuring Syslog
Examples
Thisexampleshowshowtoconfiguretheswitchtoforwardmessagesfromfacilitycategorylocal6 atseveritylevels3,2,and1toSyslogserver1atIPaddress134.141.89.113:
Switch1(rw)->set logging server 1 ip-addr 134.141.89.113 facility local6 severity 3
Example
Thisexampleshowsoutputfromtheshowloggingapplicationallcommand.Anumericand mnemonicvalueforeachapplicationislistedwiththeseveritylevelatwhichlogginghasbeen configuredandtheserver(s)towhichmessageswillbesent.Inthiscase,loggingforapplications hasnotbeenchangedfromthedefaultseveritylevelof6.Thismeansthatnotificationsand messageswithseverityvalues6through1willbesenttoconfiguredservers.
Switch1(rw)->show logging application all Application Current Severity Level Server List ---------------------------------------------------------88 RtrAcl 6 1-8 89 CLI 6 1-8 90 SNMP 6 1-8 91 Webview 6 1-8 93 System 6 1-8 95 RtrFe 6 1-8 96 Trace 6 1-8 105 RtrLSNat 6 1-8 111 FlowLimt 6 1-8 112 UPN 6 1-8 117 AAA 6 1-8 118 Router 6 1-8 140 AddrNtfy 6 1-8 141 OSPF 6 1-8 142 VRRP 6 1-8 145 RtrArpProc 6 1-8 147 LACP 6 1-8 148 RtrNat 6 1-8 151 RtrTwcb 6 1-8 158 HostDoS 6 1-8 1(emergencies) 2(alerts) 3(critical)
Page 9 of 13
Configuring Syslog
4(errors) 7(information)
5(warnings) 8(debugging)
6(notifications)
Note: Mnemonic values are case sensitive and must be typed as they are listed in the show logging application command display for your device. Refer to Table 1 for sample CLI mnemonic values. Depending on your platform, you may see different applications listed from those shown in the example above.
Example
ThisexampleshowshowtosettheseveritylevelforSSH(SecureShell)to5sothatwarning conditionsandmessagesofgreaterseverity(levels5to1)generatedbythatapplicationwillbe senttoSyslogserver1.
Switch1(rw)->set logging application SSH level 5 server 1
Usethefollowingcommandstoreviewandconfigureconsoleloggingandfilestorage.
Page 10 of 13
Configuring Syslog
TodisplayloggingtothecurrentCLIconsolesessiononanNSeries,SSeries,orKSeriesdevice:
set logging here enable
ThisaddsthecurrentCLIsessiontothelistofSyslogdestinations,andwillbetemporaryifthe currentCLIsessionisusingTelnetorSSH.
Configuration Examples
Enabling a Server and Console Logging
Procedure 1showshowyouwouldcompleteabasicSyslogconfiguration.Inthisexample,the defaultapplicationseveritylevelhasnotbeenmodified,allowingallapplicationstoforward messagestoconfigureddestinations.OneSyslogserverisconfiguredonIPaddress10.1.1.2, loggingallmessages.Consoleloggingisenabled,butpersistentfilestorageisnot. Procedure 1
Step 1. 2. 3. Task Configure Syslog server 1 and accept default settings (listed in Table 4 on page 8). (Optional) Verify that application logging settings are at default values for the enabled server. Enable console logging and disable file storage.
Note: The set logging local command requires that you specify both console and file settings. For example, set logging local console enable would not execute without also specifying file enable or disable.
Page 11 of 13
Configuring Syslog
Procedure 2
Step 1. 2. 3. Task
Configure Syslog server 2 and accept default settings (listed in Table 4 on page 8). Set the severity level for the AAA application to level 8. Enable console logging and file storage.
Page 12 of 13
Revision History
Date 04-04-2008 07-28-2008 11-14-2008 03-15-2011 Description New document Modifications due to product rebranding changes. Text corrections. Added S-Series and K-Series.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,andanylogosassociatedtherewith,are trademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Fora completelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Configuring TACACS+
ThisdocumentprovidesinformationaboutconfiguringandmonitoringTACACS+(Terminal AccessControllerAccessControlSystemPlus) onEnterasysdevices.
Notes: TACACS+ is supported on most Enterasys devices, with the exception of some Enterasys fixed switches. Refer to your Enterasys devices Release Notes to determine if your device supports TACACS+. For information on Enterasys Matrix X-Series TACACS+ support, refer to the Enterasys Matrix X Secure Core Router Configuration Guide. For information about... What is TACACS+? Why Would I Use TACACS+ in My Network? How Do I Implement TACACS+? Understanding TACACS+ Configuring TACACS+ Refer to page... 1 1 2 2 3
What is TACACS+?
TACACS+,asecurityprotocoldevelopedbyCiscoSystems,canbeusedasanalternativetothe standardRADIUSsecurityprotocol(RFC2865).TACACS+runsoverTCPandencryptsthebody ofeachpacket. BasedonthenowobsoleteTACACSprotocol(definedinRFC1492),TACACS+isdefinedinan unpublishedandexpiredInternetDraftdraftgranttacacs02.txt,TheTACACS+Protocol Version1.78,January,1997.
December 2, 2010
Page 1 of 7
Understanding TACACS+
TACACS+clientfunctionalityfallsintofourbasiccapabilities: Authenticationandsessionauthorization Commandauthorization Sessionaccounting Commandaccounting
December 2, 2010
Page 2 of 7
Configuring TACACS+
Configuring TACACS+
Default Settings
Table 1liststheTACACS+parameters(asdisplayedthroughtheshow tacacscommand)and theirdefaultvalues. Table 1 TACACS+ Parameters
Description Whether the TACACS+ client is enabled or disabled. The name of the service that is requested by the TACACS+ client for session authorization. The attribute-value pairs that are mapped to the read-only, read-write, and super-user access privilege levels for the service requested for session authorization. The TACACS+ client sends session accounting information, such as start and stop times, to a TACACS+ server for logging. The TACACS+ client checks with a TACACS+ server whether each command is permitted for that authorized session. The TACACS+ client sends command accounting information, such as the command string and IP address of the remote user, to a TACACS+ server for logging. The TACACS+ client sends multiple requests to a TACACS+ server over a single TCP connection. The period of time (in seconds) the device waits for a response from the TACACS+ server before it times out and declares an error. Default Value Disabled exec read-only: priv-lvl, 0 read-write: priv-lvl, 1 super-user: priv-lvl, 15 Disabled
Parameter TACACS+ state TACACS+ service TACACS+ session authorization A-V pairs TACACS+ session accounting state TACACS+ command authorization state TACACS+ command accounting state TACACS+ singleconnect state TACACS+ Server Timeout
Disabled
Disabled
Disabled 10 seconds
December 2, 2010
Page 3 of 7
Configuring TACACS+
Procedure 1
Step 1. Task
TACACS+ Configuration
Command(s) set tacacs enable
Enable the TACACS+ client. To disable the TACACS+ client, use the set tacacs disable command.
2.
Configure the TACACS+ servers, up to a maximum of eight, to be used by the TACACS+ client. Define the IP address, TCP port, and secret for each server. Optionally, change the timeout for each server from the default, 10 seconds. Possible timeout values are 130 seconds. To remove one or all configured TACACS+ servers, or return the timeout value to its default value for one or all configured TACACS+ servers, use the clear tacacs server {all | index} [timeout] command.
set tacacs server {index [ipaddress port secret]] | all timeout seconds}
3.
Optionally, enable session accounting. To disable TACACS+ session accounting, use the set tacacs session accounting disable command.
4.
Optionally, configure the TACACS+ session authorization service or access level. The default service name is exec. Refer to Table 1 on page 3 for the default values of the access level attribute-value pairs. To return the TACACS+ session authorization settings to their default values, use the clear tacacs session authorization {[service] [read-only] [read-write] [superuser]} command.
set tacacs session {authorization service name | read-only attribute value | read-write attribute value | super-user attribute value}
5.
Optionally, enable per-command accounting. To disable TACACS+ accounting on a per-command basis, use the set tacacs command accounting disable command.
6.
Optionally, enable per-command authorization. To disable TACACS+ authorization on a per-command basis, use the set tacacs command authorization disable command.
December 2, 2010
Page 4 of 7
Configuring TACACS+
Procedure 1
Step 7. Task
Optionally, enable the TACACS+ client to send multiple requests to the server over a single TCP connection. To disable the use of a single TCP connection, use the set tacacs singleconnect disable command.
8.
If not already configured, set the primary login authentication method to TACACS+.
RefertothedevicesCLIReferenceorConfigurationGuide,asappropriate,formoreinformation abouteachcommand.
December 2, 2010
Page 5 of 7
RefertothedevicesCLIReferenceorConfigurationGuide,asappropriate,formoreinformation abouteachcommand.
Configuring TACACS+
Revision History
Date 11-06-08 12-02-10 Description New document Revised to include additional Enterasys devices
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2010Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSNETSIGHT,SECURESTACK, ENTERASYSSECURESTACK,LANVIEW,WEBVIEW,andanylogosassociatedtherewith,aretrademarksor registeredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Foracompletelistof Enterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
December 2, 2010
Page 7 of 7
Page 1 of 14
TWCB Overview
Notes: TWCB is currently only supported for N-Series products. TWCB is an advanced routing feature that must be enabled with a license key. If you have purchased an advanced license key, and have enabled routing on the device, you must activate your license as described in the configuration guide that comes with your Enterasys Matrix DFE or NSA product in order to enable the TWCB command set. If you wish to purchase an advanced routing license, contact Enterasys Networks Sales. A minimum of 256 MB of memory is required on all modules in order to enable TWCB. See the SDRAM field of the show system hardware command to display the amount of memory installed on a module. Module memory can be upgraded to 256 MB using the DFE-256MB-UGK memory kit.
ATWCBconfigurationismadeupofoneormorecacheserversthatarelogicallygroupedina serverfarmandoneormoreserverfarmsthatareassociatedwithawebcache.ThecurrentTWCB implementationsupportsasinglewebcache. Figure 1onpage 3providesanoverviewofaTWCBconfiguration.Inouroverview,Cache1isthe nameofthewebcache.Itismadeupoftwoserverfarms:s1Serverands2Server.Thes1Server serverfarmisconfiguredwith2cacheserversfromthe186.89.0.0subnet.Thes2Serverserver farmisconfiguredwith5cacheserversfromthe176.89.0.0subnet.Webobjectsforeachenduser arecachedonacacheserver.
Page 2 of 14
TWCB Overview
Figure 1
186.89.10.51 186.89.10.55 Server Farms s2Server Cache Servers 176.89.10.20 176.89.10.32 176.89.10.45 176.89.10.50 176.89.10.52
TheNSeriesrouterdoesnotactasacacheforwebobjects;rather,itredirectsHTTPrequeststo localserversonwhichwebobjectsarecached.Thecacheserversshouldhaveawebbasedproxy cacherunning.TheSquidapplicationisanexampleofawebbasedproxycache. Inourexample,auseronthe10.10.10.0/24subnetmakesawebrequestfromthewebsitehost.The response,containingthewebobject,issenttoboththerequestinguserandacacheforthat enduserthatresidesonacacheserver. Therouterselectsacacheservertocachethewebobjectsforeachenduser.Oncecreated,allweb objectsforthatenduserwillbesenttothatcacheunlesstheenduserisamemberofapredictor roundrobinlistassociatedwithaserverfarm.Webobjectsthatbelongtomembersofapredictor roundrobinlistareloadbalancedacrossallthecacheserversconfiguredforthatserverfarm. Enduserswithparticularlyheavywebusageshouldbelongtoapredictorroundrobinlistto avoidoverwhelmingtheresourcesofasinglecacheserver. Onceawebobjectresidesinthecache,anyfuturerequestsforthatwebobjectwillbehandledby thecacheserveruntilthecacheentryexpires.Cacheentryexpirationisconfiguredinthe webbasedproxycacheapplicationinstalledonthecacheserver. TherearefivecomponentsinaTWCBconfiguration: Theserverfarm Thecacheserver Thewebcache Theoutboundinterface Theswitchandrouter
Page 3 of 14
TWCB Overview
Youcreateaserverfarmbynamingit.Uponnamingaserverfarm,youareplacedinwebcache serverfarmconfigurationmode.Withinthiscommandmodeyoucanassociateupto128 cacheserversacrossallserverfarms.Thecacheserveristhephysicalserveronwhichtheenduser cacheiscreated. Thedefaultbehaviorisfortheroutertoselectacacheserveronwhichasinglecacheperenduser willreside.Allwebobjectscachedforthatenduserwillusethatsinglecache.Thisdefault behaviorissufficientforenduserswithmoderateorlightwebusage.Shouldasinglecacheserver beassociatedwithoneormoreheavywebusers,cacheserverresourcescaneasilybe overwhelmed.Thepredictorroundrobinloadbalancingfeaturehelpsaddressthisissue. InFigure 2weseehowanenduser,configuredforstandardcaching,onlyaccessescachedweb objectsfromthecacheserverwhereitscacheresides.Inthiscase,theendusercacheresidesonthe s1Serverserverfarm186.89.10.51cacheserver.Thes2Serverserverfarmisconfiguredwitha predictorroundrobinlist.Eachlistmemberhasitswebobjectscachedacrossallthecacheservers onthes2Serverserverfarm. Figure 2 Predictor Round-Robin Overview
Cache1 s1Server
186.89.10.51 186.89.10.55 Server Farms s2Server Cache Servers Router 176.89.10.20 176.89.10.32 176.89.10.45 176.89.10.50 176.89.10.52 Global Internet
Page 4 of 14
TWCB Overview
Onceacacheserverisconfigured,youmustplaceitinserviceforthecacheservertobeactiveon theserverfarm.
The Web-Cache
Thewebcacheisalogicalentityinwhichallserverfarmsreside.ThecurrentTWCB implementationsupportsasinglewebcache.Youcreateawebcachebynamingitinrouter configurationcommandmode.Onceentered,youareplacedinTWCBwebcacheconfiguration commandmode.OnceinTWCBwebcacheconfigurationcommandmode,youcan: Addupto5serverfarmstoawebcache. OptionallyspecifyanonstandardportfortheredirectionofHTTPrequests.OutboundHTTP requestsaredirectedtoport80bydefault. CreatebypasslistscontainingarangeofhostwebsitesforwhichHTTPrequestsarenot redirectedtothecacheserversforthiswebcache.SomewebsitesrequiresourceIPaddress authenticationforuseraccess.HTTPrequestsforthesesitescannotberedirectedtothecache servers.TWCBwillnotbeenabledforHTTPrequeststothesehostwebsiteswhenconfigured asmembersofabypasslist. SpecifytheenduserswhoseHTTPrequestsareorarenotredirectedtothecacheserver. EnduserspermittedredirectiontakepartinTWCB.Endusersdeniedredirectiondonottake partinTWCB.Allendusersarepermittedredirectionbydefault.
Page 5 of 14
TWCB Overview
Placethewebcacheinservice.Atleastonecacheservermustbeinservicebeforeyoucan placeawebcacheinservice.
UsetheshowiptwcbconnscommandtodisplayactiveTWCBflowsforthisdevice.
Page 6 of 14
Configuring TWCB
Configuring TWCB
ThissectionprovidesdetailsfortheconfigurationofTWCBontheNSeriesproducts.
For information about... Configuring the Server Farm Configuring the Cache Server Configuring the Web-Cache Configuring the Outbound Interface Configuring the Switch and Router Displaying TWCB Statistics Refer to page... 8 8 9 9 9 10
ping.
ping-int
5 seconds
ping-retries
app-int
15 seconds
app-retries
maxconns
5000
http-port
80.
Page 7 of 14
Configuring TWCB
Table 1
Parameter twcb-bindings
twcb-cache twcb-configs
2000 1
4.
5.
inservice
Page 8 of 14
Configuring TWCB
Add the specified server farm to this web-cache. serverfarm serverfarm-name Optionally redirect outbound HTTP requests to a non-standard HTTP port number. Optionally specify web host sites for which HTTP requests are not redirected to the cache servers. Optionally permit or deny redirection of HTTP requests for the list of end-users to this web-cache. Place this web-cache in service. http-port port-number bypass-list range begin-ip-address end-ip-address hosts {permit | deny} redirect range begin-ip-address end-ip-address inservice
5.
6.
2.
Page 9 of 14
Page 10 of 14
Figure 3
Cache1 s1Server
186.89.10.51 186.89.10.55 VLAN 100 Server Farms s2Server Cache Servers 176.89.10.20 Router Web Site Host Global Internet
Configuretheendusersthatwillusethisserverfarmbysettingtheroundrobinpredictor ranges:
Matrix>Router(config-twcb-wcsfarm)#predictor roundrobin 10.10.10.01 10.10.10.15 Matrix>Router(config-twcb-wcsfarm)#predictor roundrobin 20.10.10.25 20.10.10.60 Matrix>Router(config-twcb-wcsfarm)#
Configurecacheserver186.89.10.51:
Matrix>Router(config-twcb-wcsfarm)#cache 186.89.10.51 Matrix>Router(config-twcb-cache)#faildetect type ping Matrix>Router(config-twcb-cache)#faildetect ping-int 4 Matrix>Router(config-twcb-cache)#faildetect ping-retries 5 Matrix>Router(config-twcb-cache)#maxconns 800 Matrix>Router(config-twcb-cache)#inservice
Page 11 of 14
Matrix>Router(config-twcb-cache)#exit Matrix>Router(config-twcb-wcsfarm)#
Configurecacheserver186.89.10.55:
Matrix>Router(config-twcb-wcsfarm)#cache 186.89.10.55 Matrix>Router(config-twcb-cache)#faildetect type ping Matrix>Router(config-twcb-cache)#faildetect ping-int 4 Matrix>Router(config-twcb-cache)#faildetect ping-retries 5 Matrix>Router(config-twcb-cache)#maxconns 800 Matrix>Router(config-twcb-cache)#inservice Matrix>Router(config-twcb-cache)#exit Matrix>Router(config-twcb-wcsfarm)#exit Matrix>Router(config)#
Configurecacheserver176.89.10.20:
Matrix>Router(config-twcb-wcsfarm)#cache 176.89.10.20 Matrix>Router(config-twcb-cache)#faildetect type app Matrix>Router(config-twcb-cache)#faildetect app-int 12 Matrix>Router(config-twcb-cache)#faildetect app-retries 5 Matrix>Router(config-twcb-cache)#maxconns 800 Matrix>Router(config-twcb-cache)#inservice Matrix>Router(config-twcb-cache)#exit Matrix>Router(config-twcb-wcsfarm)#exit Matrix>Router(config)#
Page 12 of 14
Configuretheoutboundinterfacethatconnectswiththeinternet:
Matrix>Router(config)#interface vlan 100 Matrix>Router(config-if(Vlan 1))#ip twcb cache1 redirect out Matrix>Router(config-if(Vlan 1))#end Matrix>Router#
Clearthestatisticaldataforthiswebcache:
Matrix(rw)->Router#clear ip twcb statistics
ThiscompletestheTWCBconfigurationexample.
Page 13 of 14
Revision History
Date 09/24/2008 04/16/2009 Description New document Input an advanced routing license notice that includes the 256 MB memory requirement on all modules statement.
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2009Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSMATRIX,ENTERASYSNETSIGHT,LANVIEW, WEBVIEW,andanylogosassociatedtherewith,aretrademarksorregisteredtrademarksof Enterasys Networks, Inc.,intheUnitedStatesandothercountries.ForacompletelistofEnterasystrademarks,see http://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.
Configuring VLANs
Thisdocumentprovidesthefollowinginformationaboutconfiguringandmonitoring802.1Q VLANsonEnterasysNSeries,SSeries,KSeries,andXSeriesmodularswitches,ASeries,B Series,CSeriesstackablefixedswitches,andDSeries,GSeries,andISeriesstandalonefixed switches.
For information about... What Is a VLAN? Why Would I Use VLANs in My Network? How Do I Implement VLANs? Understanding How VLANs Operate VLAN Support on Enterasys Switches Configuring VLANs Terms and Definitions Refer to page... 1 1 3 3 6 9 18
Note: This document describes the configuration and operation of VLANs as defined by the IEEE 802.1Q standard and assumes that all devices being configured support that standard. No other types of VLANs will be covered.
What Is a VLAN?
AVLANisaVirtualLocalAreaNetworkagroupingofnetworkdevicesthatislogically segmentedbyfunctions,projectteams,orapplicationswithoutregardtothephysicallocationof users.Forexample,severalendstationsmightbegroupedasadepartment,suchasEngineering orFinance,havingthesameattributesasaLAN,eventhoughtheyarenotallonthesamephysical LANsegment. Toaccomplishthislogicalgrouping,thenetworkadministratoruses802.1QVLANcapable switchingdevicesandassignseachswitchportinaparticulargrouptoaVLAN.PortsinaVLAN sharebroadcasttrafficandbelongtothesamebroadcastdomain.BroadcasttrafficinoneVLANis nottransmittedoutsidethatVLAN.
Theprimarybenefitof802.1QVLANtechnologyisthatitallowsyoutolocalizeandsegregrate traffic,improvingyouradministrativeefficiency,andenhancingyournetworksecurityand performance. Figure 1showsasimpleexampleofusingportbasedVLANstoachievethesebenefits.Inthis example,twobuildingshousetheSalesandFinancedepartmentsofasinglecompany,andeach buildinghasitsowninternalnetwork.Theendstationsineachbuildingconnecttoaswitchonthe bottomfloor.Thetwoswitchesareconnectedtooneanotherwithahighspeedlink. Figure 1 VLAN Business Scenario
Building One
Building Two
F
10 9
A
S
trunk
7 6
SmartSwitch
Member of Sales Network
F
SmartSwitch
Member of Finance Network
WithoutanyVLANsconfigured,theentirenetworkintheexampleinFigure 1wouldbea broadcastdomain,andtheswitcheswouldfollowtheIEEE802.1Dbridgingspecificationtosend databetweenstations.AbroadcastormulticasttransmissionfromaSalesworkstationinBuilding OnewouldpropagatetoalltheswitchportsonSwitchA,crossthehighspeedlinktoSwitchB, andthenbepropagatedoutallswitchportsonSwitchB.Theswitchestreateachportasbeing equivalenttoanyotherport,andhavenounderstandingofthedepartmentalmembershipsof eachworkstation. OnceSalesandFinanceareplacedontwoseparateVLANs,eachswitchunderstandsthatcertain individualportsorframesaremembersofseparateworkgroups.Inthisenvironment,abroadcast ormulticastdatatransmissionfromoneoftheSalesstationsinBuildingOnewouldreachSwitch A,besenttotheportsconnectedtootherlocalmembersoftheSalesVLAN,crossthehighspeed linktoSwitchB,andthenbesenttoanyotherportsandworkstationsonSwitchBthatare membersoftheSalesVLAN.SeparateVLANsalsoprovidesunicastseparationbetweenSalesand Finance.FinancecannotpingSalesunlessthereisaroutedVLANconfiguredforbothFinanceand Sales. AnotherbenefittoVLANuseintheprecedingexamplewouldbeyourabilitytoleverageexisting investmentsintimeandequipmentduringcompanyreorganization.If,forinstance,theFinance userschangelocationbutremaininthesameVLANconnectedtothesameswitchport,their networkaddressesdonotchange,andswitchandrouterconfigurationisleftintact.
Page 2 of 20
Page 3 of 20
Untagged Frames
When,forexample,theswitchreceivesaframefromPort1anddeterminestheframedoesnot currentlyhaveaVLANtag,butrecognizesthatPort1isamemberofVLANA,itwillclassifythe frametoVLANA.Inthisfashion,alluntaggedframesenteringaVLANswitchassume membershipinaVLAN.
Note: A VLAN ID is always assigned to a port. By default, it is the default VLAN (VLAN ID = 1).
Theswitchwillnowdecidewhattodowiththeframe,asdescribedinForwardingDecisionson page5.
Tagged Frames
When,forexample,theswitchreceivesataggedframefromPort4anddeterminestheframeis taggedforVLANC,itwillclassifyittothatVLANregardlessofitsportVLANID(PVID).This framemayhavealreadybeenthroughaVLANawareswitch,ororiginatedfromastationcapable ofspecifyingaVLANmembership.Ifaswitchreceivesaframecontainingatag,theswitchwill classifytheframeinregardtoitstagratherthanthePVIDforitsport,followingtheingress precedenceruleslistedbelow.
Page 4 of 20
Ingress Precedence
VLANassignmentforreceived(ingress)framesisdeterminedbythefollowingprecedence: 1. 2. 3. 802.1QVLANtag(taggedframesonly). PolicyorTrafficClassification(whichmayoverwritethe802.1QVLANtag).Formore information,refertoConfiguringProtocolBasedVLANClassificationonpage 16. PortVLANID(PVID).
Forwarding Decisions
VLANforwardingdecisionsfortransmittingframesisdeterminedbywhetherornotthetraffic beingclassifiedisorisnotintheVLANsforwardingdatabaseasfollows: Unlearnedtraffic:WhenaframesdestinationMACaddressisnotintheVLANsforwarding database(FDB),itwillbeforwardedoutofeveryportontheVLANsegresslistwiththe frameformatthatisspecified.RefertoBroadcasts,Multicasts,andUnlearnedUnicasts belowforanexample. Learnedtraffic:WhenaframesdestinationMACaddressisintheVLANsforwarding database,itwillbeforwardedoutofthelearnedportwiththeframeformatthatisspecified. RefertoLearnedUnicastsbelowforanexample.
Learned Unicasts
WhenaVLANswitchreceivesaframewithaknownMACaddressasitsdestinationaddress,the actiontakenbytheswitchtodeterminehowtheframeistransmitteddependsontheVLAN,the VLANassociatedFID,andiftheportidentifiedtosendtheframeisenabledtodoso. Whenaframeisreceived,itisclassifiedintoaVLAN.Thedestinationaddressislookedupinthe FIDassociatedwiththeVLAN.Ifamatchisfound,itisforwardedouttheportidentifiedinthe lookupif,andonlyif,thatportisallowedtotransmitframesforthatVLAN.Ifamatchisnot found,thentheframeisfloodedoutallportsthatareallowedtotransmitframesbelongingtothat VLAN.
Page 5 of 20
Figure 2
A FID 2 D FID 3
B FID 2 E FID 4
Port 4
Port 5
Port 6
AssumeaunicastuntaggedframeisreceivedonPort3intheexampleinFigure 2.Theframeis classifiedforVLANC(theframesPVIDisVLANC).Theswitchwouldmakeitsforwarding decisionbycomparingthedestinationMACaddresstoinformationpreviouslylearnedand enteredintoitsfilteringdatabase.Inthiscase,theMACaddressislookedupintheFDBforFID3, whichisassociatedwithVLANsCandD.LetssaytheswitchrecognizesthedestinationMACof theframeasbeinglocatedoutPort4. HavingmadetheforwardingdecisionbasedonentriesintheFID,theswitchnowexaminesthe portVLANegresslistofPort4todetermineifitisallowedtotransmitframesbelongingtoVLAN C.Ifso,theframeistransmittedoutPort4.IfPort4hasnotbeenconfiguredtotransmitframes belongingtoVLANC,theframeisdiscarded. If,ontheotherhand,aunicastuntaggedframeisreceivedonPort5,itwouldbeclassifiedfor VLANE.Port5hasisownfilteringdatabaseandisnotawareofwhataddressinginformationhas beenlearnedbyotherVLANs.Port5looksupthedestinationMACaddressinitsFID.Ifitfindsa match,itforwardstheframeouttheappropriateport,ifandonlyif,thatportisallowedto transmitframesforVLANE.Ifamatchisnotfound,theframeisfloodedoutallportsthatare allowedtotransmitVLANEframes.
Configurable Range
TheallowableuserconfigurablerangeforVLANIDs(VIDs)is: From2through4094onNSeries,SSeries,KSeries,andXSeriesswitches
Page 6 of 20
From2through4093forstackableandstandaloneswitches
VLAN Types
EnterasysswitchessupporttrafficclassificationforthefollowingVLANtypes:
Port-Based VLANs
PortbasedVLANsareconfiguredbyassociatingswitchportstoVLANsintwoways:first,by manipulatingtheportVLANID(PVID);andsecond,byaddingtheportitselftotheegresslistof theVLANcorrespondingtothePVID.AnytrafficreceivedbyaportisassociatedtotheVLAN identifiedbytheportsPVID.Byvirtueofthisassociation,thistrafficmayegresstheswitchonly onthoseportslistedontheVLANsegresslist.Forexample,givenaVLANnamedMarketing, withanIDvalueof6,bychangingthePVIDvaluesofports1through3to6,andaddingthose portstotheegresslistoftheVLAN,weeffectivelyrestrictthebroadcastdomainofMarketingto thosethreeports.Ifabroadcastframeisreceivedonport1,itwillbetransmittedoutports2and3 only.Inthissense,VLANmembershipisdeterminedbythelocationoftrafficingress,andfrom theperspectiveoftheaccesslayerwhereusersaremostcommonlylocatedegressisgenerally untagged.
Policy-Based VLANs
RatherthanmakingVLANmembershipdecisionssimplybasedonportconfiguration,each incomingframecanbeexaminedbytheclassificationenginewhichusesamatchbasedlogicto assigntheframetoadesiredVLAN.Forexample,youcouldsetupapolicywhichdesignatesall emailtrafficbetweenthemanagementofficersofacompanytoaspecificVLANsothatthistraffic isrestrictedtocertainportionsofthenetwork.Withrespecttonetworkusage,theadministrative advantagesofpolicyclassificationwouldbeapplicationprovisioning,acceptableusepolicy,and distributionlayerpolicy.Alloftheseprovisionsmayinvolvesimultaneousutilizationofinter switchlinksbymultipleVLANs,requiringparticularattentiontotagged,forbidden,and untaggedegresssettings.
Page 7 of 20
Formoreinformation,refertothePolicyClassificationchapterinyourdevicesconfiguration guideortheConfiguringPolicyFeatureGuide.
How It Works
WhenaVLANisdeclared,theinformationistransmittedoutGVRPconfiguredportsonthe deviceinaGARPformattedframeusingtheGVRPmulticastMACaddress.Aswitchthatreceives thisframeexaminestheframeandextractstheVLANIDs.GVRPthendynamicallyregisters (creates)theVLANsandaddsthereceivingporttoitstaggedmemberlistfortheextractedVLAN IDs.TheinformationisthentransmittedouttheotherGVRPconfiguredportsofthedevice. Figure 3showsanexampleofhowVLANBluefromendstationAwouldbepropagatedacrossa switchnetwork.Inthisfigure,port1ofSwitch4isregisteredasbeingamemberofVLANBlue andSwitch4declaresthisfactoutallitsports(2and3)toSwitch1andSwitch 2.Thesetwo switchesregisterthisintheportegresslistsoftheports(Switch1,port1andSwitch2,port1)that receivedtheframeswiththeinformation.Switch2,whichisconnectedtoSwitch3andSwitch5 declaresthesameinformationtothosetwoswitchesandtheportegresslistofeachportis updatedwiththenewinformation,accordingly.
Page 8 of 20
Configuring VLANs
Figure 3
R 2 D
D 3
D 3 D
Switch 4 1
End Station A
Switch 5
R D
Note: If a port is set to forbidden for the egress list of a VLAN, then the VLANs egress list will not be dynamically updated with that port.
Configuring VLANs
OnceyouhaveplannedyourimplementationstrategyasdescribedinPreparingforVLAN Configurationonpage 3,youcanbeginconfiguringVLANsasdescribedinthissection.The followinginformationforconfiguringVLANsonanEnterasysswitchwillbecovered: PlatformSpecificDifferences(page10) DefaultSettings(page11) ConfiguringStaticVLANs(page12) CreatingaSecureManagementVLAN(page14) ConfiguringDynamicVLANs(page15) ConfiguringProtocolBasedVLANClassification(page16)
Page 9 of 20
Configuring VLANs
ThisconventionisdifferentfromotherEnterasysswitchplatforms,wheretheformatinthis instancewouldbevlanvlan_id.
VLAN Constraints
VLANconstraintsisaNSeries,SSeries,andKSeriesplatformfeaturethatcontrolsthefiltering databasetowhichVLANsareallowedtobelong.ThisfeatureisnotsupportedonXSeries, stackable,orstandaloneswitchplatforms.
Protected Ports
ProtectedPortsisafeaturesupportedonthestackableandstandaloneswitchplatformsthatis usedtopreventportsfromforwardingtraffictoeachother,evenwhentheyareonthesame VLAN.Portscanbedesignatedaseitherprotectedorunprotected.Portsareunprotectedby default.Multiplegroupsofprotectedportsaresupported. Portsthatareconfiguredtobeprotected: Cannotforwardtraffictootherprotectedportsinthesamegroup,regardlessofhavingthe sameVLANmembership. Canforwardtraffictoportswhichareunprotected(notlistedinanygroup). Canforwardtraffictoprotectedportsinadifferentgroup,iftheyareinthesameVLAN.
Page 10 of 20
Configuring VLANs
Default Settings
Table 1listsVLANparametersandtheirdefaultvalues. Table 1 Default VLAN Parameters
Description Configures the three GARP timers. The setting is critical and should only be done by someone familiar with the 802.1Q standard. Enables or disables the GARP VLAN Registration Protocol (GVRP) on a specific set of ports or all ports. GVRP must be enabled to allow creation of dynamic VLANs. Ports can be set to discard frames based on whether or not they contain a VLAN tag. When enabled on a port, the VLAN IDs of incoming frames are compared to the ports egress list. If the received VLAN ID does not match a VLAN ID on the ports egress list, the frame is dropped. 802.1Q VLAN/port association. Prevents ports from forwarding traffic to each other, even when they are on the same VLAN. Configures VLANs to use an independent or shared filtering database. Enables or disables dynamic egress processing for a given VLAN. Configures the egress ports for a VLAN and the type of egress for the ports. Egress type can be tagged, untagged, or forbidden. Associates a text name to one or more VLANs. Default Value Join timer: 20 centiseconds Leave timer: 60 centiseconds Leaveall timer: 1000 centiseconds Disabled at the port level Enabled at the global level Note: The N-Series has GVRP enabled at the port level and enabled globally. No frames are discarded
GVRP
port discard
Enabled
port vlan ID (PVID) protected port (Applies to stackable and standalone switches only.) vlan constraint (Applies to N-Series, SSeries, K-Series only.) vlan dynamicegress vlan egress
vlan name
None
Page 11 of 20
Configuring VLANs
4. 5.
set vlan name vlan-id string set port vlan port-string vlan-id
Note: If the VLAN specified has not already been created, the set port vlan command will create it. It will also add the VLAN to the ports egress list as untagged, and remove the default VLAN from the ports egress list. This automatically changes the existing untagged VLAN egress permission to match the new PVID value. 6. Configure VLAN egress, which determines which ports a frame belonging to the VLAN may be forwarded out on. Static configuration: Add the port to the VLAN egress list for the device. The default setting, tagged, allows the port to transmit frames for a particular VLAN. The untagged setting allows the port to transmit frames without a VLAN tag. This setting is usually used to configure a port connected to an end user device. The forbidden setting prevents the port from participating in the specified VLAN and ensures that any dynamic requests for the port to join the VLAN will be ignored. If necessary, remove ports from the VLAN egress list. If specified, the forbidden setting will be cleared from the designated ports and the ports will be reset as allowed to egress frames, if so configured by either static or dynamic means. set vlan egress vlan-id portstring forbidden | tagged | untagged
Page 12 of 20
Configuring VLANs
Procedure 1
Step Task
6. (cont) If forbidden is not specified, tagged and untagged egress settings will be cleared from the designated ports. Dynamic configuration: By default, dynamic egress is disabled on all VLANs. If dynamic egress is enabled for a VLAN, the device will add the port receiving a frame to the VLANs egress list as untagged according to the VLAN ID of the received frame. 7. (Applies to N -Series, S-Series, K-Series only.) Optionally, set VLAN constraints to control the filtering database a VLAN will use for forwarding traffic. Filtering databases can be shared or independent. By default, filtering databases are independent. Optionally, enable ingress filtering on a port to drop those incoming frames that do not have a VLAN ID that matches a VLAN ID on the ports egress list. Optionally, choose to discard tagged or untagged, (or both) frames on selected ports. Select none to allow all frames to pass through. (Applies to stackable and standalone switches only.) Optionally, configure protected ports. This prevents ports from forwarding traffic to each other, even when they are on the same VLAN. The group-id value identifies the assigned ports and can range from 0 to 2. You can also set a protected port group name of up to 32 characters in length. 11. If the device supports routing, enter router configuration mode and configure an IP address on the VLAN interface, as shown in the following sub-steps: 11a. X-Series configuration: router configure interface vlan.1.vlan_id ip address ip-address/maxlen no shutdown Stackable /Standalone configuration: router enable configure terminal interface vlan vlan_id ip address ip-address ip-mask no shutdown set vlan dynamicegress vlan-id {enable | disable}
8.
9.
set port discard port-string {tagged | untagged | none | both} set port protected port-string group-id
10.
11b.
Page 13 of 20
Configuring VLANs
Procedure 1
Step 11c. Task
Note: Each VLAN interface must be configured for routing separately using the interface command shown above. To end configuration on one interface before configuring another, type exit at the command prompt. Enabling interface configuration mode is required for completing interface-specific configuration tasks.
Example Configuration
ThefollowingshowsanexampleSSeriesdeviceconfigurationusingthestepsinProcedure 1.In thisexample,VLAN100iscreatedandnamedVLANRED.Portsge.1.2,1.3and1.4areassignedto VLAN100andaddedtoitsegresslist.VLAN100isthenconfiguredasaroutinginterfacewithan IPaddressof120.20.20.24.
Note: Refer to Procedure 1to determine which platform-specific commands may apply to your device when following this example configuration. Switch1(su)->set vlan create 100 Switch1(su)->set vlan name 100 VLANRED Switch1(su)->set port vlan ge.1.2-4 100 The PVID is used to classify untagged frames as they ingress into a given port. Would you like to add the selected port(s) to this VLAN's untagged egress list and remove them from all other VLANs untagged egress list (y/n) [n]? NOTE: Choosing 'y' will not remove the port(s) from previously configured tagged egress lists. y Switch1(su)->configure terminal Switch1(su-config)->interface vlan 100 Switch1(su-config-intf-vlan.0.100)->ip address 120.20.20.1/24 Switch1(su-config-intf-vlan.0.100)->no shutdown
IfyouwanttoconfigureaporttodropincomingframesthatdonothaveaVLANIDthatmatches aVLANIDontheportsegresslist,usethesetportingressfiltercommand.Forexample:
Switch1(su)->set port ingress-filter ge.1.2-4 enable
Ifyouwanttoconfigureaporttodiscardtaggedoruntaggedincomingframes,usethesetport discardcommand.Forexample,toconfiguretheportstodroptaggedframesoningress:
Switch1(su)->set port discard ge.1.2-4 tagged
Page 14 of 20
Configuring VLANs
Procedure 2
Step 1. 2. 3. 4. Task
(Applies to X-Series only.) Configure the ports to be used as switch ports. Create a new VLAN. Set the PVID for the host port and the desired switch port to the VLAN created in Step 2. If not done automatically when executing the previous command, add the host port and desired switch port(s) to the new VLANs egress list. Set a private community name to assign to this VLAN for which you can configure access rights and policies.
5.
Note: By default, community namewhich determines remote access for SNMP managementis set to public with read-write access. For more information, refer to your devices SNMP documentation.
Procedure 3
Step 1. Task
Show existing GVRP configuration for a port or list of ports. If no port-string is entered, the global GVRP configuration and all port GVRP configurations are displayed. If necessary, enable GVRP on those ports assigned to a VLAN. You must specifically enable GVRP on ports, since it is disabled on ports by default. Display the existing GARP timer values.
2.
3.
Page 15 of 20
Configuring VLANs
Procedure 3
Step 4. Task
Optionally, set the GARP join, leave, and leaveall timer values. Each timer value is in centiseconds.
Caution: The setting of GARP timers is critical and should only be changed by personnel familiar with 802.1Q standards.
Procedure 4
Step 1. 2. 3. Task
(Applies to X-Series only.) Configure the ports to be used as switch ports. Create the VLANs to which frames will be assigned by the policy. Valid values are 14094. Configure VLAN egress, which determines which ports a frame belonging to the VLAN may be forwarded out on. The default setting, tagged, allows the port to transmit frames for a particular VLAN. Disable ingress filtering on the ingress ports on which the policy will be applied. Create the policy profile that enables PVID override. This function allows a policy rule classifying a frame to a VLAN to override PVID assignment configured with the set port vlan command. When none of its associated classification rules match, the configuration of the policy profile itself will determine how frames are handled by default. In this case, the default VLAN is specified with the pvid pvid parameter. Configure the administrative rules that will assign the policy profile to all frames received on the desired ingress ports.
4. 5.
set port ingress-filter port-string disable set policy profile profile-index [name name] [pvid-status {enable | disable}] [pvid pvid]
6.
set policy rule admin-profile port port-string [port-string portstring] [admin-pid admin-pid]
Page 16 of 20
Configuring VLANs
Procedure 4
Step 7. Task
Configure the classification rules that will define the protocol to filter on and the VLAN ID to which matching frames will be assigned.
Example Configuration
ThefollowingshowsanexampleNSeriesdeviceconfigurationusingthestepsinProcedure 4. ThisexampleconfiguresapolicythatensuresthatIPtrafficreceivedonthespecifiedingressports willbemappedtoVLAN2,whileallothertypesoftrafficwillbemappedtoVLAN3. 1. 2. TwoVLANsarecreated:VLAN2andVLAN3. Ports1through5ontheGigabitEthernetmoduleinslot4areconfiguredasegressportsfor theVLANswhileports8through10ontheGigabitEthernetmoduleinslot5areconfigured asingressportsthatwilldothepolicyclassification. Policyprofilenumber1iscreatedthatenablesPVIDoverrideanddefinesthedefaultbehavior (classifytoVLAN3)ifnoneoftheclassificationrulescreatedfortheprofilearematched. Administrativerulesarecreatedthatapplypolicyprofilenumber1toallframesreceivedon theingressportsge.5.8through10. Classificationrulesarecreatedforpolicyprofilenumber1thatassignIPframestoVLAN2. TherulesidentifyIPframesbyusingtheetherprotocolparameter,whichclassifiesonthe TypefieldintheheadersofLayer2EthernetIIframes,andtheprotocoldataof0x0800(IP type),0x0806(ARPtype),and0x8035(RARPtype).
vlan create 2, 3 vlan egress 2 ge.4.1-2 vlan egress 3 ge.4.3-5 port ingress-filter ge.5.8-10 disable policy profile 1 name protocol_based_vlan pvid-status enable policy rule admin-profile port ge.5.8 port-string ge.5.8 policy rule admin-profile port ge.5.9 port-string ge.5.9 policy rule admin-profile port ge.5.10 port-string ge.5.10 policy rule 1 ether 0x0800 mask 16 vlan 2 policy rule 1 ether 0x0806 mask 16 vlan 2 policy rule 1 ether 0x8035 mask 16 vlan 2
3. 4. 5.
Switch1(su)->set Switch1(su)->set Switch1(su)->set Switch1(su)->set Switch1(su)->set pvid 3 Switch1(su)->set admin-pid 1 Switch1(su)->set admin-pid 1 Switch1(su)->set admin-pid 1 Switch1(su)->set Switch1(su)->set Switch1(su)->set
Monitoring VLANs
Table 2describestheshowcommandsthatdisplayinformationaboutVLANconfigurations.Refer toyourdevicesCLIdocumentationforadescriptionoftheoutputofeachshowcommand. Table 2
Task Display all existing VLANs.
Page 17 of 20
Table 2
Task
(Applies to N-Series, S-Series, K-Series only.) Display the VLAN constraint setting. Display the VLAN dynamic egress setting. Display all static VLANs. Display ports assigned to VLANs. Display existing GVRP settings. Display static ports on the given vid, group. (Applies to stackable and standalone switches only.) Display port(s) configured in protected mode (Applies to stackable and standalone switches only.) Display the name of a specific group of protected ports.
Forwarding List GARP Multicast Registration Protocol (GMRP) GARP VLAN Registration Protocol (GVRP)
A list of the ports on a particular device that are eligible to transmit frames for a selected VLAN. A GARP application that functions in a similar fashion as GVRP, except that GMRP registers multicast addresses on ports to control the flooding of multicast frames. A GARP application used to dynamically create VLANs across a switched network.
Page 18 of 20
Table 3
Term
Page 19 of 20
Revision History
Date 02-01-2008 02-20-2008 07-28-2008 01-07-2009 03-15-2011 Description New document. Corrected product naming conventions. Modifications due to product rebranding changes. Corrected error in configuration example. Added S-Series and K-Series. Removed IGMP snooping (covered in Multicast Feature Guide).
Enterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthis documentanditswebsitewithoutpriornotice.ThereadershouldinallcasesconsultEnterasys Networksto determinewhetheranysuchchangeshavebeenmade. Thehardware,firmware,orsoftwaredescribedinthisdocumentissubjecttochangewithoutnotice. INNOEVENTSHALLENTERASYS NETWORKSBELIABLEFORANYINCIDENTAL,INDIRECT,SPECIAL, ORCONSEQUENTIALDAMAGESWHATSOEVER(INCLUDINGBUTNOTLIMITEDTOLOSTPROFITS) ARISINGOUTOFORRELATEDTOTHISDOCUMENT,WEBSITE,ORTHEINFORMATIONCONTAINEDIN THEM,EVENIFENTERASYS NETWORKSHASBEENADVISEDOF,KNEWOF,ORSHOULDHAVEKNOWN OF,THEPOSSIBILITYOFSUCHDAMAGES. Enterasys Networks, Inc. 50MinutemanRoad Andover,MA01810 2011Enterasys Networks, Inc.Allrightsreserved. ENTERASYS,ENTERASYS NETWORKS,ENTERASYSNETSIGHT,andanylogosassociatedtherewith,are trademarksorregisteredtrademarksofEnterasys Networks, Inc.,intheUnitedStatesandothercountries.Fora completelistofEnterasystrademarks,seehttp://www.enterasys.com/company/trademarks.aspx. Allotherproductnamesmentionedinthismanualmaybetrademarksorregisteredtrademarksoftheirrespective companies.