Allied Telesis Software Reference for SwitchBlade x3100 Series

Transcription

Allied Telesis Software Reference for SwitchBlade x3100 Series
Software Reference for SwitchBlade x3100 Series
Switches
Release 17.0 Issue 2
This product includes software developed by Bill Paul.
This product includes software developed by Yen Yen Lim and North Dakota State University.
This product includes software developed by the Internet Initiative Japan, Inc.
This product includes cryptographic software written by Eric Young ([email protected]).
This product includes software developed by the University of California, Berkeley and its contributors.
MD5 functions derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm.
Copyright 1988, 1989, 1990 by Carnegie Mellon University.
Copyright 1989 by TGV, Incorporated.
Copyright © 2013 Allied Telesis, Inc.
All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis,
Inc.
Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company
names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document
without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied
Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to
lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been
advised of, known, or should have known, the possibility of such damages.
Software Reference for SwitchBlade x3100 Series Switches
2
Introduction
Congratulations on your purchase of a Allied Telesis™ SwitchBlade® x3100 series product. This product is part of a family
of products that leverages Ethernet switching technology to offer service providers a range of services, such as video over
xDSL and voice over IP.
Who Should Read This Guide?
This document provides a reference for the components that comprise the SBx3100 products.
Service and Support
For information about support services for Allied Telesis, contact your Allied Telesis sales representative or visit the
website at http://www.alliedtelesis.com.
Software Reference for SwitchBlade x3100 Series Switches
3
Table of Contents
Preface - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -14
I Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 14
II Intended audience - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 14
III Reason for Update (Issue 1) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 14
IV Conventions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 15
1 Setting Up the Switch - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -17
1.1 Allied Telesis SBx3100 Products in the Network - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 18
1.1.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 18
1.2 Chassis Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 20
1.2.1 Card Configurations - SBx3112- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 20
1.2.2 Card Configurations - SBx3106- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 22
1.2.3 Card Representation in Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 22
1.3 Getting Started - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 23
1.3.1 How to Log In - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 23
1.3.2 Initial System Status - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 23
1.3.3 Check Software Load - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 25
1.3.4 How to Get Command Help - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 25
1.4 CLI Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 27
1.4.1 Command Syntax Conventions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 27
1.4.2 Entering Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 27
1.4.3 Control of CLI command confirmation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 27
1.4.4 Multiple Command Stringing- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 28
1.4.5 Command Alias - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 28
1.4.6 Configuring an Alias - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 29
1.4.7 Alias Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 32
1.5 User Administration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 38
1.5.1 Users and Privileges - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 38
1.5.2 Customizing the CLI Prompt - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 38
1.5.3 Provisioning the Login Banner- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 40
1.5.4 Password Recovery - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 41
1.5.5 User Administration Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 45
1.6 Configuring Physical Interfaces and Protocols - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 76
1.6.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 76
1.6.2 Initial Interfaces - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 76
1.6.3 Physical Interface Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 76
1.6.4 Configuring the Management Interfaces - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 77
1.6.5 IP Interface Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 79
1.6.6 System Time - SNTP- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 92
1.6.7 Configuring SNTP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 93
1.6.8 SNTP Commands- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 97
1.7 File Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 109
1.7.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 109
Software Reference for SwitchBlade x3100 Series Switches
4
1.7.2
1.7.3
1.7.4
1.7.5
Load File Names - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - File Storage - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CFC Media (SD Card)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - File Management Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
109
109
110
116
1.8 Software Load Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.8.1 Card Load Preferences - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.8.2 Load File Verification - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.8.3 Boot Server (Control Module Only) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.8.4 Commands for Software Load Management - - - - - - - - - - - - - - - - - - - - - - - - - -
139
139
139
139
141
1.9 Database and Text File Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.9.1 Database Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.9.2 Text File Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.9.3 Creating a Text Configuration file - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.9.4 Database Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.9.5 Commands for Text File Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
144
144
147
147
151
156
1.10 Control Module Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.10.1 Card Load Preferences - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.10.2 CFC for the SBx3112 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.10.3 Overview (Simplex versus Duplex) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.10.4 CFC200 Card Attributes and States (SHOW CARD ACTCFC) - - - - - - - - - - - 1.10.5 Changing the Administrative State of the Inactive CFC - - - - - - - - - - - - - - - - - 1.10.6 Redundant CFC Operation in the SBx3112 - - - - - - - - - - - - - - - - - - - - - - - - - 1.10.7 Provisioning Scenarios for Control Modules - - - - - - - - - - - - - - - - - - - - - - - - 1.10.8 Software Compatibility - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.10.9 Software Upgrade- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
161
161
161
161
162
164
164
165
166
167
1.11 Log Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.11.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.11.2 Viewing Logs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.11.3 Controlling Output of Logs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.11.4 Example Log Configuration Setup - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.11.5 Capturing and Sending Logs to a Storage Device - - - - - - - - - - - - - - - - - - - - - 1.11.6 Logging Procedures- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.11.7 Logging Commands- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
174
174
176
176
176
177
178
179
1.12 LED Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.12.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.12.2 CFC200 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.12.3 PSU - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.12.4 XE4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.12.5 GE24POE - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.12.6 GE24SFP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.12.7 LED Behavior- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
199
199
199
199
199
199
200
200
1.13 ECOMODE and Lamp Test - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.13.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.13.2 ECO Functions and Lamp Test - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.13.3 ECOMODE Commands- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
204
204
204
205
1.14 Alarm Management Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.14.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.14.2 Displaying alarms - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.14.3 Alarms Associated with the SBx3112 Architecture - - - - - - - - - - - - - - - - - - - - 1.14.4 Fan Module Alarms - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
208
208
208
209
211
Software Reference for SwitchBlade x3100 Series Switches
5
1.14.5 ALARM Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 212
1.15 Power Management and System Cooling - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.15.1 Power Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.15.2 Power Supply Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.15.3 System Cooling - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.15.4 System Cooling Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
219
219
223
226
229
1.16 Basic Provisioning of Cards and Ports - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.16.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.16.2 Feature List - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.16.3 Feature / Component Interaction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.16.4 Provisioning Modes - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.16.5 Custom Profiles - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
234
234
234
234
235
236
1.17 Configuring a User Profile - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.1 Default Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.2 Configuration Guidelines - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.3 Configuration Procedure - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.4 AlliedView NMS Profile Support - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.5 Administrative and Operational States - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.6 Common Line Card Attributes - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.7 XE4 Card Attributes - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1.17.8 Card Management Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
237
237
237
237
240
241
242
244
245
2 Interface Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -266
2.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 266
2.2 Interface Types - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 266
2.2.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 266
2.3 GE Interfaces - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 267
2.3.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 267
2.3.2 Example GE Interface (GE24POE) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 270
2.4 XE Interfaces - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2.4.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2.4.2 Example Output- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2.4.3 Interface (Common) Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
273
273
273
275
3 Power over Ethernet (PoE) - - - - - - - - - - - - - - - - - - - - - - - - - - -292
3.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 292
3.1.1 Definitions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 292
3.2 GE24POE Card Operation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3.2.1 Performance and Capacity - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3.2.2 Hardware Limitations - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3.2.3 Hardware Detection- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3.2.4 Power Allocation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3.2.5 CFC Power Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3.2.6 Card Power Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 3.2.7 LEDs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
293
293
293
293
293
294
295
295
3.3 Configuring the GE24POE Card - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 295
3.3.1 Default Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 295
Software Reference for SwitchBlade x3100 Series Switches
6
3.3.2 Configuration Guidelines - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 295
3.3.3 PoE Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 298
4 Layer Two Switching - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -307
4.1 Switching - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.2 Ingress Rules - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.3 Learning Process - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.4 Forwarding Process - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.5 Egress Rules - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.6 MAC Thrash Limiting (SBx3112) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.7 Clearing the Forwarding Database (FDB) - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.8 Viewing Switch Settings - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.9 Configuring the Forwarding Database - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.1.10 Switching Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
308
308
308
308
309
309
309
310
310
311
315
4.2 Link Aggregation (LAG) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.2 Feature Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.3 Static versus Dynamic Link Aggregation - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.4 Overview of LAG Commands/States - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.5 Alarms for LAG States - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.6 Setting the Switch Hash Select - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.7 Configuring LAG - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.2.8 Configuration Procedure - Destroying a LAG - - - - - - - - - - - - - - - - - - - - - - - - 4.2.9 LAG Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
329
329
329
330
331
333
334
335
341
342
4.3 VLAN (802.3) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.3.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.3.2 Virtual LANs (VLANs) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.3.3 Configuring Standard VLANs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.3.4 VLAN Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
361
361
361
363
367
4.4 Spanning Tree Introduction: STP, RSTP, MSTP and BPDU Cop - - - - - - - - - - - - - - - - - 4.4.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.2 Overview of Spanning Trees- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.3 Spanning Tree Protocol (STP and RSTP)- - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.4 Example (R)STP Configuration - Standard VLAN - - - - - - - - - - - - - - - - - - - - - - 4.4.5 Configuring (R)STP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.6 Default STP Configuration (Customer and Network Ports) - - - - - - - - - - - - - - - 4.4.7 Configuration Procedure - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.8 Multiple Spanning Tree Protocol (MSTP) - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.9 Configuring MSTP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.10 BPDU COP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.11 Configuring BPDU Cop - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.4.12 Spanning Tree Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
377
377
377
377
385
385
385
386
388
394
397
398
402
4.5 Ethernet Protection Switched Ring (EPSR) and SuperLoop Prevention - - - - - - - - - - - - 4.5.1 EPSR Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.2 Overview of EPSR Configuration- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.3 EPSR Terms and Definitions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.4 EPSR Protocol - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.5 Dual Ring Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
419
419
419
420
421
424
Software Reference for SwitchBlade x3100 Series Switches
7
4.5.6 Enhanced Recovery (Multiple Link Failure) - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.7 Log Output for EPSR - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.8 Configuring EPSR - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.9 EPSR Interoperability - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.10 Configuration Procedure - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.11 SuperLoop Prevention - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.12 SuperLoop Configuration Requirements - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.13 Configuring SuperLoop - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.14 Configuration Procedure - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.15 EPSR and (R)STP Interaction- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.5.16 EPSR and SuperLoop Commands- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
426
427
429
429
430
434
437
438
439
445
448
4.6 Upstream Forwarding Only (UFO) Mode - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.2 Forwarding Mode and Determining Upstream Nodes and Interfaces - - - - - - - - - 4.6.3 UFO Example Configuration (Static) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.4 STP Configuration with UFO VLAN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.5 MSTP Configuration with UFO VLAN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.6 EPSR Configuration with UFO VLAN- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.7 Configuring UFO VLANs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.8 Default Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.6.9 Configuration Guidelines - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
464
464
465
465
466
468
469
470
470
470
4.7 Upstream Control Protocol (UCP) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.7.1 Overview of UCP- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.7.2 UCP Protocol Configuration Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.7.3 UCP with STP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.7.4 UCP with EPSR/RSTP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.7.5 Configuring UCP with ESPR - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.7.6 Summary of Topology Configurations for UCP - - - - - - - - - - - - - - - - - - - - - - - 4.7.7 UCP Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
471
471
471
474
474
476
478
478
4.8 HVLAN (Port Based and VLAN Based) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.8.1 Port Based HVLAN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.8.2 Port Based HVLAN Configuration- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.8.3 Configuring Port Based HVLAN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.8.4 VLAN Based HVLAN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.8.5 Configuring VLAN Based HVLAN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.8.6 Configuration Procedure - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.8.7 HVLAN Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
480
480
480
481
485
487
488
490
4.9 VLAN Translation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.9.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.9.2 Example Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.9.3 TPID Translations (Extreme VLAN Support)- - - - - - - - - - - - - - - - - - - - - - - - - 4.9.4 HVLAN and Translation Feature Interactions - - - - - - - - - - - - - - - - - - - - - - - - 4.9.5 Configuring VLAN Translation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 4.9.6 VLAN Translation Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
500
500
500
502
502
503
505
5 IGMP and MLD Snooping - - - - - - - - - - - - - - - - - - - - - - - - - - - -506
5.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 506
5.1.1 Mulitcast Overview - Bandwidth Efficiency - - - - - - - - - - - - - - - - - - - - - - - - - - - 506
5.1.2 IP Mulitcast Addressing - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 506
Software Reference for SwitchBlade x3100 Series Switches
8
5.1.3 IP Multicast Routing and Switching- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 507
5.1.4 IP Multicast Group Joining and Leaving - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 507
5.1.5 IGMP and MLD Protocols - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 507
5.2 IGMP and MLD Snooping - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.2.1 Known versus Unknown Multicast - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.2.2 Multicast Router Ports (Dynamic versus Static) - - - - - - - - - - - - - - - - - - - - - - - 5.2.3 Interface Snooping Modes - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.2.4 Snooping Optimizations- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
509
509
509
510
511
5.3 IGMP and MLD Support on the SBx3100 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.3.1 Protocol Versions Supported - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.3.2 Hardware Support - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.3.3 Configuration Support- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
513
513
513
513
5.4 IGMP and MLD Snooping Configuration Guidelines - - - - - - - - - - - - - - - - - - - - - - - - - - 515
5.4.1 Enabling IGMP and MLD Snooping (per-VLAN/Interface)- - - - - - - - - - - - - - - - - - 515
5.4.2 Unknown Multicast Flooding - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 515
5.5 Feature Interactions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.5.1 Upstream Forwarding Only VLANs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.5.2 IPv6 Neighbor Discovery - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.5.3 Link Aggregation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.5.4 Hierarchical VLANs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.5.5 IGMP Snooping Disabled - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.5.6 IGMP Snooping Enabled- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.5.7 IGMP Snooping at the System and Interface Level - - - - - - - - - - - - - - - - - - - - - 5.5.8 Summary of Feature Interaction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
518
518
518
519
519
519
519
520
520
5.6 Channel Usage for IGMP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 522
5.6.1 Reserved - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 522
5.6.2 User provisioned MCAST addresses - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 522
5.7 Configuring IGMP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.7.1 Default Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.7.2 Configuration Example - IGMP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.7.3 Configuration Guidelines - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.7.4 Restrictions and Limitations - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.7.5 Configuration Procedure - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.7.6 Configuration Example - MLD - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 5.7.7 IGMP Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
522
522
523
523
524
524
527
528
6 Access and Security - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -563
6.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 563
6.2 Quality of Service Model - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.2.1 Ingress Traffic Concepts - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.2.2 Egress Traffic Concepts - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.2.3 Traffic Management Throughout the Network- - - - - - - - - - - - - - - - - - - - - - - - -
564
565
566
567
6.3 Classifiers - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.3.1 Classifier Support on the SBx3100- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.3.2 Classifier Management- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.3.3 Configuring Classifiers- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.3.4 Classifier Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
568
568
570
581
583
6.4 Access Control List - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 600
Software Reference for SwitchBlade x3100 Series Switches
9
6.4.1
6.4.2
6.4.3
6.4.4
Provisioning Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ACL for the SBx3100 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Configuring ACL - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Access Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
600
600
601
604
6.5 Ingress Metering (Policing) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 618
6.5.1 Configuring the Ingress Metering- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 618
6.5.2 Ingress Metering Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 620
6.6 Egress Port Rate Limiting - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 627
6.6.1 Configuring the Egress Port Rate Limiting - - - - - - - - - - - - - - - - - - - - - - - - - - - - 627
6.6.2 Egress Port Rate Limiting Commands- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 628
6.7 Priority Queuing (Layer 2) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.7.1 Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.7.2 Changing Queue Mapping and Disabling/Enabling Interfaces - - - - - - - - - - - - - - - 6.7.3 Configuring Queue Mapping - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
635
635
636
636
6.8 Queue-Based Egress Rate Limiting (QOSPOLICY) - - - - - - - - - - - - - - - - - - - - - - - - - - 6.8.1 Commands and Parameters - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.8.2 QoS Model with QOSPOLICY Parameters - - - - - - - - - - - - - - - - - - - - - - - - - - 6.8.3 QOSPOLICY Command Sequence - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.8.4 Rounding of Values - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.8.5 Configuring QOSPOLICY Attributes - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.8.6 QOSPOLICY Command List - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
638
638
639
639
640
641
642
6.9 Layer 3 QoS Support (DSCP) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.9.1 Built-in DSCP Mapping - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.9.2 Feature Interaction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.9.3 Restrictions for Layer 3 QoS for DSCP - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.9.4 Configuring L3 QoS Support - DSCP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.9.5 QoS Command List - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
652
652
654
654
654
657
6.10 RADIUS / TACACS Authentication - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.10.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.10.2 Configuring a RADIUS Server - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.10.3 Configuring a TACACS+ Server - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.10.4 RADIUS and TACACS+ Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
670
670
670
672
675
6.11 Port Authentication - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.2 802.1X Authentication- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.3 MAC Authentication - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.4 RADIUS Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.5 VLAN Configuration (Dynamic and Guest VLAN) - - - - - - - - - - - - - - - - - - - - 6.11.6 Configuring Port Authentication - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.7 Port Authentication Commands - 802.1X - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.8 MAC Authentication Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.11.9 Common Authentication Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
694
694
694
695
695
695
696
705
722
742
6.12 SSH - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.12.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.12.2 Configuring SSH - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.12.3 SSH Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
760
760
761
765
6.13 Address Resolution Protocol (ARP) Filtering - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 777
6.13.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 777
6.13.2 Associated Logs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 778
Software Reference for SwitchBlade x3100 Series Switches
10
6.13.3 Configuring ARP- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 778
6.13.4 ARP Filter Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 780
6.14 Local ARP Discard - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.14.1 Local ARP Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.14.2 Local ARP Configuration Requirements - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.14.3 Local ARP Configuration Procedures (Static versus Dynamic)- - - - - - - - - - - - - 6.14.4 Configuring Local ARP Discard - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 6.14.5 Local ARP Discard Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
786
786
786
787
788
791
7 Network Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -801
7.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 801
7.2 Dynamic Host Configuration Protocol (DHCP) - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.1 DHCP Architecture - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.2 DHCP Relay Agent - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.3 DHCP Relay Mode - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.4 DHCP Relay Snooping Mode - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.5 Auto-Ageing and IP Filter Removal - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.6 DHCP Relay TR-101 Support - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.7 Configuring DHCP Relay - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.8 Default Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.9 Restrictions and Limitations - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.10 Feature Interactions - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.11 Configuration Procedure - Relay - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.12 Configuration Procedure - Snooping - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.2.13 DHCP Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
802
802
803
806
807
809
810
810
810
811
811
811
816
820
7.3 Simple Network Management Protocol (SNMP) - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.3.1 Introduction to SNMP Support - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.3.2 SNMP Community - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.3.3 Configuring an SNMP Community - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.3.4 Default Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.3.5 Restrictions and Limitations - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.3.6 Configuration Procedure - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.3.7 SNMP Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
845
845
845
847
848
848
848
850
7.4 Link Layer Discovery Protocol (LLDP) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.4.1 Introduction (LLDP) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.4.2 Configuring LLDP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.4.3 LLDP-MED - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.4.4 Configuring LLDP-MED - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.4.5 LLDP Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
866
866
871
873
875
880
7.5 Remote Network Monitoring (RMON) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.1 RMON Configuration - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.2 RMON Statistics Collection - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.3 Management Logs for RMON (Ethernet-Based) Thresholds - - - - - - - - - - - - - - - 7.5.4 RMON History Collection - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.5 Configuring RMON - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.6 Configuring RMON Ethernet Statistics - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.7 RMON Ethernet Statistics Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.8 Configuring RMON History - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.5.9 RMON History Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
926
926
927
928
928
929
930
931
942
944
Software Reference for SwitchBlade x3100 Series Switches
11
7.6 IP Statistics - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.6.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.6.2 Access of MIB Statistics Using an SNMP Browser- - - - - - - - - - - - - - - - - - - - - - 7.6.3 IP Statistics Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
949
949
949
950
7.7 Bi-Directional Forward Detection (BFD) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.7.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.7.2 BFD Protocol - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.7.3 BFD Alarms - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.7.4 Possible Fault Scenarios - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.7.5 Configuring BFD - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 7.7.6 BFD Commands- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
954
954
954
954
955
957
959
8 Alarms and Troubleshooting - - - - - - - - - - - - - - - - - - - - - - - - - -967
8.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 967
8.2 Alarm System Features - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.2.1 Overview of Alarm System - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.2.2 Alarm Types - Interface, Card, and System - - - - - - - - - - - - - - - - - - - - - - - - - - 8.2.3 Interface/Port Outage Threshold Feature - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.2.4 Configurable Alarm Severity (Interface Alarm)- - - - - - - - - - - - - - - - - - - - - - - - 8.2.5 Interface Uptime (SHOW INTERFACE) - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.2.6 Alarm Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
968
968
969
970
970
971
973
8.3 Troubleshooting the SBx3112 (Diagnostics) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.3.1 Troubleshooting Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.3.2 Card Diagnostics - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.3.3 Interface Diagnostics- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.3.4 Diagnostics Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
981
981
981
981
982
8.4 Maintenance Audits - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 987
8.5 TRACEROUTE - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 988
8.5.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 988
8.5.2 TRACEROUTE Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 989
8.6 IGMP Trace - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 991
8.6.1 IGMP Counters - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 991
8.7 EPSR Trace - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 992
8.7.1 ESPR TRACE Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 994
8.8 User Event Logging - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.8.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.8.2 Overview of Setup - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 8.8.3 Event Logging TRACE Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
998
998
998
999
8.9 Technical Support Scripts - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1007
8.9.1 Tech Support Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1008
8.10 Optical Device Data Access- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1010
8.10.1 Optics Data Commands and Output - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1010
8.10.2 SFP/XFP Alarms and Warnings - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1011
8.10.3 Optics Data Output Examples - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1011
8.10.4 Debug Interface - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1012
8.11 Viewing the CPUSTATS (High Water Mark) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1012
8.11.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1012
Software Reference for SwitchBlade x3100 Series Switches
12
8.11.2 CPUSTATS Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1013
8.12 Port Mirroring - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1017
8.12.1 Introduction - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1017
8.12.3 Port Mirroring Commands - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1018
8.13 Routine Procedures - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1023
8.13.1 Database Management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1023
8.13.2 Delete Obsolete Users - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1024
8.13.3 Delete Obsolete Files - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1024
8.13.4 Scripting - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -1024
Appendix A: Command List - - - - - - - - - - - - - - - - - - - - - - - - - - -1026
Software Reference for SwitchBlade x3100 Series Switches
13
Preface
I Introduction
The Allied Telesis SwitchBlade x3100 leverages widely accepted Ethernet switching technology to allow the network operator to provide Ethernet-based services. It is a feature-rich platform that enables network operators to offer advanced, simultaneous services, such as high quality voice, tiered IP/Ethernet data services, and broadcast quality IP video.
I.I Purpose of this manual
This document is for those who have purchased and successfully installed this product. Refer to the SBx3100 Installation
Guides for instructions on installing the products and turning them on for the first time.
The outline of this document is first to allow the system administrator to configure the SBx3100 so that it is integrated into
the management interfaces of the network. It then goes through the layer 2 and other features of the product.
Each section generally includes the following:
• Introduction for main concepts
• Configuring the Feature, which can include:
• Default Configuration
• Configuration Guidelines
• Restrictions and Limitations
• Feature Interactions
• Configuration Procedure
• Command Reference
II Intended audience
This manual is intended for the system administrator, network manager or communications technician who will configure
and maintain SBx3100 devices, or who manages a network that includes SBx3100 devices.
It is assumed that the user is familiar with:
• The topology of the network in which the SBx3112 is to be used
• Basic principles of computer networking, protocols and routing, and interfaces
• Administration and operation of a computer network.
III Reason for Update (Issue 1)
The following table lists changes for this release.
Software Reference for SwitchBlade x3100 Series Switches
14
TABLE i-1
Reason for Update for Release 17.0 - SBx3112
Feature
16.x Functionality
17.0 Functionality
Notes
SBx3106 system
Not Supported
The SBx3106 is a smaller version of
SBx3112 system, This system has the
same features/card support as the
SBx3112 but has a smaller footprint
(4RU). The system supports 4 line card
slots and has two CFC slots, so it can
operate in simplex or duplex. In simplex
mode slot 5 can be used for a line card.
Refer to
Card Configurations SBx3106.
GE40RJ
Not Supported
The GE40RJ (AT-SBx31GT40) provides
40 RJ (copper) ports at 10/100/1000
speed.
Refer to
SBx3100
Cards.
32K FDB MAC
support
The system could support an FDB of
32K MAC entries, but only if all of
the line cards supported 32K (the
GE24POE and GE24RJ cards support
16K).
The user can configure the desired FDB
size (16 or 32K). When confiured for
32K, a card that does not support 32K is
not allowed to become operational.
Refer to
SET
SWITCH
FDBSIZE
UFO VLAN support for LAG Interfaces
Not Supported
The SBX3100 supports Upstream Forwading Only (UFO) VLANs.
Refer to
4.2.7.3.
IGMP and MLD
Snooping
IGMP was supported
There are no CLI changes, only that the
user can set the VLAN to UFO.
Both IGMP and Multicast Listener Discovery (MLD) protocols are supported
(MLD is the IPv6 equivalent of IGMP.)
To enable MLD snooping, use the
"ENABLE MLDSNOOPING VLAN"
command. MLD snooping may be
enabled per-VLAN (but not per-interface as with IGMP). By default, MLD
snooping is disabled for all VLANs.
Filter IPv6 packets
Not Supported
Classifier matches any ICMPv6 protocol
packet or with the specified type (MLD
query, version 1 MLD done, version 1
and version 2 MLD reports, redirect
messages, and user defined ICMPv6
types.)
Refer to
IGMP and
MLD Support on the
SBx3100.
Refer to
Table 6-1
and
Table 6-2
Classifier matches on IPv6 source and
destination addresses (ipv6address/
length)
Provide predefined types for IPv6 destinations: IPv6 multicast, IPv6 permanent
multicast, and IPv6 transient multicast.
IV Conventions
Software Reference for SwitchBlade x3100 Series Switches
15
IV.I Commands
Commands are usually presented in the following ways:
• Tables for specific functions or features that include important parameters
• Specific commands that are part of examples
The Allied Telesis Series product supports line editing, line recall, and abbreviations, so that command line input and editing
can be done very quickly once command syntax and the line editing commands are learned. Throughout this document all
syntax will use complete words, with verbs and parameters in upper case and the pairing of parameters and values with equal
(=)
There are three levels that can be entered:
• User
• Manager
• Security Officer
Note:
All of the commands used when explaining features in this document assume the Security Officer privilege.
The Allied Telesis Series product supports line editing, line recall, and abbreviations, so that command line input and editing
can be done very quickly once command syntax and the line editing commands are learned. These are described.
Note:
Throughout this document all syntax will use complete words, with verbs and parameters in upper case and the
pairing of parameters and values with equal (=) signs.
IV.II Graphical User Interface (GUI)
Since all operations on the SBx3100 products use the CLI, there are no GUIs presented in this document.
IV.III Syntax
The syntax rules for a command and its parameters use the following conventions throughout this document:
•
•
•
•
All upper case = Key Word
| = Option (OR)
[ ] = Optional
{ = Choice of one value }
Software Reference for SwitchBlade x3100 Series Switches
16
1. Setting Up the Switch
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Allied Telesis SBx3100 Products in the Network
Chassis Configuration
Getting Started
CLI Introduction
Alias Commands
User Administration
User Administration Commands
Configuring Physical Interfaces and Protocols
IP Interface Commands
File Management
File Management Commands
Software Load Management
Database and Text File Management
Database Commands
Commands for Text File Configuration
Control Module Management
Provisioning Scenarios for Control Modules
Log Management
Logging Commands
LED Management
ECOMODE and Lamp Test
ECOMODE Commands
Alarm Management Overview
ALARM Commands
Power Management and System Cooling
Power Supply Commands
System Cooling Commands
Basic Provisioning of Cards and Ports
Card Management Commands
Software Reference for SwitchBlade x3100 Series Switches
17
Setting Up the Switch
1.1 Allied Telesis SBx3100 Products in the Network
1.1.1 Overview
The SwitchBlade x3100 product is designed to deliver high availability, maximum performance with wirespeed non-blocking
backplane performance, and high port count. It is a a versatile carrier class FTTx platform for delivering Gigabit services to
residential, Multi-Dwelling Unit (MDU) and business customers in the last mile. The product features redundant power supplies, controllers and WAN ports to ensure reliability standards in carrier networks are met, along with powerful sub-50 millisecond failover protection using EPSR ring for link level protection.
The SBx3112 is a 12-slot access edge chassis switch primarily targeted for service provider fiber access networks. The
SBx3106 is a smaller, 4RU version of the SBx3112 chassis with front loadable cards, power supplies and a fan tray. In addition
to duplicating the feature capabilities of the larger chassis, the SBx3106 enables the use of a CFC200 with a line card in the
mate CFC slot.
The SwitchBlade x3100 series products provide:
• Up to 240 non-blocking PoE Plus Ports
• Up to 240 non-blocking 1Gbps Fiber Ports
• Up to 40 10 Gigabit Ethernet Ports
The following figure shows how Allied Telesis SBx3100 products can be configured within a network to provide a complete
service provider solution.
Software Reference for SwitchBlade x3100 Series Switches
18
Setting Up the Switch
PSTN
Management
Internet
Application
Services
Interworking
IPTV head-end
IP TV services
Service / Application
Layer
SBx900
SBx900
Central Office
Data Center
SBx908
9810
Network (Layer 3)
10G Ring
EPSR Topology
(Note 1)
9700
Note 1 - In future releases, the 9810
will aggregate subtending access islands
SBx3112
SBx3112
Access Layer (Layer 2)
SBx3100
SBx3100
Subtended
GE Ring #1
1
Subtended
GE Ring #8
Distribution Layer
1
1G
Up to 8 nodes each GE ring
1G
EPON
1G
P2P
ADSL
Apartment
= Copper (telephone)
1G
= Copper (RJ45)
= Fiber (100 Mbps, 1G, and 10G)
FIGURE 1-1
High-density
MDU
Business(es)
Allied Telesis Products in the Network
Software Reference for SwitchBlade x3100 Series Switches
19
Setting Up the Switch
1.2 Chassis Configuration
1.2.1 Card Configurations - SBx3112
The following figure shows the card layout of the SBx3112. Labels are explained in Table 1-1.
P
O
E
P
O
E
AC
DC
4
6
8
10
12
14
DC
FAULT
SBxPWRSYS
SBxPWRSYS
plus
2
S
Y
S
T
E
M
AC
E
FAULT
16
18
plus
SBx31GP24
20
0
22
0
23
1
2
4
6
8
10
12
14
16
18
SBx31FAN12
20
22
1
A
1
3
5
7
9
11
13
15
17
19
21
2
4
6
8
10
12
14
16
18
20
0
1
3
5
SBx31CFC
MASTER
SL AVE
NORMAL
FAULT
NORMAL
FAULT
FAN
M/S
PSU
RESET
B
11
FAN
13
15
1000 LINK
17
19
23
1
7
MASTER
SL AVE
NORMAL
FAULT
10/100/1000Base-T
RS-232
NORMAL
FAULT
FAN
FAULT
12
11
13
RESET
2
3
4
5 CFC
6
7
PSU
8
9
FAN
10
11
M/S
REA DY
14
16
15
10G LINK /
18
17
19
22
21
2
3
XFP
XFP
XFP
XFP
24
23
25
19
21
26
28
30
32
34
36
POWER
27
29
31
33
35
3
37
AC T
AC T
CONSOLE
10/100/1000Base-T
RS-232
5
L/A
B USY
FAULT
PORT ACTIVITY
10G LINK /
1
17
ACT
20
10/100 LINK
AC T
0
15
NET MGMT
SBx31XZ4
PORT ACTIVITY
13
1000 LINK
SD
SBx31XZ4
11
SBx S TATUS
1
0
SYS S TA TUS
PSU
10
9
SBx31CFC
M/S
CONSOLE
9
39
5
L/A
B USY
8
6
3
AC T
NET MGMT
7
38
21
AC T
10/100 LINK
SD
REA DY
9
SBx S TATUS
1
0
1
0
3
2
3
2
5 CFC
4
4
5 CFC
7
6
7
6
9
8
9
8
11
10
11
10
SYS S TA TUS
SYS S TA TUS
M/S
PSU
7
0
5
1000 LINK
SBx31GC40
22
C
23
3
plus
SBx31GP24
A
6
S
Y
S
T
E
M
SBxPWRPOE
SBx31GP24
4
DC
FAULT
SBxPWRPOE
2
AC
DC
D
FAULT
0
AC
A
AC T
0
1
2
3
XFP
XFP
XFP
XFP
7
8
SBx31GS24
1000 LINK
2
4
6
8
ACT
10
10/100 LINK
12
ACT
14
16
18
SBx31GS24
20
0
22
0
23
1
2
4
6
8
10
12
14
16
18
20
22
9
1
10
SBx31GT24
3
5
7
9
11
13
15
17
19
21
2
4
6
8
10
12
14
16
18
20
0
23
3
SBx31GT24
22
0
23
1
2
5
7
4
6
9
8
11
10
13
12
15
14
17
19
16
18
21
20
22
11
1
3
5
7
9
11
13
15
17
19
21
23
3
5
7
9
11
13
15
17
19
21
ESD
F
FIGURE 1-2
Software Reference for SwitchBlade x3100 Series Switches
2035
SBx3112 Chassis
20
Setting Up the Switch
TABLE 1-1
Allied Telesis SBx3100 - Slot/Position and Configuration Notes
No.
Module
Slot/Position
Configuration Notes
A
Line Cards
0, 2, 6, 8, 10 (left)
At least one is always configured. Unused slots must be configured with a Filler Card.
1, 3, 7, 9,11 (right)
The cards available are:
- SBx31GP24 (GE24POE) - Power source for Power over
Ethernet (PoE) ports.
- SBx31XZ4 (XE4) - Provides four 10G SFP ports.
- SBx31GS24 (GE24SFP) - Provides 24 1G SFP ports.
- SBx31GT24 (GE24RJ) - Provides 24 RJ ports.
- SBx31GC40 (GE40CSFP) - Provides 40 1G Compact SFP
ports, and can also support 20 regular 1G SFP ports.
- SBx31XS6 (XE6SFP) - Provides six 10 SFP+ ports.
- SBx31GT40 (GE40RJ) - Provides 40 RJ ports.
B
SBx31CFC -
4 (right)
When both slots are used, dual CFC200s provide redundancy.
Control Fabric
Card
5 (left)
Includes serial console and ethernet management ports, as
well as an SD card slot and USB interface.
(CFC200)
Note:
When only one CFC200 is used, the other slot
must remain unused. This is not true for the
SBx3106, as decribed below.
C
AT-SBxFAN12
Fan Tray Slot
Fan Controller. Varies fan speed depending on temperature
thresholds.
D
AC POE PSU
(PSU)
Upper left of shelf
PSU Slots A and B
Allows up to two Power Supply Units (PSU) for Power over
Ethernet (PoE).
E
AC System PSU
Upper right of shelf
Allows up to two PSUs for 12V system power
E
DC System PSU
PSU slots C and D
Upper right of shelf
Allows up to two PSUs for 12V system power
PSU slots C and D
The DC PSU can be used in place of a SBx3100 system (12V)
PSU only. There is not a DC version of the POE PSU.
It is possible to power a chassis with a DC PSU and an AC
PSU, but this is not a recommended configuration. If both PSUs
are of the same type, load balancing is performed, but this is
not guaranteed when the PSU types are mixed. (One PSU can
supply enough power for the entire chassis.)
F
ESD
Bottom right of shelf
ESD wrist strap connection point.
Software Reference for SwitchBlade x3100 Series Switches
21
Setting Up the Switch
1.2.2 Card Configurations - SBx3106
The SBx3106 is a 4RU chassis with the same features as the SBx3106. It contains the same card configuration as the SBx3112
except for the following:
• The SBx3106 Fan tray model number AT-SBxFAN06.
• An optional fifth line card can be used in the CFC slot 5.
The SBx3106 must be configured with the Release 17.x software, but a CFC200 running an earlier release will sucessfully initialize in the shelf, allowing you to install a SBx3106 using an existing CFC200, or to order a CFC200 without requiring the
card to have a Release 17.0 load. The system should then be upgraded to Release 17.x.
The CFC slot 5 can alternatively be used as a line card slot. Line card slots typically provide 20G of backplane data plane traffic capacity to the simplex CFC200, but when slot 5 is used as a line card slot, it provides up to 40G of backplane data plane
traffic capacity to the simplex CFC200.
P
O
E
P
O
E
AC
DC
AC
AC
DC
DC
FAULT
FAULT
2
4
6
8
10
12
14
16
18
20
S
Y
S
T
E
M
AC
DC
FAULT
plus
SBx31GP24
0
S
Y
S
T
E
M
FAULT
plus
SBx31GP24
2
4
6
8
10
12
14
16
18
20
0
22
0
22
1
23
1
23
SBxFAN06
POWER
3
5
7
9
11
13
15
17
19
21
SBx31GP24
2
4
6
8
10
12
14
16
18
20
0
2
1
3
5
SBx31CFC
4
PSU
FAN
MASTER
SL AVE
NORMAL
FAULT
NORMAL
FAULT
7
9
SBx S TATUS
0
1
SYS S TA TUS
M/S
3
plus
RESET
2
3
4
5 CFC
M/S
6
7
PSU
8
9
FAN
10
11
SD
11
13
15
1000 LINK
AC T
10/100 LINK
AC T
NET MGMT
CONSOLE
10/100/1000Base-T
RS-232
17
19
0
23
1
9
11
13
8
6
10
12
14
16
18
15
17
19
21
ACT
20
22
24
26
28
30
32
34
B USY
SBx31GT24
7
2
9
4
11
13
6
15
17
8
19
10
21
23
12
25
14
27
29
16
31
33
18
35
37
20
0
22
L/A
FAULT
FIGURE 1-3
Note:
3
39
5
1
REA DY
36
38
3
21
7
1000 LINK
SBx31GC40
22
5
1
23
3
5
7
9
11
13
15
17
19
5
ESD
21
SBx3106 Chassis (Line Card in CFC Slot 5)
Throughout this document, when references are made to the SBx3112, the SBx3106 will apply as well, except
where noted.
1.2.3 Card Representation in Commands
For all of the cards except the power and cooling cards (refer to 1.15.1), a card is referenced by its slot number (such as
CARD=4). For CARD there is also ACTCFC and INACTCFC. Refer to SHOW CARD.
Note:
For the SBx3106, slot numbers go up to 5.
Software Reference for SwitchBlade x3100 Series Switches
22
Setting Up the Switch
1.3 Getting Started
1.3.1 How to Log In
The default user id / password for the systems are as follows:
• officer/officer or manager/friend
If the default user “officer” or “manager” has its password set to the default value (officer or friend), the following login message is displayed:
*************************************************************************
* Warning: The password for the user 'officer' is the system default.
*
The password should be changed to avoid a security risk.
* Warning: The password for the user 'manager' is the system default.
*
The password should be changed to avoid a security risk.
*************************************************************************
If you set the password to something besides the default password, the message is not displayed. However, if the password is
set back to the default, the message is displayed again.
1.3.2 Initial System Status
If service modules and one control module (dual CFC200 or single CFC200 with a filler plate) are installed, the system is
auto-provisioned and ready to pass customer traffic in the default configuration mode.
To see how the system is initially configured, input the SHOW SYSTEM command from the CLI. The system response below
shows a sample of what is displayed for the SHOW SYSTEM command and its initial state. (Descriptions of the CARD and
PSU parameters are in later sections.)
oE135 - manager SEC>> show system
--- System Information -------------------------------------------------------System Date...................
System Uptime.................
Software
Version.....................
Options.....................
Created.....................
Booted From.................
Resource Information
SDRAM (free/total)..........
Flash (free/total)..........
Identifying Information
Shelf Serial Number.........
Shelf CLEI Code.............
Shelf MAC...................
Hostname....................
Contact.....................
Location....................
Name........................
Services....................
Description.................
2010-07-31 17:37:38
1 days, 14 hours, 27 minutes, 48 seconds
14.2.0.GAMMA.20100721
Customer-Release Build
Wed 07/21/2010 at 10:30 AM
preferred
377546 KB / 524288 KB
41896 KB / 129024 KB
8
<unknown>
00:0C:25:04:00:0E
<none>
<none>
<none>
<none>
Layer 2 - Datalink/Subnetwork
Allied Telesis Switchblade x3112 - 12 Slot
High Availability Chassis
Number of MACs on card........ 2
Feature Keying
Customer ID................. <none>
Lock ID..................... icgb-cddf-alnk-kgdf-chkp-eocb-mebg-ighk
MGMT
IP Address.................. <none>
Subnet Mask................. <none>
Gateway..................... <none>
MAC Address................. 00:0C:25:04:00:0E
Domain Name................. <none>
DNS......................... <none>
Shelf Power Input............. AC
Provisioning Mode............. Auto Provisioning
ECO Mode...................... OFF
--- Card Information ---
Software Reference for SwitchBlade x3100 Series Switches
23
Setting Up the Switch
Slot
----0
1
2
3
Prov
Type
------GE24POE
Physical Type
-------------GE24POE
4
5
6
7
CFC200
XE4
CFC200
XE4
8
9
10
XE4
XE4
11
GE24SFP GE24SFP
Model
--------ATSBx24POE
AT-SBxMFC
ATSBx31XZ4
ATSBx04XP
ATSBx31GS24
Serial Number
------------------6
CLEI Code
----------
HW
Rev
--X2
FPGA
Rev
----
51
A042834101200007
-
X2
B
-
28
-
X3
-
A31GS24H100300027
-
X4
-
--- Power Supply Units --Slot
---A
B
C
Type
-----POE
POE
System
State
----UP-UP
UP-UP
UP-UP
Temp(C)
------31
31
43
Layer 2 Base System
------------------Ageing time...........................
Ageing time status....................
Learning status.......................
Age Only FDB clear....................
TABLE 1-2
300
Enabled
Enabled
Disabled
System Parameters for SHOW SYSTEM - SBx3112
Output
Description
System Date
The current time
System Uptime
Length of time since the last system reboot
Software Version
The version of the currently executing software
Software Options
Comments on load
Software Created
The date/time since the software was built.
Booted from
The designation (preferred, temporary, backup) of the image from which the system
booted.
SDRAM (free)
The amount of memory available for dynamic program execution
Flash (free/total).
The amount of Flash memory available for persistent storage of software loads, database images, and command scripts
Shelf Serial Number
Unique Number given to shelf
Shelf CLEI Code
CLEI Code (none)
Shelf MAC
MAC address for the shelf
Hostname
A name that is translated to an IP address using a DNS server.
Contact
Typed in contact name
Location
Typed in location.
Name
Typed in name for Allied Telesis SwitchBlade SBx3100 product.
Services
Service provided by the Allied Telesis SwitchBlade SBx3100 product
Description
Generic description of the product
Number of MACs
on card
Number of MAC addresses available for product identification
Customer ID
String to identify a customer for feature keying
Software Reference for SwitchBlade x3100 Series Switches
24
Setting Up the Switch
TABLE 1-2
System Parameters for SHOW SYSTEM - SBx3112
Output
Description
Lock ID
Key used for feature keying.
MGMT IP Address
IP Address of Allied Telesis SwitchBlade SBx3100 product.
MGMT Subnet Mask
Subnet Address. By default this is 255.255.255.0
MGMT Gateway
The IP address of a gateway device, needed when connecting to an external network.
This will have a default.
MGMT Domainname
This is always set to a default.
MGMT DNS
This is always set to a default.
Shelf Power Input
Type of power supply (AC)
Provisioning Mode
The system provisioning mode
ECO Mode
If the Green mode for LEDs is on or off
1.3.3 Check Software Load
Although the service modules are shipped with release files already present in FLASH memory, the release file should be
compared with the latest software release files that are available
Once a software release file is downloaded onto a network server, the user can copy the file to the CFC flash file system,
load it into FLASH memory, make it the active load, and ensure that when the CFC200 reboots this latest load is always used.
The user can also ensure the service module loads are obtained from the control module.
Caution: Always check with the Allied Telesis web site to see which loads should be used so that a later load can be
downloaded if necessary. Failure to do this may result in the product not being able to provide all the functionality
listed for a release. If you have questions, contact your Allied Telesis representative.
Caution: If the user tries to load a software version for a card that is incompatible with the system, the card will not go into
service and an alarm/log will result.
Note:
Refer to Configuring Physical Interfaces and Protocols for information on setting up the MGMT Ethernet interface
or the inband Ethernet interface to transports management data packets.
1.3.4 How to Get Command Help
Online help is available for all SBx3100 commands. There are two types of online help:
1.
For command string help, type in the start of a command and enter a space and a “?” at the end of the line. The SBx3100
will display a list of possible parameters. After entering a parameter and a “?”, online help provides an explanation of the
parameter. Entering a “?” alone will display all of the verbs available.
2.
For complete online help, type HELP and the command. If the command is incomplete, there is an error message. Entering a space and a “?” will show the next valid parameter. When the command is complete, a complete description of the
command is displayed.
Following is an example of using HELP for a command.
>HELP SHOW SNMP
ATI 200G Central Fabric Controller Help version 14.2.0 - English Version
SYNTAX:
SHOW SNMP
DESCRIPTION:
The SHOW SNMP command displays information about the device's SNMP
agent.
The following is example output from the SHOW SNMP command:
SNMP configuration:
Software Reference for SwitchBlade x3100 Series Switches
25
Setting Up the Switch
--------------------------------Status .......................... Enabled
Authentication failure traps .... Enabled
Community ....................... public
Access ........................ read-only
Status ........................ Enabled
Traps ......................... Enabled
Open access ................... Yes
Community ....................... Administration
Access ........................ read-write
Status ........................ Disabled
Traps ......................... Disabled
Open access ................... No
SNMP counters:
------------------------------inPkts ........................
inBadVersions .................
inBadCommunityNames ...........
inBadCommunityUses ............
inASNParseErrs ................
inTooBigs .....................
inNoSuchNames .................
inBadValues ...................
inReadOnlys ...................
inGenErrs .....................
inTotalReqVars ................
inTotalSetVars ................
inGetRequests .................
inGetNexts ....................
inSetRequests .................
inGetResponses ................
inTraps .......................
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
outPkts ........................
outTooBigs .....................
outNoSuchNames .................
outBadValues ...................
outGenErrs .....................
outGetRequests .................
outGetNexts ....................
outSetRequests .................
outGetResponses ................
outTraps .......................
Parameter
Meaning
Status
The status of the SNMP agent or the specified
community (ENABLED or DISABLED)
Authentication
Failure Traps
Whether or not the SNMP agent generates a trap
on an authentication failure for an incoming
SNMP packet (ENABLED or DISABLED)
Community
The name of an SNMP community on the device.
Access
The access rights for the SNMP community
(READ-ONLY or READ-WRITE)
Status
The status of the community (ENABLED or
DISABLED)
PARAMETERS:
SNMP The SNMP parameter indicates the kind of SHOW operation performed.
SEE ALSO:
ADD SNMP COMMUNITY
CREATE SNMP COMMUNITY
DELETE SNMP COMMUNITY
(etc.)
Software Reference for SwitchBlade x3100 Series Switches
26
Setting Up the Switch
1.4 CLI Introduction
1.4.1 Command Syntax Conventions
The syntax rules for a Command and its parameters use the following conventions throughout this document:
All upper case = Key Word
| = Option (OR)
[ ] = Optional
{ = Choice of one value }
1.4.2 Entering Commands
The SBx3100 supports line editing, line recall, and abbreviations, so that command line input and editing can be done very
quickly once command syntax and the line editing commands are learned.
Table 1-3 lists the terminal editing and keystroke functions most commonly used.
TABLE 1-3
Terminal Editing Functions and Keystrokes
Action
Key Sequence
Move cursor within command line
left and right arrow
Delete character to left of cursor
[Delete] or [Backspace]
Clear command line
[Ctrl/U]
Recall previous command in command history
CTRL/P or up arrow
Recall next command in command history
CTRL/N or down arrow
Automatically complete a partially entered command keyword
[Tab] or [Ctrl/I]
Commands can be entered in the following ways:
• Commands and parameters can be in lower case.
• Commands and parameters can be abbreviated (such as en for ENABLE, sh for SHOW, etc.)
• The equal sign (=) is not needed as long as a parameter is paired with a space and then a value.
Syntax in this document uses complete words with verbs and parameters in upper case and parameters paired with values
using an equal sign.
1.4.3 Control of CLI command confirmation
CLI commands that may result in destructive actions warn the user by responding to the input of such commands with a
prompt asking the user to confirm the requested action with a “YES or Y” or “NO or N”. The user must respond with either
a “YES or Y” or “NO or N”. The system will continue to prompt for this response until the user inputs a correct response.
This provides the system a certain level of protection from unwanted destructive events.
1.4.3.1 Disable/Enable Confirmation
CLI Confirmation can be disabled if required. Disabling is especially useful when executing command scripts on the system.
Software Reference for SwitchBlade x3100 Series Switches
27
Setting Up the Switch
Use the DISABLE CONFIRMATION command to suppress user confirmation prompts for potentially dangerous commands.
This command is intended for expert users who understand the impact of the various operations on the device.
For example, to reboot an active CFC, the following would appear with confirmation prompts enabled:
officer SEC> restart card actcfc cold
Do you really want to restart card actcfc (Y/N)?
With confirmation disabled, the operation is performed without prompt or delay. When this command is used, the settings
only affect the current user session. No other user sessions are altered or changed by. When you log out, the confirmation
settings are automatically restored to enable confirmation prompts.
1.4.4 Multiple Command Stringing
Multiple commands can be strung together on the command line using the “;”. For example, the following commands can be
entered as illustrated and the responses will be returned in the order of command entry.
SHOW SESSION;SHOW USER;SHOW TRANSFER ALL
Example:
officer SEC>> SHOW SESSION;SHOW USER;SHOW TRANSFER ALL
--- Active (logged in) Users -------------------------------------------------ID User
Port
Location
Status Login Time
Deact
(secs)
-- -------------------- ------- ---------------- ------ --------------- -----0 officer
Console local
CONN
2004-06-17
11:18:54
--------------------------------------------------------------------------------- User Authentication Database ---------------------------------------------Username:
officer
Privilege..... SECURITY
OFFICER
Telnet User... Yes
Description:
Security Officer User
Status....... Enabled
Logins..... 2
Last Login... 2004-06-17
11:18:54
Fails...... 0
Lockouts... 0
------------------------------------------------------------------------------------------------------------------------------------------------------------No Transfer in progress
-------------------------------------------------------------------------------
1.4.5 Command Alias
Command alias functionality allows Allied Telesis Network Access product users to define shortcuts to command strings to
simplify the use of the CLI. It allows users to create shortcut strings which can be typed in place of commonly used (longer)
commands. With alias command strings, the user is able to quickly perform operations without having to type the full command line.
1.4.5.1 Creating a Simple Command Alias
CREATE ALIAS=ge1prof STRING=”SHOW PROFILE NAMES GE1”
When the user inputs this alias, the user will type at the prompt:
officer SEC>>ge1prof
However, the alias may NOT be part of a command. For instance:
CREATE ALIAS=ge1prof STRING=“PROFILE NAMES GE24POE”
is not acceptable. If the user attempts to input it as:
Software Reference for SwitchBlade x3100 Series Switches
28
Setting Up the Switch
officer SEC>>SHOW ge1prof
the CLI responds with an error indicating that the command did not function correctly.
With this in mind, alias names must not exactly match any of the CLI command root keywords, such as ADD, DELETE, CREetc. The CREATE ALIAS command validates this and rejects any attempts to do so. This prevents the user
from creating an alias string that overrides an existing command.
ATE, SET, SHOW,
1.4.5.2 Creating a Command Alias that Takes Input Values
officer SEC>>CREATE ALIAS=makecard STRING=”CREATE CARD=$1 $2”
takes two input values. These values are typed in the order indicated by the $n part of the string, and separated by a
space. If the user types:
officer SEC>>makecard 1 GE24POE
a GE24POE card is created in slot 1, as if the user typed:
officer SEC>>CREATE CARD=1 GE24POE
• Alias command strings are made available to all users in the system. Since the alias command is mapped to actual CLI
commands, the substituted CLI command is verified to be valid for the privilege level of the user using the alias. For
instance, if there is an alias string “reboot” to substitute the command “RESTART CARD=ACTCFC CODE FORCE” (CREATE
ALIAS=reboot STRING=”restart card=actcfc force”) and a user with USER privileges attempts to use it, the response is an
error indicating that the command is not available for the current user privilege.
• Alias command strings persist over system reboots. Because of this, there are limits on the number of aliases stored and
the maximum size of the alias name and the substitution string. As mentioned earlier, a maximum of 200 alias commands
may be created and stored with the maximum name length being 40 characters and the maximum substitution string
being 256 characters.
• If there are existing alias commands that conflict with a new verb/action, by overriding it, that was introduced as a result
of system software upgrade, the alias will be automatically removed during the upgrade. For instance if there was an existing alias:
CREATE ALIAS=”clear” STRING=”PURGE USERS”
and the upgrade introduces a new command with the verb/action CLEAR, for example:
CLEAR DATABASE
then the “clear” alias would override the CLEAR verb/action, causing the command to be interpreted as “PURGE USERS
DATABASE”, which is invalid. Therefore, during the upgrade, checks are made for conflicts and any alias commands that
would result in a conflict are destroyed.
If an existing command that is referenced in an alias has changed syntax, thereby causing an invalid syntax, no correction
is taken. Once a user attempts to use the alias, an “Unable to Parse” error is displayed.
1.4.6 Configuring an Alias
This section describes configuration information, procedures, and commands for a Command Alias.
1.4.6.1 Default Configuration
Certain aliases will be created by the Allied Telesis Network Access product upon system start-up. These default aliases are
illustrated below (they are displayed using the SHOW ALIAS command):
>SHOW ALIAS
--- Alias Commands -----------------------------------------------------------Alias Name
----------------------showcfg................
showdebug..............
Substitution String
-----------------------------------------------------show config
showoamp
Software Reference for SwitchBlade x3100 Series Switches
29
Setting Up the Switch
showdhcp...............
showepsr...............
showigmp...............
showint................
showlag................
showoamp...............
showrtp................
showstp................
showswitch.............
showsys................
showtraf...............
showuser...............
showvc.................
showvlan...............
$1;showint;showtraf;showigmp;showvlan;showlag;showswit
ch;showstp;showdhcp;showepsr;showrtp;showvc;showuser;s
howsys;showcfg
show dhcprelay
show epsr all;
show igmp;show igmpsnooping count
messageresponse;show igmpsnooping card all full;show
igmpsnooping interface all full
show interface all queuecount;show interface all
counter;show ip arp all;show ip connections;show ip
interface all;show ip interface all full;show ip
route all;
show lag all
show card $1 software;show card $1 ports;show card
actcfc cpu;show card inactcfc cpu;show card actcfc
memory heap;show card memory quickheap;show card
actcfc memory messagebuffers;show card inactcfc
memory messagebuffers;
show rtp interface all full;
show stp;show stp counter;
show switch;show switch fdb;show switch counter
show system;show system cooling;show fanmodule;show
sntp;show bootserver;show alarms all;show
contactalarm all severity all state all;
show classifier all full;show trafficdescriptor
all;show arpfilter;show qos;show accesslist all
show user;show telnet server;show sessions;show
system userconfig;show log filter;show log
output;show radius;show tacplus;show snmp;show snmp
community all;
show vc interface all full;
show vlan all full
-------------------------------------------------------------------------------
The default aliases are created dynamically when the system reboots and no other aliases have been created by the user. If,
for some reason, a default alias or aliases have been deleted, the user can recreate them all using the SETDEFAULTS ALIAS command.
1.4.6.2 Configuration Guidelines
• Command alias allows the user to create a shortcut to a command string, allowing input of the alias instead of the
extended command string. For example, suppose the user types the following, CREATE ALIAS=reboot
STRING=”RESTART CARD ACTCFC COLD”. From this point forward, the user would only be required to type
“reboot” at the CLI to reboot the active CFC.
• When the user inputs an alias that happens to fail for some reason, the failure will be displayed exactly as if the user
entered the full command string.
• The alias must encompass an entire command line. Alias strings cannot be used to substitute a portion of a command.
• The alias is not case-sensitive; similar to normal CLI commands.
• The system has an upper limit of 200, 255-character long alias entries.
• Alias commands persist between the ACTCFC and INACTCFC. Alias commands are available to all users and are pro•
•
•
•
tected by the user level settings.
Question mark (?), the CLI help symbol, is not available for aliases. For example, if a user created an alias called “mkcard”
that takes a parameter for card slot and card type, the following would not provide any useful information: Manager>>
mkcard ?.
If an alias was created using a command whose definition changed as the result of an upgrade or the alias is associated
with a command that no longer exists after the upgrade, the alias will remain after the upgrade, but will no longer work.
Auditing of the aliases over upgrades to ensure that they match any commands in the current command set is not supported.
An existing alias cannot be overwritten. To reuse an existing alias name, the user must first destroy and then create the
new definition of the alias using the DESTROY and CREATE commands.
An alias command name that is all or part of a command verb is not allowed. For example, the alias command could not
be “CREATE”, “CREAT”, “CRE”, “CR” or “C”, because it could potentially overwrite the command verb “CREATE”.
Software Reference for SwitchBlade x3100 Series Switches
30
Setting Up the Switch
• All aliases are visible to all user privilege levels. Validation of the user privilege level (to execute a certain command), is
done when attempting to use the alias. If the user does not have the privilege level required for the command, command
execution will fail. This will be discussed in more detail later in this subsection.
• Alias names must be alphanumeric.
• Nesting of alias commands is not supported within commands with aliases.
• Alias command strings must substitute a CLI command string from the root of the command. For instance, the user may
set a command string “ge1prof” to be equivalent to “SHOW PROFILE NAMES GE1” (the entire command string) by creating the alias:
1.4.6.3 Configuration Procedure
The following procedure shows the commands used to create an Alias
TABLE 1-4
Step
Action or State
1
Create an alias
Configure a Command Alias
Details
CREATE ALIAS=dm STRING=”disable more”
CREATE ALIAS=shsys STRING=”show system”
2
Use an alias
dm
shsys
3
The output of the actual
string appears.
Show the alias string
SHOW ALIAS=dm
dm=”disable more”
4
Create an alias command with input variables
CREATE ALIAS=shcard STRING=”SHOW CARD=$1”
5
Use this alias to view the information about card 4
shcard 4
Software Reference for SwitchBlade x3100 Series Switches
31
Setting Up the Switch
1.4.7 Alias Commands
This section describes the commands available for using the CLI (Alias)
TABLE 1-5
Alias Commands
Commands
CREATE ALIAS STRING
DESTROY ALIAS
RENAME ALIAS TO
SETDEFAULTS ALIAS
SHOW ALIAS
Software Reference for SwitchBlade x3100 Series Switches
32
Setting Up the Switch
CREATE ALIAS STRING
Syntax
CREATE ALIAS=aliasname STRING=substitution
Description
Creates a command alias. The list of alias commands is available for all users in the system. Validation is
done on the alias name and its definition to ensure that the alias name has not already been created
and that the definition does not reference itself.
Mode
Manager
Options
Option
Description
Range
Default
Value
ALIAS
The name of the alias for the command string.
NA
NA
NA
NA
An alias name may not match all or part of existing CLI
command root keywords.
STRING
The alias name string specifies the case-insensitive literal
string which will be used in place of the CLI string provided in the STRING=substitution string parameter.
An alias string may consist of one or more valid CLI
commands or other previously defined alias commands,
separated by semicolons. The string may contain arguments, identified with a '$' and number, such as "$1 $2"
etc. These arguments indicate placeholders where
tokens will be substituted once the alias command is
executed.
The substitution string value may not be the same as
an existing CLI command ROOT keyword, such as
ADD, DELETE, SHOW, SET, etc. This command may be
executed by users with a MANAGER privilege
level or higher.
Release Note
NA
Example
CREATE ALIAS=su STRING="show user $1;show sys userconfig"
Software Reference for SwitchBlade x3100 Series Switches
33
Setting Up the Switch
DESTROY ALIAS
Syntax
DESTROY ALIAS={ aliasname-list | ALL }
Description
Allows the user to remove an existing alias from the persisted list of alias commands.
Mode
Manager
Options
Option
Description
Range
Default
Value
ALIAS
The name of the alias for the command string.
NA
NA
Specifies the case-insensitive literal string which is to be
destroyed. This command may be executed by users
with a MANAGER privilege level or higher.
The value can be one alias, more then one alias separated by a comma, or ALL.
Release Note
NA
Note
NA
Example
DESTROY ALIAS=su,manage
Software Reference for SwitchBlade x3100 Series Switches
34
Setting Up the Switch
RENAME ALIAS TO
Syntax
RENAME ALIAS=aliasname TO=aliasname
Description
Renames an existing alias. As with the original name, it must follow the same naming rules (An alias
name may not match all or part of existing CLI command root keywords, such as s, sh, sho, or show.).
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
ALIAS
The name of the alias to be renamed
NA
NA
TO
The renamed alias. It must match the same naming rules
as the original one.
NA
NA
NA
Example
RENAME ALIAS=su TO=super
Software Reference for SwitchBlade x3100 Series Switches
35
Setting Up the Switch
SETDEFAULTS ALIAS
Syntax
SETDEFAULTS ALIAS
Description
Resets alias defaults. Any aliases created by the user no longer exist and must be re-created, if needed.
The default alias commands consist of "showdebug" which references a set of other alias commands,
used to display all system information.
Mode
Manager
Options
NA
Release Note
NA
Example
SETDEFAULTS ALIAS
Software Reference for SwitchBlade x3100 Series Switches
36
Setting Up the Switch
SHOW ALIAS
Syntax
SHOW ALIAS [ ={ aliasname-list | ALL } ]
Description
The SHOW ALIAS command allows the user to view a list of all alias commands and their corresponding substitution strings. If the user enters a name value, that alias information is displayed. The list of
alias commands is displayed in alphabetical order. This command may be executed by users with a
USER privilege level or higher.
Mode
Manager
Options
Option
Description
Range
Default
Value
ALIAS
The name of the alias for the command string.
NA
ALL
The value can be one alias, more then one alias separated by a comma, or ALL
Release Note
NA
Example
>SHOW ALIAS=showvc
--- Alias Commands --------------------------------Alias Name
Substitution String
----------------------- --------------------------showvc................. show vc interface all full;
Software Reference for SwitchBlade x3100 Series Switches
37
Setting Up the Switch
1.5 User Administration
1.5.1 Users and Privileges
The SBx3100 supports three levels of security: User, Manager, and Security Officer. Each level provides a specific degree of
system access in a progressive fashion as shown in Figure 1-4.
User + Manager + Security Officer
Security Officer
User + Manager
Manager
User
Telesis_Product_Security_Levels
FIGURE 1-4
SBx3100 Security Levels
Each security level controls the commands that can be entered as follows:
• User - Users have the lowest level of access, which is equivalent to read-only privileges. They can change their password
and use any of the SHOW commands to display information. When logged in, the User receives the command-line prompt:
username USR >
• Manager - Managers have a higher priority than Users and can perform all actions that a User can perform. In addition to
User privileges, Managers can control various aspects of a User’s account (such as showing all active sessions or showing
statistics) and can configure most areas of the SBx3112. When logged in, the Manager receives the command-line prompt:
username MGR >
• Security Officer - Security Officers have the highest priority and can access the full set of commands. In addtion to
Manager privileges, Security Officers can add, remove, or modify other user accounts, as well as create, modify, and
destroy management features. When logged in, the Security Officer receives the command-line prompt:
username SEC >
Note:
Commands that are at the Security Officer level have the text “_SEC” added to the command in the command
reference.
For all security levels, a login name and password (case-sensitive) are required to access the system. There is a timer (default
of 300 seconds or 5 minutes) that will log off the session if no commands are entered within the timeout period.
Note:
The SBx3100 can support up to 10 concurrent TELNET sessions.
1.5.2 Customizing the CLI Prompt
When you log into the Allied Telesis system, a default CLI prompt is provided as displayed here:
Software Reference for SwitchBlade x3100 Series Switches
38
Setting Up the Switch
Username: officer
Password:
officer SEC>>
<----------- CLI prompt
You can provision or customize the system CLI prompt. The changes to the CLI prompt affect all user sessions immediately
after the prompt settings are modified.
Usage notes:
• The CLI prompt is a text message presented to a user after successful login authentication.
• The CLI prompt is the same for all users.
The user can change the format of the CLI prompt. Aside from plain text, the CLI prompt can contain any of the following
formats:
•
•
•
•
•
•
Device IP (%i)
System name (%n)
User name (%u)
Date (%d)
Time (%t)
Security level (%s)
Note that changes to the CLI prompt persist over software upgrades, over both active and inactive CFCs in a duplex system,
and over restarts.
Note:
When the Network Access product device is managed by the Allied Telesis NMS system, the user account (Security
Officer level) that is used by the Allied Telesis NMS to query and control the device must use the default >> prompt.
Refer to the Allied Telesis NMS Administration Guide for details.
Following are examples of provisioning the CLI prompt.
1.
Change the CLI prompt:
officer SEC>> SET PROMPT "Testing the CLI User Prompt"
Info (010017): Operation Successful
Testing the CLI User Prompt>>
2.
Reset the CLI prompt:
Testing the CLI User Prompt>> SETDEFAULTS PROMPT
Info (010017): Operation Successful
officer SEC>>
3.
Set the CLI prompt to the system IP:
officer SEC>> SET PROMPT="%i"
Info (010017): Operation Successful
172.16.66.71>>
172.16.66.71>>
4.
Reset the CLI prompt:
172.16.66.71>> SETDEFAULTS PROMPT
Info (010017): Operation Successful
5.
Set the CLI prompt to the system name:
officer SEC>> SET PROMPT="%n"
Info (010017): Operation Successful
Lab System 42>>
6.
Reset the CLI prompt:
Lab System 42>> SETDEFAULTS PROMPT
Info (010017): Operation Successful
7.
Set the CLI prompt to the system user:
officer SEC>> SET PROMPT="%u"
Info (010017): Operation Successful
Software Reference for SwitchBlade x3100 Series Switches
39
Setting Up the Switch
LabUser>>
8.
Reset the CLI prompt:
LabUser>> SETDEFAULTS PROMPT
Info (010017): Operation Successful
officer SEC>>
9.
Set the CLI prompt to the system date:
officer SEC>> SET PROMPT="%d"
Info (010017): Operation Successful
2004-05-12>>
2004-05-12>>
10.
Reset the CLI prompt:
2004-05-12>> SETDEFAULTS PROMPT
Info (010017): Operation Successful
11.
Set the CLI prompt to the system date:
officer SEC>> SET PROMPT="%t"
Info (010017): Operation Successful
15:40:24>>
15:40:25>>
12.
Reset the CLI prompt:
15:40:26>> SETDEFAULTS PROMPT
Info (010017): Operation Successful
13.
Set the CLI prompt to the Security Officer:
officer SEC>> SET PROMPT="%s"
Info (010017): Operation Successful
SEC>>
14.
Reset the CLI prompt:
SEC>> SETDEFAULTS PROMPT
Info (010017): Operation Successful
officer SEC>>
1.5.3 Provisioning the Login Banner
The login banner appears as the first system output presented to a user when they log into the Allied Telesis system. The
user has the ability to provision or customize the system login banner. The banner could be changed to present a message to
all users or a message of the day.
Usage notes follow:
• The login banner is a text message presented to a user after successful login authentication.
• The login banner may be the same for all users or be different based upon privilege level (USER, MANAGER, or
SECURITY OFFICER).
• This functionality supports up to three (3) different text entries for login banner.
• Login banner text may either be specified by directly entering the text using CLI commands or added using a script file
that contains the desired text.
• The login banner entry may be up to 255 characters long.
Note that changes to the banner persist over software upgrades, over both active and inactive CFCs in a duplex system, and
over restarts.
Note:
Only the Security Officer can change the login banner.
Following is an example of provisioning the login banner.
Set the login banner default:
officer SEC>> SETDEFAULTS LOGINBANNER ALL
Info (010017): Operation Successful
Set the login banner:
Software Reference for SwitchBlade x3100 Series Switches
40
Setting Up the Switch
officer SEC>> SET LOGINBANNER STRING="Allied Telesis SBx3112"
Info (010017): Operation Successful
Display the login banner:
officer SEC>> SHOW LOGINBANNER
--- Login Banner Settings ----------------------------------------------------Privilege Level: USER,MANAGER,SECURITY OFFICER
Allied Telesis SBx3112
------------------------------------------------------------------------------------------------------------------------------------------------------------
Logout and log back into the system to see the changed banner:
Username: officer
Password:********
Allied Telesis SBx3112
officer SEC>>
1.5.4 Password Recovery
If all system user IDs and passwords have been deleted, destroyed, or corrupted, you can recover the default user ID and
password using the password recovery procedure.
Password recovery should only be performed on a simplex system; on a duplex system, the inactive may restart and gain
activity while the boot parameters are being changed on what was the active unit.
1.5.4.1 Password Recovery Interactions
• A system power cycle must be performed in order to recover the default user ID and password.
• The system must be rebooted in order to recover the default user ID and password.
• Boot flags must be set in order to perform the password recovery procedure.
Since all system user IDs and passwords have been destroyed, there is no user access to the CLI command line prompt to initiate a reboot from software using the RESTART command. Therefore, the system must be power-cycled. Refer to 1.5.4.2.
1.5.4.2 Password Recovery Procedure
1.
Ensure that the management device (PC, laptop, etc.) is connected to the CONSOLE (serial) port of the active CFC card.
2.
Cut the power to the PSUs.
3.
Restore power to the PSUs.
4.
As the CFC recovers, watch the boot banner as it appears.
5.
When the message to enter ^b (Ctrl b) appears, enter Ctrl b. This stops the boot process and gives control of the session
to the user, starting with the password, as shown below.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
ATI 200G Central Fabric Controller Boot Loader
Version 14.1.g.02.20100414
Created on Wed 04/21/2010 at 09:50 AM
Copyright Allied Telesis Inc., 2009
VxWorks Version 5.5.1 for MV78100 CFC200 LE MMU ARCH 5
BSP version 1.2/1.3.5_000
Copyright Wind River Systems, Inc., 1984-2002
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
*****************************************************************************
* Warning: The password for the bootrom is the system default.
*
The password should be changed to avoid a security risk.
*****************************************************************************
Press ^b to stop automatic loading of software image...
Software Reference for SwitchBlade x3100 Series Switches
41
Setting Up the Switch
6
// Countdown timer
Enter Password:
[Allied Telesis Boot Loader]:
6.
It is a good idea to change the default bootrom password (“friend”). Type “w” and press ENTER. You will be prompted
for the old password and new password, as shown below.
[Allied Telesis Boot Loader]:w
Enter Old Password:
Enter New Password:
Re-enter New Password:
Password successfully changed
[Allied Telesis Boot Loader]:
7.
Type “c” (for change parameter) and press ENTER. As each parameter appears, press ENTER to accept the current value,
until the parameter “BOOTFLAGS” is reached. At this point, add the hexadecimal value “0x100000” to the existing value
and press ENTER. This enables the password recovery mode. For example, if the existing value is “0x1000”, enter
“0x101000” (0x1000 + 0x100000).
[[Allied Telesis Boot Loader]: c
'.' = clear field;
'-' = go to previous field;
BOOTSERVER NAME
BOOTSERVER IPADDR
NETWORKLOAD
HOSTNAME
MGMT IPADDR
GATEWAY IPADDR
SUBNETMASK
FTP USERNAME
FTP PASSWORD
BOOTFLAGS
:
:
:
:
:
:
:
:
:
:
^D = quit
10.52.18.3
/tffs/load/cfc200_14.1.0.GAMMA.20100303.tar
10.52.71.36
10.52.71.1
255.255.255.0
target
telesyn
0x1008 0x101008
[Allied Telesis Boot Loader]:
8.
Type “@” and press ENTER to reboot the system again.
[Allied Telesis Boot Loader]: @
9.
The boot sequence starts again. This time, let the countdown timer expire and the system reboots automatically. Note
the message that appears indicating that password reset has been performed. All existing users and passwords have been
removed from the system and the default user ID and password combination (officer/officer and manager/friend) has
been restored.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
ATI 200G Central Fabric Controller Boot Loader
Version 14.1.g.02.20100414
Created on Wed 04/21/2010 at 09:50 AM
Copyright Allied Telesis Inc., 2009
VxWorks Version 5.5.1 for MV78100 CFC200 LE MMU ARCH 5
BSP version 1.2/1.3.5_000
Copyright Wind River Systems, Inc., 1984-2002
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
*****************************************************************************
* Warning: The password for the bootrom is the system default.
*
The password should be changed to avoid a security risk.
*****************************************************************************
Press ^b to stop automatic loading of software image...
0
Automatically loading software image...
FPGA Version 15.0
Starting Application Software Loading.
Attaching to Flash File System ... done.
/tffs/ - Volume is OK
Boot album is (current, attempt 1): 'cfc200_14.1.0.GAMMA.20100303.tar'
Checking Album's integrity...done
Loading vxWorks.bin.gz...(12854375 bytes)
Starting at 0x10000...
Attaching interface lo0...done
Software Reference for SwitchBlade x3100 Series Switches
42
Setting Up the Switch
Adding 45812 symbols for standalone.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
;@ @@@@@@@@@@@@@@@@@ ====
,;@@@@ @@@@@@@@@@@@@@" ========
;@@@@@@@@
@@@@@@@@" ,@ ========
,;@@@@@@@@@@@ @@@@@@@" ,@@@ ========
;@@@@@@@@@@@@@@@ @@@@;" ,@@@@@@ ====,
,;@@@@@@@@@@" ;@@@@@ @@" @@@@@@@@@@@@"
@@@@@@@@@@@"
"@@@@@ " @@@@@@@@@@@@@"
Allied Telesis, Inc.
ATI 200G Central Fabric Controller
Version 14.1.0.GAMMA.20100303 (Lab-Only Build)
Created on Wed 03/03/2010 at 04:10 AM
Copyright Allied Telesis Inc., 2009
---------------------------------------------Software Version Information
---------------------------------------------Build name : ATI 200G Central Fabric Controller
Build type : Lab-Only Build
Revision
: 14.1.0.GAMMA.20100303
Built on
: Wed 03/03/2010 at 04:10 AM
Built by
: Loadbuild Prime
Environment: ccb_R14.1_int
Baseline
: R14.0.1_2010_03_01_RC4
Target
: cfc200
Options
: OFFICIALBUILD=TRUE
Brand
: ATI
---------------------------------------------Boot ROM Version Information
---------------------------------------------Boot ROM
: ATI 200G Central Fabric Controller Boot Loader
Revision
: 14.1.g.02.20100414
Built on
: Wed 04/21/2010 at 09:50 AM
Built by
: dlayne
Environment: dlayne_R14.1_2
Baseline
: R14.0_4_16_2010_preRC9
BuildTarget: bootcfc200
---------------------------------------------VxWorks Version 5.5.1 for MV78100 CFC200 LE MMU ARCH 5
BSP version 1.2/1.3.5_000
Copyright Wind River Systems, Inc., 1984-2002
Memory Size: 511 MB
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
********************
* WARNING: Password reset mode has been activated for this reboot.
********************
System Time is 2010-04-21 07:11:29.428
Last reset occurred due to a power interruption.
System initializing...
/tffs/
- Volume is OK
Initialization completed successfully (14.1.0.GAMMA.20100303)
User Access Verification
Username: officer
Password:
10.
Enter the user ID officer (or manager).
Username: manager
11.
Enter the user password officer (or friend).
Password: (typed password is hidden from view)
12.
The user is logged into the system. System user data can be re-configured and stored in the database. Other configuration
data remains intact.
13.
Note that there is a security risk if the default user ID and password are enabled. It should be modified as soon as possible or the default “officer” and “manager” accounts should be replaced by a different SECURITY OFFICER account.
Software Reference for SwitchBlade x3100 Series Switches
43
Setting Up the Switch
>show user
--- User Authentication Database ---------------------------------------------Username
--------------------officer
manager
Privilege
---------------SECURITY OFFICER
SECURITY OFFICER
Status
-------Enabled
Enabled
Telnet
-----Yes
Yes
SSH
--Yes
Yes
Last Login
------------------2010-04-21 07:11:50
2010-04-21 07:11:58
-------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
44
Setting Up the Switch
1.5.5 User Administration Commands
This section describes the commands available for User Administration.
TABLE 1-6
User Administration Commands
Commands
ADD USER PASSWORD (SEC)
DEACTIVATE SESSION (SEC)
DELETE USER (SEC)
DISABLE CONFIRMATION
DISABLE MORE
DISABLE USER (SEC)
ENABLE CONFIRMATION
ENABLE MORE
ENABLE USER (SEC)
PURGE USER (SEC)
RESET USER (SEC)
SEND MESSAGE SESSION
SET LOGINBANNER (SEC)
SET PASSWORD
SET PROMPT
SET SYSTEM
SET SYSTEM LANGUAGE
SET SYSTEM USERCONFIG (SEC)
SET SYSTEM USERCONFIG - (password) - (SEC)
SET USER (SEC)
SETDEFAULTS LOGINBANNER (SEC)
SETDEFAULTS PROMPT
SHOW LOGINBANNER
SHOW SESSIONS
SHOW SYSTEM
SHOW SYSTEM USERCONFIG (SEC)
SHOW USER
Software Reference for SwitchBlade x3100 Series Switches
45
Setting Up the Switch
ADD USER PASSWORD (SEC)
Syntax
ADD USER=login-name PASSWORD=password [
DESCRIPTION=description ] [ PRIVILEGE={
[ LOGIN={ TRUE | FALSE | ON | OFF | YES
SSH={ YES | NO } [ PUBLICKEY=key-name ]
[ DEACTIVATE={ OFF | yyyy-mm-dd } ]
Description
Used to add new user accounts to the system. At a minimum, a user login name and password must be
specified. The password can be clear text (non-encrypted) or in the form of a 32-character MD5
encrypted string. Unless the FORMAT option is specified, the password value is assumed to be clear
text.
Mode
Sec_Off
FORMAT={ CLEARTEXT | MD5 } ] [
USER | MANAGER | SECURITYOFFICER } ]
| NO } ] [ TELNET={ YES | NO } ] [
] [ PWDAGEING={ OFF | 0 | 1..365 } ]
Options
Option
Description
Range
Default
Value
USER
Identifies the name of the account to change. It is a character string, 1 to 32 characters in length. Valid characters are uppercase letters (A-Z), lowercase letters (a-z),
and decimal digits (0-9). The string may not contain
spaces. The login name is case insensitive.
NA
NA
PASSWORD
The password can be clear text (non-encrypted) or in
the form of a 32-character MD5 encrypted string.
NA
NA
FORMAT
Format of the password
NA
CLEARTEXT
CLEARTEXT - Non-encrypted text
MD5 - Pre-encrypted as a 32 character MD5 digest.
DESCRIPTION
Descriptive text for the user
NA
NA
PRIVILEGE
One of the three levels. Refer to 1.5.1.
NA
USER
LOGIN
Specifies whether or not the account is accessed via
direct login or not.
NA
YES
NA
NO
YES - The account can be used immediately after it is
created.
NO, FALSE, or OFF - the account cannot be used to
access the system.
TELNET
Allows telnet access to be enabled or disabled for the
user being added.
YES - the user has access via telnet.
NO - The user will only be able to connect via serial
port.
SSH
Allows Secure Shell access to be enabled or disabled for
the user being added.
NA
NO
PUBLICKEY
The SSH Public key associated with the user account
and used for SSH authentication.
NA
NA
Software Reference for SwitchBlade x3100 Series Switches
46
Setting Up the Switch
Option
Description
Range
Default
Value
PWDAGEING
Indicates the number of days before a password expires
and requires the user to change its password. If the
value is OFF or 0, then the password does not expire.
NA
OFF
DEACTIVATE
Indicates the date that the user account is to be deactivated. The default value is OFF, which indicates that
there is no deactivation date.
NA
OFF
Release Note
NA
Example
ADD USER coleman PASSWORD cac1cacX TELNET=YES
Software Reference for SwitchBlade x3100 Series Switches
47
Setting Up the Switch
DEACTIVATE SESSION (SEC)
Syntax
DEACTIVATE SESSION={session-list|ALL} [{CANCEL|[MESSAGE=messagetext][DELAY=1..600]}]
Description
Provides a means to force a user off the system. There are two primary modes of operation for the
command, to force users off immediately or to have a delay.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
SESSION
By running the command with just a session id, the associated user is forced off immediately.
NA
NA
Session Id values can be found by running the SHOW
SESSIONS command. The session Id corresponds to
either the console number (0) or one of the 10 telnet
sessions. The SHOW SESSION command will indicate
which sessions have been initiated for a delayed deactivation. A number in the 'Deact' column indicates the
number of seconds left before that session is forced off.
MESSAGE
Text message to send to other users before ending the
session.
NA
NA
DELAY
If there is a need to offer users an opportunity to complete their work before logging off, the DELAY and MESSAGE options can be used.
NA
1 second
If delayed deactivation is used, the deactivation can be
aborted through the use of the CANCEL option.
Release Note
NA
Example
DEACTIVATE SESSION=ALL MESSAGE=Reboot in 60 seconds DELAY=60
Software Reference for SwitchBlade x3100 Series Switches
48
Setting Up the Switch
DELETE USER (SEC)
Syntax
DELETE USER=login-name
Description
Used to remove user accounts from the system. Once removed, the associated user cannot log into
the system again until his/her account is recreated via the ADD USER command. The DELETE USER
command does not, however, log the associated user off the system. If the affected user is currently
logged in, he/she is informed that his/her account was removed, but no other action is taken. If there is
a desire to force the user off the system as part of deleting the account, the DEACTIVATE SESSION
command must also be used.
Mode
Sec_Off
Options
Release Note
Option
Description
Range
Default
Value
USER
The login id that was configured
NA
NA
NA
Example
>DELETE USER=coleman
Delete User (Y/N)? Y
Info (020100): User "coleman" has been deleted
Software Reference for SwitchBlade x3100 Series Switches
49
Setting Up the Switch
DISABLE CONFIRMATION
Syntax
DISABLE CONFIRMATION
Description
Used to suppress user confirmation prompts for potentially dangerous commands. This command is
intended for expert users who understand the impact of the various operations on the device.
Mode
Manager
Release
Options
NA
Release Note
NA
Example
DISABLE CONFIRMATION
Software Reference for SwitchBlade x3100 Series Switches
50
Setting Up the Switch
DISABLE MORE
Syntax
DISABLE MORE
Description
Disables the --More-- output and lets the SBx3112 output continue to run past the end of the window.
The disabling of the MORE prompt via this command will only affect the current CLI session. The
MORE prompt can be re-enabled via the ENABLE MORE command.
Mode
Manager
Options
NA
Release Note
NA
Example
DISABLE MORE
Software Reference for SwitchBlade x3100 Series Switches
51
Setting Up the Switch
DISABLE USER (SEC)
Syntax
DISABLE USER=login-name
Description
Locks out a user. The account is still present, but the user that owns the account is unable to login.
Once disabled, the associated user cannot log into the system again until his/her access is re-enabled
via the ENABLE USER command. The DISABLE USER command does not, however, log the associated
user off the system. If the affected user is currently logged in, he/she is informed that his/her account
was removed, but no other action is taken. If there is a desire to force the user off the system as part
of deleting the account, the DEACTIVATE SESSION command must also be used.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
USER
The login name of the user
NA
NA
Release Note
NA
Example
DISABLE USER=coleman
Software Reference for SwitchBlade x3100 Series Switches
52
Setting Up the Switch
ENABLE CONFIRMATION
Syntax
ENABLE CONFIRMATION
Description
Used to re-enable confirmation prompts after they were disabled by the DISABLE CONFIRMATION
command. By default, confirmations are enabled. When this command is used, the settings only affect
the current user session. No other user sessions are altered or changed. When a user logs out, the
confirmation settings are automatically restored to enable confirmation prompts.
Mode
Manager
Options
NA
Release Note
NA
Example
ENABLE CONFIRMATION
Software Reference for SwitchBlade x3100 Series Switches
53
Setting Up the Switch
ENABLE MORE
Syntax
ENABLE MORE
Description
Stops the terminal output at the end of a window and displays --MORE --. Press return to continue the
output. This paging can be disabled via the DISABLE MORE command. BY doing so, the data will be
displayed to the screen in its entirety. The MORE prompt can be re-enabled via the ENABLE MORE
command.
Mode
Manager
Options
NA
Release Note
NA
Example
ENABLE MORE
Software Reference for SwitchBlade x3100 Series Switches
54
Setting Up the Switch
ENABLE USER (SEC)
Syntax
ENABLE USER=login-name
Description
Re-enables an account that was previously disabled. Once enabled, the associated user can log into the
system again until his/her access is disabled via the DISABLE USER command.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
USER
The login name of the user
NA
NA
Release Note
NA
Example
ENABLE USER=coleman
Software Reference for SwitchBlade x3100 Series Switches
55
Setting Up the Switch
PURGE USER (SEC)
Syntax
PURGE USER
Description
Deletes all users from the database and recreates the default Security Officer user. Global configuration parameters and counters are not affected. To clear these counters use the RESET USER command.
Mode
Sec_Off
Options
NA
Release Note
NA
Example
PURGE USER
Software Reference for SwitchBlade x3100 Series Switches
56
Setting Up the Switch
RESET USER (SEC)
Syntax
RESET USER[=login-name] [COUNTER[={ALL|GLOBAL|USER}]]
Description
Resets the User Authentication Database counters for one or all users, or resets global counters for
the User Authentication Facility. Statistics about users are shown with the SHOW USER and SHOW
SYSTEM USERCONFIG commands. The login name is not case sensitive.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
USER
If a login name is specified with the USER parameter, the
COUNTER parameter is optional (only USER may be
specified) and the activity counters for the specified user
are reset.
NA
NA
COUNTER
If a login name is not specified with the USER parameter
then the COUNTER parameter is used to specify which
counters should be reset. If USER is specified, the activity counters for all users are reset.
NA
USER
If GLOBAL is specified, the global counters for the User
Authentication Facility are reset.
If ALL is specified, all counters are reset.
Release Note
NA
Example
RESET USER COUNTER=ALL
Software Reference for SwitchBlade x3100 Series Switches
57
Setting Up the Switch
SEND MESSAGE SESSION
Syntax
SEND MESSAGE=message-text SESSION={session-list|ALL}
Description
Will allow the user to send a simple text message to any other active CLI session. The message will be
displayed asynchronously on the command window of each session listed in the SESSION parameter.
Mode
Manager
Options
Option
Description
Range
Default
Value
MESSAGE
text to send to other users (sessions)
NA
NA
SESSION
The Session ID(s) that will receive a message. The session ID. Session ID values can be found by running the
SHOW SESSIONS command. The session ID corresponds to either the console number (0) or one of the
10 telnet sessions
NA
ALL
ALL sends the message to all sessions
Release Note
NA
Example
SEND MESSAGE=”reboot in 5 minutes” SESSION=ALL
Software Reference for SwitchBlade x3100 Series Switches
58
Setting Up the Switch
SET LOGINBANNER (SEC)
Syntax
SET LOGINBANNER { FILE=filename | STRING=string }
[ { USER | MANAGER | SECURITYOFFICER | ALL } ]
Description
Allows the Security Officer user to change the login banner.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
FILE
If the FILE parameter is provided, the contents of the file
is retrieved and stored locally. The contents of the file is
also retrieved upon system reboot. If the file is deleted
or replaced, the local storage of the loginbanner is not
updated unless the command is re-run or the system is
rebooted.
NA
NA
STRING
If the STRING parameter is provided, the contents of
the string is stored locally and persisted for use after
system reboots. The maximum length of the STRING
value is 255 characters.
NA
NA
Security Level
The USER, MANAGER, SECURITYOFFICER and ALL
parameters define which user level(s) the loginbanner is
applied to.
NA
ALL
Release Note
NA
Example
SET LOGINBANNER STRING="Allied Telesis SBx3112"
Software Reference for SwitchBlade x3100 Series Switches
59
Setting Up the Switch
SET PASSWORD
Syntax
SET PASSWORD
Description
Allows Users to change their password at anytime. The command prompts for the old password and
asks to reconfirm the new password.
Mode
Manager
Options
NA
Release Note
NA
Example
SET PASSWORD
Enter Old Password:
Enter New Password:
Re-enter New Password:
Password successfully changed
Software Reference for SwitchBlade x3100 Series Switches
60
Setting Up the Switch
SET PROMPT
Syntax
SET PROMPT=string
Description
Allows the user to change the CLI prompt. Note that the parameter string must be enclosed in double
quotes “ string “. The SET PROMPT command is used to define a new, default CLI command prompt
for user login sessions.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
string
The prompt string can contain alphanumeric text and
special tokens. The special tokens identify dynamic
information in the prompt. Refer to 1.5.2.
NA
NA
NA
Example
SET PASSWORD
Enter Old Password:
Enter New Password:
Re-enter New Password:
Password successfully changed
Software Reference for SwitchBlade x3100 Series Switches
61
Setting Up the Switch
SET SYSTEM
Syntax
SET SYSTEM { CONTACT=contact | LOCATION=location | NAME=name | HOSTNAME=name
| GATEWAY=ipaddress | DOMAINNAME=name | DNS=ipaddress-list }
Description
Sets various administrative global attributes. These attributes affect the overall system. All attributes
can be displayed using the SHOW SYSTEM command. Refer to the SET IP INTERFACE for information on datafilling the DNS, DOMAINNAME, and, GATEWAY attributes.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
CONTACT
Specifies the contact information for the system. The
information is a string of descriptive text for whom to
contact. The maximum length is 80 characters. Valid
characters are any printable character. If the string
includes spaces is must be enclosed in double quotes.
NA
NA
LOCATION
Specifies the location information for the system. The
information is a string of descriptive text for where the
system is located. The maximum length is 80 characters.
Valid characters are any printable character. If the string
includes spaces it must be enclosed in double quotes.
NA
NA
NAME
Specifies a string defining the name ofthe system. The
name can be a maximum of 80 characters. If the string
includes spaces it must be enclosed in double quotes. By
convention, this is the full domain name of the IP entity
("hostname.domainname").
NA
NA
NA
Example
SET SYSTEM CONTACT=
Enter Old Password:
Enter New Password:
Re-enter New Password:
Password successfully changed
Software Reference for SwitchBlade x3100 Series Switches
62
Setting Up the Switch
SET SYSTEM LANGUAGE
Syntax
SET SYSTEM LANGUAGE={EN}
Description
Allows the user to specify the language settings for the device. The security officer user has the ability
to change the system language preference at runtime. Once changed, the language setting affects all
CLI sessions (is a system-wide setting), and also affects the management logs.
Mode
Manager
Options
Option
Description
Range
Default
Value
LANGUAGE
English (EN) is the only language supported currently.
NA
EN
Release Note
NA
Example
NA
Software Reference for SwitchBlade x3100 Series Switches
63
Setting Up the Switch
SET SYSTEM USERCONFIG (SEC)
Syntax
SET SYSTEM USERCONFIG [ LOGINFAIL=1..10 ] [ LOCKOUTPD=0..30000 ] [ MANPWDFAIL=1..5 ] [ SECUREDELAY={ OFF | 0 | 1..90 } ]
[ MINPWDLEN=1..23 ] [ PERSISTTIMER=1..1440 ]
[ PWDAGEING={ OFF | 0 | 1..365 } ] [ FORCEPWDCHANGE={ YES | NO } ]
Description
Used to modify the global (system-wide) security parameters for user authentication. Changes to the
minimum password length will affect only new users or future updates to existing user passwords.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
LOGINFAIL
Determines the maximum number of consecutive login
failures allowed before locking out a user or session.
NA
5
LOCKOUTPD
Sets the number of seconds to lockout a user or session
after the maximum number of consecutive failed login
attempts were made. The maximum number of consecutive failed logins is defined by the LOGINFAIL parameter.
NA
60
SECUREDELAY
Specifies the number of minutes that a user session can
remain idle before it is automatically timed out.
NA
5
MANPWDFAIL
Not currently supported
NA
NA
SECUREDELAY
Specifies the number of minutes that a user session can
remain idle before it is automatically timed out.
NA
5
MINPWDLEN
Specifies the minimum number of characters a user
password is allowed to contain. This parameter affects
setting of password in CLEARTEXT format or via the
SET PASSWORD command.
NA
6
PERSISTTIMER
Sets the persistence interval for system counters. The
value is specified in minute increments.
NA
10
PWDAGEING
Indicates the number of days before a password expires
and requires the user to change its password. If the
value is OFF or 0, then the password does not expire.
NA
30
FORCEPWDCHANG
E
Indicates if a new user account requires a change in the
password upon the initial login of that user. If the value is
set to YES, then the user will be prompted for a new
password when they first log in.
NA
NO
Release Note
NA
Example
SET SYSTEM USERCONFIG LOGINFAIL=10 LOCKOUTPD=120 MANPWDFAIL=3 SECUREDELAY=0 MINPWDLEN=3 PERSISTTIMER=1440 PWDAGEING=OFF FORCEPWDCHANGE=No
Software Reference for SwitchBlade x3100 Series Switches
64
Setting Up the Switch
SET SYSTEM USERCONFIG - (PASSWORD) - (SEC)
Syntax
SET SYSTEM USERCONFIG { MANAGERPASSWORD={ password | NONE } | SECURITYOFFICERPASSWORD={ password | NONE } }
[ FORMAT={ CLEARTEXT | MD5 }]
Description
Allows the user to set global passwords that can be used to obtain privileges at the SECURITY OFFICER level and/or MANAGER level when authenticating against the local database. This command can
also specify optional password encryption.
A password string can consist of any character and have a maximum length of 32 characters. The minimum password length is determined by the SET SYSTEM USERCONFIG MINPWDLEN command.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
MANAGERPASSWORD
Controls the password for all users at the Manager level
or whether all users at the Manager level will need a
password.
NA
NA
NA
NA
NA
CLEARTEXT
The MANAGERPASSWORD parameter is used to set a
global password that can be used to obtain MANAGER
level privileges when authenticating against the local
database. If there are RADIUS or TACACS+ servers
configured and enabled, privilege escalation requests are
sent to those servers first.
SECURITYOFFICERPASSWORD
Controls the password for all users at the Security Officer level or whether all users at the Security Officer
level will need a password.
The SECURITYOFFICERPASSWORD parameter is used
to set a global password that can be used to obtain
SECURITYOFFICER level privileges when authenticating
against the local database. If there are RADIUS or
TACACS+ servers configured and enabled, privilege
escalation requests are sent to those servers first.
FORMAT
Detrmines whether or not the password is encrypted:
CLEARTEXT - Non-encrypted text
MD5 - Pre-encrypted as a 32 character MD5 digest.
Release Note
NA
Example
SET SYSTEM USERCONFIG MANAGERPASSWORD=classified SECURITYOFFICERPASSWORD=NONE FORMAT=CLEARTEXT
Software Reference for SwitchBlade x3100 Series Switches
65
Setting Up the Switch
SET USER (SEC)
Syntax
SET USER=login-name [ PASSWORD=password
[ FORMAT={ CLEARTEXT | MD5 } ] ]
[ DESCRIPTION=description ]
[ PRIVILEGE={ USER | MANAGER | SECURITYOFFICER } ] [ LOGIN={ TRUE | FALSE | ON
| OFF | YES | NO } ] [ TELNET={ YES | NO } ] [ PWDAGEING={ OFF | 0 | 1..365 } ]
[ DEACTIVATE={ OFF | yyyy-mm-dd } ]
Description
Used to modify an existing user account in the system. At a minimum, a user login name must be specified. The password can be clear text (non-encrypted) or in the form of a 32-character MD5 encrypted
string. Unless the FORMAT option is specified, the password value is assumed to be clear text.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
PASSWORD
The password can be clear text (non-encrypted) or in
the form of a 32-character MD5 encrypted string.
NA
NA
FORMAT
Format of the password
NA
CLEARTEXT
CLEARTEXT - Non-encrypted text
MD5 - Pre-encrypted as a 32 character MD5 digest.
DESCRIPTION
Text to provide a hint about the user
NA
NA
PRIVILEGE
One of the three levels. Refer to 1.5.1.
NA
USER
LOGIN
Specifies whether or not the account is accessed via
direct login or not. By default, the login setting is set to
YES which means the account can be used immediately
after it is created. A value of NO, FALSE, or OFF means
that the account cannot be used to access the system.
NA
YES
TELNET
Allows telnet access to be enabled or disabled for the
user being added. If the value is YES, then the user has
access via telnet. If the value is NO, then the user will
only be able to connect via serial port.
NA
YES
PWDAGEING
Indicates the number of days before a password expires
and requires the user to change its password. If the
value is OFF or 0, then the password does not expire.
NA
0
DEACTIVATE
Indicates the date that the user account is to be deactivated. The default value is OFF, which indicates that
there is no deactivation date.
NA
OFF
Release Note
NA
Example
SET USER coleman PASSWORD cac2cacY TELNET=NO
Software Reference for SwitchBlade x3100 Series Switches
66
Setting Up the Switch
SETDEFAULTS LOGINBANNER (SEC)
Syntax
SETDEFAULTS LOGINBANNER
[ { USER | MANAGER | SECURITYOFFICER | ALL } ]
Description
Used to restore the login banner back to its default settings for the requested user privilege level. The
default loginbanner for each of the user privilege levels is an empty string.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
Security Level
The level in which the default banner is set. If ALL
parameter is provided, all user levels are reset to the
default loginbanner.
NA
ALL
Release Note
NA
Example
SETDEFAULTS LOGINBANNER
Software Reference for SwitchBlade x3100 Series Switches
67
Setting Up the Switch
SETDEFAULTS PROMPT
Syntax
SETDEFAULTS PROMPT
Description
Sets the CLI prompt to the default. When this command is run, the prompt reverts back to the
prompt string of "%u %s" which displays the user name and security level of the user of the current
session.
Mode
Manager
Options
NA
Release Note
NA
Example
SETDEFAULTS PROMPT
Software Reference for SwitchBlade x3100 Series Switches
68
Setting Up the Switch
SHOW LOGINBANNER
Syntax
SHOW LOGINBANNER
Description
The SHOW LOGINBANNER command allows the user to view the login banner settings for each
user. This command shows the text that will be displayed to the user upon login.
Mode
User
Options
NA
Release Note
NA
Example
SHOW LOGINBANNER
--- Login Banner Settings ---------------------Privilege Level:
USER,MANAGER,SECURITY OFFICER
(Login banner is empty)
Software Reference for SwitchBlade x3100 Series Switches
69
Setting Up the Switch
SHOW SESSIONS
Syntax
SHOW SESSIONS
Description
Displasy a list of all active (logged in) users, including the login-name, the port or device that the user
is logged into, the IP address that the user is logged in from and the login time for the user session.
There is also a column that identifies if the user has been scheduled for deactivation and the number of
seconds before the session is logged off. This column has a value only if the DEACTIVATE SESSION
command was invoked.
Mode
User
Options
NA
Release Note
NA
show sessions
--- Active (logged in) Users -------------------------------------------------ID User
Port
Location
Deact
(secs)
-- -------------------- ------- ---------------- ------ --------------- -----0 Console local
AUTH
2 officer
Telnet 10.52.18.149
CONN
2010-11-05
17:33:36
3 manager
Telnet 10.52.18.230
CONN
2010-11-08
12:03:13
Software Reference for SwitchBlade x3100 Series Switches
Status Login Time
70
Setting Up the Switch
SHOW SYSTEM
Syntax
SHOW SYSTEM
Description
Displays a terse summary of current configuration information for the shelf.
Mode
User
Options
NA
Release Note
NA
Note
The slot numbering will only go up to 5 for the SBx3106.
Example
SHOW SYSTEM
-- System Information -------------------------------------------------------System Date...................
System Uptime.................
Software
Version.....................
Options.....................
Created.....................
Booted From.................
Resource Information
SDRAM (free/total)..........
Flash (free/total)..........
Identifying Information
Shelf Serial Number.........
Shelf CLEI Code.............
Shelf MAC...................
Hostname....................
Contact.....................
Location....................
Name........................
Services....................
Description.................
2010-11-05 10:52:59
8 days, 22 hours, 27 minutes, 56 seconds
15.0.0.ALPHA.20101025
Lab-Only Build
Tue 10/26/2010 at 05:19 PM
preferred
379266 KB / 524288 KB
82292 KB / 129024 KB
7
<unknown>
00:0C:25:04:00:0C
<none>
<none>
<none>
<none>
Layer 2 - Datalink/Subnetwork
Allied Telesis Switchblade x3112 - 12 Slot
High Availability Chassis
Number of MACs on card........ 2
Feature Keying
Customer ID................. <none>
Lock ID..................... phik-lbjj-loch-ceic-ojie-mjmk-bakm-oneb
MGMT
IP Address.................. 10.52.71.108
Subnet Mask................. 255.255.255.0
Gateway..................... 10.52.71.1
MAC Address................. 00:0C:25:04:00:0C
Domain Name................. <none>
DNS......................... <none>
vlan:10.0
IP Address.................. 10.52.71.108
Subnet Mask................. 255.255.255.0
Gateway..................... 10.52.71.1
Domain Name................. <none>
DNS......................... <none>
Shelf Power Input............. AC
Provisioning Mode............. Auto Provisioning
ECO Mode...................... OFF
Software Reference for SwitchBlade x3100 Series Switches
71
Setting Up the Switch
--- Card Information ---
Slot
----0
1
Prov
Type
------GE24POE
GE24POE
Physical Type
-------------GE24POE
2
3
4
5
6
7
8
GE24POE
GE24SFP
CFC200
CFC200
GE24POE
GE24POE
GE24POE
CFC200
CFC200
GE24POE
9
GE24SFP GE24SFP
10
XE4
XE4
11
XE4
XE4
Model
--------ATSBx24POE
AT-SBxMFC
AT-SBxMFC
ATSBx24POE
ATSBx31GS24
ATSBx04XP
ATSBx04XP
Serial Number
------------------18
CLEI Code
----------
HW
Rev
--X6
FPGA
Rev
----
31
45
11
-
X2
X2
X6
-
A042824103900008
-
B
-
17
-
X3
-
6
-
X3
-
--- Power Supply Units --Slot
---A
B
C
D
Type
-----POE
POE
System
System
State
----UP-DN
UP-DN
UP-DN
UP-UP
Temp(C)
------0
0
0
44
Layer 2 Base System
------------------Ageing time...........................
Ageing time status....................
Learning status.......................
Age Only FDB clear....................
300
Enabled
Enabled
Disabled
Software Reference for SwitchBlade x3100 Series Switches
72
Setting Up the Switch
SHOW SYSTEM USERCONFIG (SEC)
Syntax
SHOW SYSTEM USERCONFIG
Description
The SHOW SYSTEM USERCONFIG command will display the value of all of the global security parameters and security counters. The security parameters indicate the values set by the SET SYSTEM
USERCONFIG command. The security counters are counters maintained to monitor user authentication activity in the system. The counters are persisted at intervals as defined by the PERSISTTIMER
parameter of the SET SYSTEM USERCONFIG command or whenever a modification to the system
parameters is done. The counters can be reset using the RESET USER command.
The following security counters are displayed:
•
Logins - number of successful logins into the system
•
Manager Pwd changes - number of times a manager or security officer password has been
changed.
•
Unknown login names - number of attempts to login with an invalid login-name
•
Idle session timeouts - number of idle sessions that have closed due to timeout.
•
Database clears - number of calls to RESET USER command for global counters.
•
Authentications - number of successful logins into the system.
•
Manager Pwd fails - number of unsuccessful logins to manager or security officer accounts.
•
Total Pwd fails - total number of unsuccessful logins to existing accounts.
•
Login lockouts - number of times a user or session was locked out due to consecutive failed login
attempts.
•
Default account resets - number of times PURGE USER command was called.
Additional information is displayed for the security parameters, including:
•
number of login fails allowed before lockout
•
length of lockout period (in seconds)
•
number of manager password fails before logoff
•
minimum password length
•
amount of idle time (in minutes) before a telnet session times out
•
value of Persist Timer (in minutes)
•
the RADIUS authentication mode
•
the TACACS+ authentication mode
Mode
Sec_Off
Example
SHOW SYSTEM USERCONFIG
--- User Authentication Facility Configuration and Counters ------------------Security Parameters:
login fails before lockout.................
lockout period (seconds)...................
manager passwd fails before logoff.........
minimum password length....................
idle telnet session timeout (minutes)......
persist Timer (minutes)....................
Software Reference for SwitchBlade x3100 Series Switches
3
60
3
6
OFF
1440
(LOGINFAIL)
(LOCKOUTPD)
(MANPWDFAIL)
(MINPWDLEN)
(SECUREDELAY)
(PERSISTTIMER)
73
Setting Up the Switch
RADIUS authentication mode................. Login
TACACS+ authentication mode................ Login
New User Account Defaults:
password ageing (days)..................... OFF
force password change on first login....... No
(PWDAGEING)
(FORCEPWDCHANGE)
Security Counters: (Last persisted 2010-08-09 11:06:47)
logins....................... 42
authentications..............
manager Pwd changes.......... 0
manager Pwd fails............
unknown login names.......... 0
total Pwd fails..............
idle session timeouts........ 0
login lockouts...............
database clears.............. 0
default account resets.......
Software Reference for SwitchBlade x3100 Series Switches
42
0
0
0
0
74
Setting Up the Switch
SHOW USER
Syntax
SHOW USER[=login-name] [FULL]
Description
Displays the list of all configured users and their configuration parameters and counters. The configuration parameters indicate the values set by the ADD USER or SET USER command. The counters are
counters maintained to monitor user authentication activity in the system for each user configured.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
login-name
The id of the user
NA
NA
FULL
Includes the attributes for all login names
NA
NA
NA
Example
manager SEC>> show user
--- User Authentication Database ---------------------------------------------Username
--------------------officer
manager
Privilege
---------------SECURITY OFFICER
SECURITY OFFICER
Status
-------Enabled
Enabled
Telnet
-----Yes
Yes
SSH
--Yes
Yes
Last Login
------------------2010-11-05 17:33:36
2010-11-08 12:03:13
SHOW USER manager
--- User Authentication Database --------------Username...................
Description................
Privilege..................
Status.....................
Telnet User................
SSH User...................
Public Key.................
Password Ageing............
Deactivation...............
Accounting Statistics:
Last Login...............
Logins...................
Failed Attempts..........
Lockouts.................
manager
Default User
SECURITY OFFICER
Enabled
Yes
Yes
None
Off
OFF
2010-11-08 12:03:13
2
0
0
Software Reference for SwitchBlade x3100 Series Switches
75
Setting Up the Switch
1.6 Configuring Physical Interfaces and Protocols
1.6.1 Introduction
1.6.2 Initial Interfaces
FIGURE 1-5 shows the physical and protocol interfaces that allow the SBx3112 to communicate with management systems.
One of two IP interfaces can be used:
• The MGMT Ethernet interface that transports only management data packets.
• An inband Ethernet interface that interleaves user data packets with management data packets on the uplink, using an
already created VLAN interface. In using a VLAN interface the management data packets are always VLAN-tagged.
Over these two interfaces, the TELNET or SNMP agent can be configured.
Caution: Only one interface can be enabled at a time; enabling an interface will disable an interface already enabled. If
necessary, the ENABLE IP INTERFACE command will automatically disable the other IP Interface.
1.6.3 Physical Interface Configuration
SBx31CFC
SBx S TATUS
0
1
SYS S TA TUS
M/S
PSU
FAN
MASTER
SL AVE
NORMAL
FAULT
NORMAL
FAULT
RESET
2
3
4
5 CFC
M/S
6
7
PSU
8
9
FAN
10
11
SD
REA DY
B USY
1000 LINK
AC T
10/100 LINK
AC T
NET MGMT
CONSOLE
10/100/1000Base-T
RS-232
L/A
FAULT
Management software,
PC with *TELNET/CLI,
Network Management System
Management software,
PC with *TELNET/CLI,
Network Management System
Ethernet
Ethernet (Dedicated for Management)
SBx31XZ4
PORT ACTIVITY
10G LINK /
AC T
0
1
2
3
XFP
XFP
XFP
XFP
FIGURE 1-5
Connections for Management Interfaces for the SBx3112
To enable TELNET access for the management ethernet interfaces, TELNET must be enabled. The user can then choose
which interface to use and supply the IPADDRESS and SUBNETMASK for the SBx3112 that will be used by the management
device when a user logs in
Software Reference for SwitchBlade x3100 Series Switches
76
Setting Up the Switch
1.6.4 Configuring the Management Interfaces
1.6.4.1 Configuration Procedure
The following tables show how to configure the MGMT and Inband interface.
Caution: Enabling the Inband Interface would disable the MGMT interface.
TABLE 1-7
Configure the MGMT Interface
Step
Action or State
Details
1
Enable the telnet server
Required before telnet interfaces can be used
ENABLE TELNET SERVER
2
ADD IP INTERFACE=MGMT
IPADDRESS=10.52.66.220
SUBNETMASK=255.255.255.0
Sets the IP address and subnet mask for the management interface.
3
SET SYSTEM GATEWAY 10.51.66.1
Sets the system gateway.
4
Set system DNS (if not already set)
This step is optional.
SET SYSTEM DNS 10.4.5.7,10.52.7.50
Set system domain name (if not already set)
This step is optional.
SET SYSTEM DOMAINNAME ALLIED-SYSTEM-1
The domain name is a string of 1 to 63 characters in
length.
6
ENABLE IP INTERFACE=MGMT
Enables the interface so management-related data
can be transmitted and received.
7
SHOW IP INTERFACE=MGMT
This shows a dedicated MGMT interface has been
configured.
5
Interface.......................... ETH:0 (MGMT)
IP State........................... Enabled
Note:
Provisioning
IP Address...................... 10.52.66.220
Subnet Mask..................... 255.255.255.0
Gateway......................... 10.52.66.1
DNS............................. <none>
Domain Name..................... <none>
Card............................ ACTCFC
MGMT............................ Yes
The SBx3112 only supports a single
default gateway, DNS server, and
Domain Name, and so these
parameters do not appear on the SET
IP INTERFACE and ADD IP
INTERFACE commands.
Caution: The inband interface can be accessed from any port. Therefore, avoid provisioning subscriber ports on the inband
VLAN
TABLE 1-8
Configure the Inband Interface
Step
Action or State
1
Create the VLAN to be used for the inband interface
Details
CREATE VLAN INBAND VID 420
2
Add the VLAN to the Network interface
ADD VLAN INBAND INTERFACE 1.0 FRAME TAGGED
3
Add the IP interface to the VLAN
ADD IP INTERFACE VLAN:420.0 IPADDRESS 10.51.66.101 SUBNETMASK 255.255.255.0 IFNAME INBAND
Software Reference for SwitchBlade x3100 Series Switches
77
Setting Up the Switch
TABLE 1-8
Configure the Inband Interface
Step
Action or State
Details
4
Set system gateway (if not already set)
SET SYSTEM GATEWAY 10.51.66.1
5
Set system DNS (if not already set)
This step is optional.
SET SYSTEM DNS 10.4.5.7,10.52.7.50
6
7
Set system domain name (if not already set)
This step is optional.
SET SYSTEM DOMAINNAME ALLIED-SYSTEM-1
The domain name is a
string of 1 to 63 characters in length.
Enable the interface for the created VLAN (3)
ENABLE IP INTERFACE=VLAN:420.0
8
Show the physical interfaces again.
>SHOW IP INTERFACE=ALL
--- IP Interfaces --Interface
-------------ETH:0
VLAN:420.0
Name
---------MGMT
inband
IP State
-------Disabled
Enabled
IP Address
--------------10.52.66.108
10.52.66.101
Subnet Mask
--------------255.255.255.0
255.255.255.0
Card
-----ACTCFC
ACTCFC
1.6.4.2 Using the PING Command
Following is an example output for the PING command
officer SEC>> ping 10.52.66.67
officer SEC>>
PING 10.52.66.67 (10.52.66.67)
64 bytes from 10.52.66.67 (10.52.66.67): icmp_seq=1
--- 10.52.66.67 ping statistics --1 packets transmitted, 1 packets received, 0% packet loss
officer SEC>> PING 172.16.66.1
PING 172.16.66.1
officer SEC>>
PING 172.16.66.1 (172.16.66.1)
64 bytes from 172.16.66.1 (172.16.66.1): icmp_seq=1
--- 172.16.66.1 ping statistics --1 packets transmitted, 1 packets received, 0% packet loss
officer SEC>> PING 172.16.66.1 FROM INTERFACE=vlan:402.0
PING 172.16.66.1 FROM INTERFACE=vlan:402.0
officer SEC>>
PING 172.16.66.1 (172.16.66.1)
64 bytes from 172.16.66.1 (172.16.66.1): icmp_seq=1
--- 172.16.66.1 ping statistics --1 packets transmitted, 1 packets received, 0% packet loss
officer SEC>> PING 172.16.66.1 FROM IPADDRESS=172.16.66.240
PING 172.16.66.1 FROM IPADDRESS=172.16.66.240
officer SEC>>
PING 172.16.66.1 (172.16.66.1)
64 bytes from 172.16.66.1 (172.16.66.1): icmp_seq=1
--- 172.16.66.1 ping statistics --1 packets transmitted, 1 packets received, 0% packet loss
Software Reference for SwitchBlade x3100 Series Switches
78
Setting Up the Switch
1.6.5 IP Interface Commands
This section describes the commands available to enable, configure and manage the IP Interface.
TABLE 1-9
IP Interface Commands
Commands
ADD IP INTERFACE
DELETE IP INTERFACE
DISABLE IP INTERFACE
DISABLE TELNET SERVER (SEC)
ENABLE IP INTERFACE
ENABLE TELNET SERVER (SEC)
PING
SET IP INTERFACE
SET TELNET
SHOW IP INTERFACE
SHOW TELNET
STOP PING
Software Reference for SwitchBlade x3100 Series Switches
79
Setting Up the Switch
ADD IP INTERFACE
Syntax
Note:
ADD IP INTERFACE={ MGMT | type:id }
IPADDRESS=ipaddress SUBNETMASK=mask | IPANDLENGTH=ipaddress/length
[ CARD={ slot | ACTCFC } ] [ IFNAME=ifname ] [ MANAGEMENT={ YES | NO } ]
The SBx3112 only supports a single default gateway, DNS server, and Domain Name, and so these parameters do
not appear on the SET IP INTERFACE and ADD IP INTERFACE commands
Description
Configures the IP address, gateway address, and subnetmask of a VLAN interface. The VLAN interface
is specified by the vlan number (vid). When the IP interface is added, its state is by default disabled and
must be enabled using the ENABLE IP INTERFACE command. If the interface and telnet server are
enabled (See ENABLE TELNET SERVER), users can log in to the system via the specified IP address.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The data packet interface for the system.
NA
NA
MGMT - for the dedicated interface)
type:id - for the inband, the VLAN to be used
IPADDRESS
The IP address used to login to the system.
NA
NA
SUBNETMASK
The subnet mask to associate with the given interface.
NA
NA
IPANDLENGTH
As an alternative to specifying IPADDRESS and SUBNETMASK, the IPANDLENGTH may be used to specify
the IPv4 address and the subnet mask in a single parameter, with the IP address in standard dotted-decimal
notation and the length indicating the number of bits in
the subnet mask. For example, the address
“140.215.30.62” with subnet mask “255.255.255.0” can
be specified as “IPANDLENGTH=140.215.30.62/24”..
NA
NA
CARD
Note: The user should only specify the ACTCFC
option (for the active CFC). The “slot” option is currently not supported.
NA
ACTCFC
IFNAME
A name that can be given for the interface.
NA
NA
MANAGEMENT
Allows MANAGEMENT access to this interface
NA
YES
YES - The interface can be used for MANAGEMENT. A
user can Telnet directly into a MANAGEMENT interface
and use it for remote access.
NO - The interface cannot be used for MANAGEMENT.
Release Note
NA
Example
ADD IP INTERFACE VLAN:420.0 IPADDRESS=10.51.66.101 SUBNETMASK=
255.255.255.0 IFNAME=INBAND
Software Reference for SwitchBlade x3100 Series Switches
80
Setting Up the Switch
DELETE IP INTERFACE
Syntax
DELETE IP INTERFACE={ MGMT | type:id-range | ifname-list | ALL } [ FORCE ]
Description
Deletes the MGMT or VLAN interface
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The interfaces that have been defined.
NA
NA
FORCE
Overrides the confirmation message.
NA
NA
Release Note
NA
Example
DELETE IP INTERFACE=MGMT
Software Reference for SwitchBlade x3100 Series Switches
81
Setting Up the Switch
DISABLE IP INTERFACE
Syntax
DISABLE IP INTERFACE={ MGMT | type:id | ifname }
Description
Deactivates the VLAN or MGMT interface, so that users can no longer log into the SBx3112 product
using the IP address.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The interfaces that have been defined.
NA
NA
Release Note
NA
Example
DISABLE IP INTERFACE=MGMT
Software Reference for SwitchBlade x3100 Series Switches
82
Setting Up the Switch
DISABLE TELNET SERVER (SEC)
Syntax
DISABLE TELNET SERVER
Description
The DISABLE TELNET SERVER command blocks access to the device via telnet. For security reasons,
there may be a need to disable the telnet server. Once deactivated, the only other means of access are
through SNMP (if enabled) and the Console. After deactivation and all users log off, the Console provides the only interface through which the telnet server can be re-enabled. Users are not automatically
forced out of the system when telnet server is disabled. If there is a desire to force users off the system as part of disabling telnet, the DEACTIVATE SESSIONS command must also be used.
Mode
Sec_Off
Options
NA
Release Note
NA
Example
DISABLE TELNET
Software Reference for SwitchBlade x3100 Series Switches
83
Setting Up the Switch
ENABLE IP INTERFACE
Syntax
ENABLE IP INTERFACE={ MGMT | type:id | ifname }
Description
The ENABLE IP INTERFACE command enables an existing interface. Only one IP Interface can be
enabled at a given time. If necessary, the ENABLE IP INTERFACE command will automatically disable
the other IP Interface. If the telnet service is enabled (See ENABLE TELNET SERVER), users can log in
to the system the IP address associated with the enabled interface.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The provisioned IP interface
NA
NA
Release Note
NA
Example
ENABLE IP INTERFACE=VLAN:420.0
Software Reference for SwitchBlade x3100 Series Switches
84
Setting Up the Switch
ENABLE TELNET SERVER (SEC)
Syntax
ENABLE TELNET SERVER
Description
The ENABLE TELNET SERVER command will allow remote users to telnet to the system. Since the
default is for TELNET to be disabled for security, the user must input this command before the TELNET interfaces can be used.
Mode
Sec_Off
Options
NA
Release Note
NA
Example
ENABLE TELNET SERVER
Software Reference for SwitchBlade x3100 Series Switches
85
Setting Up the Switch
PING
Syntax
PING={ ipaddress | hostname }
[ FROM { INTERFACE={ type:id | id | ifname } | IPADDRESS=ipaddress } ]
[ DELAY=1..900 ] [ LENGTH=1..8192 ]
[ NUMBER={ 1..65535 | CONTINUOUS } ]
[ TIMEOUT=1..900 ]
Description
Pings an interface or IP address from the Allied Telesis product. The PING command is used to find
other hosts in the same network. The PING command sends ICMP echo packets to the specified host
and waits for a response. If a response is received, an indication of success is shown to the user. Once
the command operation completes, the user is presented with a summary of the number of packets
sent and received along with an indication of the percentage of packets lost. In the event that a user
wishes to end a repetitive PING request, the STOP PING command terminates ping operation and
presents information regarding the number of packets sent and received.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
Identifies the source VLAN interface from which the
PING request originates.
NA
NA
IPADDRESS
Used to indicate the source of a PING request. The
originating IP address is used when the PING request
needs to originate from a network source other than
the SBx3112 management network connection.
NA
NA
DELAY
Sets the number of seconds to wait between a PING
response and the next PING request.
NA
1 second
LENGTH
Sets the size of the ICMP packet, in bytes, sent as part
of the ping request
NA
64 bytes
NUMBER
Indicates the number of ping requests to send to the
specified host. To stop the ping operation before all
attempts are given or to stop continuous pinging, use
the STOP PING command.
NA
1 request
TIMEOUT
Specifies the amount of time, in seconds, to wait for a
response from the remote host. If the timeout delay
expires, the ICMP response packet is considered lost
and the remote host unreachable.
NA
5 seconds
Release Note
NA
Example
PING 10.52.201.234
Software Reference for SwitchBlade x3100 Series Switches
86
Setting Up the Switch
SET IP INTERFACE
Syntax
Note:
SET IP INTERFACE={ MGMT | type:id-range | ifname-list | ALL }
{ [ IPADDRESS=ipaddress ] [ SUBNETMASK=mask ] |
[ IPANDLENGTH=ipaddress/length ] }
[ IFNAME=ifname ]
[ MANAGEMENT={ YES | NO } ]
The SBx3112 only supports a single default gateway, DNS server, and Domain Name, and so these parameters do
not appear on the SET IP INTERFACE and ADD IP INTERFACE commands.
Description
Changes the existing setting for the MGMT or VLAN interface. If this command is executed while the
interface is in use, users of the interface must reconnect after the settings are applied by the system.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The data packet interface for the system.
NA
NA
MGMT - for the dedicated interface
type:id - for the inband, the VLAN to be used
ifname-list - The names for the interfaces if they exist
ALL - All of the IP interfaces
IPADDRESS
The IP address of the system
NA
NA
SUBNETMASK
The subnet mask to associate with the given interface.
NA
NA
IPANDLENGTH
As an alternative to specifying IPADDRESS and SUBNETMASK, the IPANDLENGTH may be used to specify
the IPv4 address and the subnet mask in a single parameter, with the IP address in standard dotted-decimal
notation and the length indicating the number of bits in
the subnet mask. For example, the address
“140.215.30.62” with subnet mask “255.255.255.0” can
be specified as “IPANDLENGTH=140.215.30.62/24”.
NA
NA
IFNAME
A name that can be given for the interface.
NA
NA
MANAGEMENT
Allows MANAGEMENT access to this interface.
NA
YES
YES - The interface can be used for MANAGEMENT. A
user can Telnet directly into a MANAGEMENT interface
and use it for remote access.
NO - The interface cannot be used for MANAGEMENT.
Release Note
NA
Example
The following sequence shows the result of changing IPANDLENGTH:
>set ip int mgmt ipandlength 10.52.71.142/24
The mgmt interface will be reset. Do you want to continue (Y/N)? y
Info (010017): Operation Successful officer SEC>> show ip int mgmt
--- IP Interfaces ---
Software Reference for SwitchBlade x3100 Series Switches
87
Setting Up the Switch
Interface.......................ETH:0 (MGMT)
abled
IP State........................... Dis-
Provisioning
IP Address...................... 10.52.71.142
Subnet Mask..................... 255.255.255.0
Gateway......................... 10.52.71.1
DNS............................. <none>
Domain Name..................... <none>
Card............................ ACTCFC
MGMT............................ Yes
> set ip int mgmt ipandlength 10.52.71.142/16
The mgmt interface will be reset. Do you want to continue (Y/N)? y
Info (010017): Operation Successful officer SEC>>
> show ip int mgmt
--- IP Interfaces --Interface.......................... ETH:0 (MGMT)
Disabled
Provisioning
IP Address......................
Subnet Mask.....................
Gateway.........................
DNS.............................
Domain Name.....................
Card............................
MGMT............................
IP State...........................
10.52.71.142
255.255.0.0
10.52.71.1
<none>
<none>
ACTCFC
Yes
Software Reference for SwitchBlade x3100 Series Switches
88
Setting Up the Switch
SET TELNET
Syntax
SET TELNET [ TERMTYPE=termstring ] [ INSERTNULL={ ON | OFF } ]
Description
Allows the user to set the system-wide settings of the telnet client configuration, including the TERMTYPE and INSERTNULL data.
Mode
Manager
Options
Option
Description
Range
Default
Value
TERMTYPE
The string that will be sent to a remote telnet server
during the negotiation of the telnet connection. The terminal identification is usually used by the remote system
to set the terminal attributes for the Telnet session.
NA
XTERM
INSERTNULL
When set to ON, specifies that a NULL character
should be inserted after each CR sent to the remote
system.
NA
OFF
Release Note
NA
Example
SET TELNET INSERTNULL=ON
Software Reference for SwitchBlade x3100 Series Switches
89
Setting Up the Switch
SHOW IP INTERFACE
Syntax
SHOW IP [ INTERFACE [ ={ MGMT | type:id-range | ifname-list | ALL }] [ FULL ]
]
Description
Displays the IP configuration information for the named interface. The information displayed includes
the interface name, the IP address and the subnet mask, and status. It shows whether the MGMT or
inband ethernet interface has been enabled.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
INTERFACE
The provisioned IP interfaces
NA
NA
NA
Example
E135 - >SHOW IP INTERFACE=FULL
--- IP Interfaces --Interface.......................... ETH:0 (MGMT)
IP State........................... Disabled
Provisioning
IP Address......................
Subnet Mask.....................
Gateway.........................
DNS.............................
Domain Name.....................
Card............................
MGMT............................
10.52.71.108
255.255.255.0
10.52.71.1
<none>
<none>
ACTCFC
Yes
--- IP Interfaces --Interface.......................... VLAN:10.0 (inband)
IP State........................... Enabled
Provisioning
IP Address......................
Subnet Mask.....................
Gateway.........................
DNS.............................
Domain Name.....................
Card............................
VLAN ID.........................
MGMT............................
Software Reference for SwitchBlade x3100 Series Switches
10.52.71.108
255.255.255.0
10.52.71.1
<none>
<none>
ACTCFC
10
Yes
90
Setting Up the Switch
SHOW TELNET
Syntax
SHOW TELNET [ { SERVER | SESSIONS } ]
Description
Displays the Telnet Client configuration information, indicating the settings for InsertNull and Terminal
Type.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
SERVER
Displays the state of the telnet server, indicating if it is
ENABLED or DISABLED.
NA
NA
SESSIONS
Displays the current telnet client sessions, indicating if
there are any connections to remote systems, the CLI
Session Id that requested the connection, the source
and destination IP addresses of the telnet connection,
and the time at which the connection was made.
NA
NA
NA
Example
SHOW TELNET SERVER
Info (020108): Telnet Server is Enabled.
Software Reference for SwitchBlade x3100 Series Switches
91
Setting Up the Switch
STOP PING
Syntax
STOP PING
Description
Terminates a ping session that is in progress and presents information regarding the number of packets
sent and received.
Mode
Manager
Options
NA
Release Note
NA
Example
STOP PING
1.6.6 System Time - SNTP
When the SBx3112 is first installed, local time can be set up using the command SET SYSTEM TIME.
The SBx3112 can also synchronize with a network time server using the SNTP protocol, which requires an SNTP server with
a host name or IP address to be configured.
1.6.6.1 Time Zones and Daylight Savings Time
There is support for Time-zones and Daylight Saving Time (DST) on the SBx3112. With this feature the SBx3112-based times
correctly reflect current local time and whether DST is in effect if desired. Standard North American Time-zones and their
DST settings (start and end date/time and UTC offset) are supported. In addition the user may specify a custom time-zone
with a start and end date/time and UTC offset for DST.
Note that this feature includes standard DST rules for the following US time-zones:
•
•
•
•
•
•
Eastern Time - Standard Time: -5:00, DST UTC: -4:00
Central Time - Standard Time: -6:00, DST UTC: -5:00
Mountain Time - Standard Time: -7:00, DST UTC: -6:00
Pacific Time: - Standard Time: -8:00, DST UTC: -7:00
Alaska Time - Standard Time: -9:00, DST UTC: -8:00
Hawaii Time - Standard Time: -10:00 (Hawaii does not observe DST)
The all standard US time-zones DST start and end date/time is defined as the second Sunday in March at 02:00 and the first
Sunday in November at 02:00 respectively.
The user defined time-zone is named CUSTOM and has a start date and time, end date and time, and a UTC offset. Date is
either specified as a month and day combination or as the “third Thursday of March” (as an example).
As an example, with the EASTERN time-zone specified by the command:
SET SYSTEM TIMEZONE=EASTERN DST=ON
The SHOW SYSTEM TIME would display one of the following:
• Info (033608): System time is 2007-08-16 13:26:20 (DST)
• Info (033608): System time is 2007-02-16 13:26:20 (STANDARD)
The SHOW SYSTEM TIME FULL would display:
--- System Time --Date.................................2007-01-01
UTC Offset........................... -06:00:00
Time................................. 11:00:01 (STANDARD)
Day Light Saving
Status............................. ON
Software Reference for SwitchBlade x3100 Series Switches
92
Setting Up the Switch
Time-zone..........................
Start..............................
End................................
DST UTC Offset.....................
Standard UTC Offset................
CENTRAL
2ND.SUN.MAR/02:00:00 (2007-03-11)
1ST.SUN.NOV/02:00:00 (2007-11-04)
-05:00:00
-06:00:00
SNTP Settings
Status............................. OFF
1.6.7 Configuring SNTP
This section describes configuration information, procedures, and commands for SNTP.
1.6.7.1 Default Configuration
When an SBx3112 switch is initially booted up, the system time will be configured as follows:
• Standard Eastern Time, DST is OFF, and UTC offset is -5:00.
1.6.7.2 Configuration Guidelines
• All command interactions are supported by both CLI and SNMP.
• DST support can be enabled or disabled, with the default setting disabled.
• Only a single time-zone can in effect at a time whether that is the user time-zone rule or one of the pre-defined North•
•
•
•
American time-zones.
A Management Log entry is generated whenever DST starts or stops.
Modifying the current system time will cause a reevaluation of whether or not DST is in effect.
Disabling DST while DST settings are in effect will cause a reversion to the standard time UTC offset.
If a pre-defined time-zone is being used, modifying the current UTC offset will generate a warning and clear all of the DST
settings.
• All logs (error, crash, trace, management) will indicate whether in DST or standard time. And all logs that were generated
prior to the onset of DST will retain their original time.
• The SHOW SYSTEM TIME command will indicate whether in DST or standard time.
1.6.7.3 Configuration Procedure
A typical SNTP configuration procedure involves the following steps:
•
•
•
•
ADD SNTP SERVER
ENABLE SNTP
- Inputs the hostname or IP address of the SNTP server that the Allied Telesis product will use.
- Activates the SNTP so that the SBx3112 will be able to synchronize its clock with the SNTP clock.
SET SYSTEM TIMEZONE
- Sets the timezone offset.
RESET SNTP - Once the SNTP server is configured, this has the SBx3112 send an SNTP query to re-synchronize the
SBx3112 with the SNTP server. Note that the SNTP server must be enabled to do this.
To delete the SNTP server, the following sequence would be used:
•
•
DISABLE SNTP
- Deactivates the SNTP so that the SBx3112 will no longer synchronize its clock with the SNTP clock.
DELETE SNTP SERVER
- Deletes the hostname or IP address of the SNTP server that the SBx3112 is using.
Software Reference for SwitchBlade x3100 Series Switches
93
Setting Up the Switch
The following procedure shows the commands used for adding an SNTP server, enabling SNTP, and modifying the system
timezone.
TABLE 1-10
Step
Configuration Procedure for SNTP
Command
Description (Optional)
Review the default SNTP settings before configuring
1
SHOW SNTP
SNTP Configuration
-----------------------------------------------------------------------------Status
Off
Local IP
10.52.70.14
Last Update
Last Delta
Last Status
SNTP Server
-----------------------------------------------------------------------------No SNTP Server Configured
SNTP Statistics
-----------------------------------------------------------------------------Requests Sent
0
Responses Received
0
Set up the configuration for SNTP. These commands are normally issued during system setup
2
>ENABLE TELNET SERVER
>ADD IP INTERFACE=MGMT IPADDRESS=10.52.70.14 SUBNETMASK=255.255.255.0
CARD=ACTCFC GATEWAY=10.52.70.1 IFNAME=MGMT MANAGEMENT=Yes
>ENABLE IP INTERFACE=MGMT
Add the SNTP server (by specifying an IP address or hostname)
3
ADD SNTP SERVER=192.43.244.18
Specifies the hostname or IP address of the SNTP
server that the SBx3112 system will use.
Enable the SNTP server
4
ENABLE SNTP
Activates the SNTP so that the SBx3112 will be
able to synchronize its clock with the SNTP clock.
Note the results
5
SHOW SNTP
-------------------------------------------------------------------SNTP Configuration
-------------------------------------------------------------------Status
On
Local IP
10.52.70.14
Last Update
2009-12-07 09:18:46
Last Delta
+00.12s
Last Status
Operation Successful
SNTP Server
-------------------------------------------------------------------192.43.244.18
SNTP Statistics
-------------------------------------------------------------------Requests Sent
1
Responses Received
1
Review the system time setting before changing the time-zone
Software Reference for SwitchBlade x3100 Series Switches
94
Setting Up the Switch
TABLE 1-10
Configuration Procedure for SNTP
Step
Command
6
SHOW SYSTEM TIME FULL
Description (Optional)
--- System Time --Date.................................... 2009-12-07
Time.................................... 09:18:55 (STANDARD)
Current UTC Offset................. -05:00:00
Day Light Saving
Status................................
ON
Timezone..............................
EASTERN
Start.................................
2ND.SUN.MAR/02:00:00 (2010-03-14)
End...................................
1ST.SUN.NOV/02:00:00 (2010-11-07)
DST UTC Offset........................
-04:00:00
Standard UTC Offset..............
-05:00:00
SNTP Settings
Status................................
ON
Change the system time-zone (using a custom UTC offset)
7
Modifies the UTC offset by -01:00.
SET SYSTEM TIMEZONE CUSTOM
UTCOFFSET -01:00
Verify that the UTC offset changed
8
SHOW SYSTEM TIME FULL
--- System Time --Date.................................... 2009-12-07
Time.................................... 13:21:55 (STANDARD)
Current UTC Offset................. -01:00:00
Day Light Saving
Status................................
OFF
Timezone..............................
CUSTOM
Start.................................
End...................................
DST UTC Offset........................
+00:00:00
Standard UTC Offset................ -01:00:00 <- HERE
SNTP Settings
Status................................
ON
Software Reference for SwitchBlade x3100 Series Switches
95
Setting Up the Switch
The following procedure shows the commands used for deleting an SNTP server.
TABLE 1-11
Step
Configuration Procedure for SNTP - Deleting SNTP Server
Command
Description (Optional)
Review the SNTP settings
1
SHOW SNTP
-------------------------------------------------------------------SNTP Configuration
-------------------------------------------------------------------Status
On
Local IP
10.52.70.14
Last Update
2009-12-07 09:18:46
Last Delta
+00.12s
Last Status
Operation Successful
SNTP Server
-------------------------------------------------------------------192.43.244.18
SNTP Statistics
-------------------------------------------------------------------Requests Sent
1
Responses Received
1
Disable the SNTP
2
DISABLE SNTP
Deactivates the SNTP so that the SBx3112 will no
longer synchronize its clock with the SNTP clock.
Delete the SNTP server
3
DELETE SNTP SERVER
Deletes the hostname or IP address of the SNTP
server that the SBx3112 is using.
Verify that SNTP has been disabled and that SNTP server has been deleted
4
SHOW SNTP
SNTP Configuration
-----------------------------------------------------------------------------Status
Off
Local IP
10.52.70.14
Last Update
Last Delta
Last Status
SNTP Server
-----------------------------------------------------------------------------No SNTP Server Configured
SNTP Statistics
-----------------------------------------------------------------------------Requests Sent
0
Responses Received
0
Software Reference for SwitchBlade x3100 Series Switches
96
Setting Up the Switch
1.6.8 SNTP Commands
This section describes the commands available to enable, configure and manage the IP Interface.
TABLE 1-12
SNTP Commands
Commands
ADD SNTP SERVER
DELETE SNTP SERVER
DISABLE SNTP
ENABLE SNTP
RESET SNTP
SET SYSTEM
SET SYSTEM TIMEZONE
SHOW SNTP
SHOW SYSTEM TIME
Software Reference for SwitchBlade x3100 Series Switches
97
Setting Up the Switch
ADD SNTP SERVER
Syntax
ADD SNTP SERVER={ipaddress|hostname}
Description
Inputs the hostname or IP address of the SNTP server that the SBx3112 will use. If an SNTP server is
already specified, the command is rejected. To change the server, the existing server must be deleted
using the DELETE SNTP SERVER command.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
SERVER
The hostname or IP address of the SNTP server
NA
NA
NA
Example
officer SEC>> add sntp server 192.43.244.18.
Info (010017): Operation Successful
officer SEC>> sh sntp
------------------------------------------------------------------------------SNTP Configuration
-----------------------------------------------------------------------------Status
On
Local IP
10.52.70.13
Last Update
2009-11-07 11:02:22 DST
Last Delta
+00.00s
Last Status
Unknown error
SNTP Server
-----------------------------------------------------------------------------192.43.244.18
SNTP Statistics
-----------------------------------------------------------------------------Requests Sent
2
Responses Received
2
----------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
98
Setting Up the Switch
DELETE SNTP SERVER
Syntax
DELETE SNTP SERVER
Description
Deletes the hostname or IP address of the SNTP server that the SBx3112 is using. The SNTP server
may be removed regardless of the state of the SNTP client on the device (see ENABLE SNTP or DISABLE SNTP).
Mode
Manager
Options
NA
Release Note
NA
Example
SHOW SNTP
-------------------------------------------------------------SNTP Configuration
-------------------------------------------------------------Status On
Local IP 10.52.70.13
Last Update 2009-12-07 09:47:51
Last Delta +00.13s
Last Status
Operation Successful
SNTP Server
----------------------------------------------------------------------192.43.244.18
SNTP Statistics
--------------------------------------------------------------Requests Sent 1
Responses Received 1
--------------------------------------------------------------DELETE SNTP SERVER
Info (010017): Operation Successful
officer SEC>> sh sntp
-------------------------------------------------------SNTP Configuration
---------------------------------------------------Status On
Local IP 10.52.70.13
Last Update 2009-12-07 09:47:51
Last Delta +00.13s
Last Status
Operation Successful
SNTP Server
---------------------------------------------(DELETED)
Software Reference for SwitchBlade x3100 Series Switches
99
Setting Up the Switch
DISABLE SNTP
Syntax
DISABLE SNTP
Description
Deactivates the SNTP so that theSBx3112 will no longer synchronize its clock with the SNTP clock.
The SNTP server can now be deleted. If the SNTP client is unable to communicate with the SNTP
server, the disable operation places the client in a state where it can attempt to communicate with the
server when ENABLE SNTP is executed.
Mode
Manager
Options
NA
Release Note
NA
Example
DISABLE SNTP
Software Reference for SwitchBlade x3100 Series Switches
100
Setting Up the Switch
ENABLE SNTP
Syntax
ENABLE SNTP
Description
Activates the SNTP so that theSBx3112 will be able to synchronize its clock with the SNTP clock once
the SNTP server has been added.
Mode
Manager
Options
NA
Release Note
NA
Example
ENABLE SNTP
Software Reference for SwitchBlade x3100 Series Switches
101
Setting Up the Switch
RESET SNTP
Syntax
RESET SNTP
Description
Resets the timing counters and sends a query to the SNTP server to re-establish the time. Note that
the SNTP server must be in use.
Mode
Manager
Options
NA
Release Note
NA
Example
RESET SNTP
Software Reference for SwitchBlade x3100 Series Switches
102
Setting Up the Switch
SET SYSTEM
Syntax
SET SYSTEM [TIME=hh:mm:ss] [DATE=yyyy-mm-dd]
Description
Sets various administrative global attributes. These attributes affect the overall system. All attributes
can be displayed using the SHOW SYSTEM command. The SET SYSTEM command sets the local time
or date on the product.
Note that the behavior of changing the system time is affected by the choice of parameters:
TIME only - the TIME is converted to UTC time based on the current offset.
TIME and DATE - The TIME is converted to UTC time based on the current TIMEZONE settings and
the DATE provided.
DATE only - If the new date moves the system into or out of DST, then the UTC time is adjusted such
that the local time is unaffected.
Mode
Manager
Options
Option
Description
Range
Default
Value
TIME
Specifies the current local time of day. The format for
the time is hh:mm:ss, for example 08:30:00 for 8:30 AM
and 20:30:00 for 8:30 PM.
NA
TBS
NA
TBS
Note that the time set using this command is potentially
changed by enabling an SNTP server.
DATE
Specifies the current date of the year. The format is
yyyy-mm-dd, for example 2010-01-01 for January 1,
2010.
Setting the system date is immediately reflected in all
system output that contains date, such as logs, SNMP
traps, etc.
Release Note
NA
Example
(TIME only)
TIMEZONE is set to EASTERN
Current local date/time is 11:00:00 on 2011-01-01 (out of DST so offset is -5 hours)
SET SYSTEM TIME 13:00:00
Current local date/time is 13:00:00 on 2011-01-01 (still out of DST)
UTC time would therefore be 18:00:00
Example
(TIME and DATE)
TIMEZONE is set to EASTERN
Current local date/time is 11:00:00 on 2011-01-01 (out of DST so offset is -5 hours)
SET SYSTEM TIME 13:00:00 DATE 2011-06-01
Current local date/time is 13:00:00 on 2011-06-01 (in DST so offset is -4 hours)
UTC time would therefore be 17:00:00
Example
(DATE)
TIMEZONE is set to EASTERN
Current local date/time is 13:00:00 on 2011-06-01 (in DST so offset is -4 hours)
SET SYSTEM DATE 2011-11-30 (out of DST)
Current local date/time is now 13:00:00 on 2011-11-30 (out of DST so offset is -5 hours)
Software Reference for SwitchBlade x3100 Series Switches
103
Setting Up the Switch
UTC time would therefore be 18:00:00
Software Reference for SwitchBlade x3100 Series Switches
104
Setting Up the Switch
SET SYSTEM TIMEZONE
Syntax
SET SYSTEM TIMEZONE [ { EASTERN | CENTRAL | MOUNTAIN | PACIFIC | ALASKAN |
HAWAIIAN | CUSTOM UTCOFFSET={ + | -hh:mm }
[ DSTSTART=nth.weekday.month [ /hh:mm:ss ]
DSTEND=nth.weekday.month [ /hh:mm:ss ]
DSTUTCOFFSET={ + | -hh:mm } ] } ] [ DST={ ON | OFF } ]
Description
Sets the timezone. There is support for Time-zones and Daylight Saving Time (DST) on the SBx3112.
With this feature the SBx3112-based times correctly reflect current local time and whether DST is in
effect if desired. Standard North American Time-zones and their DST settings (start and end date/time
and UTC offset) are supported. The user may specify a custom time-zone with a start and end date/
time and UTC offset for DST.
Note that changing the TIMEZONE has no effect on the UTC time in the shelf, only how it is displayed.
(The local time being displayed is always calculated on the fly from the UTC date/time and the TIMEZONE parameter.) Refer to the example below.
Mode
Manager
Options
Default
Value
Option
Description
Range
TIMEZONE
Allows the user to specify one of the pre-defined North
American DST time-zone settings:
NA
EASTERN
NA
NA
(DST UTC: -4:00, Standard Time: -5:00) Eastern Time
(EDT)
(DST UTC: -5:00, Standard Time: -6:00) Central Time
(CDT)
(DST UTC: -6:00, Standard Time: -7:00) Mountain Time
(MDT)
(DST UTC: -7:00, Standard Time: -8:00) Pacific Time
(PDT)
(DST UTC: -8:00, Standard Time: -9:00) Alaska Time
(AKDT)
The standard US time-zone DST start and end date/
time is defined as M03.02.00/02:00:00 and M11.01.00/
02:00:00 respectively.
CUSTOMUTCOFFSET
Specifies a value (hour and minutes) to be used as the
UTC offset. The offset can be any value between -23:59
and +23:59 (e.g., +5:45).
Software Reference for SwitchBlade x3100 Series Switches
105
Setting Up the Switch
Option
Description
Range
Default
Value
DSTSTART
Used to specify a date for the start of Daylights Savings
Time (DST). Depending on the region, this may either
be a fixed calendar date or an offset relative to a day of a
given month. For example, if DST starts on the second
Sunday in March at 02:00, the DSTSTART parameter is
set to 01.00.03/02:00:00.
NA
02:00:00
NA
NA
The date is represented as either a month and day combination in the format mmm-dd where:
mmm can either be a number between 1-12 (1=January
and 12=December) or one of the following three letter
month abbreviations:
JAN,FEB,MAR,APR,MAY,JUN,JUL,AUG,SEP,OCT,NOV,D
EC.
dd is the day of the month starting with 1.
The other format is used to specify something like “the
first Sunday in March.” This format is in the format
wwww.ddd.mmm, as follows:
www - 1ST,2ND,3RD,4TH,LAST
ddd - SUN,MON,TUE,WED,THU,FRI,SAT
mmm JAN,FEB,MAR,APR,MAY,JUN,JUL,AUG,SEP,OCT,NOV,D
EC
If hh:mm:ss is not supplied by the user for DSTSTART or
DSTEND a value of 02:00:00 will be used as the default.
DSTEND
Used to specify a date for the end of Daylights Savings
Time (DST). Depending on the region, this may either
be a fixed calendar date or an offset relative to a day of a
given month. For example, if DST ends on the first Sunday in November at 02:00, the DSTEND parameter is
set to 00:00:11/02:00:00.
Refer to DSTEND for more information.
DSTUTCOFFSET
Specifies a value (hour and minutes) to be used as the
UTC offset when DST is in effect. The offset can be any
value between -23:59 and +23:59 (e.g., +5:45).
NA
NA
DST
Turn the Daylight Saving Time feature on or off.
NA
OFF
Release Note
NA
Example
SET SYSTEM TIMEZONE EASTERN DSTSTART=2ND.SUN.MAR DSTEND=1ST.SUN.NOV
DSTUTCOFFSET=-04:00 DST=ON
Example
(Changing TIMEZONE only)
TIMEZONE is set to EASTERN
Current local date/time is 13:00:00 on 2011-06-01 (in DST so offset is -4 hours)
UTC time would therefore be 17:00:00
SET SYSTEM TIMEZONE PACIFIC
Current local date/time is 10:00:00 on 2011-06-01 (offset is now -7 hours)
UTC time is still 17:00:00
Software Reference for SwitchBlade x3100 Series Switches
106
Setting Up the Switch
SHOW SNTP
Syntax
SHOW SNTP
Description
Shows the attributes of the Simple Network Time Protocol (SNTP) configuration, which includes the
SNTP server hostname/address, and UTC offset).
Mode
User
Options
NA
Release Note
NA
Example
SHOW SNTP
-------------------------------------------------------------SNTP Configuration
-------------------------------------------------------------Status On
Local IP 10.52.70.13
Last Update 2009-12-07 09:47:51
Last Delta +00.13s
Last Status
Operation Successful
SNTP Server
----------------------------------------------------------------------192.43.244.18
SNTP Statistics
--------------------------------------------------------------Requests Sent 1
Responses Received 1
---------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
107
Setting Up the Switch
SHOW SYSTEM TIME
Syntax
SHOW SYSTEM TIME [FULL]
Description
Displays the current date and time that the system is using.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
FULL
Includes all of the time attributes (UTC Offset, Daylight
Savings Time settings, SNTP setting as ON or OFF
NA
NA
NA
Example
SHOW SYSTEM TIME FULL
--- System Time --Date................................. 2010-03-25
Time................................. 11:12:29 (STANDARD)
Current UTC Offset................... +00:00:00
Day Light Saving
Status.............................
Timezone...........................
Start..............................
End................................
DST UTC Offset.....................
Standard UTC Offset................
OFF
CUSTOM
+00:00:00
+00:00:00
SNTP Settings
Status............................. OFF
Software Reference for SwitchBlade x3100 Series Switches
108
Setting Up the Switch
1.7 File Management
1.7.1 Introduction
A software release is the set of executable binary code that runs on system cards. Software releases are delivered in the form
of executable files, or load files. Depending on the card, some will require a load, others may not. Card load files and the system configuration database are normally stored on the control module card. New functionality and feature content for the
system is delivered in the form of new software releases. Users perform software upgrades to load new releases. Management of system files is important to maintaining optimum operational performance from the system. System file management,
load management, database management, and the software upgrade process will be described.
The SBx3112 offers two system configurations, duplex or simplex. Software upgrades for both configurations are described
below. Some differences between a simplex and duplex system are:
• Simplex systems are equipped with a single control module, the active CFC (ACTCFC)
• Duplex systems are configured with two control modules, the active CFC (ACTCFC) and the inactive CFC (INACTCFC),
providing a hot standby control module.
1.7.2 Load File Names
Load file names describe both the hardware type that uses the software and the version identification for the release. There
is internal meta data imbedded within the file that contains the same information. This external and internal data is used during the loading and installation processes to verify and assure correct software installation for appropriate hardware. For
example, the meta data insures that a control module load file will only load into and execute on a control module card.
These are examples of software release file:
• CFC200 card load file name: CFC200_14.2.1.tar
• GE24POE card load file name: GE24_14.2.1.tar
• GE24SFP card load file name: GE24SFP_14.2.1.tar
Consider the load file names listed above. The load release is subdivided into three levels. The release level will be important
and will be referred to during a software upgrade. They are as follows:
{
CFC200_14.2.1.tar
14 = Major Release
2 = Minor Release
1 = Patch Release
FIGURE 1-6
Note:
Release levels
Software load files are delivered as tar files, and the”.tar” extension must be retained.
1.7.3 File Storage
Load files can be stored in numerous locations. For example, loads will be stored in FLASH on the control module, service
module, and could be stored in the users network on a TFTP server, ZMODEM, FTP server, or SD card.
FLASH memory is a nonvolatile, reusable memory device that allows storage of large volumes of data. RAM is volatile,
dynamic memory that contains the executable software. Software loads are stored in FLASH and RAM memory on the control module and service module. The primary function of FLASH memory on the system is to store software releases, simpli-
Software Reference for SwitchBlade x3100 Series Switches
109
Setting Up the Switch
fying the servicing and maintenance requirements of the system and reducing recovery time during system restorations.
Control modules and service modules are shipped with release files already present in FLASH memory.
Note:
The files on these control and service modules may or may not have the latest release.
For a duplex system, both control modules have the same files on their respective FLASH file systems. When both control
modules are UP and are in sync, all file operations are automatically applied to both the active and inactive control module. If
the inactive control module is DOWN, it is out-of-sync and file operations are not performed on it. When the inactive control module is enabled, it performs a bulk sync, and once complete, the two control modules have file operations applied to
both.
Control modules have enough FLASH memory to store two release files for each card type, allowing older and new releases
to coexist in FLASH memory during upgrade procedures. The configuration database is also stored in FLASH on the control
modules. Service modules have enough memory to store a single copy of its software release file.
When performing an upgrade, management commands retrieve the new release files from a network host and load them into
FLASH memory on the control module and service module.
1.7.4 CFC Media (SD Card)
The media card is an SD card.
Note:
A USB slot is physically present on the faceplate, but there is no software support in16.0. (USB support will be
available in a future release.)
The following SD flash memory cards are officially supported in this release.
• SanDisk SD 2G Flash card
• SanDisk 4GB SDHC Flash card
• SanDisk SDHC 32G Flash card
Note:
Others brands can be used but are not guaranteed to work.
The SD cards are labeled as “SD4” (on the slot 4 CFC) and “SD5” (on the slot 5 CFC) and are managed via the MEDIA commands. The SD cards (on both the active and inactive CFC) can be used in all commands that allow media devices for either
source or destination files, including:
BACKUP DATABASE
RESTORE DATABASE
BACKUP CONFIG
PUT LOG
COPY FILE
DELETE FILE
PUT FILE
RENAME FILE
SHOW FILE
Note:
The RESTORE CONFIG is not supported from the SD card in 16.0 for either CFC.
Following are some sample input commands with the 2GB SD card.
show media
--- Media Devices -----------------------------------------------------Unit
State
-------------------------------------- --------------------------------SD4
UP Online
SD5
UP Online
-------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
110
Setting Up the Switch
show media sd5
------------------------------------------------------------------------Device Name
SD5
Fault
No Faults
Parent Card
5
Card Type
SD MEDIA
State
UP
Status
Online
Serial Number
1894278981
Firmware Version
8.0
Number of Sectors
3862528
Bytes per Sector
512
Model
SD02G
------------------------------------------------------------------------show files sd5:*
------------------------------------------------------------------------File.................................. Size KiB
-------------------------------------- --------------------------------AllMsg.log............................ 2
MostMsgs.log.......................... 12
back09Dec2009.cfg..................... 65
backup08Dec2009.db.................... 635
cfc200_14.1.0.GAMMA.20091207.tar...... 13282
ge24poe_14.1.0.GAMMA.20091207.tar..... 2082
renamingRob........................... 75
Capacity KiB.......................... 1931264
Total Displayed KiB................... 16157
Available KiB......................... 1912672
------------------------------------------------------------------------copy file john.scr to sd5:john.scr
Command has been submitted
Copy OK: 1683 bytes copied
Info (033019): Successfully copied file john.scr to john.scr media sd5
show file sd5:*
------------------------------------------------------------------------File.................................. Size KiB
-------------------------------------- --------------------------------AllMsg.log............................ 2
MostMsgs.log.......................... 12
back09Dec2009.cfg..................... 65
backup08Dec2009.db.................... 635
cfc200_14.1.0.GAMMA.20091207.tar...... 13282
ge24poe_14.1.0.GAMMA.20091207.tar..... 2082
john.scr.............................. 1
renamingRob........................... 75
Capacity KiB.......................... 1931264
Total Displayed KiB................... 16158
Available KiB......................... 1912671
------------------------------------------------------------------------show files media sd4
------------------------------------------------------------------------------File.................................. Size KiB
-------------------------------------- --------------------------------------AllMsg.log............................ 207
DBBackupTR15.db....................... 670
RobSD.txt............................. <1
cfc200_14.1.0.GAMMA.20100203.tar...... 13359
rob.tar............................... 2097
Capacity KiB.......................... 3567616
Total Displayed KiB................... 16334
Available KiB......................... 4194303
Software Reference for SwitchBlade x3100 Series Switches
111
Setting Up the Switch
delete file sd5:john.scr
Do you really want to delete file(s) (Y/N)? y
Info (033822): Submitted request to delete file john.scr
Info (033816): Successfully deleted file: john.scr media sd5
deactivate media sd5
Command has been submitted for card 5
Info (039512): Operation Successful (SD5 )
show media
--- Media Devices -----------------------------------------------------Unit
State
-------------------------------------- --------------------------------SD4
UP Online
SD5
DOWN Offline
------------------------------------------------------------------------
1.7.4.1 Transferring Files between Flash and an SD Card
The COPY FILE command can be used to transfer (and rename) files between flash and an SD card. If either the source file or
destination is a media card, the file name should be directly preceded by the unit name (e.g., SD5).
When copying to flash, if the system is running with redundant CFCs, the operation is performed on both CFCs (when both
CFCs are online). The command fails if there is insufficient space on the CFC flash file system or SD card for the new file.
The following procedure shows the commands used to copy a file from flash to an SD card as well as from an SD card to
flash.
TABLE 1-13
Step
Procedure - Transferring File between Flash and SD Card
Command
Description/Notes
Copy a file from flash to an SD card
1
copy file D104_14.1.0.cfg to sd5:
Copies file “D104_14.1.0.cfg” from the local
flash to the SD5 media card.
Info (033019): Successfully copied file
D104_14.1.0.cfg to D104_14.1.0.cfg media sd5
Verify that file was copied
2
show file sd5:
------------------------------------------------------------------------------File..................................
-------------------------------------D104_14.1.0.cfg.................. 62
DBBackupTR15.db.......................
cfc200_14.1.0.GAMMA.20100208.tar......
rob.tar...............................
rob1.tar..............................
rob12.tar.............................
xe4_14.1.0.GAMMA.20100111.tar.........
xe4_14.1.0.GAMMA.20100118.tar.........
Size KiB
--------------------------------------670
13366
2097
2097
2053
2053
2054
Capacity KiB.......................... 1985024
Total Displayed KiB................... 24455
Available KiB......................... 1960160
Copy a file from flash to an SD card and renaming it
3
copy file D104_14.1.0.cfg to
sd5:D104_old.cfg
Info (033019): Successfully copied file
D104_14.1.0.cfg to D104_old.cfg media sd5
Software Reference for SwitchBlade x3100 Series Switches
Copies file “D104_14.1.0.cfg” from the local
flash to the SD5 media card and changes the
filename to “D104_old.cfg“.
112
Setting Up the Switch
TABLE 1-13
Step
Procedure - Transferring File between Flash and SD Card
Command
Description/Notes
Verify that file was copied and renamed
4
show file sd5:
------------------------------------------------------------------------------File..................................
-------------------------------------D104_14.1.0.cfg.......................
D104_old.cfg..................... 62
DBBackupTR15.db.......................
cfc200_14.1.0.GAMMA.20100208.tar......
rob.tar...............................
rob1.tar..............................
rob12.tar.............................
xe4_14.1.0.GAMMA.20100111.tar.........
xe4_14.1.0.GAMMA.20100118.tar.........
Size KiB
--------------------------------------62
670
13366
2097
2097
2053
2053
2054
Capacity KiB.......................... 1985024
Total Displayed KiB................... 24518
Available KiB......................... 1960096
Copy a file from an SD card to flash and renaming it
5
copy file sd4:D104.cfg to D104_today.cfg
Info (033006): Successfully copied file D104.cfg to
D104_today.cfg card 4
Info
(033011):
Successfully
D104_today.cfg to card 5
transferred
Copies file “D104.cfg” from the SD4 media card
to the flash on both CFCs (card 4 and card 5)
and changes the filename to “D104_today.cfg“.
file:
Verify that file was copied to flash and renamed
6
show file
------------------------------------------------------------------------------File..................................
-------------------------------------AllMsg-2.log..........................
AllMsg.log............................
D10-14_14.0.0.ALPHA.20091012.cfg......
D10-14_14.0.0.ALPHA.20091021.cfg......
D10-14_14.0.0.ALPHA.20091026.cfg......
D10-14_14.0.0.ALPHA.20091102.cfg......
D10-14_14.0.0.ALPHA.20091109.cfg......
D10-14_14.0.0.ALPHA.20091118.cfg......
D10-14_14.0.0.GAMMA.20091117.cfg......
Size KiB
--------------------------------------2
3
6
6
6
6
75
68
65
(output Omitted)
D104_14.2.0.GAMMA.20100609.cfg........
D104_14.2.0.GAMMA.20100611.cfg........
D104_14.2.0.GAMMA.20100615.cfg........
D104_14.2.0.GAMMA.20100617.cfg........
D104_14.2.0.GAMMA.20100622.cfg........
D104_14.2.0.GAMMA.20100629.cfg........
D104_14.2.0.GAMMA.20100629_john.cfg...
D104_14.2.0.GAMMA.20100629a.db........
D104_14.2.0.GAMMA.20100709.cfg........
D104_14.2.0.GAMMA.20100709b.cfg.......
D104_14.2.0.GAMMA.20100716.cfg........
D104_today.cfg..................59
EcoMode.cfg...........................
EcoTest2.cfg..........................
HvlanEpsrTc_Jan25.cfg.................
58
58
59
59
61
60
60
276
61
61
61
5
63
63
(output Omitted)
Software Reference for SwitchBlade x3100 Series Switches
113
Setting Up the Switch
1.7.4.2 Transferring Files between a TFTP Server and an SD Card
The PUT FILE and GET FILE commands can be used to transfer (and rename) files between a TFTP server and an SD card.
The commands fails if there is insufficient space on the CFC flash file system or SD card for the new file.
The following procedure shows the commands used to copy a file from a TFTP server to an SD card as well as from an SD
card to a TFTP server.
TABLE 1-14
Step
Procedure - Transferring File between TFTP Server and SD Card
Command
Description/Notes
Copy a file from SD card to a TFTP server
1
put file sd5:D104_14.1.0.cfg tftp server
10.52.65.42
Transfers file “D104_14.1.0.cfg“ from SD card
(SD5) to the TFTP server.
Copy a file from SD card to a TFTP server and change the filename
2
put file sd5:D104_14.1.0.cfg tftp server
10.52.65.42 to logfiles/D104_14.1.0.cfg
Transfers file “D104_14.1.0.cfg“ from SD card
(SD5) to the TFTP server and changes its name
to “logfiles/D104_14.1.0.cfg“.
Copy a file from the TFTP server to the SD card
3
get file D104_14.1.0_19July.cfg tftp
server 10.52.65.42 to sd5:
Transfers file “D104_14.1.0_19July.cfg“ from
the TFTP server to SD card (SD5).
Verify that file was copied to the SD card
4
show file sd5:
------------------------------------------------------------------------------File..................................
-------------------------------------D104_14.1.0.cfg.......................
D104_14.1.0_19July.cfg................
D104_old.cfg..........................
DBBackupTR15.db.......................
cfc200_14.1.0.GAMMA.20100208.tar......
rob.tar...............................
rob1.tar..............................
rob12.tar.............................
xe4_14.1.0.GAMMA.20100111.tar.........
xe4_14.1.0.GAMMA.20100118.tar.........
Size KiB
--------------------------------------62
62
62
670
13366
2097
2097
2053
2053
2054
Capacity KiB.......................... 1985024
Total Displayed KiB................... 24581
Available KiB......................... 1960032
Copy a file from the TFTP server to the SD card and change the filename
5
get file D104_14.1.0_19July.cfg tftp
server 10.52.65.42 to sd4:backup.cfg
Software Reference for SwitchBlade x3100 Series Switches
Transfers file “D104_14.1.0_19July.cfg“ from
the TFTP server to SD card (SD4) and changes
its name to “backup.cfg“.
114
Setting Up the Switch
TABLE 1-14
Step
Procedure - Transferring File between TFTP Server and SD Card
Command
Description/Notes
Verify that file was copied to the SD card and renamed
6
show file sd4:
------------------------------------------------------------------------------File..................................
-------------------------------------AllMsg.log............................
D104.cfg..............................
backup.cfg............................
DBBackupTR15.db.......................
RobSD.txt.............................
cfc200_14.1.0.GAMMA.20100203.tar......
rob.tar...............................
Size KiB
--------------------------------------207
59
62
670
<1
13359
2097
Capacity KiB.......................... 3567616
Total Displayed KiB................... 16456
Available KiB......................... 4194303
Software Reference for SwitchBlade x3100 Series Switches
115
Setting Up the Switch
1.7.5 File Management Commands
TABLE 1-15
File Management Commands
Commands
ACTIVATE MEDIA
AUDIT FILES
COPY FILE TO
DEACTIVATE MEDIA
DELETE FILES
DELETE NONPREFLOADS
DIAGNOSE MEDIA
EXECUTE SCRIPT
FORMAT MEDIA
GET FILE
PURGE MEDIA
PUT FILE
PUT FILE CARD
RENAME FILE TO
SHOW FILES OPERATIONS
SHOW FILES
SHOW FLASH
SHOW MEDIA
SHOW SCRIPT
SHOW TRANSFER
STOP TRANSFER
Software Reference for SwitchBlade x3100 Series Switches
116
Setting Up the Switch
ACTIVATE MEDIA
Syntax
ACTIVATE MEDIA=unit
Description
The ACTIVATE MEDIA command brings the media card to an operational state of UP, with the status
of Online indicating that it is available for service. During the activation sequence, the following steps
are performed: - The device information is read - Out of service diagnostics are run - The file system
on the media card is activated.
Mode
Manager
Options
Option
Description
Range
Default
Value
MEDIA
The name of the file that is being copied from. The unit
is the SD card and the number of the CFC slot (e.g.,
SD4).
NA
NA
Software Reference for SwitchBlade x3100 Series Switches
117
Setting Up the Switch
AUDIT FILES
Syntax
AUDIT FILES
Description
Audits all load files (files with extension .tar) and raises or clears file corruption alarms accordingly
Refer to Software Load Management for its use in verifying loads.
Mode
Manager
Options
NA
Example
AUDIT FILES
Command has been submitted
officer SEC>>>>
--------------------------------------------------------------------------File
CRC Local
LocalCRC
Mate
MateCRC
------------------------------ ------------------------------------------E134cfgOn032310.log........... No
Pass
0xdeadbeef Pass
0xdeadbeef
E134cfgOn032310.txt........... No
Pass
0xdeadbeef Pass
0xdeadbeef
Jan25Config................... No
Pass
0xdeadbeef Pass
0xdeadbeef
Jan25Config.txt............... No
Pass
0xdeadbeef Pass
0xdeadbeef
W5_ge24poe_14.1.0.mdavidson.20 No
Pass
0xdeadbeef Pass
0xdeadbeef
100306.tar....................
W5_xe4_14.1.0.mdavidson.201003 No
Pass
0xdeadbeef Pass
0xdeadbeef
06.tar........................
attachment.txt................ No
Pass
0xdeadbeef Pass
0xdeadbeef
cfc200_14.2.0.dhays2.20100326. No
Pass
0xdeadbeef Pass
0xdeadbeef
tar...........................
cfc200_14.2.0.dhays3.20100326. No
Pass
0xdeadbeef Pass
0xdeadbeef
tar...........................
cfc200_14.2.0.dhays4.20100326. No
Pass
0xdeadbeef Pass
0xdeadbeef
tar...........................
cfc200_14.2.0.dhays5.20100326. No
Pass
0xdeadbeef Pass
0xdeadbeef
tar...........................
cfc200_14.2.0.dhays6.20100326. No
Pass
0xdeadbeef Pass
0xdeadbeef
tar...........................
ge24poe_14.1.0.dhays4.20100319 No
Pass
0xdeadbeef Pass
0xdeadbeef
.tar..........................
ge24poe_14.2.0.dhays1.20100325 No
Pass
0xdeadbeef Pass
0xdeadbeef
.tar..........................
ge24poe_14.2.0.dhays1.20100326 No
Pass
0xdeadbeef Pass
0xdeadbeef
.tar..........................
vxWorks_cfc200................ No
Pass
0xdeadbeef Pass
0xdeadbeef
xe4_14.1.0.GAMMA.20100202.tar. No
Pass
0xdeadbeef Pass
0xdeadbeef
xe4_14.1.0.dhays4.20100319.tar No
Pass
0xdeadbeef Pass
0xdeadbeef
xe4_14.2.0.dhays1.20100325.tar No
Pass
0xdeadbeef Pass
0xdeadbeef
xe4_14.2.0.dhays1.20100326.tar No
Pass
0xdeadbeef Pass
0xdeadbeef
---------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
118
Setting Up the Switch
COPY FILE TO
Syntax
COPY FILE={ sourcefile | unit:sourcefile } TO={ destinationfile | unit:destinationfile }
Description
Copies the specified source file to the specified destination file. The command is rejected if there is
insufficient space on the CFC flash file system for the new file. If either the source file or destination is
a media card, the file name should be directly preceded by the unit name. For example, COPY FILE
SD5:myFile to myFile would copy the file “myFile” from the SD card associated with CFC 5 to
local flash.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILE
The name of the file that is being copied from. The unit
is the SD card and the number of the CFC slot (e.g.,
SD4).
NA
NA
TO
The name of the file that the file is being copied to. The
unit is the SD card and the number of the CFC slot (e.g.,
SD4).
NA
NA
If only the filename is specified, the file is copied to
FLASH memory.
Example
COPY FILE SD5:D104.CFG TO D104.CFG
Software Reference for SwitchBlade x3100 Series Switches
119
Setting Up the Switch
DEACTIVATE MEDIA
Syntax
DEACTIVATE MEDIA=unit [FORCE]
Description
The DEACTIVATE MEDIA command brings the media card to an operational state of DOWN, with
the status of Offline indicating that is not available for service. During the deactivation sequence, the
following steps are performed:
Applications that could be using the media card are polled for approval. If there is an operation in progress, the request to deactivate the device may be denied.
The file system on the media card is deactivated.
Mode
Manager
Options
Option
Description
Range
Default
Value
MEDIA
The name of the file that is being copied from. The unit
is the SD card and the number of the CFC slot (e.g.,
SD4).
NA
NA
FORCE
The media card will be deactivatedeven if there is an
operation in progress that is using the media card.
NA
NA
Software Reference for SwitchBlade x3100 Series Switches
120
Setting Up the Switch
DELETE FILES
Syntax
DELETE FILES={ filename-pattern | unit:filename-pattern } [ FORCE ]
Description
Deletes the specified file from the CFC flash file system. The file must already exist on the CFC flash
file system. The command is disallowed if the specified file is already designated as a preferred load file
for a provisioned card. The command is allowed for files that are designated as alternate or temporary
load files for a provisioned card. The DELETE FILE command can also be used to delete the specified
file from an SD card. In this case, filename must be preceded by the unit name, for example SD5:myFile.
Mode
Manager
Options
Example
Option
Description
Range
Default
Value
FILES
One or more filenames to be deleted. Wildcards can be
used for multiple files. The unit is the SD unit on the
active CFC.
NA
NA
FORCE
Suppresses the confirmation message.
NA
NA
DELETE FILES SD5:D104.CFG FORCE
Software Reference for SwitchBlade x3100 Series Switches
121
Setting Up the Switch
DELETE NONPREFLOADS
Syntax
DELETE NONPREFLOADS
Description
Deletes all files on the CFC flash file system that are not designated as a preferred load for a provisioned card. This command is useful during load upgrade, to remove all non-essential files so that space
for new load files is available. For an SBx3112 with redundant CFCs, the operation is performed on
both CFCs when they are both ONLINE.
Mode
Manager
Options
NA
Example
DELETE NONPREFLOADS
Software Reference for SwitchBlade x3100 Series Switches
122
Setting Up the Switch
DIAGNOSE MEDIA
Syntax
DIAGNOSE MEDIA=unit
Description
The DIAGNOSE command runs Out Of Service diagnostics on the media card. These diagnostics
require the media card to be deactivated before being permitted to run. The diagnostics get run automatically when the media card is activated.
Mode
Manager
Options
Option
Description
Range
Default
Value
MEDIA
The name of the file that is being copied from. The unit
is the SD card and the number of the CFC slot (e.g.,
SD4).
NA
NA
Release Note
NA
Example
DIAGNOSE MEDIA=SD4
Software Reference for SwitchBlade x3100 Series Switches
123
Setting Up the Switch
EXECUTE SCRIPT
Syntax
EXECUTE SCRIPT=filename
Description
Processes all of the commands specified in the specified filename. The script file contains one or more
CLI commands. The first line in the file must contain a comment that identifies the file as a script.
Other words can also exist on the line, but the word 'script' must appear some place in the line. Comments are identified as a hash(#) character on a line in the file. A CLI command in the script file must
occupy a single line. A command cannot span more than one line. If a command requires user interaction like a confirmation, the user response text is included on the line after the command. The contents of a script file are played back as written. A syntax error in the file is detected as the script is run.
If an error is encountered, the device is left in an unknown condition.
Mode
Manager
Options
Option
Description
Range
Default
Value
filename
The filename that contains the scripting commands.
NA
NA
Release Note
NA
Example
EXECUTE SCRIPT CLIENT_EPSR_SETUP
Software Reference for SwitchBlade x3100 Series Switches
124
Setting Up the Switch
FORMAT MEDIA
Syntax
DIAGNOSE MEDIA=unit
Description
The FORMAT MEDIA command allows the user to format a new media card so that is able to be used.
Care should be taken, as any files or data already on the media card will be lost.
Mode
Manager
Options
Option
Description
Range
Default
Value
MEDIA
The name of the file that is being copied from. The unit
is the SD card and the number of the CFC slot (e.g.,
SD4).
NA
NA
Release Note
NA
Example
FORMAT MEDIA=SD4
Software Reference for SwitchBlade x3100 Series Switches
125
Setting Up the Switch
GET FILE
Syntax
GET FILE={ sourcefilename | serverpath/sourcefilename } { TFTP SERVER={ ipaddress | hostname } | ZMODEM | FTP SERVER={ ipaddress | hostname } USER=userid
PASSWORD=password } [ TO=unit: ]
Description
Used to transfer files onto either the CFC flash file system or, (if the optional TO parameter is used) a
specified media card, from the specified SERVER, using the specified file transfer METHOD. The command fails if there is insufficient space on the CFC flash file system or SD card, or if the filename is the
same as a pre-existing preferred load file for a provisioned card. For an SBx3112 with redundant CFCs,
the operation is performed on both CFCs when they are both ONLINE.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILE
The file that is either on the CFC FLASH (sourcefilename) or on the server that is designated by the path.
NA
NA
TFTPSERVER
The ip address or name of the tftp server.
NA
NA
ZMODEM
Specifies the file should be transferred using the ZMODEM protocol.
NA
NA
FTPSERVER
The ip address or name of the tftp server.
NA
NA
USER
The user id to gain access to the specified server.
NA
NA
PASSWORD
The password needed after entering the user id to gain
access to the specified server
NA
NA
TO
The SD card that will receive the file from the specified
server.
NA
NA
Release Note
NA
Example
GET FILE D104_14.1.0_19JULY.CFG TFTP SERVER 10.52.65.42 TO SD5:
Software Reference for SwitchBlade x3100 Series Switches
126
Setting Up the Switch
PURGE MEDIA
Syntax
PURGE MEDIA=unit
Description
The PURGE MEDIA command deletes all files from the specificed media card.
Mode
Manager
Options
Option
Description
Range
Default
Value
MEDIA
The name of the file that is being copied from. The unit
is the SD card and the number of the CFC slot (e.g.,
SD4).
NA
NA
Release Note
NA
Example
PURGE MEDIA=SD4
Software Reference for SwitchBlade x3100 Series Switches
127
Setting Up the Switch
PUT FILE
Syntax
PUT FILE={sourcefile|unit:sourcefile} {TFTP SERVER={ipaddress|hostname} | FTP
SERVER={ipaddress|hostname} USER=userid PASSWORD=password | ZMODEM}
[TO=serverpath]
Description
Transfers the specified file from the CFC flash file system or specified SD card to the given destination.
The destination is either an external server, or a card or set of cards in the shelf. The source file must
already exist on the flash file system.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILE
The file that is either on the CFC FLASH (sourcefilename) or on the server that is designated by the path.
NA
NA
TFTP_Server
The ip address or name of the tftp server.
NA
NA
ZMODEM
Specifies the file should be transferred using the ZMODEM protocol.
NA
NA
FTP_Server
The ip address or name of the tftp server.
NA
NA
USER
The user id to gain access to the specified server.
NA
NA
PASSWORD
The password needed after entering the user id to gain
access to the specified server
NA
NA
TO
The SD card that will receive the file from the specified
server.
NA
NA
Release Note
NA
Example
PUT FILE SD5:D104_14.1.0.CFG TFTP SERVER 10.52.65.42 TO LOGFILES/
D104_14.1.0.CFG
Software Reference for SwitchBlade x3100 Series Switches
128
Setting Up the Switch
PUT FILE CARD
Syntax
PUT FILE={ sourcefile | unit:sourcefile } CARD={ slot | slot-list }
Description
Transfers the specified file from the CFC flash file system or specified SD card to the given destination.
The destination is a card or set of cards in the shelf. The source file must already exist on the flash file
system.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILE
The file name on the CFC FLASH memory. The unit can
also be included.
NA
NA
CARD
The slot(s) of the cards that will receive the file.
NA
NA
Release Note
NA
Example
PUT FILE SD5:D104_14.1.0.CFG CARD 10-11
Software Reference for SwitchBlade x3100 Series Switches
129
Setting Up the Switch
RENAME FILE TO
Syntax
RENAME FILE={ sourcefile | unit:sourcefile } TO={ destinationfile | unit:destinationfile }
Description
Renames the specified file on the CFC flash file system. The file must already exist on the CFC flash file
system. The command is disallowed if the specified file is already designated as a preferred, alternate or
temporary load file for a provisioned card. For a duplex system, the operation is performed on both
CFCs when they are both ONLINE. The RENAME FILE command can also be used to rename the
specified file on a specified media card by prepending the name of the media card to the respective filenames. Example: RENAME cflash9:myOldFilName TO cflash9:myNewFileName.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILE
The name of the file that is being copied from. The unit
is the SD card and the number of the CFC slot.
NA
NA
TO
The name of the file that the file is being copied to. If
only the filename is specified, the file is copied to FLASH
memory. Note - In release 14.1 only one SD unit is
allowed on the active CFC, and so you cannot copy a file
from one SD unit to another.
NA
NA
Release Note
NA
Example
RENAME FILE SD4:D104_14.1.0_19JULY.CFG TO SD4:D104_14.1.0_OLD.CFG
Software Reference for SwitchBlade x3100 Series Switches
130
Setting Up the Switch
SHOW FILES OPERATIONS
Syntax
SHOW FILES OPERATIONS
Description
Show in-progress/pending transactions for the COPY, DELETE, and RENAME commands. This command when used with the SHOW TRANSFER command can tell the user the reason a file is busy.
Mode
User
Options
NA
Release Note
NA
Example
SHOW FILES OPERATIONS
----------------------------------------------------------------------------Command Device
Filename
------- --------- ----------------------------------------------------------DELETE
LOCAL
xe4_14.2.0.GAMMA.20100810.tar
------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
131
Setting Up the Switch
SHOW FILES
Syntax
SHOW FILES [ ={ filename-pattern | unit: | unit:filename-pattern } ] [ FULL ]
Description
Displays all user manageable files that exist on the CFC flash file system. Examples of manageable files
include software load files and script files. There are other types of files that are not directly manageable by the user that exist on the CFC flash file system, but are hidden and not displayed by this command. Database and log files are examples of files that are not directly user manageable. The
information is displayed in a columnar format, and for each file the following is shown:
•
the name of the file
•
the size of the file in kilobytes
Additional general information is shown about the CFC flash file system, including:
Mode
•
the total amount of space (in kilobytes) allocated for user manageable files
•
the total amount of space (in kilobytes) currently in use for user manageable files
•
the total amount of free space (in kilobytes) available for additional user manageable files.
User
Options
Default
Value
Option
Description
Range
FILES
Used to select the
NA
All files
on the
CFC flash
file system.
NA
NA
filename-pattern - A set of files using wildcards.
unit - The CD unit (SD4 or SD5)
unit:filename-pattern - the specific SD unit
and the pattern (in 14.1, only the SD unit on the active
CFC unit can be specified)
FULL
When the FULL option is specified, extra information
about each file is shown:
- the version of the file if it is a software load file; for
other types of files this field is left blank
- the hardware model number supported by this file if it
is a software load file; for other types of files this field is
left blank
- the date and time that the file was last modified
Release Note
NA
Example
SHOW FILES
File............................................................
---------------------------------------------------------------D104_14.2.0_PR22173.cfg.........................................
D104_16.0.0.ALPHA.20120213a.cfg.................................
D104_16.0.0.ALPHA.20120305.cfg..................................
D104_16.0.0.ALPHA.20120312.cfg..................................
D104_16.0.0.ALPHA.20120319.cfg..................................
D104_16.0.0.ALPHA.20120319_26Mar2012.cfg........................
D104_16.0.0.ALPHA.20120326.cfg..................................
D104_16.0.0.ALPHA.20120326.out..................................
D104_16.0.0.ALPHA.20120326_superloop.cfg........................
Software Reference for SwitchBlade x3100 Series Switches
Size KiB
----------834
859
113
95
96
95
95
285
113
132
Setting Up the Switch
D104_16.0.0.ALPHA.20120409_PR24981_ringEveryPort.cfg............
D104_16.0.0.ALPHA.20120409_superloop_0.0_0.5_1.0.cfg............
D104_16.0.0.ALPHA.20120416.cfg..................................
D104_16.0.0.ALPHA.20120416_fullR15Config.cfg....................
cfc200_14.2.0.tar...............................................
cfc200_15.1.0.tar...............................................
cfc200_16.0.0.RC1.20120418.tar..................................
ge24_14.2.0.tar.................................................
ge24_15.1.0.tar.................................................
ge24sfp_14.2.0.tar..............................................
ge24sfp_15.1.0.tar..............................................
x31sma_16.0.0.RC1.20120418.tar..................................
xe4_14.2.0.tar..................................................
xe4_15.1.0.tar..................................................
xe6sfp_15.1.0.tar...............................................
75
113
113
859
13866
11002
13680
2154
2095
2101
2034
2629
2085
2049
2049
Allowed KiB..................................................... 87040
Total Displayed KiB............................................. 59489
Available KiB................................................... 27539
------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
133
Setting Up the Switch
SHOW FLASH
Syntax
SHOW FLASH [INACTCFC]
Description
Displays information about the flash memory on the CFC card. Flash memory is used for storage of
user manageable files and other data not manageable by the user. The information displayed by the
SHOW FLASH command includes:
•
the total size of flash memory (in kilobytes)
•
the total size of free flash memory (in kilobytes)
•
the total size of contiguous free flash memory (in kilobytes)
This command should not be confused with the SHOW FILES command which shows files and memory usage associated only with user manageable file space on the flash memory.
Mode
Manager
Options
Option
Description
Range
Default
Value
INACTCFC
This option is not supported in 14.2.
NA
NA
To display the flash memory of the "inactive" CFC, the
user must first swap the active card with the inactive
one (thereby making the inactive CFC the active CFC)
and then issue the SHOW FLASH command.
Release Note
NA
Example
>SH FLASH
--- Flash Information ------------------------------------------Total size............... 129024
Free size................ 41604
Contiguous free size..... 17056
kb
kb
kb
---------------------------------------------------------------->SH FLASH
<cr>
INACTCFC
- This parameter is currently not supported.
>SH FLASH INACTCFC
Error: (010014): Particular command argument set not yet supported : inactive
Software Reference for SwitchBlade x3100 Series Switches
134
Setting Up the Switch
SHOW MEDIA
Syntax
SHOW MEDIA [ ={ unit-list | ALL } ] [ FULL ]
Description
Displays information for the specified media card(s). The information that can be displayed includes:
the Parent Card slot number, the media card’s type, state, status, model/serial number, firmware version, number of sectors, and number of bytes per sector.
Mode
Manager
Options
Option
Description
Range
Default
Value
MEDIA
Used to select the:
NA
NA
NA
NA
unit-list - A specific SD unit or a list of SD units.
ALL - all available media cards
FULL
When the FULL option is specified, extra information
about each media card is shown:
- Serial Number
- Firmware Version
- Number of Sectors
- Number of Bytes per Sector
Release Note
NA
Example
show media full
------------------------------------------------------------Device Name
Fault
Parent Card
Card Type
State
Status
Serial Number
Firmware Version
Number of Sectors
Bytes per Sector
Model
SD4
No Faults
4
SD MEDIA
UP
Online
2156096975
8.0
15523840
512
SD08G
--------------------------------------------------------------------------------------------------------------------------Device Name
Fault
Parent Card
Card Type
State
Status
Serial Number
Firmware Version
Number of Sectors
Bytes per Sector
Model
Software Reference for SwitchBlade x3100 Series Switches
SD5
No Faults
5
SD MEDIA
UP
Online
1613776034
8.0
3970048
512
SD02G
135
Setting Up the Switch
SHOW SCRIPT
Syntax
SHOW SCRIPT=filename
Description
Displays the contents of a Command Line Interface (CLI) script. A script contains CLI commands that
are executed through the EXECUTE SCRIPT command.
Mode
Manager
Options
Option
Description
Range
Default
Value
SCRIPT
The filename of a valid script file
NA
NA
Release Note
NA
Example
SHOW SCRIPT CLIENT_EPSR_SETUP
Software Reference for SwitchBlade x3100 Series Switches
136
Setting Up the Switch
SHOW TRANSFER
Syntax
SHOW TRANSFER [ ={ transferid-list | ALL } ]
Description
Displays current file transfer operations, including those in progress and those that are pending. The
information is displayed in a columnar format. For files that are being transferred to or from a network
server (as result of a PUT FILE or GET FILE command, the following is displayed:
- an ID, which is simply a number associated with a particular file transfer to serve as an identifying tag
- the CMD, which is the command that was used to initiate the file transfer. The command is either
PUT or GET.
- Remote file, which is the name of the file being transferred to or from the network server
- Local file, which is the name of the file on the CFC flash file system being transferred to or from the
network server
- the Server, which is the IP address of the network server
- the Mode, which is the protocol being used for the file transfer. Currently, only TFTP is supported.
- the Status, which describes the current state of the file transfer operation. The status is either Progress, which means that the transfer is in progress, or Pending, which means that the transfer is delayed
and will begin when other transfers are completed.
- the MB, which is the number of megabytes that have been transferred, if the associated transfer status
is in progress For files that are being transferred from the CFC flash file system to another card in the
shelf (as result of a PUT FILE operation), the following is displayed: - the Card, which is the card the file
is being transferred to
- the CMD, which is the command that was used to initiate the file transfer. Currently, only the PUT
command is supported.
Mode
Manager
Options
Option
Description
Range
Default
Value
TRANSFER
The transfer ID(s), separated by a comma
NA
ALL
Release Note
NA
Example
SHOW TRANSFER ALL
Software Reference for SwitchBlade x3100 Series Switches
137
Setting Up the Switch
STOP TRANSFER
Syntax
STOP TRANSFER={ transferid-list | ALL }
Description
Aborts an in-progress or pending file transfer. Only transfers to/from a network server can be
stopped. File transfers from the CFC flash file system to a card in the shelf cannot be stopped. Stopping
a transfer that is in progress deletes the destination file, but does not affect the source file.
Mode
Manager
Options
Option
Description
Range
Default
Value
TRANSFER
The transfer ID(s), separated by a comma.
NA
ALL
Release Note
NA
Example
STOP TRANSFER ALL
Software Reference for SwitchBlade x3100 Series Switches
138
Setting Up the Switch
1.8 Software Load Management
1.8.1 Card Load Preferences
Once a software load is present in the control module FLASH file system, it can be designated as the target software load for
one or more cards using the parameters on the SET CARD command. The setting can be PREFLOAD, ALTLOAD, or TEMPLOAD.
1.8.2 Load File Verification
When software load files are created, a CRC value is calculated and written into the internal file data. Once a file has been
transferred to the control module FLASH file system (and to Service Module FLASH), the file contents can be verified by
recalculating the CRC value and comparing it to the internal CRC value. In the unlikely event that there is a mismatch
between the value, the file is designated corrupt.
File CRC validation is performed on all load files (those with the “.tar” extension on the file name) in the control module
FLASH file system a follows:
•
•
•
•
immediately after a restart or swap of activity
periodic audit (every 24 hours)
whenever a user enters the AUDIT FILES command
File CRC validation is performed on individual files when:
• the file is being designated as a parameter on the SET CARD command
• the file is being used during the card restart sequence, as a result of system action or manual command (RESTART
CARD or ENABLE CARD)
As mentioned above, the user can audit system files using the AUDIT FILES command. Following is an example of the use of
the command.
officer SEC>> audit files
Command has been submitted
officer SEC>>
File
Local Audit Result
Mate Audit Result
-----------------------------------------------------------------------------------------------D104_14.2.0_PR22173.cfg...................................Pass
Pass
D104_16.0.0.ALPHA.20120213a.cfg...........................Pass
Pass
D104_16.0.0.ALPHA.20120305.cfg............................Pass
Pass
D104_16.0.0.ALPHA.20120312.cfg............................Pass
Pass
D104_16.0.0.ALPHA.20120319.cfg............................Pass
Pass
D104_16.0.0.ALPHA.20120319_26Mar2012.cfg..................Pass
Pass
D104_16.0.0.ALPHA.20120326.cfg............................Pass
Pass
D104_16.0.0.ALPHA.20120326.out............................Pass
Pass
D104_16.0.0.ALPHA.20120326_superloop.cfg..................Pass
Pass
D104_16.0.0.ALPHA.20120409_PR24981_ringEveryPort.cfg......Pass
Pass
D104_16.0.0.ALPHA.20120409_superloop_0.0_0.5_1.0.cfg......Pass
Pass
D104_16.0.0.ALPHA.20120416.cfg............................Pass
Pass
D104_16.0.0.ALPHA.20120416_fullR15Config.cfg..............Pass
Pass
cfc200_14.2.0.tar.........................................Pass
Pass
cfc200_15.1.0.tar.........................................Pass
Pass
cfc200_16.0.0.RC1.20120418.tar............................Pass
Pass
ge24_14.2.0.tar...........................................Pass
Pass
ge24_15.1.0.tar...........................................Pass
Pass
ge24sfp_14.2.0.tar........................................Pass
Pass
ge24sfp_15.1.0.tar........................................Pass
Pass
x31sma_16.0.0.RC1.20120418.tar............................Pass
Pass
xe4_14.2.0.tar............................................Pass
Pass
xe4_15.1.0.tar............................................Pass
Pass
xe6sfp_15.1.0.tar.........................................Pass
Pass
1.8.3 Boot Server (Control Module Only)
Users of the system have the option of storing secure copies of software release load files on their network servers. This
assists the user in providing optimum network reliability. The boot server should be configured and the most current control
module load file should be stored there. This insures that secure load files are always available.
Software Reference for SwitchBlade x3100 Series Switches
139
Setting Up the Switch
Note that boot server functionality is only available for the active control module.
Users can also configure the system to boot from the network servers where the load files are stored using the SET BOOTSERVER. It permits users to designate a server to be the system boot server. As discussed in 1.7.3, load files are stored in
FLASH memory on the control module. If the FLASH should become corrupted or the files become unusable for any reason,
the system will boot from the secure load files stored on the boot server. To ensure system recovery back to its normal
operating state, the card load files that are stored on the boot server must be a copy of the card load file designated as PREFLOAD for the control module.
Loading the system from the boot server is not intended to be the primary method for software release delivery. Rather, it is
a backup or secondary method that the system will utilize if the primary method is unusable for any reason.
To configure the boot server, the flow of commands would be.
1.
Get the preferred load using the GET FILE command.
2.
Set the preferred load using the SET CARD PREFLOAD command.
3.
Make a backup of preferred load using the COPY FILE command.
4.
Make the backup the alternate load using the SET CARD ALTLOAD command.
5.
Set the Bootserver using the SET BOOTSERVER command.
6.
Copy the current control module preferred load files, that are designated as PREFLOAD, onto the boot server using the
PUT FILE command.
The following procedure shows the commands used to configure a boot server’s IP address and the path to where the preferred CFC software load resides on server. In this example, the filename of the preferred CFC software load is
“cfc200_14.2.0.GAMMA.20100716.tar” (as previously set by the user using the SET CARD=ACTCFC PREFLOAD command). The IP address of the designated network boot server is 10.52.65.38.
TABLE 1-16
Step
Procedure - Configuring the Boot Server
Command
Description/Notes
Configure the IP address of the boot server (where preferred CFC software load resides)
1
set bootserver ipaddress 10.52.65.38
Sets the IP address of the network boot server
to 10.52.65.38
Configure the path on boot server (where preferred CFC software load is located)
2
set bootserver path x3112Files/
Sets the path (on the network boot server) to
“x3112/”
Verify the new boot server settings
3
show bootserver
------------------------------------------------------------------------------Network Boot Host IP..... 10.52.65.38
Network Boot Load........ cfc200_14.2.0.GAMMA.20100716.tar
Network Boot Path........ x3112Files/
Software Reference for SwitchBlade x3100 Series Switches
140
Setting Up the Switch
1.8.4 Commands for Software Load Management
TABLE 1-17
Software Load Management Commands
Commands
SET BOOTSERVER
SHOW BOOTSERVER
Software Reference for SwitchBlade x3100 Series Switches
141
Setting Up the Switch
SET BOOTSERVER
Syntax
SET BOOTSERVER=ipaddress [PATH=pathname|NONE]
Description
Sets static IP address of the network boot server. The network boot server is the source for the preferred CFC software load file. The device downloads the preferred load from the boot server via TFTP
when all boot attempts for the CFC fail from the CFC flash file system. The preferred software load is
set using the command SET CARD=ACTCFC PREFLOAD=filename. In the event the CFC cannot use
the preferred load from its own flash file system, the preferred load file is transferred from the boot
server and written to the flash, replacing any existing preferred load file for the CFC.
Mode
Manager
Options
Option
Description
Range
Default
Value
BOOTSERVER
Specifies the IP address of the network server that is the
source for the preferred CFC software load. Files are
transferred from the network server via TFTP.
NA
NA
PATH
Identifies the directory path on the network server
from which the preferred software load is retrieved.
The path on the network server includes spaces then
the entire PATH must be enclosed in double quotes (").
NA
NONE
NONE - The load is located at the root level on the
boot server.
Release Note
NA
Example
SET BOOTSERVER IPADDRESS 10.52.70.30 PATH X3112 FILES/
Software Reference for SwitchBlade x3100 Series Switches
142
Setting Up the Switch
SHOW BOOTSERVER
Syntax
SHOW BOOTSERVER
Description
Displays the static IP address of the network boot server, and the preferred software load file which is
downloaded from the server when all boot attempts for the CFC fail from the CFC flash file system.
Mode
Manager
Options
NA
Release Note
NA
Example
SHOW BOOTSERVER
------------------------------------------------------------------------------Network Boot Host IP..... 10.52.65.38
Network Boot Load........ cfc200_14.2.0.GAMMA.20100716.tar
Network Boot Path........ x3112Files/
-------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
143
Setting Up the Switch
1.9 Database and Text File Management
1.9.1 Database Management
1.9.1.1 Introduction
All configuration and provisioning changes made by the system user are stored internally in the system configuration database. The database is updated dynamically any time a configuration change is made to the system, through the normal use of
CLI commands. When the control module is restarted, it restores the system configuration from the database.
The database is stored in the control module FLASH memory, but is not a user manageable file in the FLASH system, so no
file-related CLI commands apply to it. A separate set of CLI commands is provided to manipulate the database.
For a system configured for duplex operation, a copy of the current database is located on both the active and inactive control module. Configuration changes made on the active control module are automatically written to the database and propagated to the copy of the database located on the inactive control module. As long as the control modules are operating in
synchronization, any action that results in configuration data being written to the database is reflected on both control modules. When the inactive control module is being brought online from an offline condition, its database is bulk synchronized
with the active control module.
During a normal software release upgrade, commands that manage the configuration database are executed. Summaries of
the commands follow.
1.9.1.2 Database Backup
If required, the database containing the most recent provisioning and configuration data from the active CFC would be used
to restore the system back to normal.
Note:
Keep a copy of the most recent database on a secure network server by preforming a backup after any configuration
change.
During a normal software release upgrade, the database is manually backed up if a downgrade is required after the new load
files have been committed. If a downgrade is required, a database restoration is performed.
The steps in performing a database backup include:
1.
Designate a network server for secure storage of the current configuration database
2.
Using the BACKUP DATABASE command, back up the current configuration database to the secure server.
Note:
3.
The user can specify the source of the database backup as either the RAM database contents or the database kept in
the CFC FLASH.
The user may execute the SHOW TRANSFER command to display the progress of the backup.
The following procedure shows the commands used to back up the contents of the system configuration database (located
on flash) to a secure TFTP server.
TABLE 1-18
Step
Procedure for Backing Up the Database
Command
Description/Notes
Note the IP address of the destination TFTP server on which to save backup file: 10.52.65.42.
Initiate the backup.
1
backup database file D104_17July2010.db
tftp server 10.52.65.42 source flash
Software Reference for SwitchBlade x3100 Series Switches
Takes the system configuration database residing on local flash and saves it to the designated
TFTP server with a filename of
“D104_17July2010.db“.
144
Setting Up the Switch
TABLE 1-18
Step
Procedure for Backing Up the Database
Command
Description/Notes
View status of database backup.
2
Info (033752): Database backup created, transfer started
Info (033753): Database backup succeeded
1.9.1.3 Specifying Source for a Database Backup
In normal system operation, all persistent data attributes are stored in RAM memory on the CFC and dynamically written to
the system database in the onboard FLASH. However, in abnormal failure cases the data integrity of the database in the
onboard flash can become suspect, due to alarm conditions including flash memory failure or software audit failure. In these
failure cases, any attempt to backup the database would fail since the onboard flash is not reliable as a backup source.
When the onboard FLASH database integrity is suspect due to flash memory failure, the user has the option to create a
binary database file based on the RAM memory contents, since in this case the RAM data is usually still reliable as a backup
source.
If the SOURCE parameter is not specified, the default behavior is the same as in previous releases, with the source for the
database backup being the onboard flash database.
The backup operation will still fail if a database audit alarm is present, since in this case the reliability of both the RAM and
flash memory is questionable. However, in the case where flash failure is detected and an alarm is raised, the database audit is
suspended to prevent it from raising an additional alarm.
1.9.1.4 Database Purge
The PURGE DATABASE command erases the current configuration database. This command would be used if the user
wanted to reconfigure the system back to factory defaults. When the command is entered, the system reboots and recovers
with the factory defaults.
Note:
When the PURGE DATABASE command is used on a duplex configuration that is in normal (synchronized)
mode, the database on the active control module and the copy on the inactive control module will be purged.
TELNET is disabled by default, and If the user is connected through TELNET, when the database purge completes, TELNET
will be back in the default disabled mode, and the user will no longer be connected to the system. The user should therefore
connect and login to the CONSOLE interface of the control module prior to executing the PURGE DATABASE command.
Once the database is purged, and the system reboots, the system configuration database can be built by either:
• Restoring a previously backed up database (RESTORE DATABASE)
• Rebuilding the database manually using CLI commands and scripts
• Restoring a Config File
The following shows an example of the PURGE DATABASE command and the reply that the purge is completed. Note that
this example was completed at the TELNET interface and is last message before the connection was lost.
officer SEC> PURGE DATABASE FORCE
Command has been submitted
PURGE DATABASE - success
Caution: Use of the PURGE DATABASE command can cause network outages.
Software Reference for SwitchBlade x3100 Series Switches
145
Setting Up the Switch
1.9.1.5 Restore Database
With the SBx3112, the user can use the RESTORE DATABASE command to replace the current database with a database
that had been previously backed up and sent to a network server. (The user should be aware of backward compatibility criteria, as explained in 1.7.2.)
During a database restore, the binary database file contents are read to the onboard flash database, and then the system will
boot up with the creation of the RAM database using the contents of the onboard flash database.
Because the database contents are read from the onboard flash database, RESTORE DATABASE FILE (SEC) is not the best
recovery procedure for a simplex system with an onboard flash failure. In this case the RESTORE CONFIG FILE (SEC) command is preferred.
RESTORE DATABASE would be the preferred recovery method if the user is replacing the CFC that has flash failure with a
known good CFC, and they had backed up from RAM to create the database file.
Note:
While the database transfer is occurring, the old database is still intact in FLASH memory, and the new database is
written to RAM. The user can abort the database restore operation while the database transfer is still in progress.
Once the database transfer is complete, the old database is erased from FLASH and the new database is written to
FLASH. The control module is then automatically restarted, and the new database is used to configure the system.
The following procedure shows the commands used to overwrite the configuration database with contents from a backup file
(transferred from an external network server).
TABLE 1-19
Step
Procedure for Restoring the Database
Command
Description/Notes
Note the IP address of the TFTP server containing the desired backup file: 10.52.65.42.
Note the filename of the desired backup file (from which to restore the system).
Initiate the restore.
1
restore database file D104_17July2010.db
tftp server 10.52.65.42
Takes the contents of the backup file named
“D104_17July2010.db“ located on the designated TFTP server and overwrites the system
configuration database in flash.
Note the warning, and type “y” to continue with database restore.
2
WARNING: Restoring the database will also reboot the CFC and may cause the system to become inaccessible. Continue (Y/N)? y
View status of database restore.
3
Command has been submitted
Info (033754): Database restore submitted with transfer ID: 7
Info (033755): Database restore succeeded; automatically rebooting...
After system reboots, log back into system.
4
User Access Verification
Username:
Password:
1.9.1.6 Database in Upgrade Mode
During a software upgrade, a schema migration is performed, where the configuration data read from the original database in
flash memory is written to a new database. The data in the new database is converted (schema migrated) to a new format
that is compatible with the load being upgraded to. During this process, the original database is left intact in flash memory,
Software Reference for SwitchBlade x3100 Series Switches
146
Setting Up the Switch
and the new database is held in RAM memory on the control module. When in this condition, the database is considered to
be in “upgrade mode”, and an alarm is raised against the control module being upgraded.
To get out of upgrade mode, the user must commit to the new load using the SET CARD command on the CM, which erases
the original database in flash memory and then copies the new database from RAM to flash memory. Alternatively, during
duplex upgrades only, upgrade mode can be cleared by doing an abort of the upgrade process, which erases the new database
in RAM memory and causes the system to revert back to the original database still in flash memory.
1.9.2 Text File Configuration
1.9.2.1 Introduction
A text configuration file is a “snapshot” of the configuration database including all of the non-default configuration commands
in a text-based (rather than binary) file. The source of the data to build the configuration file was the binary database in RAM
memory, not the binary database in the onboard flash.
The advantage to having a text file is that it can be read (unlike a binary file), modified if necessary, saved, and then used to
configure (or reconfigure) this or other systems.
Note:
Since the file is in text rather than binary format, applying a configuration file will take longer (by minutes) than a
binary file.
Following are the major tasks and commands used for this feature.
1.9.3 Creating a Text Configuration file
1.9.3.1 Introduction
The parameter FILE is used to write either to the local FLASH (destinationfile) or the SD (using the format SD<no.>:destinationfile).
In the case where the onboard flash file system is not reliable due to a flash write failure condition, the user also has to
option to specify another destination for the configuration file output.
The BACKUP CONFIG command therefore allows the user to specify alternative file output destinations, similar to the file
output options supported by the BACKUP DATABASE command. The file destination can be specified using an optional
parameter on the BACKUP CONFIG command. If the optional parameter is not specified, the default behavior will be to
write the output file to the onboard flash file system.
The following procedure shows the commands used to create a backup file that reflects current configuration of the system
and save it to an SD card as well as to TFTP server.
TABLE 1-20
Step
Procedure for Backing Up the Config
Command
Description/Notes
Note the IP address of the destination TFTP server on which to save configuration file: 10.52.65.42.
Note the SD card on which to save configuration file: SD4
Initiate the backup to an SD card.
1
backup config file sd4:D104.cfg
Saves the current configuration of the system to
the designated SD card (SD4) with a filename of
“D104.cfg“.
View status of database backup.
2
Info (020139): Configuration Backup Processing...
Info (020147): Configuration file "sd4:D104.cfg" successfully created.
Software Reference for SwitchBlade x3100 Series Switches
147
Setting Up the Switch
TABLE 1-20
Step
Procedure for Backing Up the Config
Command
Description/Notes
Verify that configuration file was created.
3
show files sd4:
------------------------------------------------------------------------------File..................................
-------------------------------------AllMsg.log............................
D104.cfg......................... 59
DBBackupTR15.db.......................
RobSD.txt.............................
cfc200_14.1.0.GAMMA.20100203.tar......
rob.tar...............................
Size KiB
--------------------------------------207
670
<1
13359
2097
Capacity KiB.......................... 3567616
Total Displayed KiB................... 16393
Available KiB......................... 4194303
Alternatively, the following steps show how to back up the config to a TFTP server:
4
backup config file D104.cfg tftp server
10.52.65.42
Saves the current configuration of the system to
the designated TFTP server with a filename of
“D104.cfg“.
View status of configuration backup.
5
officer SEC>>
Info (020139): Configuration Backup Processing...
Command has been submitted Transfer ID: 1
Info (033012): Successfully transferred file: D104.cfg
Note:
While the BACKUP CONFIG command is executing, commands that further affect the system configuration are
disallowed, with the user receiving a command rejected message. Moreover, the execution of this command may
take several minutes to complete.
1.9.3.2 Restoring a Configuration Database Using a Text Configuration File
A text configuration file can be used to populate the configuration database of a device, and can be useful during system
upgrades and downgrades. The command used to execute the file and restore a configuration database is RESTORE CONFIG
FILE (SEC).
The keyword FILE requires that a sourcefile (from FLASH) or unit:sourcefile (from CFLASH) be supplied. The optional keyword OUTPUT is recommended since this can be used to capture logs that are produced by the script.
Since the configuration file has usually been written to a remote server, the RESTORE CONFIG command will automatically
transfer the file from the remote server to the onboard flash file system, and then reboot the system using the transferred
file.
Note:
Once the text configuration file has finished running, the system will purge its current database and reboot using the
configuration reflected in the text configuration file. The user can stop this from occurring using the STOP CONFIG
file, as explained below.
Note:
RESTORE DATABASE would be the preferred recovery method if the user is replacing the CFC that has a flash
failure with a known good CFC, and they had backed up from RAM to create the database file. RESTORE CONFIG
can be used if no trusted database file is available on the remote server but a trusted config file is available. However,
RESTORE CONFIG recovers a system slower than RESTORE DATABASE.
Software Reference for SwitchBlade x3100 Series Switches
148
Setting Up the Switch
The following procedure shows the commands used to restore a previously generated configuration, which was created via
the BACKUP CONFIG located on flash.
TABLE 1-21
Step
Procedure for Restoring the Config
Command
Description/Notes
Initiate the restore.
1
restore config file D104_17July2010.cfg
Overwrites the current configuration of the
system based on the contents of the configuration file named “D104_17July2010.cfg“ (located
on the local flash).
Note the warning, and type “y” to continue with database restore.
2
Database will be cleared and system will reboot.
configuration (Y/N)? y
The system may become inaccessible. Restore
View status of database restore.
3
Command has been submitted
Info (020148): Restore configuration successfully requested.
Info (033756): Database purge succeeded; automatically rebooting...
After system reboots, log back into system.
4
User Access Verification
Username:
Password:
1.9.3.3 Stopping a Backup/Restore in Progress
Both the BACKUP and RESTORE commands take several minutes to execute, and the user may wish to stop the command
before it is complete. The command to do this is STOP CONFIG and it has the following effect:
• If entered during a BACKUP CONFIG command, STOP CONFIG throws away the configuration text file being created,
and configuration commands can be input.
• If entered during a RESTORE CONFIG command, STOP CONFIG cancels the execution of the file, closes out the log file
(if one is being output) and configuration commands can be input.
Note:
Stopping a RESTORE CONFIG should be done before the database is purged and the system reboots; otherwise, an
incorrect configuration could be installed.
1.9.3.4 Viewing the Progress of a BACKUP or RESTORE
While a BACKUP or RESTORE is in progress, the user can view the status of the file execution using the command SHOW
CONFIG STATUS. The command displays the processes that are run, and as each one is completed, it will have a 100% displayed next to it.
If a STOP CONFIG is input during a BACKUP or RESTORE, the SHOW CONFIG STATUS will show which process was
being run when the STOP CONFIG command was input, and what percentage of that process was completed. When the
text file configuration is present on the system, the system will use the text file to create the DB which it runs from. The text
file configuration will also be kept up to date as additional commands are entered into the system.
Following is an example of the SHOW CONFIG command when a STOP CONFIG command has been input during a
BACKUP CONFIG. Notice that Dsl2vnTextConfig is in the Processing state with (6.10%) complete.
officer SEC> SHOW CONFIG STATUS
--- Configuration File Progress ----------------------------------------------State.................. Backup
Software Reference for SwitchBlade x3100 Series Switches
149
Setting Up the Switch
Backup Initiated....... 2010-03-25 12:52:59
Backup Completed....... In progress...
Progress Summary....... 9 of 10 complete
Backup Configuration Progress Details
User Data.............................
OA&M Configuration....................
DslagTextConfig.......................
Traffic Management....................
DsbaseTextConfig......................
DsstpTextConfig.......................
DsdhcpTextConfig......................
Dsl2vnTextConfig......................
OampNmTextConfig......................
DsigmpTextConfig......................
Complete (100.00%)
Complete (100.00%)
Complete (100.00%)
Complete (100.00%)
Complete (100.00%)
Complete (100.00%)
Complete (100.00%)
Processing (6.10%)
Complete (100.00%)
Complete (100.00%)
1.9.3.5 Editing a Text Configuration File
Once the BACKUP command has been used to create a text file of the system configuration, the file can be edited by using
the PUT FILE command to send the file to a destination (such as a server) where it can be edited. The file can then be placed
back onto the FLASH or FLASH media using the GET FILE command.
Following is an example of this sequence:
// Put file onto server
officer SEC> PUT FILE bkupcfgfl TFTP SERVER 172.16.18.50
Command has been submitted Transfer ID: 1
officer SEC> Info (033012): Successfully transferred file: bkupcfgfl
// File arrives on TFTP server
TFTP Daemon started
New session created
Requested to write file bkupcfgfl in format octet
Fully expanded file specification : C:\tftp_files\bkupcfgfl
Received 4486 bytes in < 1 second
// File arrives on server
script_file_1.txt
test_script1.txt
bkupcfgfl
1 KB
1 KB
5 KB
Text Document
Text Document
File
5/1/2010 6:22 AM
6/24/2010 6:11 AM
3/26/2010 8:05 AM
// Editing the backup file on the server
// Get file from server after editing
officer SEC> GET FILE bkupcfgfl TFTP SERVER 172.16.18.50
Command has been submitted Transfer ID: 2
officer SEC> Info (033012): Successfully transferred file: bkupcfgfl
1.9.3.6 Using Configuration Text Files During Upgrades/Downgrades
The text config file can be useful when performing software release upgrades, especially when upgrading hardware at the
same time. Refer to the software release upgrade sections for more information.
Software Reference for SwitchBlade x3100 Series Switches
150
Setting Up the Switch
1.9.4 Database Commands
TABLE 1-22
Database Commands
Commands
BACKUP DATABASE FILE (SEC)
PURGE DATABASE (SEC)
RESTORE DATABASE FILE (SEC)
SHOW DATABASE
BACKUP CONFIG FILE (SEC)
RESTORE CONFIG FILE (SEC)
SHOW CONFIG (SEC)
STOP CONFIG (SEC)
Software Reference for SwitchBlade x3100 Series Switches
151
Setting Up the Switch
BACKUP DATABASE FILE (SEC)
Syntax
BACKUP DATABASE FILE={ destinationfile | unit:destinationfile | serverpath/
destinationfile } [ { TFTP SERVER={ ipaddress | hostname } | ZMODEM | FTP
SERVER={ ipaddress | hostname } USER=userid PASSWORD=password } ] [ SOURCE={
FLASH | RAM } ]
Description
Backs up the contents of the system configuration database to a file on an external network server.
The newly created file is not user readable or writable. While transfer of data is in progress, any configuration change caused by any CLI command aborts the transfer and the backup operation is cancelled.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
FILE
The destination filename to use for creating the backup.
The system does not require the filename to have an
extension, nor does it place restrictions on an extension
(if specified).
NA
NA
Note: If the filename already exists on the destination
media (e.g., SD card, server), the system will overwrite
the contents of that file.
TFTP_Server
The ip address or name of the tftp server.
NA
NA
ZMODEM
Specifies the file should be transferred using the ZMODEM protocol.
NA
NA
FTP_Server
The ip address or name of the tftp server.
NA
NA
USER
The user id to gain access to the specified server.
NA
NA
PASSWORD
The password needed after entering the user id to gain
access to the specified server
NA
NA
SOURCE
The source of the database file. It can be directly from
RAM or from the flash memory.
NA
FLASH
Release Note
NA
Example
BACKUP DATABASE FILE D104_17JULY2010.DB TFTP SERVER 10.52.65.42
Software Reference for SwitchBlade x3100 Series Switches
152
Setting Up the Switch
PURGE DATABASE (SEC)
Syntax
PURGE DATABASE [ALL][FORCE]
Description
Purges all contents in the system configuration database and then automatically restarts the CFC. After
the restart, the database is repopulated only with factory default configuration.
The configuration must be restored through individual CLI commands, or read from a script file using
the EXECUTE SCRIPT command, or by restoring the database contents from a network server using
the RESTORE DATABASE command.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
ALL
In addition to the system configuration database, the following NVRAM parameters are reset to their defaults:
NA
NA
NA
NA
SET IP INTERFACE MGMT IPADDRESS=x SUBNETMASK=y
x=192.168.1.1
y=255.255.255.0
SET SYSTEM GATEWAY=x
- x=<none> ("0.0.0.0")
SET SYSTEM TIMEZONE CUSTOM UTCOFFSET=x
- x=+00:00
SET BOOTSERVER IPADDRESS=x PATH=y
- x=<none> ("0.0.0.0")
- y=""
Boot ROM password
- "friend"
FORCE
Overrides the user confirmation.
Release Note
NA
Example
PURGE DATABASE FORCE
Software Reference for SwitchBlade x3100 Series Switches
153
Setting Up the Switch
RESTORE DATABASE FILE (SEC)
Syntax
RESTORE DATABASE FILE={sourcefile|unit:sourcefile|serverpath/sourcefile}
[{TFTP SERVER={ipaddress|hostname}|ZMODEM| FTP SERVER={ipaddress|hostname}
USER=userid PASSWORD=password}] [FORCE]
Description
Rewrites the configuration database with contents from a file transferred from an external network
server. While the data is transferred from the server, it is buffered in RAM memory in the CFC and not
written to the flash. If the transfer fails or is aborted, the existing database is retained. If the file transfer is successful, then the database in flash memory is automatically purged and rewritten with the new
contents. Once the flash memory write completes, the CFC automatically restarts to apply the
updates from the database. * This command impacts service if completed successfully * User warning
confirmation is required unless overridden with the FORCE option.
Mode
Sec_Off
Options
Option
Description
Range
Default
Value
FILE
The filename identifying the database file that is located
either on the CFC SD card or on the server that is designated by the path.
NA
NA
TFTP_Server
The ip address or name of the tftp server.
NA
NA
ZMODEM
Specifies the file should be transferred using the ZMODEM protocol.
NA
NA
FTP_Server
The ip address or name of the tftp server.
NA
NA
USER
The user id to gain access to the specified server.
NA
NA
PASSWORD
The password needed after entering the user id to gain
access to the specified server
NA
NA
FORCE
Overrides the user confirmation.
NA
NA
Release Note
NA
Example
RESTORE DATABASE FILE D104_17July2010.db TFTP SERVER 10.52.65.42
WARNING: Restoring the database will also reboot the CFC and may cause the system to become
inaccessible. Continue (Y/N)? y
Command has been submitted
Info (033754): Database restore submitted with transfer ID: 7
Info (033755): Database restore succeeded; automatically rebooting...
User Access Verification
Username: officer
Example
Password:
Software Reference for SwitchBlade x3100 Series Switches
154
Setting Up the Switch
SHOW DATABASE
Syntax
SHOW DATABASE
Description
Shows the system configuration database utilization information to the user.
Mode
User
Options
NA
Release Note
NA
Example
E134 - officer SEC>>>> SHOW DATABASE
--- Database Information -----------------------MAX Record Storage in Bytes
Percent Record Storage Utilized
Largest Free Record Available
Maximum Number of Entries
Percent Entries Utilized
Cache or Flash
:
:
:
:
:
:
6291456
10%
4299251
100000
00%
Flash
-------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
155
Setting Up the Switch
1.9.5 Commands for Text File Configuration
TABLE 1-23
Text File Configuration Commands
Commands
BACKUP CONFIG FILE (SEC)
RESTORE CONFIG FILE (SEC)
SHOW CONFIG (SEC)
STOP CONFIG (SEC)
Software Reference for SwitchBlade x3100 Series Switches
156
Setting Up the Switch
BACKUP CONFIG FILE (SEC)
Syntax
BACKUP CONFIG FILE={ destinationfile | unit:destinationfile | serverpath/destinationfile } [ { TFTP SERVER={ ipaddress | hostname } | ZMODEM | FTP
SERVER={ ipaddress | hostname } USER=userid PASSWORD=password } ]]
Description
Allows the user to create a configuration file which reflects current configuration of the system. This
configuration file can be used to recreate the configuration on the same or similar system, using the
RESTORE CONFIG command.
Mode
Sec_Off
Note
While the BACKUP CONFIG command is executing, commands that further affect the system configuration are disallowed, with the user receiving a command rejected message. Moreover, the execution
of this command may take several minutes to complete.
Options
Option
Description
Range
Default
Value
FILE
The destination filename to use for creating the backup
on the CFC flash, an SD card, or a server designated by
the path. The system does not require the filename to
have an extension, nor does it place restrictions on an
extension (if specified).
NA
NA
Note: If the filename already exists on the destination
media (e.g., SD card, server), the system will overwrite
the contents of that file.
TFTP_Server
The ip address or name of the tftp server.
NA
NA
ZMODEM
Specifies the file should be transferred using the ZMODEM protocol.
NA
NA
FTP_Server
The ip address or name of the tftp server.
NA
NA
USER
The user id to gain access to the specified server.
NA
NA
PASSWORD
The password needed after entering the user id to gain
access to the specified server
NA
NA
Release Note
NA
Example
BACKUP CONFIG FILE D104_17JULY2010.CFG
Software Reference for SwitchBlade x3100 Series Switches
157
Setting Up the Switch
RESTORE CONFIG FILE (SEC)
Syntax
RESTORE CONFIG FILE={ sourcefile | unit:sourcefile } [ { TFTP SERVER={ ipaddress | hostname } | ZMODEM | FTP SERVER={ ipaddress | hostname } USER=userid
PASSWORD=password } ] [ OUTPUT={ CONSOLE | logfile | unit:logfile } ]
Description
Allows the user to restore a previously generated configuration, which was created via the BACKUP
CONFIG command. During the processing of RESTORE CONFIG, the current data is purged, the system is rebooted, and the configuration is then restored by executing the commands in the configuration file that is provided with the FILE parameter. The OUTPUT parameter indicates the destination of
the responses to the commands executed. If the OUTPUT parameter is not provided, the responses
to the commands are not recorded or displayed. To monitor the progress of the RESTORE CONFIG
command, the user may run the SHOW CONFIG STATUS command.
Mode
Sec_Off
Note
While the BACKUP CONFIG command is executing, commands that further affect the system configuration are disallowed, with the user receiving a command rejected message. Moreover, the execution
of this command may take several minutes to complete.
Options
Option
Description
Range
Default
Value
FILE
The filename identifying the configuration file that is
located either on the CFC SD card or on the server
that is designated by the path.
NA
NA
TFTP_Server
The ip address or name of the tftp server.
NA
NA
ZMODEM
Specifies the file should be transferred using the ZMODEM protocol.
NA
NA
FTP_Server
The ip address or name of the tftp server.
NA
NA
USER
The user id to gain access to the specified server.
NA
NA
PASSWORD
The password needed after entering the user id to gain
access to the specified server
NA
NA
OUTPUT
Indicates the destination for the responses to the executed commands:
NA
CONSOLE
CONSOLE - the output of the command execution is
displayed on the CLI console.
logfile (unit:logfile) - the filename of the log file to which
command execution output is saved during the restore
process. The maximum length of the filename is 100
characters.
Note: If the OUTPUT parameter is not provided, the
output from the commands are not recorded or displayed.
Release Note
NA
Example
RESTORE CONFIG FILE D104_17JULY2010.CFG OUTPUT CONSOLE
Software Reference for SwitchBlade x3100 Series Switches
158
Setting Up the Switch
SHOW CONFIG (SEC)
Syntax
SHOW CONFIG <STATUS>
Description
Allows the user to view the current configuration information or to monitor the progress of a currently running BACKUP CONFIG or RESTORE CONFIG command. If the STATUS parameter is provided, the current or previous status of a BACKUP CONFIG or RESTORE CONFIG is displayed.
Without the STATUS parameter, the current configuration information is generated and displayed to
the user.The status information is not saved over reboots of the system.
Mode
Sec_Off
Options
Release Note
Option
Description
Range
Default
Value
STATUS
If the STATUS parameter is provided, the current or
previous status of a BACKUP CONFIG or RESTORE
CONFIG is displayed.
NA
NA
NA
Example
voip2-iMAP4-x3112>> SHOW CONFIG
Info (020139): Configuration Backup Processing...
-----------------------------------------------------------------------------# script
#
# Version: 14.2.0.GAMMA.20100803
# File created: 2010-08-12 15:38:29
DISABLE MORE
DISABLE CONFIRMATION
#
#
SET SYSTEM USERCONFIG LOGINFAIL=3 LOCKOUTPD=60 MANPWDFAIL=3 SECUREDELAY=0
MINPWDLEN=6 PERSISTTIMER=1440 PWDAGEING=OFF FORCEPWDCHANGE=No
ENABLE USER=officer
ENABLE USER=manager
SET USER=officer PASSWORD=D31D86D0DE8DD34FC535C67E480DEAA2 FORMAT=MD5
DESCRIPTION="Security Officer User" PRIVILEGE=SECURITYOFFICER TELNET=Yes
PWDAGEING=OFF DEACTIVATE=OFF
SET USER=manager PASSWORD=3AF00C6CAD11F7AB5DB4467B66CE503E FORMAT=MD5
DESCRIPTION="Default User" PRIVILEGE=SECURITYOFFICER TELNET=Yes PWDAGEING=OFF
DEACTIVATE=OFF
(ouput continues)
Software Reference for SwitchBlade x3100 Series Switches
159
Setting Up the Switch
STOP CONFIG (SEC)
Syntax
STOP CONFIG
Description
Allows the user to cancel a BACKUP CONFIG or RESTORE CONFIG command that is currently in
progress. If neither is currently in progress, no action is taken.
Mode
Sec_Off
Options
NA
Release Note
NA
Example
STOP CONFIG
Software Reference for SwitchBlade x3100 Series Switches
160
Setting Up the Switch
1.10 Control Module Management
When creating or changing the attributes of a card, the type of load must be considered, especially when doing a software
upgrade.
1.10.1 Card Load Preferences
Once a software load is present in the control module FLASH file system, it can be designated as the target software load for
one or more cards using the parameters of the SET CARD command. One or more of the following types of designations
can be set for a card:
• Preferred - selected using the PREFLOAD parameter. A load designated as PREFLOAD indicates that this is the primary load that the specified card will load from. For system integrity reasons, load files designated as PREFLOAD cannot
be renamed or deleted. Any changes made in load designations, for a system configured for duplex operation, while the
system is operating in sync, will be reflected on both the ACTCFC and INACTCFC.
• Alternate - (Control Module Only) selected using the ALTLOAD parameter. A load designated as ALTLOAD indicates that this is the alternate load that the specified CM will load from. The ALTLOAD is used when a redundant copy
of the preferred load file is made on the CM FLASH file system; it specifies an alternate load preference for the redundant
file. Establishing an alternate load provides a backup in the unlikely event that the preferred load file cannot boot. For a
duplex system configuration, any changes made in the ALTLOAD designation apply to both the active (ACTCFC) and
inactive (INACTCFC) control modules.
Note:
This parameter is not supported for the service modules because the copy of the service module load stored on the
control module FLASH file system is the alternate by default (the preferred is the copy located in the service module
flash memory).
• Temporary - selected using the TEMPLOAD parameter. A load designated as TEMPLOAD indicates that this is the
load that the specified card will load from, one time, during the next loading process. The TEMPLOAD designation is
used during the software upgrade procedure.
TEMPLOAD designation results in two things. First, if for any reason the new load file is unusable, the system will erase
the designation of TEMPLOAD for the new file and revert back to using its original load, allowing the system to automatically recover from an initialization failure of the TEMPLOAD. Second, setting a load as TEMPLOAD puts the configuration into the upgrade mode. For upgrade purposes, changes made to the designation of temporary are independent of
system synchronization status.
Note that load preferences for the CFC(s) are stored in the non-volatile RAM (NVRAM) of each module, while load preferences for the Line Cards are stored in the configuration database, explained in 1.8.1.
Note:
An Inconsistent Load Minor alarm will be posted against any service module whose running major and minor
software load version does not match the preferred major and minor software load version of the active control
module. The alarm is raised whenever the CM is taken out of upgrade mode. This is intended to maintain
consistency of load versions throughout the system.
1.10.2 CFC for the SBx3112
The following modes and CFCs are available:
For the SBx3112 (200G) the CFC200 supports simplex and duplex mode. Note that in duplex mode, each CFC200 switches
traffic in a load sharing mode thereby doubling the system throughput to 400G. Note that for this capacity both CFCs must
be in service.
1.10.3 Overview (Simplex versus Duplex)
For the SBx3112 in simplex mode there is one Control Module, and it is called the active CFC: it has the only copy of the
configuration database, and if the CFC restarts, service is temporarily lost.
Software Reference for SwitchBlade x3100 Series Switches
161
Setting Up the Switch
When a SBx3112 is in duplex mode, one of the CFCs is redundant. Because the default for the shelf is AutoProv, the newly
inserted CFC is discovered and provisioned and comes up as the inactive CFC. The system is now equipped with an active
and inactive CFC; referred to on the system as ACTCFC and INACTCFC, respectively, and the inactive keeps a copy of
the persistent data and dynamic data, as well as the software load on the active CFC. Moreover, the inactive receives incremental updates from the active CFC, called data synchronization, or data sync. This ensures there is matching data (called
data mirroring) in both CFCs.
Because of this mirroring, the inactive CFC can take over the shelf if there is a fault in the active CFC. This is called a swap
activity or a swap; all persistent and transient data is retained, so the Allied Telesis duplex system can continue to process
subscriber services as well as receive requests and produce outputs to the management interfaces, including the alarms associated with the swap.
The above explanation of the SBx3112 in duplex mode assumes that both CFCs are functioning normally prior to the degradation of the active CFC, that all data and software loads have synched, and that the inactive CFC has been successfully mirroring data up to the swap and has no alarms. There are situations where these conditions do not exist, and these can be
created by the user (such as disabling the inactive CFC), or autonomously. These will be explained below.
The following shows the output for the SHOW CARD ACTCFC and SHOW CARD INACTCFC commands.
manager SEC>> show card actcfc
--- Card Information --Slot...............................
Type...............................
State..............................
Provisioning Profile...............
5
CFC200
UP-UP-Online (Active)
AutoProv
Hardware
Model Number (Revision)......... AT-SBxMFC (Rev X2)
Serial Number................... 43
CLEI Code....................... <none>
Software
Running Load....................
Preferred Load..................
Temporary Load..................
Alternate Load..................
cfc200_14.2.0.GAMMA.20100722.tar
cfc200_14.2.0.GAMMA.20100722.tar
None
None
Software Build Information
Load File.......................
Build Name......................
Build Type......................
Revision........................
Built On........................
Boot ROM Build Name.............
cfc200_14.2.0.GAMMA.20100722.tar
ATI 200G Central Fabric Controller
Customer-Release Build
14.2.0.GAMMA.20100722
Thu 07/22/2010 at 03:05 PM
ATI 200G Central Fabric Controller Boot
Loader
Boot ROM Version................ 14.1.g.01
Card Type Specific Information
Timing Reference................ N/A
1.10.4 CFC200 Card Attributes and States (SHOW
CARD ACTCFC)
Table 1-24 describes the common attributes and states for the CFC card.
.
TABLE 1-24
CFC200 Card Attributes - Defaults are in Bold
CFC Card Attribute
Values / Range
Description
Slot
Slot Number of the CFC card
The identifying slots of the CFC card (slots 4 and 5).
Type
Card Type
The type of card, here the CFC200
Software Reference for SwitchBlade x3100 Series Switches
162
Setting Up the Switch
TABLE 1-24
CFC200 Card Attributes - Defaults are in Bold (Continued)
CFC Card Attribute
Values / Range
Description
State
Three attributes:
These three attributes determine the state of the card;
whether it is capable of carrying traffic and the status
(Implied Operational Status)
- Admin State
- Operational State
- Status
Also, the CFC200 can be Active
or Inactive. When the Inactive
has an Operational status of UP,
it provides traffic switching
capacity (200G) and can take
over if the active CFC has a fault.
(The system is then in Simplex
mode.)
ONLINE - Card is configured and can provide service.
(UP)
DEGRADED - There is a fault but the card can still provide service (UP). If this is the status of the active CFC
and the inactive is in an ONLINE status, a switch of activity may occur.
OFFLINE - The normal status when a card is in a
DOWN state. The card requires a routine operation to
place it ONLINE and available for service. (DOWN)
CARD NOT PRESENT - For the Inactive CFC only, The
card is provisioned and enabled, but the card is not present.
FAILED - The card has detected a hardware or software
fault that makes it unable to provide service. (DOWN)
The system is now in simplex mode.
NOT INSTALLED - Card is provisioned in software
(CREATE) but not physically present (DOWN)
NOT PROVISIONED - For the inactive CFC200 card,
the card may be physically installed but has not been provisioned in software (CREATE).
RESET - Transient state as card resets (DOWN)
LOADING - The software load is being transferred from
the CFC to the flash memory in the card. (DOWN)
BOOTING - The software load is being copied from the
flash memory into its RAM memory. (DOWN)
INITIALIZING - Card is being initialized as part of
attempt to restore it to service (DOWN)
CONFIGURING - Provisioning data for he card is being
copied from the CFC to the RAM memory on the card.
(DOWN)
TERMINATING - The card is performing an operation in
preparing to go out of service. (UP or DOWN)
Provisioning Profile
Profile that has been applied to
the card and if there is a Profile
mismatch.
If there is a Profile mismatch, a (*) appears next to the
Profile Name. Refer to 1.16.5.
Hardware
Model Number
The AT number for card type
Serial Number
The unique serial number for the card
CLEI Code
The CLEI code, if the card has one.
Software Reference for SwitchBlade x3100 Series Switches
163
Setting Up the Switch
TABLE 1-24
CFC200 Card Attributes - Defaults are in Bold (Continued)
CFC Card Attribute
Values / Range
Description
Software
Running
Refer to 1.10.1.
Preferred SW Load
Temporary SW Load
Alternate Load
1.10.5 Changing the Administrative State of the Inactive CFC
When both CFC cards are functioning properly, the inactive CFC has an Admin and Operational Status of UP and data is
synched so it can take activity if necessary. However, it is possible to change the state of the inactive CFC so that normal
duplex operation does not take place and the inactive CFC cannot assume activity.
Caution: Data traffic capacity is reduced from 400g to 200G.
You can do this ny disabling the inactive CFC (i.e. DISABLE CARD=5)
The inactive CFC now cannot take over activity, and the card goes through the following changes:
• Admin State - DOWN, since the CFC is now disabled.
• Operational State - DOWN, since the Operational State follows the Admin State.
• STATUS - OFFLINE, since the card is disabled and is no longer synching with the active CFC.
Note:
The Admin State and Op State of the active CFC will always be UP.
When the inactive CFC is disabled, data sync is no longer occurring between the two CFCs. To bring the inactive (and disabled) CFC back into service and have it receive the data stored on the active CFC so it can take over the shelf, enable the
card. (This can be done by entering ENABLE CARD INACTCFC or pressing the reset button on the inactive CFC.)
The inactive CFC now reboots, and goes through the following steps before it can return to normal operation for traffic load
sharing and redundancy protection (Admin and Operational States are UP).
1.
Status sequence - This is the most important attribute, and it is a sequence that shows the progress of data sync with the
active CFC. During data sync, the status is Initializing, and the Admin State and Operational State continue to be
DOWN, since the card cannot provide service yet. Once data sync is complete, the inactive card states change to normal:
2.
Admin State - UP, since the card now is synched to the active CFC and is enabled.
3.
Status - IN TEST, since the inactive CFC is running diagnostics on itself to ensure it has no faults and is ready to go
into service
4.
Operational State - UP, since the CFC will now be able to take over the shelf if it can sync with the active CFC and has
no faults.
Note:
Whenever the inactive CFC reboots, it assumes that the active CFC is functioning normally during the reboot
process; this ensures the inactive will not come up as the newly active CFC if the currently active CFC were to fail
during the reboot. Moreover, in assuming the active CFC is functioning normally during the reboot, the inactive CFC
will wait for the active CFC to establish communications and begin the data sync. However, if the inactive card
detects that the active card is no longer providing service (rebooting, failed, removed), the inactive card will start a
5 minute timer. If the timer expires, the inactive CFC will try to come into service as the active using its own
(possibly not current) data.
1.10.6 Redundant CFC Operation in the SBx3112
The SBx3112 duplex configuration each CFC200 switches traffic in a load sharing mode thereby doubling the system
throughput to 400G.
Software Reference for SwitchBlade x3100 Series Switches
164
Setting Up the Switch
Audits are performed after a switchover, to ensure that the CFC and Line Cards are in sync. There is the potential for the
cards to be out of sync if, for example, a change to the mirroring was in progress during the switchover.
For full packet throughput both CFCs must be installed and operational. The CFCs will provide a level of redundancy allowing
the system to survive one of the CFCs being removed, although with a reduction to half the backplane bandwidth.
The system will still switch at full duplex capacity (400Gbps) whenever both CFCs are in sync during software upgrade,
where one of the CFCs is in upgrade mode. However, during the restart of the CFC for loading the new software, there will
be a reduction in backplane bandwidth since that CFC is temporarily not providing service.
1.10.7 Provisioning Scenarios for Control Modules
1.10.7.1 Overview
The following procedures are used when changing the SBx3112 mode from simplex to duplex (one always active CFC to an
active and inactive CFC) or duplex to simplex (an active and inactive CFC to only one always active CFC). Both types of procedures can be done in AutoProv or Manual mode.
Note:
To minimize the possibility of loss of service, all procedures to change the CFC configuration involve inserting or
removing the inactive CFC. Ensure that all of the commands used in this section apply to the currently inactive CFC.
If the slots the user wishes to provision involve the CFC that is currently active, perform a Swap Activity to make it
the inactive CFC.
1.10.7.2 Simplex to Duplex (AutoProv Mode)
When the Allied Telesis system is in simplex mode, one of the slots (4,5) will contain a filler plate. Changing the mode from
simplex to duplex is done as follows:
1.
Remove the filler plate from either Slot 4 or 5.
2.
Remove the new CFC card from its antistatic container.
3.
Following antistatic procedures, insert the CFC card into the available slot. Refer to the Installation Guide for details.
4.
Because the CFC cards are in AutoProv mode, the active CFC will detect the newly inserted CFC and try to provision it,
synch all of its data with the inactive CFC (bulk sync), and then bring the CFC into service (an Admin and Operational
State of UP, a status of ONLINE, and a status of INACTIVE).
1.10.7.3 Duplex to Simplex (AutoProv Mode)
In AutoProv mode, whenever a CFC card is physically present, the system will try to bring the CFC card into service (perform data sync). Therefore, the card must be disabled and then physically removed. Follow these steps:
1.
Disable the inactive CFC (DISABLE CARD INACTCFC)
2.
Follow antistatic procedures and remove the inactive CFC from its slot and place in an antistatic container.
3.
With the inactive CFC card now removed, delete the card from the configuration database (DESTROY CARD INACTCFC).
4.
Insert a filler plate into the empty slot for optimum system cooling. (Line Cards are not allowed in the unused slot in
14.2.)
1.10.7.4 Simplex to Duplex (Manual Mode)
When the Allied Telesis system is in simplex mode, one of the slots (4 or 5) contains a filler card. Moreover, because the CFC
is in manual mode, the CFC must be explicitly created and enabled, as shown in the following steps:
1.
Follow antistatic procedures and remove any Filler Plate Full card(s) in slots 4 or 5.
2.
Remove the CFC card from its antistatic container.
3.
Follow antistatic procedures and insert the CFC card into the available slot. Refer to the Installation Guide for details.
Software Reference for SwitchBlade x3100 Series Switches
165
Setting Up the Switch
4.
Because the CFC cards are in Manual mode, the slot will have a status of NOT PROVISIOINED. The card must therefore
be provisioned using the command:
CREATE CARD=4 <CFC200>
or CREATE CARD=5 <CFC200>
5.
The card is now provisioned in the configuration database, but must change its Admin State to UP to sync with the active
CFC, and to try to go into service. The default for the manual mode is when cards are created, ENABLED=UP, so no
additional actions are needed. If this has been changed, enter the ENABLE CARD=INACTCFC command.
6.
The newly enabled CFC will boot, sync all of its data with the active CFC (bulk sync), and then bring the CFC into service
(an Operational State of UP, a status of ONLINE, and a state of INACTIVE).
1.10.7.5 Duplex to Simplex (Manual Mode)
In Manual mode, the CFC card can be physically present and the shelf will not try to create and enable the card. Therefore,
the card does not need to be removed before deleting it from the database. Follow these steps:
1.
Disable the inactive CFC (DISABLE CARD=INACTCFC).
2.
Delete the card from the configuration database (DESTROY CARD=4 or DESTROY CARD=5).
3.
Follow antistatic procedures and remove the inactive CFC from its slot and place in an antistatic container.
4.
Insert a filler plate into the empty slot for optimum system cooling. (Line Cards are not allowed in the unused slot in
14.2.)
1.10.8 Software Compatibility
A software release will retain backward compatibility with certain releases that preceded it (i.e., up to one major release
back). Backward compatible means that database data -- that was saved in flash memory using an older software release -- will
be restorable when the newer software release is loaded. This allows for a software upgrade to occur without requiring the
entire system database to be recreated.
Backward compatible also means that a card using a given software release can communicate with another card using an older
software release.
Caution: The SBx3112 supports restoring the system configuration using the configuration (text) file from an earlier
software release. However, it is only recommended for users that are very knowledgeable about CLI commands
and syntax. Due to differences that may exist between the commands in the current software release and those of
the older release, the configuration file may require editing before initiating the restore. Otherwise, the restore
may result in unpredictable configuration results.
An understanding of software upgrades and interim upgrades is important to the concept of backward compatibility. An
upgrade where system load files are changed in order to add new, significant feature functionality is called a software
upgrades. For example, an upgrade from release 14.0.0 to 15.0.0. An upgrade where system load files are changed in order
to possibly add minor feature functionality and software fixes is referred to as an interim upgrade. For example, an upgrade
from release 14.1.1 to 14.1.2. During an interim upgrade, no schema migration is to be performed on the configuration database. Also, during the interim upgrade, no Database in Upgrade alarm is raised.
Software upgrades and interim upgrades will be reemphasized in each of the system upgrade procedure sections.
Backward compatibility is unidirectional; a newer load may be able to understand data that originates from an older load, but
the reverse (i.e., forward compatibility) is not necessarily true.
The rules for backward compatibility are:
• Interim-release changes have no effect on backward compatibility. For example, release “14.1.1” is fully backward
compatible with release “14.1.0”. Any release that is backward compatible with release “14.1.1” is also, by extension,
compatible with release “14.1.0”.
• Backward compatibility is supported between any two releases that share the same major release number. For example, release “14.1.1” is backward compatible with release “14.0.1”.
Software Reference for SwitchBlade x3100 Series Switches
166
Setting Up the Switch
• If a software release has a minor release number of “0” (zero), it is backward compatible with any releases in the previous major release. For example, release “15.0.1” is backward compatible with release “14.1.0”.
In cases where a direct upgrade is not supported, a multi-step upgrade process may be used. The user must first upgrade to
the interim release, and then upgrade to the desired release.
Note:
Only the control module card (not the service modules) has this backward compatibility logic. Therefore, a control
module running a newer software load is compatible with a service module running an equivalent or older load, but
a control module running an older release load is not compatible with an service module running a newer release
load.
Note:
The third digit, for patches, is automatically compatible for upgrade. For any anomalies, refer to the specific Release
Notes.
Any CM load supports its major release load and the same release for Line Cards. Also, any CM load supports one major
release back on Line Cards for the purpose of upgrading. The following figure shows the compatibility hierarchy.
15.2
15.1
15.0
Current Release
{
FIGURE 1-7
14.2
14.1
14.0
{
New Release
Compatibility Hierarchy
1.10.9 Software Upgrade
1.10.9.1 Introduction
To upgrade the system to a new software release, load files can be remotely loaded into FLASH memory and then individually
selected for use at runtime. Along with the user commands described earlier in this manual, there are comprehensive commands provided to examine the state of the FLASH memory and to load, view, and remove release files. There are also commands provided to install, query, and activate the software on each card, at which time the software is booted into RAM
memory and executed.
The latest software release files are available from Allied Telesis. For the latest software loads go to
http://www.alliedtelesis.com/support/software/restricted/login.aspx
You should have an account with an email address and password.
The general steps are:
1.
If not already done, set up the MGMT/Inband interface and network servers. Refer to Section 1.6.4
2.
Do SHOW SYSTEM or SHOW CARD ACTCFC SOFTWARE to see what CFC load is used.
3.
Compare current system loads with the latest load’s information.
4.
If the loads are the same, no action is required.
5.
If the loads are not the latest, contact ATI to obtain them.
Software Reference for SwitchBlade x3100 Series Switches
167
Setting Up the Switch
1.10.9.2 Software Upgrade Procedure - Overview
A software upgrade involves obtaining new load files. Next, the loads are stored in FLASH on the CM. The boot status of the
new loads is set to TEMPLOAD. The user then executes a restart on the control module. The user verifies that the new
loads are working correctly. The user must commit, then downgrade if necessary.
Commit means that the user chooses to accept the new loads as the new system load files. After setting the loads as PREFLOAD, the system will boot from these loads until new loads are set as PREFLOAD.
The user can choose to perform a downgrade after a software upgrade has been completed. The user may revert back to the
original load files and database, but any changes made to the new database are lost.
1.10.9.3 Simplex Upgrade Procedure
This is a walkthrough of a software upgrade for a simplex CFC200. It is assumed that the system is running in a stable state.
TABLE 1-25
CFC200 Simplex Software Upgrade Steps
Step
State or Action
Details
1.
Pre-Upgrade Configuration
Checking the Allied Telesis website, find the latest loads for the hardware
and software release this upgrade will support and download these to the
network server so that they may be copied if necessary.
Note:
2.
Back up the current database:
BACKUP DATABASE
3.
Retrieve the new load files for
the CFC and Line Cards from
the network server and store
them in FLASH on the CFC
card.
For both the CFC and Line Cards, ensure that all
PREFLOADs are set to the current load. This
ensures that the database that is backed up (in the
step below) can correctly allow the user to perform a
downgrade or abort the upgrade if necessary.
For network reliability purposes, backup the existing configuration database to the external network server using the BACKUP DATABASE
command. Refer to Section 1.9.
Follow these steps to get the latest CFC and Line Card load files and set
them as the TEMP load.
1 Ensure the latest loads are on the network server.
2. Transfer the new loads from the server to the control module FLASH
(Refer to 1.7.4.)
- GET FILE <load> tftp server 10.52.65.42
3. Set the new CFC load as the TEMP load for the CFC200.
- SET CARD=ACTCFC TEMPLOAD=<latest CFC200 load>
4. Set a new Line Card load as a Temp load for verification testing
- SET CARD=<slot-list> TEMPLOAD=<latest Line Card
load>
4.
Execute a restart on the CFC
card
Restart the card with the command:
RESTART CARD=ACTCFC COLD
The CFC200 and Line cards reboot to the new loads and recover.
The database contains all the original configuration, schema-migrated to
the new load, and held in CFC200 RAM during this step only. The original
database is still intact in FLASH memory.
Software Reference for SwitchBlade x3100 Series Switches
168
Setting Up the Switch
TABLE 1-25
CFC200 Simplex Software Upgrade Steps (Continued)
Step
State or Action
Details
5.
Run any verification tests.
After step 4 is completed, the system will be in a “Database in
upgrade mode” alarm condition unless this is an Interim Upgrade (See
Section 1.10.8).
Note:
6.
Commit to the new load:
Set the CFC200 card with the
new load file as the preferred
load.
Whenever the active CFC is in upgrade mode, all
commands are allowed, but a warning is displayed
to remind the user that the system is in upgrade
mode and changes are not being saved to FLASH
memory until the upgrade is committed to (see Step
6.)
The new load is set as PREFERRED so that on the next reboot the new
load will be loaded.
SET CARD=ACTCFC PREFLOAD=<latest CFC load>
The new schema-migrated database is now written into FLASH memory.
The old database is erased. The upgrade mode alarm is cleared.
If the user is sure they are not going to perform a downgrade, the original
CFC loads can be deleted with the DELETE FILE command.
7.
Back up the current database:
BACKUP DATABASE
For network reliability purposes, backup the existing configuration database to an external network server using the command:
BACKUP DATABASE (Refer to 1.9.1.2)
Software Reference for SwitchBlade x3100 Series Switches
169
Setting Up the Switch
1.10.9.4 Simplex Downgrade Procedure
To revert back to the original load files after they have been committed to, a downgrade must be performed. The user must
fully commit to the upgrade before performing a downgrade. Load preferences must be set to the new loads.
Note:
Any configuration changes completed while the upgrade was in progress will not be saved to the database
if a downgrade is performed.
TABLE 1-26
Simplex Software Downgrade Steps
Step
State or Action
Details
1.
Obtain the original load files.
If the original load files are not in FLASH on the CFC200, obtain copies
and put them in FLASH on the CFC200. (Refer to 1.7.4).
2.
Set the original load files as PREFLOAD.
Set the original CFC load files to PREFERRED.
SET CARD=ACTCFC PREFLOAD=<original CFC200 load>
Line Card load preferences are saved on the database and will be taken
from it after it has been restored.
Restore the original database.
3.
Restore the original database. (Refer to 1.9.1.5.)
The user inputs the command:
RESTORE DATABASE
During this process, the database reverts back to its original configuration data, the CFC200 restarts, and the CFC200 and Line
Cards revert back to their original loads.
1.10.9.5 Duplex Upgrade Procedure
By taking advantage of redundant control modules provided by the duplex configuration, software upgrades on a duplex system are not service affecting for the control modules.
Note:
Service is affected when performing upgrades on Line Cards. Video, data, and voice traffic will be affected.
Also, for brief periods swtiching capacity is reduced from 400G to 200G
Following is a detailed walkthrough of a duplex software upgrade for the CFC200 duplex system. It is assumed that the system is running in a stable state
.
TABLE 1-27
Duplex Software Upgrade Steps
Step
State or Action
Notes
1.
Pre-Upgrade Configuration
Obtain the latest loads from Allied Telesis. Contact Allied Telesis for load
information. Download the loads to the network server so that they may
be copied if necessary.
2.
The user backs up the current
database using the BACKUP
DATABASE command.
For network reliability purposes, backup the existing configuration database to the external network server using the BACKUP DATABASE command. (Refer to Section 1.9.)
3.
The user retrieves the new load
files from the network server
using the GET FILE command.
Transfer the new load(s) from the server to the control module FLASH
They are stored in FLASH on
both control modules
Ensure the latest load is on the network server as explained in Step 1.
- get file <load> tftp server 10.52.65.42
The loads are automatically transferred to the INACTCFC.
Software Reference for SwitchBlade x3100 Series Switches
170
Setting Up the Switch
TABLE 1-27
Duplex Software Upgrade Steps (Continued)
Step
State or Action
Notes
4.
The user sets the new control
module load as TEMPLOAD on
the inactive CFC (INACTCFC)
using the SET CARD command.
Set the new CFC load as TEMPLOAD for the INACTCFC.
Execute a restart on the inactive
control module.
Restart the inactive CFC by using either:
Note the resulting state as a
result of restarting the inactive
CFC.
The inactive control module recovers on the new load.
5.
6.
- SET CARD=INACTCFC TEMPLOAD=<latest load>
- RESTART CARD INACTCFC
Certain CLI commands are not available at this point in the upgrade
(unless this is an Interim Upgrade).
An Out of Sync alarm may be raised on the INACTCFC informing the
user that synchronization with the ACTCFC is in progress. Wait until this
alarm has cleared before proceeding with the upgrade.
Note: A Database in Upgrade alarm is raised on the INACTCFC
informing the user that an upgrade is in progress. The system will be in
an alarm condition unless there is no schema migration to be performed (Interim upgrade).
7.
Switch activity and activate the
new control module load.
Input the command:
- SWAP ACTIVITY
The active control module releases activity, The previously inactive control module takes activity and becomes the active CFC with the new load.
The newly inactive does not reboot, however, so no database changes are
synchronized to it.
Note:
8.
Upgrade at least 1 Line Card and
perform any verification tests.
Whenever the active CFC is in upgrade mode, all
commands are allowed, but a warning is displayed to
remind the user that the system is in upgrade mode
and changes are not being saved to FLASH memory
until the upgrade is committed.
The user upgrades one or more Line Cards for verification test purposes.
The user does this by setting the new load as temporary, so the module
will boot using the new load.
SET CARD=<slot(s) with Line Card> TEMPLOAD=<latest
load>
The user then loads the temp load into the Line Card(s) by restarting the
line Card(s)
RESTART CARD=<slot-list>
9.
New Load Verification
The user executes new load verification testing.
Once testing is complete, the user may accept the new loads and commit
to them or not ac
cept them and abort back to the original loads.
To abort - go to Step 10, Abort the Upgrade.
To commit - go to Step 11, Commit to new loads.
Software Reference for SwitchBlade x3100 Series Switches
171
Setting Up the Switch
TABLE 1-27
Duplex Software Upgrade Steps (Continued)
Step
State or Action
Notes
10.
Abort the Upgrade
To abort the upgrade at this point, input the command:
SWAP ACTIVITY FORCE
Reload the Line Card (s) that was upgraded in Step 8 with the original load
and restart the Line Cards.
SET CARD=<slot(s) with Line Card> TEMPLOAD=<old
load>
RESTART CARD=<slot-list>
The active control module releases activity.
The previously inactive control module takes activity and becomes active
with the original load. The previously active control module restarts and
syncs up with the newly active one.
The system is now running on the original CFC loads and database.
11.
Commit to new loads
To commit to the new loads, set them as Preferred for the control module
and service modules using the SET CARD <card> PREFLOAD <loadname> command. The Database in Upgrade alarm is cleared and the
inactive reboots with the new load and re synchronizes to the active CM.
Immediately upgrade the remaining service modules.
Note:
The user should not attempt to perform any
maintenance activity on the INACTCFC until it
has re-synchronized with the ACTCFC. The
possibility of load corruption could occur on the
INACTCFC rendering it out of service.
Note:
An Inconsistent Load Minor alarm will be posted
against any Line Card whose running major and
minor software load version does not match the
preferred major and minor software load version
of the active CFC. The alarm is raised whenever
the CFC is taken out of upgrade mode. This is
intended to maintain consistency of load
versions throughout the system.
Also the user should make a copy of the control module load and set it as
ALTLOAD.
The user should perform a database backup to a new database file name
using the BACKUP DATABASE commands. Refer to Section 1.9.
The old loads can now be deleted from control module FLASH, if desired,
using the DELETE FILE command.
1.10.9.6 Duplex Downgrade Procedure
There is no support for backward schema migration of the database; therefore, in order to revert back to the original loads,
once they have been committed to, a software downgrade must be performed. The system will revert back to the old database and will lose any configuration changes made to the new database. During this process, the database reverts back to its
original configuration data, the CFC200 restarts, and the CFC200 and Line Cards revert back to their original loads.
Software Reference for SwitchBlade x3100 Series Switches
172
Setting Up the Switch
Note:
Downgrading causes a loss of configuration changes made to the new database.
TABLE 1-28
Duplex Software Downgrade Steps
Step
State or Action
Details
1.
Evaluate the CFC200 and Line
Card loads on the CFC200. If
the original files are still in
FLASH, this step can be skipped.
Transfer the CFC200 and Line Card loads from the server to the control
module FLASH:
Set the original CFC load as
PREFLOADs
Set the original CFC load as the PREF load for the active and inactive
CFC200. The PREFLOAD setting is synchronized to the inactive.
2.
- get file <load> tftp server 10.52.65.42
SET CARD=ACTCFC PREFLOAD=<original load>
For the Line cards, the preferred loads will come from the restored database and will reload automatically.
3.
Restore the database that was
backed up in Step 2.of Table 127.
The user inputs the command:
RESTORE DATABASE (Refer to Section 1.9.1.5.)
Once the boot sequence continues, the original database is loaded into
RAM memory and is schema migrated to the old load. The original database is still intact in FLASH memory.
Software Reference for SwitchBlade x3100 Series Switches
173
Setting Up the Switch
1.11 Log Management
1.11.1 Introduction
The SBx3112 produces management logs that provide information about all changes that occur. Figure 1-8 shows an example
log, and Table 1-29 describes the fields included with a management log.
A
B
C
D
** PORT003 2010-07-30 07:06:54
Location: Slot: 8 Port: 11
Description: Port Fault Set F
Reason Code: Loss of Link
3106 FAULT
A
= Severity
C
= Date and time
E
= Log Type
B
= Category
D
= Sequence
F
= Message
FIGURE 1-8
E
Sample Log Produced by the SBx3112
Software Reference for SwitchBlade x3100 Series Switches
174
Setting Up the Switch
TABLE 1-29
Field Definitions of Management Logs
Field
Value
Description
Category - You can clear
the CATEGORY field of a
LOG FILTER by setting
the CATEGORY to
‘NONE’ or ““. Refer to
SET LOG FILTER.
BDB
Configuration database has been backed up
CARD
Change to a card
CFCP
A change in CFC protection, such as duplex to simplex.
CHAS
Chassis
CLI
Command-line interface
CUC
Cooling Unit Controller
EPSR
EPSR Change of State
FAN
Fan Unit
FILE
File Changes
IGMP
Changes to IGMP configuration
LOG
Log management
PORT
Port change
RDB
Configuration database has been restored
RMON
Performance Monitoring of Ethernet-based statistics
RSDB
Configuration Database has been reset (purged)
SHLF
Changes in shelf
SNTP
Changes in SNTP (time setting)
STP
Spanning tree protocol
SYS
Changes in overall system
TRAP
A trap has been produced
USER
Changes in user configuration
AUTH
Port Authentication
RAD
RADIUS Server
INFO
Information only
FAULT
Fault condition
OTHER
All other logs
*C
CRITICAL: data service is affected and requires immediate attention.
**
MAJOR: data service may be affected and must be investigated.
*
MINOR: data service is not affected but could lead to a larger problem.
<blank>
NONE: Information only
Log Type
Severity
Software Reference for SwitchBlade x3100 Series Switches
175
Setting Up the Switch
TABLE 1-29
Field Definitions of Management Logs (Continued)
Field
Value
Description
Date and Time
yyyy-mm-dd
hh:mm:ss
Date and time the log was produced
1.11.2 Viewing Logs
Use the SHOW LOG command to filter logs immediately in the output, for example to show only logs that have a severity of
CRITICAL.
1.11.3 Controlling Output of Logs
To control the output of logs the following are used:
• Log Filter - This is a filterid (usually a text string) that is associated with a Category and Severity.
• Log Output - This is an outputid (also usually a text string) that is associated with the destination for the logs. The destination can be a terminal or SYSLOG server. The outputid can also define the log format.
By combining the two, a filterid can be created and then associated with an outputid. Figure 1-9 shows an example configuration.
outputids for:
SYSLOG server
SBx3112
TELNET/CLI
SBx3100
All logs (all Categories and Severities)
Physical Link
Critical Severity only
Categories CARD, SHLF only
SBx31CFC
local
terminal
CFC control module (console port)
FIGURE 1-9
Example Log Configuration
1.11.4 Example Log Configuration Setup
An example sequence of setting up a log management system would be as follows:
• Create a log filter - Use the CREATE
LOG FILTER=<filter name> command to create a name for a set of logs, called
the filterid, and set up a criteria so logs that meet that criteria are collected together and associated with that filterid.
Software Reference for SwitchBlade x3100 Series Switches
176
Setting Up the Switch
• Create a log output - Use the CREATE
LOG OUTPUT=<output name> command to create a name for the destination for
the logs (called an outputid), set up the attributes for that destination (such as an IP address), and specify the log format.
• Associate the filterid with the outputid - Use the ADD FILTER OUTPUT=<output name> command to associate the
filterid with the outputid so that logs filtered in a certain way are sent to a certain destination.
The log format can be set to FULL, SUMMARY, or MSGONLY by using the FORMAT keyword with the CREATE LOG OUTPUT
or the SET LOG OUTPUT command. The FULL format displays the entire log message. The SUMMARY format displays only the
category, timestamp, and log type. The MSGONLY format displays only the log message. A comparison of the formats is
shown in Figure 1-10.
Full
USER002 2010-07-15 10:57:23 9123 INFO
User: user01 at IP: 192.16.18.103 has logged in
Summary
USER002 2010-07-15 10:57:23 9123 INFO
Message
Only
User: user01 at IP: 192.16.18.103 has logged in
FIGURE 1-10
Comparison of Log Formats
1.11.5 Capturing and Sending Logs to a Storage Device
Users can query the system for logs and send them to a storage device using the PUT FILE command. Note that the PUT
FILE command can be used for not only log files, but any supported file type. Usually logs will be captured and sent to a network server for analysis.
For logs from both the ACTCFC and the INACTCFC, an example of using the PUT FILE command to capture logs and send
them to a TFTP server follows. In this example, the user captured logs from the INACTCFC of a duplex system.
officer SEC> PUT LOG FILE=LOG_FILE TFTP SERVER=172.16.18.50 CARD=INACTCFC
Command has been submitted
officer SEC>
Info (010020): Successfully transferred file: LOG_FILE
The log file now exists on the TFTP server:
FIGURE 1-11
TFTP session with reception of log file
Any text editor can now be used to analyze the file.
Logs can be captured from any card with an independently running software load (as described above, the ACTCFC and the
INACTCFC). In the PUT LOG command syntax, the CARD parameter can have the value slot. The procedure is the same,
except that the CARD parameter will use a slot number rather than ACTCFC or INACTCFC.
Software Reference for SwitchBlade x3100 Series Switches
177
Setting Up the Switch
1.11.6 Logging Procedures
1.11.6.1 Configuration Procedure
The following procedure shows the commands used in the configuration.
TABLE 1-30
Step
Configuration Procedure for LOG Filtering
Command
Description
Show logs that match a criteria. For example, to view logs that have a severity level of CRITICAL, input the following:
1.
officer SEC> SHOW LOG SEVERITY=CRITICAL
*C SYS010 2010-04-16 14:39:42 3538 FAULT
System: Cleared Port Outage Threshold
Create a log filter for critical severity only
2.
CREATE LOG FILTER=CRITICAL_log SEVERITY=CRITICAL
Create a log output to associate with the log filterid CRITICAL
3
CREATE LOG OUTPUT=terminal DESTINATION=CLI FORMAT=SUMMARY
Add the log filter created in step 2. to the log output created in step 3
4.
ADD LOG FILTER=CRITICAL_log OUTPUT=TERMINAL
Enable the output.
5.
ENABLE LOG OUTPUT=TERMINAL
Software Reference for SwitchBlade x3100 Series Switches
178
Setting Up the Switch
1.11.7 Logging Commands
This section describes the commands available to enable, configure and manage Logging.
TABLE 1-31
Logging CLI Commands
Commands
ADD LOG FILTER OUTPUT
CREATE LOG OUTPUT
CREATE LOG FILTER
DELETE LOG FILTER
DESTROY LOG FILTER
DESTROY LOG OUTPUT
DISABLE LOG OUTPUT
ENABLE LOG OUTPUT
PURGE LOG
PUT LOG FILE
SET LOG FILTER
SET LOG OUTPUT
SHOW LOG
SHOW LOG FILTER
SHOW LOG OUTPUT
Software Reference for SwitchBlade x3100 Series Switches
179
Setting Up the Switch
ADD LOG FILTER OUTPUT
Syntax
ADD LOG FILTER={filterid-list|ALL} OUTPUT=outputid
Description
Used to associate existing management log filters with an existing management log output destination.
After successful execution of this command, the specified management log output destination, if
enabled, receives management logs that match the filter criteria contained in the management log filters.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILTER
The log filter that was created.
NA
NA
OUTPUT
The outputid that was created.
NA
NA
Release Note
NA
Example
ADD LOG FILTER=CRITICAL_log OUTPUT=TERMINAL
Software Reference for SwitchBlade x3100 Series Switches
180
Setting Up the Switch
CREATE LOG OUTPUT
Syntax
CREATE LOG OUTPUT=outputid
[ { CLI [ FORMAT={ FULL | MSGONLY | SUMMARY } ] |
CONSOLE [ FORMAT={ FULL | MSGONLY | SUMMARY } ] |
SYSLOG SERVER={ ipaddress | hostname }
{ [ FACILITY={ 0..7 | DEFAULT } ] |
[ CRITICALFACILITY={ 0..7 | DEFAULT } ]
[ MAJORFACILITY={ 0..7 | DEFAULT } ]
[ MINORFACILITY={ 0..7 | DEFAULT } ]
[ INFOFACILITY={ 0..7 | DEFAULT } ] }
| FILE=unit:filename
[ FORMAT={ FULL | MSGONLY | SUMMARY } ] } ]
Description
Creates management log output destinations. Management log output destinations are used to direct a
filtered management log stream to a specific destination. Currently, supported destinations include a
CLI session, the system console and a Syslog server. Note that CLI session output destinations are not
persisted. If a user sets up a management log output destination and then subsequently logs out, that
management log output destination is removed from the system. In addition, created log output destinations are disabled upon creation. Execute the ENABLE LOG OUTPUT command to enable the management log output destination for output.
Mode
Manager
Options
Default
Value
Option
Description
Range
OUTPUT
The outputid is a name associated with the destination for the logs. The destination can be a terminal
or SYSLOG server. The outputid can also define
the log format.
NA
NA, but
usually a
text string
upto 23
characters
long
CLI
The output will go to the CLI session.
NA
NA
CONSOLE
The output will go to the System Console.
NA
NA
SYSLOG_Ser
ver
The IP address or hostname of the Syslog server.
NA
NA
FACILITY
The log facility that all levels of syslogs are sent to.
NA
2
Refer to RFC3164 for details on the SYSLOG protocol.
CRITICALFACILITY
The log facility that critical syslogs are sent to. The possible values are 0-7, indicating LOCAL0-LOCAL7 or
DEFAULT.
NA
LOCAL2
MAJORFACILITY
The log facility that major syslogs are sent to. The possible values are 0-7, indicating LOCAL0-LOCAL7 or
DEFAULT.
NA
LOCAL2
MINORFACILITY
The log facility that minor syslogs are sent to. The possible values are 0-7, indicating LOCAL0-LOCAL7 or
DEFAULT.
NA
LOCAL2
Software Reference for SwitchBlade x3100 Series Switches
181
Setting Up the Switch
Option
Description
Range
Default
Value
INFOFACILITY
The log facility that informational syslogs are sent to.
The possible values are 0-7, indicating LOCAL0LOCAL7 or DEFAULT.
NA
LOCAL2
FILE
unit:filename-pattern - the specific SD unit
and the pattern (in 14.2, the SD unit on the active or
inactive CFC unit can be specified.
NA
NA
FORMAT
Allows users to specify the format of the management
logs. Valid formats include the following:
NA
FULL
FULL - Displays the entire contents of the management
log including log type, date and time, severity, sequence
number and message body.
MSGONLY - Displays only the management log bodies.
SUMMARY - Displays a one-line summary of the management log. The summary includes the log type, date
and time and log sequence number.
Release Note
NA
Example
CREATE LOG OUTPUT=terminal DESTINATION=CLI FORMAT=SUMMARY
Software Reference for SwitchBlade x3100 Series Switches
182
Setting Up the Switch
CREATE LOG FILTER
Syntax
CREATE LOG FILTER=filterid [CATEGORY=category]
[SEVERITY=[op]{CRITICAL|MAJOR|MINOR|NONE}]
Description
Creates a management log filter. Management log filters are used to set filter criteria for management
logs. If a management log passes the criteria in a given log filter, the management log is routed to all of
the management log output destinations that are associated with that filter via the ADD LOG FILTER
command. By default, without a category or severity value specified, a management log filter matches
all logs.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILTER
The name of a filter to create. The name should match
criteria that the filter is going to define.
NA
NA
CATEGORY
A comma-separated list of log categories, Valid values
for the SBx3112 are listed in Table 1-29.
NA
NA
SEVERITY
SEVERITY of the log to filter on
NA
NONE
- CRITICAL
- MAJOR
- MINOR
- NONE
Release Note
NA
Example
CREATE LOG FILTER=rmon_filter CATEGORY=RMON SEVERITY=MINOR
Software Reference for SwitchBlade x3100 Series Switches
183
Setting Up the Switch
DELETE LOG FILTER
Syntax
DELETE LOG FILTER={filterid-list|ALL} OUTPUT=outputid
Description
Used to remove the association between management log filters and a management log output destination. Upon successful execution of this command, the specified management log filters are removed
from the management log output destination. The management log output destination will no longer
receive logs that match the filter criteria in the log filters that were removed.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILTER
The name of a previously created filter to delete.
NA
NA
OUTPUT
The name of the output destination. This was created
with the CREATE LOG FILTER command.
NA
NA
Release Note
NA
Example
DELETE LOG FILTER=rmon_filter OUTPUT=terminal
Software Reference for SwitchBlade x3100 Series Switches
184
Setting Up the Switch
DESTROY LOG FILTER
Syntax
DESTROY LOG FILTER={filterid-list|ALL}
Description
Removes management log filters from the system. Upon successful completion of this command, the
specified management log filter is completely removed from the system. The log filter is also removed
from all log output destinations that have had the filter added with the ADD LOG FILTER command.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILTER
Name given for the log filter.
NA
NA
Release Note
NA
Example
DESTROY LOG FILTER=rmon_filter
Software Reference for SwitchBlade x3100 Series Switches
185
Setting Up the Switch
DESTROY LOG OUTPUT
Syntax
DESTROY LOG OUTPUT={outputid-list|ALL}
Description
Removes existing management log output destinations from the system. CLI output destinations are
automatically destroyed when the user logs out of his/her session. Upon successful completion of this
command, the specified management log destination is completely removed from the system.
Mode
Manager
Options
Option
Description
Range
Default
Value
OUTPUT
The log destination ids that have been created.
NA
NA
Release Note
NA
Example
DESTROY LOG OUTPUT=terminal
Software Reference for SwitchBlade x3100 Series Switches
186
Setting Up the Switch
DISABLE LOG OUTPUT
Syntax
DISABLE LOG OUTPUT={outputid-list|ALL}
Description
Disables management log streaming for existing management log output destinations.
Mode
Manager
Options
Option
Description
Range
Default
Value
OUTPUT
The log destination ids that have been created.
NA
NA
Release Note
NA
Example
DSIABLE LOG OUTOUT=systest
Software Reference for SwitchBlade x3100 Series Switches
187
Setting Up the Switch
ENABLE LOG OUTPUT
Syntax
ENABLE LOG OUTPUT={outputid-list|ALL}
Description
Enables management log streaming for existing management log output destinations.
Mode
Manager
Options
Option
Description
Range
Default
Value
OUTPUT
The log destination ids that have been created.
NA
NA
Release Note
NA
Example
ENABLE LOG OUTPUT=terminal
Software Reference for SwitchBlade x3100 Series Switches
188
Setting Up the Switch
PURGE LOG
Syntax
PURGE LOG
Description
Used to remove all stored management logs from the system.
Mode
Manager
Options
None
Release Note
NA
Example
PURGE LOG
Software Reference for SwitchBlade x3100 Series Switches
189
Setting Up the Switch
PUT LOG FILE
Syntax
PUT LOG FILE={ destinationfile | unit:destinationfile | serverpath/destinationfile }
[ { TFTP SERVER={ ipaddress | hostname }
| ZMODEM | FTP SERVER={ ipaddress | hostname }
USER=userid PASSWORD=password } ]
[ TYPE={ MGMT | ERROR | TRACE | CRASH } ]
[ CARD={ slot | ACTCFC | INACTCFC } ]
Description
Used to transfer management, error, trace or crash logs off the device. Currently, TFTP is the only
supported transfer method. Logs can be captured from any card with an independently running software load. In the PUT LOG command syntax, the CARD parameter can have the value slot. The procedure is the same, except that the CARD parameter will use a slot number rather than ACTCFC or
INACTCFC.
Mode
Manager
Options
Option
Description
Range
Default
Value
FILE
The FILENAME parameter is used to specify the filename for the logs to be transferred into on the remote
server. If a unit:filename, the logs will be written to a file
on the specified flash unit.
NA
NA
TFTP_Server
ip address or host name of tftp server
NA
NA
ZMODEM
Transfer logs usng the ZMODEM protocol.
NA
NA
FTP_Server
ip address or host name of ftp server
NA
NA
NA
MGMT
NA
ACTCFC
USER - user for the ftp server
PASSWORD - password for th ftp server
TYPE
MGMT - management logs - logs generated during the
normal course of system operation that may indicate
system status, state or error conditions.
ERROR - error logs - logs used for field support and
debugging that may assist in troubleshooting.
TRACE - trace logs - logs used for field support and
debugging that may assist in troubleshooting.
CRASH - crash logs - logs used for field support and
debugging in cases where the system has experienced an
unhandled exception condition.
CARD
Used to select which cfc the logs are offloaded from.
slot - slot number of card
ACTCFC - Active CFc
INACTCFC - Inactive CFC
Release Note
NA
Example
PUT LOG FILE SD4:NEWLOGS TFTP SERVER 10.52.36.2 TYPE MGMT CARD ACTCFC
Software Reference for SwitchBlade x3100 Series Switches
190
Setting Up the Switch
SET LOG FILTER
Syntax
SET LOG FILTER=filterid
[CATEGORY=category]
[SEVERITY=[op]
{CRITICAL|MAJOR|MINOR|NONE}]
Description
Used to change the filter criteria on an existing management log filter. By default, if no category, severity or format options are specified, the management log filter is set to match all logs.
Mode
Manager
Release
Options
Option
Description
Range
Default
Value
FILTER
The filterid that has been created
NA
NA
CATEGORY
Allows the user to specify one or more management log
categories to filter. A comma-separated list of categories is accepted. The management log category is taken
from the leading 3 or 4 alphabetic characters from the
management log name. Refer to Table 1-29.
NA
NA
NA
NA
To clear the categories and set back to the default, use
eithe NONE or ““.
SEVERITY
The SEVERITY parameter allows for the display of management logs that have only a certain sequence number
values. A single severity value may be specified or an
operation-specified range of severities. Valid severities
are CRITICAL, MAJOR, MINOR or NONE. These
severity values can be combined with an optional operator to include a range of severities. The valid operators
are the following:
< - less-than - match all logs with a severity less than
or equal to the specified severity threshold
> - greater-than - match all logs with a severity greater
than or equal to the specified severity threshold
! - not-equal - match all logs with a severity less than
or equal to the specified severity threshold
Release Note
NA
Example
SET LOG FILTER=rmon_filter SEVERITY=MAJOR
Software Reference for SwitchBlade x3100 Series Switches
191
Setting Up the Switch
SET LOG OUTPUT
Syntax
SET LOG OUTPUT=outputid
[ { CLI [ FORMAT={ FULL | MSGONLY | SUMMARY } ] |
CONSOLE [ FORMAT={ FULL | MSGONLY | SUMMARY } ] |
SYSLOG { [ SERVER={ ipaddress | hostname } ] }
{ [ FACILITY={ 0..7 | DEFAULT } ] |
[ CRITICALFACILITY={ 0..7 | DEFAULT } ]
[ MAJORFACILITY={ 0..7 | DEFAULT } ]
[ MINORFACILITY={ 0..7 | DEFAULT } ]
[ INFOFACILITY={ 0..7 | DEFAULT } ] } |
FILE=unit:filename [ FORMAT={ FULL | MSGONLY | SUMMARY } ] } ]
Description
Used to change the management log output destination settings. By default, if no category, severity or
format options are specified, the management log filter is set to match all logs.
Mode
Manager
Options
Option
Description
Range
Default
Value
OUTPUT
The outputid that was created.
NA
NA
The output will go to the Command Console.
NA
NA
CLI
FORMAT can be:
- FULL displays the entire log message.
- SUMMARY displays only the category, timestamp, and
log type.
- MSGONLY displays only the log message.
CONSOLE
The FORMAT meanings are the same as for the CLI.
NA
NA
SYSLOG_Ser
ver
The SERVER that will receive the management log
stream
NA
NA
The log facility that all levels of syslogs are sent to.
NA
2
FACILITY
Refer to RFC3164 for details on the SYSLOG protocol.
CRITICALFACILITY
The log facility that critical syslogs are sent to. The possible values are 0-7, indicating LOCAL0-LOCAL7 or
DEFAULT.
NA
LOCAL2
MAJORFACILITY
The log facility that major syslogs are sent to. The possible values are 0-7, indicating LOCAL0-LOCAL7 or
DEFAULT.
NA
LOCAL2
MINORFACILITY
The log facility that minor syslogs are sent to. The possible values are 0-7, indicating LOCAL0-LOCAL7 or
DEFAULT.
NA
LOCAL2
INFOFACILITY
The log facility that informational syslogs are sent to.
The possible values are 0-7, indicating LOCAL0LOCAL7 or DEFAULT.
NA
LOCAL2
Software Reference for SwitchBlade x3100 Series Switches
192
Setting Up the Switch
Option
Description
Range
Default
Value
FILE
unit:filename-pattern - the specific SD unit
and the pattern (in 14.1, only the SD unit on the active
CFC unit can be specified
NA
NA
NA
NA
The FORMAT meanings are the same as for the CLI
OUTPUT
The outputid is a name associated with the destination for the logs. The destination can be a terminal
or SYSLOG server. The outputid can also define
the log format.
Release Note
NA
Example
SET LOG OUTPUT=terminal CLI FORMAT=MSGONLY
Software Reference for SwitchBlade x3100 Series Switches
193
Setting Up the Switch
SHOW LOG
Syntax
SHOW LOG [ CATEGORY=category ] [ DATE=[ op ] yyyy-mm-dd [ -yyyy-mm-dd ] ] [
FORMAT={ FULL | MSGONLY | SUMMARY } ] [ REVERSE ]
[ SEQUENCE=0..9999 [ -0..9999 ] ]
[ SEVERITY=[ op ] { CRITICAL | MAJOR | MINOR | NONE } ]
[ TAIL [ =count ] ] [ TIME=[ op ] hh:mm:ss [ -hh:mm:ss ] ]
Description
Used to display all the stored management logs. Optional parameters are available to display only the
management logs matching certain criteria. With no optional parameters specified, all management
logs are displayed in order from newest to oldest.
Mode
User
Options
Option
Description
Range
Default
Value
CATEGORY
A comma-separated list of log categories, Valid values
for the SBx3112 are listed in Table 1-29.
NA
ALL
DATE
Causes SHOW LOG to display only the logs that
occurred on a certain date or within a range of
dates.There are three possible ways to use the DATE
parameter.
NA
ALL
NA
FULL
NA
NA
1) As a single date, yyyy-mm-dd (e.g., 2010-03-14 to display all logs that occurred on March 14, 2010)
2) As an explicit range of dates, yyyy-mm-dd-yyyy-mmdd (e.g., 2010-03-14-2010-03-17 to display all logs that
occurred between March 14, 2010, and March 17, 2010,
inclusive)
3) As an operation-specified range of dates. The following operations are valid:
< - less-than - displays all logs earlier than or equal to a
certain date
> - greater-than - displays all logs with a date later than
or equal to a certain date
FORMAT
Controls how the logs are displayed to the user. The
following formats are valid:
FULL - Displays the entire contents of the management log including log type, date and time, severity,
sequence number and message body.
MSGONLY - Displays only the management log bodies.
SUMMARY - Displays a one-line summary of the management log. The summary includes the log type, date
and time and log sequence number.
REVERSE
Reverses the normal order of management log display,
displaying the management logs in oldest to newest
order.
Software Reference for SwitchBlade x3100 Series Switches
194
Setting Up the Switch
Option
Description
Range
Default
Value
SEQUENCE
Allows for the display of management logs that match
the specified range of sequence numbers. Sequence
number ranges can be either a single sequence number,
an explicit range of sequence numbers (e.g., 100-200) or
an operation-specified range of sequence numbers (e.g.,
<200)
NA
NA
NA
NA
The following are the valid operations:
< - less-than - displays all logs with a sequence number
less than or equal to the given sequence number.
> - greater-than - displays all logs with a sequence number greater than or equal to the given sequence number.
SEVERITY
Indicates the severity level to filter the display with.
Severity indicates the degree of service impact associated with an alarm condition. The following severities
are defined:
- CRITICAL: A critical alarm is used to indicate that a
severe, service-affecting condition has occurred and
that immediate corrective action is imperative.
- MAJOR: A major alarm is used to indicate a serious
disruption of service or the malfunctioning or failure of
important circuits. These troubles require immediate
attention and response to restore or maintain system
capability. The urgency is less than critical situations
because of lesser immediate or impending effect on service or system performance.
- MINOR: Minor alarms are used for troubles that do
not have serious effect on service to customers or for
troubles that do not effect essential system operation.
- NONE: Represents an informational message. No
explicit action is required.
TAIL
The TAIL parameter allows for the display of a certain
number of the newest logs. If a numeric argument is not
supplied, the newest 20 logs are displayed, otherwise
the optional numeric argument is taken as the number
of logs to display, if that number of logs exists.
NA
NA
TIME
Filters logs based on the time at which the log occurred.
The time may be specified as an exact value (hh:mm:ss),
an explicit range (hh:mm:ss-hh:mm:ss) or as an operation-specified range of values.
NA
NA
The following operations are valid:
< - less-than - displays all logs with a time less than or
equal to the specified value.
> - greater-than - displays all logs with a time greater
than or equal to the specified value.
Release Note
NA
Example
Software Reference for SwitchBlade x3100 Series Switches
195
Setting Up the Switch
SHOW LOG CATEGORY=PORT SEVERIT
** PORT004 2010-11-04 15:47:13
3314 FAULT
Location: Slot: 8 Port: 22
Description: Port Fault Cleared
Reason Code: Remote BFD Session Failed
** PORT004 2010-11-04 15:47:13
3311 FAULT
Location: Slot: 8 Port: 18
Description: Port Fault Cleared
Reason Code: Remote BFD Session Failed
** PORT004 2010-11-04 15:47:12
Location: Slot: 8 Port: 18
Description: Port Fault Cleared
Reason Code: BFD Session Failed
3310 FAULT
** PORT004 2010-11-04 15:47:12
3307 FAULT
Location: Slot: 8 Port: 19
Description: Port Fault Cleared
Reason Code: Remote BFD Session Failed
** PORT004 2010-11-04 15:47:11
Location: Slot: 8 Port: 19
Description: Port Fault Cleared
Reason Code: BFD Session Failed
3306 FAULT
** PORT004 2010-11-04 15:47:02
Location: Slot: 8 Port: 22
Description: Port Fault Cleared
Reason Code: BFD Session Failed
3305 FAULT
** PORT003 2010-11-04 15:47:02
3304 FAULT
Location: Slot: 8 Port: 22
Description: Port Fault Set
Reason Code: Remote BFD Session Failed
** PORT003 2010-11-04 15:47:02
3303 FAULT
Location: Slot: 8 Port: 18
Description: Port Fault Set
Reason Code: Remote BFD Session Failed
** PORT003 2010-11-04 15:47:02
Location: Slot: 8 Port: 22
Description: Port Fault Set
Reason Code: BFD Session Failed
3302 FAULT
** PORT004 2010-11-04 15:47:02
Location: Slot: 8 Port: 22
Description: Port Fault Cleared
Reason Code: Loss of Link
3301 FAULT
Software Reference for SwitchBlade x3100 Series Switches
196
Setting Up the Switch
SHOW LOG FILTER
Syntax
SHOW LOG FILTER
Description
displays all the existing management log filters in the system. The log filter name, the log categories filtered, if any, and the severity values filtered are displayed by this command.
Mode
User
Options
NA
Release Note
NA
Example
SHOW LOG FILTER
--- Management Log Filters --------------------------------------------------Filter ID
------------------------1
2
Categories
------------------------CLI
PORT
Software Reference for SwitchBlade x3100 Series Switches
Severities
------------------------Critical Major Minor None
Critical Major Minor None
197
Setting Up the Switch
SHOW LOG OUTPUT
Syntax
SHOW LOG OUTPUT
Description
Displays all the existing management log output destinations currently defined in the system. The information displayed contains the management log output name, the destination type, the log format type,
the associated management log filters, and the status (enabled or disabled). Additional destination-specific information is also displayed. For CLI log output destinations, the user name, IP address and session number information is displayed. For Syslog log output destinations, the Syslog server IP address is
shown.
Mode
User
Options
NA
Release Note
NA
Example
SHOW LOG OUTPUT
--- Management Log Output Destinations ----------------
Output ID.............................
Destination...........................
Message Type..........................
Filters...............................
Status................................
Syslog server hostname/IP address.....
Critical facility.....................
Major facility........................
Minor facility........................
Info facility.........................
19
Syslog
SYSLOG - NORMAL
1 2
Enabled
10.52.18.202
2
2
2
2
Software Reference for SwitchBlade x3100 Series Switches
198
Setting Up the Switch
1.12 LED Management
1.12.1 Introduction
On the SBx3100, the LEDs have the following attributes:
• Color - Green or amber
• State - Solid, flashing, or off
1.12.2 CFC200
The CFC 200 has:
•
•
•
•
•
•
2 slot status LEDs, labeled per slot number (0-11) on the faceplate
one power LED, labeled “PSU” on the faceplate
one activity LED, labeled “M/S” (for Master/Slave) on the faceplate
one Fan Status LED, labeled “FAN” on the faceplate
one management Ethernet port LED, labeled “L/A” (for Link/Activity) on the faceplate
one SD card LED, labeled “SD” on the faceplate, to show status of the removable SD memory card
Note:
The slot status LEDs on the CFC are physically controlled by the cards in the slots, not by the CFC.
1.12.3 PSU
The AC PSU card has 3 LEDs:
• One input AC power LED, labeled “AC” on the faceplate
• One output DC power LED, labeled “DC” on the faceplate
• One fault LED, labeled “FAULT” on the faceplate
The DC PSU card has 3 LEDs:
• One input DC power LED, labeled “DC In” on the faceplate
• One output DC power LED, labeled “DC out” on the faceplate
• One fault LED, labeled “FAULT” on the faceplate
Note:
If any provisioned PSU is in failed state, then the single PSU LED on the CFC is flashing amber.
1.12.4 XE4
The XE4 card has four green LEDs, one for each port, labeled L/A (for Link/Activity) on the faceplate. The LED is on when
the link is up, and blinking when the link has activity. Disabling the XE interface turns the LED off, regardless of whether a
fiber is present.
1.12.5 GE24POE
The GE24POE card has two LEDs per port. One port LED is used to indicate activity (green for a 1Gbps link, yellow for a
10/100 Mbps link, and flashing for activity). The second port LED is used to indicate PoE status (green for PoE active, solid
yellow for power fault conditions and flashing yellow for insufficient power conditions). Disabling the GE interface turns the
activity LED off, regardless of whether a cable is present. Disabling the GE interface has no effect on the POE LED.
Software Reference for SwitchBlade x3100 Series Switches
199
Setting Up the Switch
1.12.6 GE24SFP
The GE24SFP card had 24 LEDs, one for each port, labeled L/A (for Link/Activity) on the faceplate. Each port LED is used to
indicate activity (green for a 1Gbps link, yellow for a 10/100 Mbps link, and flashing for activity). The LED is OFF if the cable
or SFP is missing. Disabling the XE interfaces turns the LED off, regardless of whether a fiber is present.
1.12.7 LED Behavior
Color and pattern are used to distinguish the card states on the single LED per card. Green color indicates in service or
potentially in service (bootup) states, and amber color indicates out of service states. Thus, an amber color indicates “Ok To
Pull”. Solid light patterns are used to indicate stable states, while flashing patterns indicate transient states. Table 1-32 illustrates the display of the slot status LEDs over various card states.
TABLE 1-32
Single LED State for Card State on CFC200
Card State
Slot LED State on CFC200
DN-DN-Offline
Solid Amber
UP-DN-Reset
Solid Amber
UP-DN-Offline (query)
Solid Amber
UP-DN-Loading
Flashing Green
UP-DN-Booting
Flashing Green
UP-DN-Intest
Flashing Green
UP-DN-Configuring
Flashing Green
UP-UP-Online
Solid Green
UP-UP-Degraded
Flashing Amber
UP-DN-Failed
Flashing Amber
UP-DN-NotInstalled (card mismatch)
Solid Amber
UP-DN-NotInstalled (card not present)
Off
No card physically present, no card provisioned
Off
Inserted, not in database (manual provisioning mode)
Solid Amber
Note that when a card is reset, its LED is solid amber which is the same as the disabled state. The bootROM on the card
assumes that the card is disabled until told by the CFC to proceed with coming in service (which involves transition to UPDN-Loading or UP-DN-Booting). This policy ensures that a manually disabled card continues to show solid amber even if a
card is put into reset state by card insertion. It's also useful in visual determination of reboot loops; in that case the card
would continue to cycle between solid amber and flashing green. Once the application level software on the card is running
and the bootROM is no longer in control, the CFC will drive the LED states as per the table above.
The CFC activity LEDs are slightly different from iMAP devices, in that on iMAP systems the inactive CFC does not light the
activity LED at all, while on the x3112 the inactive CFC shows the amber color on its activity LED. The inactive CFC activity
LED is a solid amber pattern in all cases unless the card is online with the "Out of Sync" alarm; in that case it has a flashing
amber pattern. The active CFC booting up in simplex will set the M/S LED to solid amber until the software determines
activity status during initialization, then it turns to solid green to indicate that the CFC is active.
When the CFC is in a stable state (either UP-UP-Online with no "Out of Sync" alarm, or DN-DN-Offline), neither the card
status LED for that CFC nor the M/S LED is in a flashing state.
Software Reference for SwitchBlade x3100 Series Switches
200
Setting Up the Switch
The following table illustrates the display of the Master/Slave LED over various states:
TABLE 1-33
CFC Card State and M/S LED on CFC200
CFC Card State
M/S LED State (on corresponding CFC200)
UP-UP-Online (Active)
Solid Green
UP-UP-Online (Inactive) - in sync
Solid Amber
UP-UP-Online (Inactive) - out of sync
Flashing Amber
UP-DN- (Inactive)
Solid Amber
DN-DN-Offline
Solid Amber
a
a. Any transitional state
The following table illustrates the display of the PSU related LEDs over various states. Note that if any provisioned PSU is in
a failed state, then the single PSU LED on the CFC is flashing amber.
TABLE 1-34
PSU Card
State
AC PSU States and Associated LEDs
PSU LED State
(on CFC200)
AC (or DC In) LED
(on PSU)
DC (or DC Out)
LED (on PSU)
Fault LED (on
PSU)
UP-UP-Online
Solid Green
Solid Green
Solid Green
Off
UP-UPDegraded
Flashing Amber
Solid Green
Off
Ona
UP-DN-Failed
(output fault)
Flashing Amber
Solid Green
Off
Solid Red
UP-DN-Failed
(no AC input)
Flashing Amber
Off
Off
Off
UP-DN-NotInstalled
Flashing Amber
NA
NA
NA
Not inserted,
not in databaseb
Solid Green
NA
NA
NA
a. The Fault LED on the PSU is driven by the PSU firmware, so that LED is on if the fault is detected by the firmware
on the PSU. However, faults detected by software running on the CFC do not set the fault LED on the PSU
b. In this case the system only has a single PSU physically present and configured in the database. In this case the PSU
LED on the CFC is solid green because this is considered a normal operating mode
TABLE 1-35
DC PSU States and Associated LEDs
PSU Card
State
PSU LED State
(on CFC200)
AC (or DC In) LED
(on PSU)
DC (or DC Out)
LED (on PSU)
Fault LED (on
PSU)
UP-UP-Online
Solid Green
Solid Green
Solid Green
Off
UP-UPDegraded
Flashing Amber
Solid Green
Off
Ona
UP-DN-Failed
(output fault)
Flashing Amber
Solid Green
Off
Solid Red
UP-DN-Failed
(no AC input)
Flashing Amber
Off
Off
Off
Software Reference for SwitchBlade x3100 Series Switches
201
Setting Up the Switch
TABLE 1-35
DC PSU States and Associated LEDs (Continued)
PSU Card
State
PSU LED State
(on CFC200)
AC (or DC In) LED
(on PSU)
DC (or DC Out)
LED (on PSU)
Fault LED (on
PSU)
UP-DN-NotInstalled
Flashing Amber
NA
NA
NA
Not inserted,
not in databaseb
Solid Green
NA
NA
NA
NA - PSU powered outside of
chassis
NA
Solid Green
Flashingc
Off
a. The Fault LED on the PSU is driven by the PSU firmware, so that LED is on if the fault is detected by the firmware
on the PSU. However, faults detected by software running on the CFC do not set the fault LED on the PSU
b. In this case the system only has a single PSU physically present and configured in the database. In this case the PSU
LED on the CFC is solid green because this is considered a normal operating mode
c. If the DC PSU is powered but not inserted in the chassis, it is in "STANDBY" mode. In this state, the DC OUT LED
will be flashing. This is an unexpected state while inserted in the chassis. Note that the AC PSU cannot be powered
outside of the chassis.
The following table illustrates the display of the fan related LEDs over various states:
TABLE 1-36
Fan Card State and LED State CFC200 and FC4
Fan Card State
FAN LED State (CFC200
FAN LED State (FC4)
UP-UP-Offline
Solid Green
Solid Green
UP-UP-Degraded
Flashing Amber
Solid Green
UP-DN-Failed
Flashing Amber
Solid Greena
UP-DN-NotInstalled
Flashing Amber
NA
a. The Fan power LED only turns OFF if there is an overload condition and the hot-swap circuitry isolates the
fan tray from the system power
The following table illustrates the display of the SD related LEDs over various states:
TABLE 1-37
SD Card State and LED State CFC200
SD Card State
SD LED State (on Corresponding CFC200
Activated (Ready)
Solid Green
Activated (Busy)
Flashing Green
Activated (Fault)
Flashing Amber
Deactivated
Off
Not inserted
Off
The following table illustrates the display of the MGMT interface LEDs over various states.
TABLE 1-38
MGMT Interface State and LED State
MGMT Interface State
L/A LED State (on Corresponding CFC200
UP-UP-Online (1000 LINK)
Solid Green
UP-UP-Online (1000 ACT)
Flashing Green
UP-UP-Online (10/100 LINK)
Solid Amber
Software Reference for SwitchBlade x3100 Series Switches
202
Setting Up the Switch
TABLE 1-38
MGMT Interface State and LED State
MGMT Interface State
L/A LED State (on Corresponding CFC200
UP-UP-Online (10/100 ACT)
Flashing Amber
UP-DN-Failed
Off
Disabling of the physical Ethernet layer for the MGMT interface is not supported; however, disable/enable of the IP service on
the interface will affect whether or not the interface is actively passing data (flashing LED). This is the same behavior as other
iMAP products.
The following table illustrates the display of the port activity LEDs on the GE24POE/GE24SFP over various states:
TABLE 1-39
GE Interface State and Port Activity LED State on GE Cards
GE Interface State
Port Activity LED State (on Corresponding GE24POE/GE24SFP
UP-UP-Online (1000 LINK)
Solid Green
UP-UP-Online (1000 ACT)
Flashing Green
UP-UP-Online (10/100 LINK)
Solid Amber
UP-UP-Online (10/100 ACT)
Flashing Amber
UP-DN-Offline
Off
UP-DN-Failed
Off (Note that since the LED shows link-state, there could be a BFD failure,
where the port may be operationally down but the LED could still be On.
The following table illustrates the display of the port LEDs on the XE4 over various states:
TABLE 1-40
XE Interface State and Port Activity LED State on XE4
XE Interface State
Port Activity LED State (on Corresponding XE4
UP-UP-Online (10000 LINK)
Solid Green
UP-UP-Online (10000 ACT)
Flashing Green
DN-DN-Offline
Off
UP-DN-Failed
Off
Software Reference for SwitchBlade x3100 Series Switches
203
Setting Up the Switch
1.13 ECOMODE and Lamp Test
1.13.1 Introduction
The SBx3112-00 has a “green” energy savings mode called ECOMODE that is activated by the user either via a front-panel
ECO mode switch or by CLI command. While ECO mode is on, the system removes power to all LEDs on the CFCs (except
for the master/slave LED) and all port LEDs on the service modules. ECO mode has no effect on the LEDs on the fan tray,
the PSUs and the optocouplers on the back of the chassis.
Following is an example output for the SHOW SYSTEM ECOMODE. It simply toggles between the modes.
SHOW SYSTEM ECOMODE
Info (038019): System ECOMODE is set to OFF
SET SYSTEM ECOMODE=ON
Info (010017): Operation Successful
SHOW SYSTEM ECOMODE
Info (038019): System ECOMODE is set to ON
1.13.2 ECO Functions and Lamp Test
The system retains its ECO mode status in the configuration database, so the mode survives power cycles and software
restarts. The default ECO mode is off; i.e., all LEDs are enabled. The user can set the ECO mode via SET SYSTEM ECOMODE ON/OFF command, and query it via the SHOW SYSTEM ECOMODE or SHOW SYSTEM commands. The text configuration files generated by BACKUP/SHOW CONFIG contain the set command for the ECO mode.
The ECO mode switch toggles the current ECO mode. So if the system is not in ECO mode, pushing the ECO mode switch
is the same as typing SET SYSTEM ECOMODE ON. Once in ECO mode, pushing the ECO mode switch is the same as typing
SET SYSTEM ECOMODE OFF. Although both CFCs have the ECO mode switch on the faceplate, only the ECO switch on
the active CFC controls ECO mode, the inactive CFC ECO switch has no effect on the system.
The ECO mode switch/command is also used for LED lamp test. Lamp test is the opposite of ECO mode, in that all LEDs are
illuminated for a brief period. Unlike ECO mode, lamp test is not a persisted state for the LEDs. Lamp test is performed
automatically by entering or exiting ECO mode.
Specifically, LED behavior for ECOMODE and lamp test is as follows, and is initiated by either:
• Pressing an holding the ECO mode switch
• Entering the SET SYSTEM ECOMODE=ON or SET SYSTEM ECOMODE=OFF
When entering ECO mode (mode transition from OFF to ON), all applicable LEDs will illuminate in alternating colors for 3
seconds (effectively a lamp test), then turn OFF
When exiting ECO mode (mode transition from ON to OFF), all applicable LEDs will illuminate in alternating colors for 3
seconds (also effectively a lamp test), then return to their appropriate normal states (as per tables above)
Alternating colors means that the LEDs alternate green/amber, with each color showing for 200 milliseconds, during the 3
second lamp test period. Note that the XE4 port LEDs do not have an amber color, so during lamp test they appear as solid
green for the 3 second lamp test period.
Software Reference for SwitchBlade x3100 Series Switches
204
Setting Up the Switch
1.13.3 ECOMODE Commands
TABLE 1-41
ECOMODE Commands
Commands
SET SYSTEM ECOMODE
SHOW SYSTEM ECOMODE
Software Reference for SwitchBlade x3100 Series Switches
205
Setting Up the Switch
SET SYSTEM ECOMODE
Syntax
SET SYSTEM ECOMODE={ ON | OFF }
Description
The SBx3112-00 has a “green” energy savings mode called ECOMODE that is activated by the user
either via a front-panel ECO mode switch or by this CLI command. While ECO mode is on, the system removes power to all LEDs on the CFCs (except for the master/slave LED) and all port LEDs on
the service modules.
Mode
Manager
Options
Option
Description
Range
Default
Value
ECOMODE
Toggles ECOMODE as either ON or OFF
NA
OFF
Release Note
NA
Example
SET SYSTEM ECOMODE=ON
Software Reference for SwitchBlade x3100 Series Switches
206
Setting Up the Switch
SHOW SYSTEM ECOMODE
Syntax
SHOW SYSTEM ECOMODE
Description
Shows the status of ECOMODE on the SBx3112 (on or off).
Mode
User
Options
NA
Release Note
NA
Example
SHOW SYSTEM ECOMODE
Info (038019): System ECOMODE is set to OFF
Software Reference for SwitchBlade x3100 Series Switches
207
Setting Up the Switch
1.14 Alarm Management Overview
1.14.1 Overview
There are three levels of alarm severity on the system, Critical, Major, and Minor. In general, they are described as:
• Critical - A critical alarm is used to indicate that a severe, service-affecting condition has occurred and that immediate
corrective action is imperative.
• Major - A major alarm is used to indicate a serious disruption of service or the malfunctioning or failure of important circuits. These troubles require immediate attention and response by the crafts person to restore or maintain system capability. The urgency is less than critical situations because of lesser immediate or impending effect on service or system
performance.
• Minor - Minor alarms are used for troubles that do not have serious effect on service to customers or for troubles that
do not affect essential system operation.
• Info - Represents an informational message. No explicit action is required of the user.
When an anomaly occurs, the system generates management logs. In reality, every time an event occurs on the system, a log
is created. Logs are also generated when performance measurement thresholds have been exceeded. For an efficient management configuration, users can configure logs to be filtered, output, and shown on specified devices and formats.
1.14.2 Displaying alarms
Alarms can be displayed using the SHOW ALARMS command. Depending on the parameters used when the user inputs the
SHOW ALARMS command, different information will be provided in the response. For example the column Time Stamp is
added with the time and date of the alarm. This can help the user correlate the alarm to other problems in the network. The
SHOW ALARMS command will be discussed below.
• SHOW ALARMS ALL - To display all system alarms, the user inputs this command. The alarm statuses for all system
cards will be displayed.
• SHOW ALARMS CARD - To display alarms for a specified card
• SHOW ALARMS PORT - To display alarms for a specified port
• SHOW ALARMS SEVERITY - To display alarms according to their severity
Here are some examples of the use of the SHOW ALARMS command:
>show alarms
--- Shelf Alarms --Shelf
Fault
Severity
------------ -------------------------------- -------Shelf
Port Outage Threshold
Critical
Time Stamp
-------------13:31:11 03/19
--- Fan Alarms --Fan
Fault
Severity
------------ -------------------------------- -------Fan Module
Hardware Not Recognized
Major
Time Stamp
-------------13:31:22 03/19
--- Interface(Port) Alarms --Interface
-----------0.1
0.2
0.3
0.4
Fault
-------------------------------Loss of Link
Loss of Link
Loss of Link
Loss of Link
Software Reference for SwitchBlade x3100 Series Switches
Severity
-------Major
Major
Major
Major
Time Stamp
-------------13:40:49 03/19
13:40:49 03/19
13:40:49 03/19
13:40:49 03/19
208
Setting Up the Switch
0.6
0.7
0.8
0.9
0.10
0.12
0.13
0.14
0.15
0.16
0.17
0.18
0.19
0.20
0.21
0.22
0.23
1.0
1.1
1.2
1.3
11.1
11.2
11.3
11.6
11.7
11.8
11.9
11.10
11.12
11.13
11.14
11.15
11.16
11.17
11.18
11.19
11.20
11.21
11.22
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
Loss
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
of
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Link
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
Major
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:40:49
13:32:14
13:32:14
13:32:14
13:32:14
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
13:32:06
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
03/19
Severity
-------Major
Major
Major
Major
Time Stamp
-------------13:32:14 03/19
13:32:14 03/19
13:32:14 03/19
13:32:14 03/19
>show alarms CARD=1
--- Interface(Port) Alarms --Interface
-----------1.0
1.1
1.2
1.3
Fault
-------------------------------Loss of Link
Loss of Link
Loss of Link
Loss of Link
1.14.3 Alarms Associated with the SBx3112 Architecture
All of the logs and alarms are listed in Log Reference for SwitchBlade x3100 Series Switches. Following are the alarms that are
related to the SBx3112 architecture.
1.14.3.1 Alarms for the (Dual) CFC
The SBx3112 has a dual CFC that operates in load sharing mode.
• The internal control links between all data switching cards are Ethernet based. Therefore, all the data switching cards on
the SBx3112 support an alarm that indicates loss of the control plane link.
• There are two internal data plane links between each CFC and each service module, and so each service module has four
active data plane links in a duplex configuration. In the iMAP series products, each service module has a single data plane
Software Reference for SwitchBlade x3100 Series Switches
209
Setting Up the Switch
link to each CFC, so the “Datalink Lost” alarms are enhanced on SBx3112 to provide more detailed information about
which internal data link is having a fault.
• On data link failures detected by the CFC (CM side), the alarm differentiates between the two links to the service module
by designating the alarm as “A” or “B”, and the failure can be detected by either CFC. On data link failures detected by
Line Cards, the alarm differentiates between the four links by using both the A/B designation and the CFC slot.
1.14.3.2 Alarms for the CFC200
The CFC200 supports all of the pre-release 14.0 CFC card alarms, in addition to the following new alarms. (Refer to the
Allied Telesis Log Manual for complete information on these alarms.)
• Control link lost - as explained above, when control link is lost between CFCs
• USB Failure - because of thermal shutdown or over-current
• High Temperature - as detected by the temperature sensor on the CFC.
Alarms for the inactive CFC have a high severity due to the fact that losing the inactive CFC causes a loss in total system
bandwidth.
1.14.3.3 Alarms for the Service Modules
The XE and GE24 type line cards all support a standard set of alarms, and in addition the following new control and data link
alarms.
•
•
•
•
•
•
•
Control link lost
Datalink lost (CM side: link A)
Datalink lost (CM side: link B)
Datalink lost (Line Card side: link A to slot 4)
Datalink lost (Line Card side: link B to slot 4)
Datalink lost (Line Card side: link A to slot 5)
Datalink lost (Line Card side: link B to slot 5)
1.14.3.4 PSU Card Alarms
The PSU cards support the following alarms.
•
•
•
•
•
•
•
Card Not Present
Hardware Not Recognized
Input Voltage Fault
No Communication
Output Voltage Fault
High Temperature - as detected by the temperature sensor on the PSU
General Fault - PSU failures for which there is no more specific alarm (e.g. fan failure)
There are some notable behaviors of PSU alarms during a PSU mismatch (System PSU installed in a PoE PSU slot or vice
versa) scenario.
If a PoE PSU is installed in a System PSU slot (slot C or D), the following alarms are generated for the mismatched slot:
• Input Voltage Fault
1.
• Output Voltage Fault
• PSU General Fault - (This alarm will be masked.)
Software Reference for SwitchBlade x3100 Series Switches
210
Setting Up the Switch
If a System PSU is mistakenly installed in a PoE PSU slot (slot A or B), the behavior depends on whether a PoE PSU is
installed in the other PoE PSU slot. If a PoE PSU is installed in one PoE PSU slot and a System PSU is installed in the other
PoE PSU slot, the following alarms are generated for the mismatched slot:
• Hardware Not Recognized
2.
• No Communication
If a System PSU is installed in one PoE PSU slot and there is no other PoE PSU installed, there will be no alarms.
1.14.4 Fan Module Alarms
Alarms for the fan module include the following.; (Refer to the Allied Telesis Log Manual for complete information on these
alarms.)
•
•
•
•
•
Fan Module Not Present
Fans Not Rotating Properly
Hardware Not Recognized
No Communication
High Temperature - as detected by one or more of the temperature sensors on the fan tray.
Software Reference for SwitchBlade x3100 Series Switches
211
Setting Up the Switch
1.14.5 ALARM Commands
TABLE 1-42
Alarm Commands
Commands
SET ALARMS THRESHOLD
SETDEFAULTS ALARMS THRESHOLD
SHOW ALARMS
SHOW ALARMS PORT
SHOW ALARMS THRESHOLD
Software Reference for SwitchBlade x3100 Series Switches
212
Setting Up the Switch
SET ALARMS THRESHOLD
Syntax
SET ALARMS THRESHOLD [ MINOR=value ] [ MAJOR=value ] [ CRITICAL=value ]
Description
The alarm thresholds control when the MINOR, MAJOR, and CRITICAL Port Outage Threshold
alarms are raised. The entered values must be non-zero and satisfy the condition: MINOR < MAJOR <
CRITICAL These signify the lowest number of ports for that alarm to be raised. When all UPLINK
ports are out of service a CRITICAL alarm will be raised regardless of the threshold values.
Mode
Manager
Options
Option
Description
Range
Default
Value
THRESHOLD
The threshold for MINOR, MAJOR, CRITICAL port
outage alarms.
NA
NA
MINOR -Minimum number of ports before a MINOR
alarm is raised.Setting minor to anything greater than
one is allowed but not recommended. That means that
(MINOR - 1) ports can be out of service before the
threshold alarm is raised.
MAJOR -Minimum number of ports before a MAJOR
alarm is raised.
CRITICAL -Minimum number of ports before a CRITICAL alarm is raised.
Release Note
NA
Example
SET ALARMS THRESHOLD MINOR=10
Warning(033613): 9 ports can go out of service before
an alarm is raised if the MINOR threshold is 10.
Threshold Mark
-------------------------------------MINOR
10
MAJOR
24
CRITICAL
128
Info (010017): Operation Successful
Software Reference for SwitchBlade x3100 Series Switches
213
Setting Up the Switch
SETDEFAULTS ALARMS THRESHOLD
Syntax
SETDEFAULTS ALARMS THRESHOLD
Description
Sets all alarm threshold values back to the factory defaults.
Mode
Manager
Options
NA
Release Note
NA
Example
SETDEFAULTS ALARMS THRESHOLD
Software Reference for SwitchBlade x3100 Series Switches
214
Setting Up the Switch
SHOW ALARMS
Syntax
SHOW ALARMS [ { ALL | CARD={ slot-list | ACTCFC | INACTCFC | ALL } | INTERFACE={ type:id-range | id-range | ifname-list | ALL } } ] [ SEVERITY={ CRITICAL | MAJOR | MINOR | INFO | ALL } ] [ FULL ]
Description
Displays alarm conditions on system components. The display is filtered according to the given parameters and shown in a tabular output, with one alarm per row. There are 4 columns of output for each
alarm consisting of:
Mode
•
The component the alarm is against
•
A description of the fault or condition
•
The severity of the alarm
•
The time and date the alarm occurred.
User
Options
Option
ALARMS
Description
Range
Default
Value
The component that will have its alarms displayed.
NA
ALL
NA
NA
ALL - all system components
CARD - The slot number for the card
ACTCFC- The acive CFC
INACTCFC- The inactinve CFC
ALL - All alarms on all system components are displayed.
INTERFACE
Specifies the list of interfaces that may have an alarm
against them. Interfaces can be of varioust ypes like,
ETH or LAG. LAG type of interface can have more than
one physical port associated with it.
Interfaces can be queried by using 'type:id-range', 'namelist' or 'ALL' options.
For example, 'ETH:2.0', 'ETH:2.1-2.4', where 2.0,2.1 etc
are the actual physical ports and are used as the interface Id's in this representation.
Software Reference for SwitchBlade x3100 Series Switches
215
Setting Up the Switch
Option
Description
Range
Default
Value
SEVERITY
Indicates the severity level to filter the display with.
Severity indicates the degree of service impact associated with an alarm condition. The following severities
are defined:
NA
NA
NA
NA
- CRITICAL: A critical alarm is used to indicate that a
severe, service-affecting condition has occurred and
that immediate corrective action is imperative.
- MAJOR: A major alarm is used to indicate a serious
disruption of service or the malfunctioning or failure of
important circuits. These troubles require immediate
attention and response to restore or maintain system
capability. The urgency is less than critical situations
because of lesser immediate or impending effect on service or system performance.
- MINOR: Minor alarms are used for troubles that do
not have serious effect on service to customers or for
troubles that do not effect essential system operation.
- INFO: Represents an informational message. No
explicit action is required.
FULL
Release Note
Show all alarms regardless of whether or not they are
masked
NA
Example
SHOW ALARMS=ALL
--- Interface(Port) Alarms --Interface
-----------3.0
3.1
3.2
3.3
3.6
3.7
3.8
3.9
3.10
Fault
-------------------------------Loss of Link
Loss of Link
Loss of Link
Loss of Link
Loss of Link
Loss of Link
Loss of Link
Loss of Link
Loss of Link
Software Reference for SwitchBlade x3100 Series Switches
Severity
-------Major
Major
Major
Major
Major
Major
Major
Major
Major
Time Stamp
-------------03:07:26 07/30
03:07:26 07/30
03:07:26 07/30
03:07:26 07/30
03:07:26 07/30
03:07:26 07/30
03:07:26 07/30
03:07:26 07/30
03:07:26 07/30
216
Setting Up the Switch
SHOW ALARMS PORT
Syntax
SHOW ALARMS [ PORT [ ={ port-list | ALL } ] ] [ FULL ]
Description
Shows alarms for a specified set of ports or all ports.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
PORT
The comma-separated list of port(s) that will have its
alarms displayed.
NA
ALL
FULL
Includes more descriptive information.
NA
NA
NA
Example
SHOW ALARMS PORT=3.0,3.1
--- Interface(Port) Alarms --Interface
-----------3.0
3.1
Fault
-------------------------------Loss of Link
Loss of Link
Software Reference for SwitchBlade x3100 Series Switches
Severity
-------Major
Major
Time Stamp
-------------03:07:26 07/30
03:07:26 07/30
217
Setting Up the Switch
SHOW ALARMS THRESHOLD
Syntax
SHOW ALARMS THRESHOLD
Description
Displays alarm threshold settings for MINOR, MAJOR, CRITICAL port outage alarms.
Mode
User
Options
NA
Release Note
NA
Example
>SHOW ALARMS THRESHOLD
Threshold Mark
-------------------------------------MINOR
1
MAJOR
24
CRITICAL
128
Software Reference for SwitchBlade x3100 Series Switches
218
Setting Up the Switch
1.15 Power Management and System Cooling
1.15.1 Power Management
1.15.1.1 Introduction
The power and system cooling for the SBx3112 involves the following components:
• SBxFAN
• POE Power Supply Units (PSU)
• System Power Supply Units (PSU) - There are two types, AC and DC.
The next two sections describe their functions and how the interact.
1.15.1.2 Power Supply Unit (PSU)
There are four removable system Power Supply Units (PSU) labeled on the front of each shelf. They are in groups of two,
with each group providing the following
• System - These are labeled as “SBxPWR-SYS/AC”. Each system PSU has AC power input, with output voltage of 12VDC
and output power of 1200 W.
• Power over Ethernet (PoE) - These are labeled as “SBxPWR-POE/AC”. Each POE PSU has AC power input, with output
voltage of 56VDC and output power of 1200 W.
Model numbers for the PSUs follow the numbering scheme AT-SBxPWRSYS1-xx (System) and AT-SBxPWRPOE1-xx (POE),
with the nn designating a country or region. Refer to the SwitchBlade x3112 Installation Guide for specific model numbers.
The POE PSUs reside in power slots A and B, and the system PSUs reside in power slots C and D. The slots are electronically
keyed to prevent a PSU from being damaged if accidentally inserted in the wrong slot; the PSU will only draw power and light
LEDs in the correct slot. If an incompatible PSU is inserted into a PSU slot, the system will raise an alarm, CARD MISMATCH. (Refer to the Log Manual.)
1.15.1.3 Power Supply Functions
All 4 power supplies are monitored and controlled for voltage, current, and temperature levels, and controlling the on/off
state. All are hot swappable.
The system power supplies operate in a load sharing mode, but the system can run with a single system power supply. If both
system PSUs have been configured in the system but one of them is physically not present, then the system will report a
power feed failure alarm. However, if only one PSU is configured in the database the system does not report a power feed
failure alarm. Thus the customer can run normally on one system PSU if they desire, but dual PSUs are recommended for
increased fault tolerance.
There are two, replaceable opto-coupler modules on the back of the chassis, labeled as SBxOCPLR. There is one for PSU
slots A and C, and the other is for PSU slots B and D, as indicated on the back of the chassis. These opto-coupler modules
are not hot- swappable and affect the control plane between the CFCs and the PSUs. Each opto-coupler has a green power
LED that is illuminated under normal circumstances. In the event that an opto-coupler module is faulty, the CFCs will not be
able to communicate with the associated PSUs. Therefore, as part of troubleshooting an alarm on the PSUs, the user should
visually inspect the associated opto-coupler on the back of the chassis to ensure that it is functioning.
PSUs can be queried from the CLI using SHOW PSU. PSUs cannot be disabled or enabled but can be created and destroyed.
The CREATE PSU command assumes that slot A and B are for POE type PSUs, and slots C and D are for system PSUs, so the
user doesn't have to specify the PSU type on the command. PSUs can be destroyed from the system database using
DESTROY PSU, but only if they are not physically present. The system will only allow one system PSU to be destroyed under
Software Reference for SwitchBlade x3100 Series Switches
219
Setting Up the Switch
any circumstance, but will allow both POE PSUs to be destroyed if not physically present. PSUs are always auto provisioned
upon insertion regardless of system provisioning mode.
1.15.1.4 Sample Command Output
The following are examples of power supply unit commands.
show psu
--- Power Supply Units --Slot
---A
B
C
D
Type
-----POE
POE
System
System
State
----UP-UP
UP-UP
UP-UP
UP-UP
Temp(C)
------43
47
32
30
show psu full
--- Power Supply Units --Slot............................................................
Type............................................................
State...........................................................
Hardware
Model Number..................................................
Serial Number.................................................
Actual
Temperature...................................................
A
POE
UP-UP-Online
AT-SBxPWRPOE1-10
A043334101100005
43 degrees Celsius
--- Power Supply Units --Slot............................................................
Type............................................................
State...........................................................
Hardware
Model Number..................................................
Serial Number.................................................
Actual
Temperature...................................................
B
POE
UP-UP-Online
AT-SBxPWRPOE1-10
A043334101100003
47 degrees Celsius
--- Power Supply Units --Slot............................................................
Type............................................................
State...........................................................
Hardware
Model Number..................................................
Serial Number.................................................
Software Reference for SwitchBlade x3100 Series Switches
C
System
UP-UP-Online
AT-SBxPWRSYS1-80
A043334101100022
220
Setting Up the Switch
Actual
Temperature................................................... 32 degrees Celsius
--- Power Supply Units --Slot............................................................
Type............................................................
State...........................................................
Hardware
Model Number..................................................
Serial Number.................................................
Actual
Temperature...................................................
D
System
UP-UP-Online
AT-SBxPWRSYS1-80
A043334101100010
30 degrees Celsius
Following is an example of manually destroying and recreating a PSU that is not physically present
show psu a
--- Power Supply Units --Slot..................................
Type..................................
State.................................
Hardware
Model Number........................
Serial Number.......................
Actual
Temperature.........................
A
POE
UP-DN-NotInstalled
<none>
<none>
0 degrees Celsius
PSU Faults
PSU Card Not Present............ Major
officer SEC>> destroy psu a force
Info (010017): Operation Successful
officer SEC>> show psu a
----------------------------------------------------------------------------No information to display from settings provided
----------------------------------------------------------------------------officer SEC>> create psu a
Info (010017): Operation Successful
officer SEC>> show psu a
--- Power Supply Units --Slot..................................
Type..................................
State.................................
Hardware
Model Number........................
Serial Number.......................
Actual
A
POE
UP-DN-NotInstalled
<none>
<none>
Software Reference for SwitchBlade x3100 Series Switches
221
Setting Up the Switch
Temperature......................... 0 degrees Celsius
PSU Faults
PSU Card Not Present............ Major
Software Reference for SwitchBlade x3100 Series Switches
222
Setting Up the Switch
1.15.2 Power Supply Commands
TABLE 1-43
Power Supply Commands
Commands
CREATE PSU
DESTROY PSU
SHOW PSU
Software Reference for SwitchBlade x3100 Series Switches
223
Setting Up the Switch
CREATE PSU
Syntax
CREATE PSU={ A | B | C | D }
Description
Creates the one to four PSUs for the SBx3112
Mode
Manager
Options
Option
Description
Range
Default
Value
PSU
The CREATE PSU command allows the user to create
POE Power Supply Units (PSUs) for preprovisioning.
The CREATE PSU command assumes that slot A and B
are for POE type PSUs, and slots C and D are for system PSUs.
NA
NA
PSUs are always auto provisioned upon insertion
regardless of system provisioning mode. A single POE
PSU that is not receiving power on the back of the unit
is *not* detected as present in the shelf, because POE
power is used to detect POE presence. If a second POE
PSU is added and powered, then the first will appear as
present.
Release Note
NA
Example
CREATE PSU=A
Software Reference for SwitchBlade x3100 Series Switches
224
Setting Up the Switch
DESTROY PSU
Syntax
DESTROY PSU={ A | B | C | D }
Description
Destroys the one to four PSUs for the SBx3112.
Mode
Manager
Options
Option
Description
Range
Default
Value
PSU
The DESTROY PSU command allows the user to
destroy POE Power Supply Units (PSUs). The
DESTROY PSU command assumes that slot A and B are
for POE type PSUs, and slots C and D are for system
PSUs. PSUs can be destroyed from the system database
using DESTROY PSU, but only if they are not physically
present. The system will only allow one system
PSU1200 to be destroyed under any circumstance, but
will allow both POE PSUs to be destroyed if not physically present.
NA
NA
Release Note
NA
Example
DESTROY PSU=B
Software Reference for SwitchBlade x3100 Series Switches
225
Setting Up the Switch
SHOW PSU
Syntax
SHOW PSU [ ={ A | B | C | D | ALL } ] [ FULL ]
Description
Shows the status of the PSUs on the SBx3112.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
PSU
Allow the user to view the configuration an status information of the given PSU. If ALL or no value is provided
with the PSU parameter, a summary view of all PSUs is
displayed.
NA
ALL
FULL
A more detailed output of PSU information is displayed.
NA
NA
NA
Example
manager SEC>> SHOW PSU C FULL
--- Power Supply Units --Slot..................................
Type..................................
State.................................
Hardware
Model Number........................
Serial Number.......................
Actual
Voltage (measured/nominal)..........
Current.............................
Power...............................
Temperature.........................
C
System
UP-UP-Online
AT-SBxPWRSYS1-80
00
12.3/12.0 Volts
278.0 Amps
3419.4 Watts
33 degrees Celsius
1.15.3 System Cooling
1.15.3.1 Introduction
The system fan tray is identified in software as FM4 and is a removable module that consists of:
• Four fans
• Three temperature sensors
• Controller Board
1.15.3.2 Temperature Sensors
There is an additional temperature sensor on the CFC200, monitored for high temperature alarms, and can be queried for
current readings via CLI and SNMP, but is not used to control the fan speeds. There are also temperature sensors on the
PSUs.
Note:
The specific alarm on the CFC200 is “High Temperature” and is described in the Log Manual.
Software Reference for SwitchBlade x3100 Series Switches
226
Setting Up the Switch
1.15.3.3 Temperature and Fan Control
The system controls the fan tray to include reading the IDPROM, monitoring temperature and fan speed, and adjusting the
fan speed. The user cannot change the fan speed settings (There is no support for SET FANMODULE SPEED like on 9100.)
The user can query the fan speeds and temperature readings using CLI and SNMP, the same as with the iMAP products.
Unlike the iMAP products, the fan module cannot be administratively disabled.
The SBx3112 is designed to operate at commercial temperatures over a temperature range from 0-40 degrees Celsius. However, the fan tray on SBx3112 does have a cold temperature shutdown mode which is enabled once the fan sensor drops to
~11C. When enabled, the cold temperature shutdown mode protects the fans by turning them off. The system exits cold
temperature shutdown when the fan sensor rises to ~15C, and the fans resume operation.
1.15.3.4 Example Command Output
The following are examples of SYSTEM COOLING and FANMODULE commands and output. Note that in the case that
temperature sensors can not be read, for example because the card containing the sensor is not physically present, then the
temperature for that sensor would be shown as “Not Available”.
officer SEC>> show system cooling
--- Temperature Sensors --Fan
Fan
Fan
CFC
CFC
PSU
PSU
PSU
PSU
Tray
Tray
Tray
Slot
Slot
Slot
Slot
Slot
Slot
Sensor #1....................
Sensor #2....................
Sensor #3....................
4 ...........................
5 ...........................
A ...........................
B ...........................
C ...........................
D ...........................
31
32
30
40
42
42
42
47
47
Celsius
Celsius
Celsius
Celsius
Celsius
Celsius
Celsius
Celsius
Celsius
--- Fan Module --Fan Module............................
Model Number..........................
Serial Number.........................
State.................................
FM4
AT-SBx31FAN
102
UP-UP-Online
Actual
Fan Speed
Fan 1.............................
Fan 2.............................
Fan 3.............................
Fan 2.............................
Cold Temperature Shutdown...........
2685
2724
2702
2690
Off
rpm
rpm
rpm
rpm
officer SEC>> show fanmodule
Software Reference for SwitchBlade x3100 Series Switches
227
Setting Up the Switch
--- Fan Module --Fan Module............................
Model Number..........................
Serial Number.........................
State.................................
FM4
AT-SBx31FAN
102
UP-UP-Online
Actual
Fan Speed
Fan 1.............................
Fan 2.............................
Fan 3.............................
Fan 2.............................
Cold Temperature Shutdown...........
2685
2724
2702
2690
Off
rpm
rpm
rpm
rpm
1.15.3.5 High Temperature Alarms
The SBx3112 system raises high temperature alarms against individual components that cross a high temperature threshold.
The thresholds are as follows:
TABLE 1-44
High Temperature Alarm Thresholds
Component
Alarm is Raised (Celsius)
Alarm is Cleared (Celsius)
CFC
70
65
FAN
55
50
PSU
50
45
Note:
The FAN alarm is based on the highest reading of the three temperature sensors on the fan module.
Software Reference for SwitchBlade x3100 Series Switches
228
Setting Up the Switch
1.15.4 System Cooling Commands
TABLE 1-45
System Cooling Commands
Commands
DISABLE FANMODULE
ENABLE FANMODULE
SHOW FANMODULE
SHOW SYSTEM COOLING
Software Reference for SwitchBlade x3100 Series Switches
229
Setting Up the Switch
DISABLE FANMODULE
Syntax
DISABLE FANMODULE
Description
Changes the ADMINSTATE of the system fan module to DOWN. The operational state remains UP
and the fan module continues to operate. Use of this command is recommended before physically
removing the module.
Mode
Manager
Options
NA
Release Note
NA
Example
DISABLE FANMODULE
Software Reference for SwitchBlade x3100 Series Switches
230
Setting Up the Switch
ENABLE FANMODULE
Syntax
ENABLE FANMODULE
Description
Changes the ADMINSTATE of the system fan module to UP. The operational state remains UP and the
fan module continues to operate.
Mode
Manager
Options
NA
Release Note
NA
Example
ENABLE FANMODULE
Software Reference for SwitchBlade x3100 Series Switches
231
Setting Up the Switch
SHOW FANMODULE
Syntax
SHOW FANMODULE
Description
Displays various information about the system fan module, including: - dynamic state attributes alarms and defect conditions - current fan speeds.
Mode
User
Options
NA
Release Note
NA
Example
>SHOW FANMODULE
--- Fan Module --Fan Module............................
Model Number..........................
Serial Number.........................
State.................................
FM4
AT-SBxFAN
8
UP-UP-Online
Actual
Fan Speed
Fan 1.............................
Fan 2.............................
Fan 3.............................
Fan 4.............................
Cold Temperature Shutdown...........
2428
2450
2435
2413
Off
Software Reference for SwitchBlade x3100 Series Switches
rpm
rpm
rpm
rpm
232
Setting Up the Switch
SHOW SYSTEM COOLING
Syntax
SHOW SYSTEM COOLING
Description
Displays various information about shelf temperature and fan conditions. Information includes: - current readings of the shelf temperature sensors - any current faults related to the temperature sensors
- fan module information including dynamic state attributes, alarms and defect conditions, and current
fan speeds (the same information as the SHOW FANMODULE output).
Mode
User
Example
>SHOW SYSTEM COOLING
--- Temperature Sensors --Fan
Fan
Fan
CFC
CFC
PSU
PSU
PSU
PSU
Tray
Tray
Tray
Slot
Slot
Slot
Slot
Slot
Slot
Sensor #1....................
Sensor #2....................
Sensor #3....................
4............................
5............................
A............................
B............................
C............................
D............................
27 Celsius
29 Celsius
28 Celsius
not available
42 Celsius
not available
38 Celsius
42 Celsius
not available
--- Fan Module --Fan Module............................
Model Number..........................
Serial Number.........................
State.................................
FM4
AT-SBxFAN
8
UP-UP-Online
Actual
Fan Speed
Fan 1.............................
Fan 2.............................
Fan 3.............................
Fan 4.............................
Cold Temperature Shutdown...........
2428
2448
2433
2412
Off
Software Reference for SwitchBlade x3100 Series Switches
rpm
rpm
rpm
rpm
233
Setting Up the Switch
1.16 Basic Provisioning of Cards and Ports
1.16.1 Introduction
Provisioning for any SBx3112 means to query and control the configuration database, and involves the following:
• Provisioning Data - The provisioning data itself, which consists of:
• States - These determine whether the card or port can be placed in service and if so whether it can process data.
• Attributes - These are the characteristics of the card or port, usually to optimize the processing of data.
• Management Configuration - These are all the settings that allow the SBx3112 to communicate to management interfaces, and have been described in Section 3.
The provisioning data is stored in the CFC and can be retrieved and backed up when necessary, usually during a software
upgrade, described in Section 5.
• Persistence - This is the ability of the provisioning data to survive changes such as a reboot of the shelf or the removal
of a card.
• Pre-provisioning - The user has the option of creating a card and having it in the database prior to inserting the card.
1.16.2 Feature List
TABLE 1-46
Feature for the Provisioning of Modules
Feature
Description
Refer to
Module Configuration
Which modules are compatible with the ATI products
1.16.3
Provisioning Modes
Manual (PROVMODE = MANUAL) versus Automatic (PROVMODE = AUTO)
Provisioning Modes
1.16.4
User-Created Profiles
The user can modify the AutoProv profile provided for each card type or
port type (called a managed entity). User-created profiles are also possible,
1.16.5
AlliedView NMS Profile
Support
The NMS profile is displayed as an external profile with the SHOW INTERFACE command. If a port is de-provisioned at the NMS, the output for the
External Profile is set to None.
1.17.4
Administrative and operational States
The combination of the two determines whether the card or port is available
for service and, if available for service, whether it is being provided
1.17.5
Software Loads
The attributes of the load and how they determine module behavior, especially
during an upgrade.
1.10
Line Card Attributes
Attributes common to all Line Cards
1.17.6
XE4 Attributes
Attributes common to XE4 cards
1.17.7
1.16.3 Feature / Component Interaction
The components for the SBx3112 interfaces are divided into Service Modules and Control Modules.
Note:
This table includes the ATN code where applicable to specify the card. For more information on these cards,
especially model numbers and compatible releases, refer to the Allied Telesis Component Specification.
Controlling these components is done through the use of profiles, operational states, and provisioning modes, as explained
below.
Software Reference for SwitchBlade x3100 Series Switches
234
Setting Up the Switch
TABLE 1-47
Detail
Minimum
Software
Release
SBx3112-00
SBx3112-00 Chassis Group
NA
SBx3106-00
SBx3112-00 Chassis Group
17.0
Component
Type
Component
Chassis
Cooling and
Power
Line Cards
Control
SBx3100 Cards
Model Number
FM4 (SBx3112)
SBxFAN12
Fan Controller
NA
FM2 (SBx3106)
SBxFAN06
Fan Controller
17.0
PoE Power Supply
AT-SBxPWRPOE1-xx
Up to two PSUs for Power over Ethernet
(PoE).
NA
System Power Supply AC
AT-SBxPWRSYS1-xx
Up to two PSUs for 12V system power
NA
System Power Supply DC
AT-SBxPWRSYS1-80
Up to two PSUs for 12V system power
15.1
GE24POE
SBx31GP24
10/100/1000M with PoE
14.1
XE4
SBx31XZ4
XFP-based 10G interface
14.1
GE24SFP
SBx31GS24
SFP-based 1G interface
14.2
GE24RJ
SBx31GT24
10/100/1000M without PoE
15.0
XE6SFP
SBx31XS6
SFP+-based 10G interface
15.1
GE40CSFP
SBx31GC40
SFP-based 1G interface (Compact)
16.0
GE40RJ
SBx31GT40
10/100/1000M without PoE
17.0
CFC200
SBx31CFC
Provides 200G in load sharing mode, so
in duplex provides 400G throughput.a
14.1
Full-height
NA
Modules
Filler Plate
FPF
a. In the SBx3106, the CFC200 must be configured with Release 17.x.
1.16.4 Provisioning Modes
1.16.4.1 Manual Provisioning Mode (PROVMODE = MANUAL)
In this mode, commands are used to create, modify, or delete the provisioning data. The data is persistent over reboots and
restarts of the Allied Telesis system and the removal of the card. (To delete a card, the user must explicitly do so with the
DESTROY CARD command.)
Important to note is that insertion of a card when in the Manual Provisioning Mode does not create/provision the card in the
database; this must be done using the CREATE command.
1.16.4.2 Automatic Provisioning Mode (PROVMODE = AUTO)
In the AUTO mode, hardware is discovered in a slot where there is no prior provisioning and the cards and ports are automatically provisioned. This discovery occurs when:
Software Reference for SwitchBlade x3100 Series Switches
235
Setting Up the Switch
• The card is inserted into a slot (this would not apply to a CM in a simplex system since it is in simplex mode).
• The Network or Service Module is already inserted and the following occurs:
• The Control Module powers up
• The Control Module reboots
• The system mode is changed from manual to automatic.
Similar to the Manual Provisioning Mode, commands are used to create, modify, or delete provisioning data, and data is persistent over reboots/restarts of the system and the removal of the card.
Note:
The default mode for the Allied Telesis series products is Automatic Provisioning Mode (PROVMODE=AUTO), and
the mode can be changed through commands
Note:
Once the user has set the PROVMODE to MANUAL, the user must explicitly provision Allied Telesis Series
modules and ports using CLI commands. It is recommended that the default AUTO mode be used.
1.16.4.3 The AUTOPROV Profile
When the system is first initialized, the system’s PROVMODE is set to AUTO, and all modules come up with the profile name
AUTOPROV.
Note:
Modification of a profile does not change the attributes of a card/port that has already been provisioned.
1.16.4.4 Provisioning Data at Startup
When the system is first brought up, it is configured as follows:
•
•
•
•
The Provisioning Mode is set to AUTO (PROVMODE=AUTO)
All modules and ports use the AUTOPROV profile
The AUTOPROV profile is set to the factory defaults.
The Administrative State of all modules and ports is UP, and the Operational State is set to UP if the module/port can
process data.
1.16.4.5 Provisioning Mode (SHOW SYSTEM PROVMODE)
Use this command to view whether the Provisioning Mode is MANUAL or AUTO.
officer SEC> SHOW SYSTEM PROVMODE
System is in AUTO provisioning mode
1.16.5 Custom Profiles
The user can modify the AutoProv profile provided for each card type or port type (called a managed entity). User-created
profiles are also possible, and these profiles have the following attributes:
• Profile Creation
Profiles are created with the CREATE PROFILE command.
Profile names must be unique within a type; they are case insensitive.
• Applying Profiles to Managed Entities
Configuration settings of a Profile are applied to managed entities when requested at the CLI as long as the Profile and
entities define the same type.
Software Reference for SwitchBlade x3100 Series Switches
236
Setting Up the Switch
Configuring a User Profile
If a profile is applied to a managed entity and the user manually changes an attribute of the managed entity, the managed
entity keeps it reference to the Profile but indicates that it no longer matches the Profile.
If a Profile is modified, all managed entities using the Profile indicate their provisioning no longer matches the profile.
An entity must be disabled before a different Profile can be applied.
A profile controls the attributes of the entity, but not the state.
• Destroying User Profiles
Any user-created Profile can be destroyed (unlike AutoProv, which can never be destroyed).
If a Profile that has been applied to managed entities is destroyed, the managed entity has no Profile (this shows up as
<none>).
• Command Changes for Profile Names
One of the main change to existing commands is that the SHOW PROFILE NAMES command has changed to SHOW PROFILE=name for card and port types.
The set of commands used to create, change, and destroy profiles is not that large; however, for each type there are different parameters since each type has different attributes.
1.17 Configuring a User Profile
1.17.1 Default Configuration
When an SBx3112 switch is initially booted up, Profiles will be configured as follows:
• All card profiles are set to AUTOPROV
• ALL port profiles are set to AUTOPROV
1.17.2 Configuration Guidelines
Any profiles that are created, changed, or destroyed, are persistent; this means the following:
• Reboot - Any changes made to profiles survive a system reboot
• Redundancy - The profile settings are mirrored in both CFCs, and so survive an activity switch.
• Upgrade - The profile settings survive over an upgrade (not relevant for release 6.0).
Note:
Although the user can SET a Profile, this does not mean that profile can be applied successfully. General checks are
done on the profile, but some checks cannot be done until the user tries to apply the profile to an entity.
To associate an interface with a profile, the interface must be disabled.
1.17.3 Configuration Procedure
The following procedure walks through all of the steps needed to create a user profile
Note:
In the outputs below, the response may be abbreviated if it does not add to the concepts being explained. Removed
output is shown with an extended dotted line (...............................)
Software Reference for SwitchBlade x3100 Series Switches
237
Setting Up the Switch
Configuring a User Profile
TABLE 1-48
Step
Configuration Procedure for User profile
Command
Description
Show the cards in the SBx3112
1
SHOW CARD
--- Card Information --Slot
----0
1
2
3
4
5
6
7
8
9
10
11
Prov
Card Type
--------GE24POE
GE24POE
GE24POE
CFC200
CFC200
GE24POE
GE24POE
GE24POE
GE24SFP
XE4
XE4
State
---------------------------------------DN-DN-NotInstalled
DN-DN-NotInstalled
DN-DN-NotInstalled
UP-UP-Online (Active)
UP-UP-Online (Inactive)
DN-DN-NotInstalled
DN-DN-NotInstalled
UP-UP-Online
DN-DN-NotInstalled
UP-UP-Online
UP-UP-Online
Faults
-----Info
Info
Info
Info
Info
Info
-
Show the Profiles that exist. If no profiles have been created, the are all AUTOPROV.
2
SHOW PROFILE NAMES
--- Card Profiles --Name
-------------------------------AutoProv
AutoProv
AutoProv
AutoProv
Type
---------CFC200
GE24POE
GE24SFP
XE4
--- Port Profiles --Name
-------------------------------AutoProv
AutoProv
Type
------GEPORT
XEPORT
Show the AUTOPROVattributes for a specific port.
3
>SHOW PROFILE AUTOPROV=GE
--- Gigabit Ethernet Port Profiles --Name...............................
Type...............................
Initial Admin State................
Auto Negotiation...................
Speed..............................
Duplex.............................
Flow Control.......................
AutoProv
GEPORT
Up
On
Auto
Auto
Auto
Create a Profile, gold, where all of the attributes are the same except for FLOWCONTROL. This is added to the Port
Profiles.
Software Reference for SwitchBlade x3100 Series Switches
238
Setting Up the Switch
Configuring a User Profile
TABLE 1-48
Configuration Procedure for User profile
Step
Command
Description
4
>CREATE PROFILE=GOLD GEPORT FLOWCONTROL=ON
Info (033561): Successfully created profile(s) GOLD
>SHOW PROFILE NAMES
--- Card Profiles --............................................
--- Port Profiles --Name
-------------------------------AutoProv
GOLD
AutoProv
Type
-------GEPORT
GEPORT
XEPORT
Associate an interface with the profile. (If necessary, disable the interface first.)The interface now has the profile attributes.
5
>SET INTERFACE=8.0 PROFILE=gold
>SHOW INTERFACE=8.0
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
8.0
GE
UP-DN-Dependency
<none>
<none>
<none>
GE24POE
Provisioning
Provisioning Profile............ gold
Direction....................... Customer
..........................
1.17.3.1 Creating an Entity
When creating a card, the user has the option to CREATE the card and associate it with a Profile. If the user does not include
a Profile (that exists), the card and its associated entities (interfaces) will have <none> as the associated Profile.
>CREATE CARD=3 GE24POE
>SHOW INTERFACE 3.0
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
3.0
GE
UP-DN-Dependency
<none>
<none>
<none>
GE24POE
Provisioning
Provisioning Profile............ <none>
Direction....................... Customer
------------------------------------
The user could now create a new Profile (silver) with changed attributes, and SET the interface (3.0) to this Profile. As a
result, the interface will be associated with the silver profile and have its attributes.
>CREATE PROFILE SILVER GEPORT FLOWCONTROL=ON
Info (033561): Successfully created profile(s) SILVER
>SHOW PROFILE NAMES
Software Reference for SwitchBlade x3100 Series Switches
239
Setting Up the Switch
Configuring a User Profile
--- Card Profiles ---------------------------------------- Port Profiles --Name
-------------------------------AutoProv
SILVER
AutoProv
Type
---------GEPORT
GEPORT
XEPORT
>SET INTERFACE 3.0 PROFILE=SILVER
>SHOW INTERFACE=3.0
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
3.0
GE
UP-DN-Dependency
<none>
<none>
<none>
GE24POE
Provisioning
Provisioning Profile............ SILVER
Direction....................... Customer
1.17.3.2 Setting an Interface to No Profile
If the user wishes to disassociate an entity with any Profile, two double quotes are used. Whatever profile the entity was
associated with is dropped and the entity has <none> for a Profile association.
>SET INTERFACE 3.0 PROFILE=""
Info (020186): Successfully modified interface(s) 3.0
>SHOW INTERFACE=3.0
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
3.0
GE
UP-DN-Dependency
<none>
<none>
<none>
GE24POE
Provisioning
Provisioning Profile............ <none>
Direction....................... Customer
----------------------------------
1.17.4 AlliedView NMS Profile Support
1.17.4.1 Overview
The AlliedView NMS product also has a profile feature, but at a network service level; a profile is created for a card type or
port type, and can then be applied to multiple interfaces over multiple devices. Moreover, profiles can include a more global
set of attributes, such as traffic and performance management attributes. Finally, the profiles are filled out using pull-down
menus and GUIs, ensuring there is less chance of error.
Note:
Refer to the AlliedView NMS Administration Guide for a complete description of profiles.
Software Reference for SwitchBlade x3100 Series Switches
240
Setting Up the Switch
Configuring a User Profile
When the NMS sets the port attributes by deploying an NMS profile, the SHOW INTERFACE command on the SBx3112 displays the NMS profile name that has been applied as an External Profile name. Moreover, if at the NMS a port is deprovisioned, the product output for External Profile is set to None.
1.17.4.2 Feature Operation
• NMS profile names can be set against any root interface of a card or any interface that can be dynamically created after a
card is provisioned. Interfaces include ETH (for XE4, GE24POE, and GE24SFP) and any future interfaces.
• LAG interfaces are explicitly excluded from support by this feature as they have no corresponding profile in the NMS.
These interfaces reject NMS profile name setting.
• If the profile name associated with an interface is changed at the NMS, the NMS updates the product to ensure that
NMS and product are in sync with regard to the profile name.
• If, at the NMS, a new profile is applied to a given collection of interface, the NMS automatically updates the product.
• The profile settings exist at the CLI to ensure that the profile name survives in a text configuration-based restore. As a
result, users have the ability to override the NMS profile name at the product. This results in mismatch notifications at the
NMS when the NMS rediscovers the device. The user at the NMS can then redeploy the NMS profile and reset the External Profile name to the NMS Profile name.
• The NMS profile name has a maximum of 50 characters, and rejects a profile name of ‘None’. (Refer to the AlliedView
NMS Administration Guide for a complete description of Profile naming conventions.)
The SET INTERFACE EXTERNALPROFILE supports the specification of an external profile name on an interface.
Note:
In most circumstances, the user should not manually change the External Profile name.
>SHOW INTERFACE=10.0
--- XE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
10.0
XE
UP-UP-Online
<none>
<none>
gold
XE4
Provisioning
Provisioning Profile............ AutoProv
Flow Control.................... Off
Remote Monitoring............... Off
Actual
Direction....................... Network
............
1.17.5 Administrative and Operational States
1.17.5.1 Overview
Administrative and Operational States determine whether the card or port is available for service and, if available for service,
whether it is being provided:
• The Administrative State is controlled by the user and can be set to either UP (available for service) or DOWN (Not
available for service). Control of this state is through the ENABLE/DISABLE command.
• The Operational State is either UP (providing service) or DOWN (not providing service). This state is not user controllable but does depend on the Administrative State:
• If the Administrative State of a card is UP, the Operational State will be UP if the card/port can provide service.
• If the Administrative State is DOWN, the Operational State will always be DOWN.
Software Reference for SwitchBlade x3100 Series Switches
241
Setting Up the Switch
Configuring a User Profile
1.17.6 Common Line Card Attributes
The attributes for a Line Card are shown in the display for the SHOW CARD <slot number> command.
Following is the output for the command. Table 1-49 describes the attributes and states that are common for Ethernet cards.
E134 - officer SEC>>>> show card 3
--- Card Information --Slot...............................
Type...............................
State..............................
Provisioning Profile...............
3
GE24POE
UP-UP-Online
AutoProv (*)
Hardware
Model Number (Revision)......... AT-SBx24POE (Rev X6)
Serial Number................... 17
CLEI Code....................... <none>
Software
Running Load.................... 14.2.0.dhays.20100325
Preferred Load.................. ge24poe_14.2.0.dhays1.20100325.tar
Temporary Load.................. <none>
.
TABLE 1-49
Common Line Card Attributes - Defaults are in Bold)
Card Attribute
Values / Range
Description
Slot
Slot Number
The slot number occupied by the card
Type
Depends on the card type
The type of card
Software Reference for SwitchBlade x3100 Series Switches
242
Setting Up the Switch
Configuring a User Profile
TABLE 1-49
Common Line Card Attributes - Defaults are in Bold) (Continued)
Card Attribute
Values / Range
Description
State
Three attributes:
These three attributes determine the state of the
card; whether it is capable of carrying traffic and the
status (Implied Operational Status)
- Admin State
- Operational State
- Status
ONLINE - Card is configured and can provide service. (UP)
DEGRADED - There is a fault but the card can still
provide service (UP)
OFFLINE - The normal status when a card is in a
DOWN state. The card requires a routine operation
to place it ONLINE and available for service.
(DOWN)
FAILED - The card has detected a hardware or software fault that makes it unable to provide service.
(DOWN)
NOT INSTALLED - Card is provisioned in software
(CREATE) but not physically present (DOWN)
RESET - transient state as card resets (DOWN)
LOADING - The software load is being transferred
from the CFC to the flash memory in the card.
(DOWN)
Note:
A percentage number for loading is
included. Once at 100%, there may
still be a delay so that the transfer of
software to the card is complete.
BOOTING - The software load is being copied from
the flash memory into its RAM memory. (DOWN)
IN TEST - Card is running diagnostics (DOWN)
CONFIGURING - Provisioning data for he card is
being copied from the CFC to the RAM memory on
the card. (DOWN)
TERMINATING - The card is performing an operation in preparing to go out of service. (UP or
DOWN)
Provisioning Profile
Profile that has been applied to
the card and if there is a Profile
mismatch.
If there is a status mismatch, a (*) appears next to
the Profile Name. Refer to 1.16.5.
Hardware
Model Number
The TN number for card type
Serial Number
The unique serial number for the card
CLEI Code
The CLEI code, if the card has one.
Running
Refer to 1.10.
Preferred SW Load
Preferred SW Load
Temporary SW Load
Software Reference for SwitchBlade x3100 Series Switches
243
Setting Up the Switch
Configuring a User Profile
1.17.7 XE4 Card Attributes
The only common attribute for XE4 cards is the ADMIN STATE (UP or DOWN).
Note:
If the user sets the Administrative State of the NM card to DOWN (using the DISABLE command with the FORCE
option) and there is only one NM provisioned, upstream data service is lost for the SBx3112.
Following are the outputs for the Network Interfaces. (For details on the DIRECTION attribute, refer to 2.2.)
E134 - officer SEC>>>> SHOW INTERFACE DIRECTION=NETWORK
--- GE Interfaces --Interface
----------3.22
3.23
10.16
10.17
State
----UP-UP
UP-UP
UP-UP
UP-UP
Autonegotiate
------------On
On
On
On
Flow Control
-----------Off
Off
On
On
Duplex
-----Full
Full
Full
Full
Speed
-------1 Gbps
1 Gbps
1 Gbps
1 Gbps
Direction
--------Network
Network
Network
Network
--- XE Interfaces --Interface
----------0.0
0.1
0.2
0.3
2.0
2.1
2.2
2.3
State
----UP-UP
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
Flow Control
-----------Off
Off
Off
Off
Off
Off
Off
Off
Direction
--------Network
Network
Network
Network
Network
Network
Network
Network
--- General Interfaces --Interface
--------------ETH:0
LAG:0
LAG:1
State
----UP-UP
UP-UP
UP-UP
Name
---------MGMT
l1
l2
Software Reference for SwitchBlade x3100 Series Switches
244
Setting Up the Switch
Configuring a User Profile
1.17.8 Card Management Commands
TABLE 1-50
Card Management Commands
Commands
CREATE CARD card_type
CREATE PROFILE cardtype
DESTROY CARD
DESTROY PROFILE
DISABLE CARD
ENABLE CARD
RESTART CARD
RESTART SYSTEM
RESTART SYSTEM
SET CARD PROFILE
SET PROFILE CARD_TYPE
SET SYSTEM
SHOW CARD
SHOW CARD MEMORY
SHOW PROFILE
SHOW SYSTEM PROVMODE
SWAP ACTIVITY
Software Reference for SwitchBlade x3100 Series Switches
245
Setting Up the Switch
Configuring a User Profile
CREATE CARD CARD_TYPE
Syntax
CREATE CARD=slot card_type [{[PREFLOAD=filename] [ADMINSTATE={UP|DOWN}]| PROFILE=name}]
Description
Creates software provisioning for a card in a specific slot. A CARD is a field replaceable module that
occupies a slot. The ports on the specified card are automatically provisioned when the card is provisioned.
Mode
Manager
Note
Control and Fan Modules are automatically provisioned during system startup and are not affected by
the CREATE CARD command.
At minimum, when creating a card, the user must specify the slot number and the card type. If no
other parameters are entered, the card and its ports are provisioned using default values. If the card
auto provisioning profile is specified, then all card attributes are set to the values in the card auto provisioning profile and all port attributes are set to the values in the port auto provisioning profile. PROFILE specifies the name of the profile used to provision the card. The contents of a profile can be
displayed (SHOW PROFILE) and changed (SET PROFILE).
Options
Option
Description
Range
Default
Value
Card
The slot for the card. Refer to 1.16.1 for which cards
can be provisioned in which slots.
NA
NA
card_type
The type of card. For the SBx3112, the allowed card
types are GE24POE, GE24RJ, GE24SFP, and XE4.
NA
NA
PREFLOAD
Specifies the name of the preferred software load file for
the card. This file must reside on the CFC flash file system, and is loaded to the flash memory on the card (if
it's not already there) when the card is enabled or reset.
The command is rejected if the preferred software load
specified is not compatible with the specified card.
NA
NA
ADMINSTATE
The initial administrative state for the card. The administrative state reflects the user's intent on having the card
available for service (ready to process data).
NA
NA
PROFILE
A profile contains a set of pre-defined provisioning attributes. The contents of a profile can be displayed
(SHOW PROFILE) and changed (SET PROFILE).
NA
NA
Release Note
NA
Example
CREATE Card=2 GE24POE
Software Reference for SwitchBlade x3100 Series Switches
246
Setting Up the Switch
Configuring a User Profile
CREATE PROFILE CARDTYPE
Syntax
CREATE PROFILE=name cardtype [ PREFLOAD=filename ]
[ ADMINSTATE={ UP | DOWN } ]
Description
Creates a profile for the specified card type. Attributes required are usually the PREFLOAD and
ADMINSTATE.
Mode
Manager
Options
Option
Description
Range
Default
Value
PROFILE
A profile contains a set of pre-defined provisioning attributes. The contents of a profile can be displayed
(SHOW PROFILE) and changed (SET PROFILE).
NA
NA
card_type
The type of card. For the SBx3112 the cards supported
are GE24POE, GE24RJ, GE24SFP, and XE4.
NA
NA
PREFLOAD
Specifies the name of the preferred software load file for
the card. This file must reside on the CFC flash file system, and is loaded to the flash memory on the card (if
it's not already there) when the card is enabled or reset.
The command is rejected if the preferred software load
specified is not compatible with the specified card.
NA
NA
ADMINSTATE
The initial administrative state for the card. The administrative state reflects the user's intent on having the card
available for service (ready to process data).
NA
NA
Release Note
NA
Example
CREATE PROFILE=GOLD GE24POE ADMINSTATE=UP
Software Reference for SwitchBlade x3100 Series Switches
247
Setting Up the Switch
Configuring a User Profile
DESTROY CARD
Syntax
DESTROY CARD=slot-list [FORCE]
Description
Removes software provisioning for the specified card or list of cards. The command fails if the administrative state for each card has not already been set to DOWN (See DISABLE CARD). A warning is
provided for this command and confirmation is required.
Mode
Manager
Options
Option
Description
Range
Default
Value
FORCE
Suppress.es the warning and bypasses the confirmation
NA
NA
Release Note
NA
Example
DESTROY CARD=2 GE24POE
Software Reference for SwitchBlade x3100 Series Switches
248
Setting Up the Switch
Configuring a User Profile
DESTROY PROFILE
Syntax
DESTROY PROFILE=name cardtype
Description
Destroys a profile for the specified card type. No other attributes are required. Any managed entity
that had a Profile applied is set to (no profile association).
Mode
Manager
Options
Option
Description
Range
Default
Value
card_type
The type of card. For the SBx3112 the cards supported
are GE24POE, GE24RJ, GE24SFP, and XE4.
NA
NA
Release Note
NA
Example
DESTROY PROFILE=GOLD GE24POE
Software Reference for SwitchBlade x3100 Series Switches
249
Setting Up the Switch
Configuring a User Profile
DISABLE CARD
Syntax
DISABLE CARD={slot-list|INACTCFC} [FORCE]
Description
Takes a card out-of-service and sets the card's administrative state to DOWN. A list or range of slots
is accepted. It is recommended that the user disable the card before physically removing it from the
slot. The DISABLE CARD command is disallowed for the slot containing the active CFC card. A confirmation is provided before the card is taken out-of-service.
Mode
Manager
Note
For the GE24POE, disabling the card will cause power to be disabled for all affected ports. However, it
will not change the admin state of the PoE feature for those ports, only the operational state. Refer to
DISABLE POE INTERFACE.
Options
Option
Description
Range
Default
Value
CARD
The slot number or list of slot numbers separated by a
comma.
NA
NA
INACTCFC
For a dual CFC, the inactive one.
NA
NA
NA
NA
Caution; the CFCs operate in load-sharing mode, disabling one of the CFCs will mean a reduction in traffic
capacity.
FORCE
The confirmation message is suppressed.
Release Note
NA
Example
DISABLE CARD=2
Software Reference for SwitchBlade x3100 Series Switches
250
Setting Up the Switch
Configuring a User Profile
ENABLE CARD
Syntax
ENABLE CARD={slot-list|INACTCFC} [NODIAGS] [VERBOSE]
Description
Changes the administrative state of the specified card to UP, making it available for service. A list or
range of slots is accepted. During the enable sequence, several steps are performed to initialize the
card and return it to service, such as card reset, hardware/software version compatibility checking,
reloading of the card if applicable and necessary, booting the software load if applicable, running out of
service diagnostics if applicable, sending card configuration data, and initiating defect monitoring on the
card.
If any of the ports on the card are in the enabled state (administrative state set to UP), they are also
initialized. Initialization steps for ports include configuration of enabled ports on the card, initiation of
defect monitoring on the port.
Mode
Manager
Options
Option
Description
Range
Default
Value
CARD
The slot number or list of slot numbers separated by a
comma.
NA
NA
INACTCFC
For a dual CFC, the inactive one. This will bring the card
into service so it may begin traffic load sharing.
NA
NA
NODIAGS
Signifies that out of service diagnostics will not run during the enable sequence. Out of service diagnostics are
run by default unless this parameter is provided.
NA
NA
VERBOSE
Lists the change in card status as the card is enabled.
(Logs, however, are always produced even if this option
is not used.)
NA
NA
Release Note
NA
Example
ENABLE CARD=2
Software Reference for SwitchBlade x3100 Series Switches
251
Setting Up the Switch
Configuring a User Profile
RESTART CARD
Syntax
RESTART CARD={ slot-list | INACTCFC | ACTCFC } [ COLD ] [ FORCE ]
Description
Performs a restart of the software running on the specified card. For the active CFC card, the entire
system is affected and all cards are restarted.
Mode
Manager
Options
Option
Description
Range
Default
Value
CARD
The slot number of the card(s) to be reset. The list must
not include the slots for the ACTCFC or INACTCFC
NA
NA
INACTCFC
The inactive CFC as determined by the system.
NA
NA
ACTCFC
For a dual CFC, the inactive CFC as determined by
NA
NA
NA
NA
NA
NA
the system. Otherwise the single active CFC
COLD
For the active CFC card, a COLD restart - resets the
CFC and all other cards in the shelf - reboots and re initializes the software on the CFC - runs out of service
diagnostics on the CFC if previously scheduled through
use of the DIAGNOSE CARD command - reloads configuration data from the system database - manages
recovery of the remaining cards in the shelf
For the inactive CFC card, a COLD restart - changes
the operational state to DOWN, if not already DOWN
- performs a hardware reset on the card - reboots and
re initializes the software - runs out of service diagnostics - reloads configuration data - restores the operational state to UP if the administrative state is UP,
including data initialization and initiation of defect monitoring
FORCE
Performs the reset without the confirmation message.
Release Note
NA
Example
RESTART Card=INACTCFC COLD FORCE
Software Reference for SwitchBlade x3100 Series Switches
252
Setting Up the Switch
Configuring a User Profile
RESTART SYSTEM
Syntax
RESTART SYSTEM [ FORCE ]
Description
Restarts the system. If the command is executed on a duplex system, avoiding the requirement to
restart both the ACTCFC and INACTCFC.
Mode
Manager
Options
Option
Description
Range
Default
Value
FORCE
Performs the reset without the confirmation message.
NA
NA
Release Note
NA
Example
RESTART SYSTEM
Software Reference for SwitchBlade x3100 Series Switches
253
Setting Up the Switch
Configuring a User Profile
SET CARD
Syntax
SET CARD={slot-list|ACTCFC|INACTCFC}
{PREFLOAD={filename|NONE}|
ALTLOAD={filename|NONE}|
TEMPLOAD={filename|NONE}}
Description
The SET CARD command modifies the provisioning attributes for the specified card or list of cards.
The administrative state is modified through the ENABLE CARD or DISABLE CARD commands, so
the only provisioning attributes that are modifiable with the SET CARD command relate to software
load file preferences. Therefore, this command is only used during software load changes to set software load preferences for cards.
Mode
Manager
Options
Option
Description
Range
Default
Value
CARD
The slot number of the card(s) to be modified.
NA
NA
PREFLOAD
Specifies the name of the preferred software load file for
the card. This file must reside on the CFC flash file system, and is loaded to the flash memory on the card (if
it's not already there) when the card is enabled or reset.
Refer to 1.8.1 on software loads.
NA
NA
Setting of PREFLOAD is not allowed for the inactive
CFC; it obtains its prefload settings from the active
CFC.
ALTLOAD
The ALTLOAD is used when a redundant copy of the
preferred load file is made on the CM FLASH file system; it specifies an alternate load preference for the
redundant file. Establishing an alternate load provides a
backup in the unlikely event that the preferred load file
cannot boot.
NA
NA
TEMPLOAD
A load designated as TEMPLOAD indicates that this
is the load that the specified card will load from, one
time, during the next loading process. The TEMPLOAD designation is used during the software upgrade
procedure.
NA
NA
Release Note
NA
Example
SET CARD=ACTCFC PREFLOAD=cfc200_14.1.0.GAMMA.20100303.tar
Software Reference for SwitchBlade x3100 Series Switches
254
Setting Up the Switch
Configuring a User Profile
SET CARD PROFILE
Syntax
SET CARD=slot-list PROFILE=name
Description
Modifies the provisioning attributes for the specified card or list of cards. The administrative state is
modified through the ENABLE CARD or DISABLE CARD commands, so the only provisioning attributes that are modifiable with the SET CARD command relate to software load file preferences.
Therefore, this command is only used during software load changes to set software load preferences
for cards.
Mode
Manager
Options
Option
Description
Range
Default
Value
CARD
The slot number of the card(s) to be reset. The list must
not include the slots for the ACTCFC or INACTCFC.
NA
NA
PROFILE
The name of an already created Profile
NA
NA
Release Note
NA
Example
SET CARD=2,3 PROFILE=SILVER
Software Reference for SwitchBlade x3100 Series Switches
255
Setting Up the Switch
Configuring a User Profile
SET INTERFACE EXTERNALPROFILE
Syntax
SET INTERFACE={ type: | type:id-range | id-range | ifname-list | ALL }
EXTERNALPROFILE={ profile | NONE }
Description
Supports the specification of an external profile name on an interface. When the AlliedView NMS sets
the port attributes by deploying an NMS profile, the SHOW INTERFACE command on the product displays the NMS profile name that has been applied as an External Profile name. Moreover, if at the
NMS a port is deprovisioned, the product output for External Profile is set to None.
When the SBx3112 is managed by the NMS, this command should not be used.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The interface that will have the external profile.
NA
NA
EXTERNALPROFILE
Used to identify the name of a profile associated with
the interface that is external to the SBx3112, such as the
NMS. This parameter is used by external management
systems to identify the profile specified by the management system. The profile name can then be used by CLI
users to correlate external configuration settings with
interfaces.
NA
NA
Release Note
NA
Example
SET INTERFACE=8.* EXTERNALPROFILE=GE24POE_ClassA
Software Reference for SwitchBlade x3100 Series Switches
256
Setting Up the Switch
Configuring a User Profile
SET PROFILE CARD_TYPE
Syntax
SET PROFILE=name card_type [PREFLOAD=filename] [ADMINSTATE={UP|DOWN}]
Description
Modifies provisioning attributes for the profile specified by name and component type. A profile for a
component is similar to a template, since it contains a set of pre-defined provisioning attributes. Usercreated Profiles and the name AutoProv are supported, which signifies the auto provisioning profile.
The auto provisioning profile is used by the system when cards and ports are discovered during card
insertion or system startup. The auto provisioning profile can also be manually applied to an already
provisioned card or port using the SET CARD or SET INTERFACE commands. Upon initial system
startup (before any user modification is done) the profiles are populated with factory default attributes. Any subsequent user modification of the profile attributes using this command is stored in the
system database and is retained over subsequent restarts.
Mode
Manager
Options
X
Option
Description
Range
Default
Value
PROFILE
The profile name that has been created.
NA
NA
card_type
A card type such as the GE24POE, GE24RJ, GE24SFP,
GE40RJ, GE40CSFP, XE6SFP, and XE4.
NA
NA
PREFLOAD
Specifies the name of the preferred software load file for
the card. This file must reside on the CFC flash file system, and is loaded to the flash memory on the card (if
it's not already there) when the card is enabled or reset.
Refer to 1.8.1 on software loads.
NA
NA
ADMINSTATE
The admin state of the card when the card is initially
seated or restarted.
NA
UP
Release Note
NA
Example
SET PROFILE=AUTOPROV XEPORT FLOWCONTROL=off ADMINSTATE=up
Software Reference for SwitchBlade x3100 Series Switches
257
Setting Up the Switch
Configuring a User Profile
SET SYSTEM
Syntax
SET SYSTEM [PROVMODE={MANUAL|AUTO}]
Description
Controls the system provisioning mode.
Mode
Manager
Options
Option
Description
Range
Default
Value
PROVMODE
The PROVMODE parameter specifies the system provisioning mode. The provisioning mode determines how
hardware devices are introduced to the system software.
NA
AUTO
- AUTO: In auto provisioning mode, removable hardware devices are automatically discovered and provisioned either upon insertion or upon system startup.
The provisioning is persisted in the CFC database until
manually destroyed using CLI commands (DESTROY
CARD for example). Auto provisioning is the default
mode for the system
- MANUAL: In manual provisioning mode, all provisioning is performed through the use of CLI commands
(CREATE CARD for example). Hardware devices are
not automatically provisioned upon card insertion or
upon system startup. The manually entered provisioning
data is persisted in the CFC database until manually
destroyed using CLI commands (DESTROY CARD for
example).
Some cards (active CFC and FC) are automatically provisioned even in manual mode, and cannot be destroyed
using CLI commands.
Release Note
NA
Example
SET SYSTEM PROVMODE=MANUAL
Software Reference for SwitchBlade x3100 Series Switches
258
Setting Up the Switch
Configuring a User Profile
SHOW CARD
Syntax
SHOW CARD [ ={ slot-list | ACTCFC | INACTCFC | ALL } ] [ { INVENTORY | SOFTWARE | FULL } ]
Description
Displays various information about the provisioned card in the specified slot. Entering the command
with no optional parameters displays basic information about the card. Optional parameters are provided to display additional information.
Mode
User
Options
Option
Description
Range
Default
Value
CARD
The slot number of the card(s) to be reset. The list must
not include the slots for the ACTCFC or INACTCFC
NA
NA
ACTCFC
The active CFC
NA
NA
INACTCFC
For a dual configuration, the inactive CFC (although it is
still load-sharing if in service).
NA
NA
ALL
The SHOW CARD ALL command displays a summary
of cards present in the shelf. Entering SHOW CARD
ALL command without the optional INVENTORY
parameter displays the following information for each
slot in tabular format:
NA
NA
NA
NA
- slot number
- provisioned card type
- current state of the card, in the format of hyphen separated administrative state, operational state, and status
attribute (for example, UP-UP-ONLINE)
- current faults against the card
INVENTORY
Entering the SHOW CARD ALL command with the
optional INVENTORY parameter displays the following
information for each slot in tabular format:
- slot number
- provisioned card type
- model number (read from the IDPROM on the card)
- serial number (read from the IDPROM on the card
Release Note
SOFTWARE
Show the software loads of the cards
NA
NA
FULL
Show a full display without summaries
NA
NA
NA
Example
SHOW CARD ACTCFC
--- Card Information --Slot...............................
Type...............................
State..............................
Provisioning Profile...............
5
CFC200
UP-UP-Online (Active)
AutoProv
Software Reference for SwitchBlade x3100 Series Switches
259
Setting Up the Switch
Configuring a User Profile
Hardware
Model Number (Revision)......... AT-SBxMFC (Rev X2)
Serial Number................... 51
CLEI Code....................... <none>
Software
Running Load....................
Preferred Load..................
Temporary Load..................
Alternate Load..................
cfc200_14.2.0.kmartin.20100401_KWM.tar
cfc200_14.2.0.kmartin.20100401_KWM.tar
None
None
Software Build Information
Load File.......................
Build Name......................
Build Type......................
Revision........................
Built On........................
Built By........................
Environment.....................
Baseline........................
Boot ROM Build Name.............
cfc200_14.2.0.kmartin.20100401_KWM.tar
ATI 200G Central Fabric Controller
Lab-Only Build
14.2.0.GAMMA.20100401
Fri 04/30/2010 at 03:20 PM
kmartin
kmartin_R14.2_Dev1
R14.2.0_2010_04_01_Nightly
ATI 200G Central Fabric Controller Boot
Loader
Boot ROM Version................ 14.1.g.01
Card Type Specific Information
Timing Reference................ N/A
SHOW CARD=5 // The same output as with SHOW CARD=ACTCFC
--- Card Information --Slot...............................
Type...............................
State..............................
Provisioning Profile...............
5
CFC200
UP-UP-Online (Active)
AutoProv
Hardware
Model Number (Revision)......... AT-SBxMFC (Rev X2)
Example
SHOW CARD (for the SBx3106)
--- Card Information ---
Slot
----0
1
2
3
4
5
Prov
Card Type
--------GE24RJ
GE40CSFP
GE40RJ
XE6SFP
CFC200
CFC200
State
---------------------------------------UP-UP-Online
UP-UP-Online
UP-UP-Online
UP-UP-Online
UP-UP-Online (Active)
UP-UP-Online (Inactive)
Faults
--------
SHOW CARD INVENTORY
--- Card Information ---
Software Reference for SwitchBlade x3100 Series Switches
260
Setting Up the Switch
Slot
----0
1
2
3
4
5
Prov
Type
-------GE24RJ
GE40CSFP
GE40RJ
XE6SFP
CFC200
CFC200
Configuring a User Profile
Physical
Type
--------GE24RJ
GE40CSFP
GE40RJ
XE6SFP
CFC200
CFC200
Model
-----------AT-SBx31GT24
AT-SBx31GC40
AT-SBx31GT40
AT-SBx31XS6
AT-SBx31CFC
AT-SBx31CFC
Serial Number
------------------A044024103200003
A31GC40H100000001
A31GT40H100000001
3020081840407063
A31CFCH100300022
A31CFCH100300022
Software Reference for SwitchBlade x3100 Series Switches
CLEI Code
----------
HW
Rev
--A1
A1
A1
A1
FPGA
Rev
----
261
Setting Up the Switch
Configuring a User Profile
SHOW CARD MEMORY
Syntax
SHOW CARD [ ={ slot-list | ACTCFC | INACTCFC | ALL } ] MEMORY { HEAP | MESSAGEBUFFERS | QUICKHEAP }
Description
Displays information about card memory usage.
Mode
User
Options
Option
Description
Range
Default
Value
CARD
The slot number of the card(s) to be reset. The list must
not include the slots for the ACTCFC or INACTCFC
NA
ALL
ACTCFC
The active CFC
NA
NA
INACTCFC
For a dual configuration, the inactive CFC (although it is
still load-sharing if in service).
NA
NA
MEMORY
- HEAP - Displays memory heap usage statistics. This
parameter is only supported for the CFC card.
NA
NA
- MESSAGEBUFFERS - Displays memory message bufferstatistics. This parameter is only supported for the CFC
card.
- QUICKHEAP - Displays memory quick heap usage statistics. This parameter is only supported for the CFC
card.
Release Note
NA
Example
SHOW CARD=actcfc MEMORY HEAP
-- Heap Memory Usage --------------------------------------------------Current Time: 2010-11-05 11:27:47
Number of Free Bytes.........................................
Number of Free Blocks........................................
Maximum Free Block Size......................................
Number of Allocated Bytes....................................
Number of Allocated Blocks...................................
Software Reference for SwitchBlade x3100 Series Switches
388410720
1478
387338984
84416288
56112
262
Setting Up the Switch
Configuring a User Profile
SHOW PROFILE
Syntax
SHOW PROFILE [ ={ name-list | NAMES | ALL } ] [ FULL ]
Description
Displays a summary of profiles including their card/interface types. If only a single profile is given or the
FULL option is supplied, the details of the profile are displayed.
Mode
User
Options
Option
Description
Range
Default
Value
PROFILE
The profiles for the components. In 16.0 these are:
NA
ALL
NA
NA
- CFC200 card
- GE24POE card
- GE24RJ card
- GE24SFP card
- GE40CSFP card
- XE4 card
- XE6SFP card
- GEPORT
- XEPORT
FULL
Release Note
Provides more detailed information
NA
Example
E135 - >SHOW PROFILE
--- Card Profiles --Name
-------------------------------AutoProv
AutoProv
AutoProv
AutoProv
Type
---------CFC200
GE24POE
GE24SFP
XE4
--- Port Profiles --Name
-------------------------------AutoProv
AutoProv
Type
---------GEPORT
XEPORT
Software Reference for SwitchBlade x3100 Series Switches
263
Setting Up the Switch
Configuring a User Profile
SHOW SYSTEM PROVMODE
Syntax
SHOW SYSTEM PROVMODE
Description
Displays the current provisioning mode for the system.
Mode
User
Options
NA
Release Note
NA
Example
SHOW SYSTEM PROVMODE
System is in AUTO provisioning mode
Software Reference for SwitchBlade x3100 Series Switches
264
Setting Up the Switch
Configuring a User Profile
SWAP ACTIVITY
Syntax
SWAP ACTIVITY [FORCE]
Description
Switches activity between the 2 redundant CFCs. Both CFCs must be in the ONLINE status. Sanity
checking is performed automatically to ensure a non-service affecting switchover, unless the optional
FORCE option is used.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
FORCE
Bypasses sanity checking and requires no confirmation.
NA
NA
NA
Example
SWAP ACTIVITY
Software Reference for SwitchBlade x3100 Series Switches
265
2. Interface Management
2.1 Introduction
This chapter describes the interfaces that the SBx3112 supports.
• Interface Types
• GE Interfaces
• XE Interfaces
2.2 Interface Types
2.2.1 Introduction
An interface is a capability associated with a physical port. The interface, therefore, provides a logical representation of one
or many physical ports. A specific instance of an interface has an identifier which can be used when configuring these capabilities.
The relationship between interfaces and physical ports can vary from one-to-one to many-to-many. This means that one port
can have more than one interface type and an interface type can use more than one port.
For the SBx3112, there are the following interface types:
• Ethernet - Each instance having a Type of ETH, an ID of the port number, and no name. The management interface has an
interface of ETH:0 and has a category of General.
• LAG - This occurs when a LAG is created, and has a Type of LAG, an ID of 0.0 (first), and associated ports that depend
on the ports that have been chosen to be part of the LAG group.
• VLAN - This supports the INBAND and ethernet module interfaces.
• GE - This is used when changing attributes for the interface and for profiles.
• XE - This is used when changing attributes for the interface and for profiles.
Software Reference for SwitchBlade x3100 Series Switches
266
Interface Management
GE Interfaces
2.3 GE Interfaces
2.3.1 Overview
The cards that provide the GE Interfaces (such as the GE24POE and GE24SFP) have common attributes, as listed in the following table. Also, note the following for each card type.
2.3.1.1 GE24POE and GE24RJ Interfaces
• The 1000BASE-T standard does not support running at 1 Gbps without auto negotiation, (SPEED=1000 and
AUTO=OFF). The GE24POE allows this, but operation in this mode is not guaranteed.
• The copper interfaces on the GE24POE card support automatic MDIX crossover detection. This keeps the user from
having to use crossover cables for physical interface connections. Crossover detection works whether AUTO is ON or
OFF (does not depend on auto negotiation).
2.3.1.2 GE24RJ Interfaces
The only difference between the GE24RJ and GE24POE is that the GE24RJ does not support PoE. Otherwise, interface support is the same.
2.3.1.3 GE24SFP Interfaces
Three different Ethernet types are supported by the GE24SFP when the corresponding SFP module is inserted:
• 1000BASE-X
• 100BASE-FX
• 10/100/1000BASE-T (tri-speed copper).
Some provisioned parameters and SFP module combinations are incompatible, such as SPEED=10 or SPEED=1000 when a
100BASE-FX SFP is inserted, or SPEED=10 or SPEED=100 when a 1000BASE-X SFP is inserted. SPEED will only be used for
SFP modules recognized as models that support tri-speed operation with an internal PHY. The actual operating value will be
correctly displayed by SHOW INTERFACE which may result in a mismatch between provisioning and actual SPEED.
The combination of SPEED=1000 and AUTO=OFF will not be blocked when an SFP module that supports tri-speed operation is inserted. This is not technically a valid configuration per the 1000B-T standard and is different than the operation of
the GE24POE, but the combination is valid for 1000BASE-X SFP modules. This configuration cannot be blocked during provisioning because it is not known in advance which SFP module will be used. Instead, SPEED=1000 and AUTO=OFF is allowed,
and is applied to the interface.
AUTONEGOTIATE does not apply to 100BASE-FX, and it is ignored when a 100FX SFP module is detected. Port settings
provisioned as AUTO are set to defaults as shown in table below. The actual operating value is correctly displayed by SHOW
INTERFACE.
2.3.1.4 GE40CSFP Interfaces
The interfaces on the GE40CSFP card support up to 40 Compact SFP (CSFP) modules or up to 20 SFP modules.
Port numbering is as follows:
Each CSFP port has two ports numbered n and n+2. Even numbers are across the top of the card and odd numbered ports
are across the bottom of the card.
Refer to the following figure for how the ports are configured with SFPs. This is explained in detail after the figure.
Software Reference for SwitchBlade x3100 Series Switches
267
Interface Management
GE Interfaces
SBx31GC40
2
1000 LINK
4
8
6
10
12
14
16
18
ACT
20
22
24
26
28
30
32
34
36
0
38
0
39
1
3
5
7
9
11
13
15
17
19
21
23
25
27
29
31
33
35
37
If Compact SFP is used (one for each port), both ports are 1G Bi-Directional
If SFP is used, one port of two is 1G Bi-Directional, for top row left port is active ,
for bottom row right port is active.
FIGURE 2-1
Port Layout and SFP Configuration for GE40CSFP
The GE40CSFP only supports 1000Mbps. The standard 10/100/1000B-T SFP module AT-SPTX is only supported at
1000Mbps. Standard 100BASE-FX SFP modules are not supported.
When a standard SFP module is used in place of a CSFP module, only one of the two ports can used. The secondary interface
is masked, or eclipsed, and it will have a state of UP-DN-Failed. A corresponding alarm is raised against this interface. For
even numbered ports, 0, 2, 4, 6 …, the secondary interface port is the higher numbered (on the right) interface: 2, 6, etc. For
odd numbered ports, 1, 3, 5, 7, the secondary interface is the lower numbered (on the left) interface: 1, 5, etc.
Note:
Refer to the SwitchBlade x3112 Installation Guide for information on SFP models.
There are two alarms for the GE40CSFP:
• "Pluggable Module Not Supported" - This alarm is raised when an unsupported C/SFP module is inserted. Modules are
considered unsupported based if the bit rate is not 1000M. For example, this alarm is raised on the GE40CSFP when a
100BASE-FX SFP module or a 10G SFP+ module is inserted. The alarm is cleared when the module is removed.
• "Eclipsed" - alarm is raised when a standard SFP is inserted into a GE40CSFP interface. The secondary port is then
masked, or eclipsed, and the interface state is UP-DN-Failed. The alarm is cleared when the module is removed or the
port is disabled.
Only the flow control port setting is auto-negotiated on the GE40CSFP. The actual operating value is displayed by SHOW
INTERFACE
2.3.1.5 GE Interface Attributes
The following table lists the common attributes for the GE interfaces.
TABLE 2-1
Interface Attributes for the GE Cards
Attribute
Values/Range
Description
Interface
Number of the interface
The identifying number of the interface.
Type
Interface Type
The type of interface, in this case GE
Software Reference for SwitchBlade x3100 Series Switches
268
Interface Management
GE Interfaces
TABLE 2-1
Interface Attributes for the GE Cards
Attribute
Values/Range
Description
State
Three attributes:
- Admin State
These three attributes determine the state of the card; whether it is
capable of carrying traffic and the status (Implied Operational Status)
- Operational State
ONLINE - Port is configured and can provide service. (UP)
- Status
DEGRADED - There is a fault but the port can still provide service
(UP)
OFFLINE - The normal status when a port is in a DOWN state. The
card requires a routine operation to place it ONLINE and available for
service. (DOWN)
FAILED - The port has detected a hardware or software fault that
makes it unable to provide service. (DOWN)
DEPENDENCY - The port cannot provide service because the card on
which it depends is unavailable. (DOWN)
CONFIGURING - Provisioning data for the port is being copied from
the CFC to the RAM memory on the card. (DOWN)
TERMINATING - The port is performing an operation in preparing to
go out of service. (UP or DOWN)
Description
Text
This is an attribute that should help in administration of the system. In
most cases, the user should create names that are alpha-numeric and
avoid using special characters such as ‘-’, ‘:’, or ‘.’ , since these may be
rejected by the CLI if they could represent a type or interface set.
Remote ID
1 to 31 ASCII characters
Used by DHCP Servers to identify the Relay Agent.
External Profile
Profile Name provided by the NMS.
Card Type
In this case, GE24POE, GE24RJ, GE24SFP, or GE40CSFP
Interface Faults
Any faults on the interface and the level of alarm. (This only appears if
there is a fault.)
Provisioning
Provisioning Profile Profile that has been
applied to the card and if
there is a Profile mismatch.
If there is a status mismatch, a (*) appears next to the Profile Name.
Direction
Customer or Network. (Default is Customer.)
Auto Negotiation
Specifies whether automatic negotiation of transmission parameters
for the ports is allowed.
If ON, the port has increased flexibility to communicate with the
remote peer. The port has the ability to advertise flow control and to
provide single direction fault coverage. The port will drive the link state
up and down based on the ability to communicate with the remote
peer, triggering on both transmit and receive failures Loss of Signal
(LOS).
If OFF, the port state is driven by receive failure (LOS). Flow control is
still provided as long as the FLOWCONTROL parameter is ON.
The default value is ON.
Speed
10, 100, 1000, AUTO (Default is AUTO.)
Duplex
HALF, FULL, AUTO (Default is AUTO.)
Software Reference for SwitchBlade x3100 Series Switches
269
Interface Management
GE Interfaces
TABLE 2-1
Interface Attributes for the GE Cards
Attribute
Values/Range
Description
Provisioning
Flow Control
Specifies whether flow control is enabled. Note that flow control
works between the card and the external interface only; it does not
work across the backplane from card to card
If ON, the port behavior is the same as AUTO.
If OFF, pause is ignored and not generated, and potential for packet loss
is increased.
FLOWCONTROL is independent of AUTONEGOTIATION, but the
combination of the settings determines the port’s behavior. Following
is the result of Flow Control / Auto states - behavior:
AUTO or ON / ON - Advertise Symmetric pause (send and receive
pause frames). Flow control setting is the result of negotiation. Note
that when Auto=ON, FLOWCONTROL cannot be set to ON.
ON / OFF - Flow control is ON, and pause frames are sent and
received.
OFF / ON or OFF - Flow control is OFF (regardless of link partner).
The default value is OFF.
Remote monitoring
On of Off
Actual
Attributes measured
when the interface is
operationally UP.
Other attributes are determined by the Interface.
VLAN Information
VLAN attributes
The attributes for the VLAN over the interface.
2.3.2 Example GE Interface (GE24POE)
show interface eth:10.0
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
10.0
GE
UP-UP-Online
<none>
<none>
<none>
GE24POE
Provisioning
Provisioning Profile............
Direction.......................
Auto Negotiation................
Speed...........................
Duplex..........................
Flow Control....................
Remote Monitoring...............
AutoProv (*)
Customer
On
10 Mbps
Auto
Auto
Off
Actual
Software Reference for SwitchBlade x3100 Series Switches
270
Interface Management
Direction.......................
Physical Address................
Speed...........................
Duplex..........................
Flow Control....................
logo
VLAN Information
Acceptable Frame Types..........
Ingress Filtering...............
TPID............................
TAGALL..........................
Dynamic MAC Learning Limit......
Untagged VLAN...................
GE Interfaces
Customer
00:0C:25:04:00:80
10 Mbps
Full
Off
All
On
0x8100
Off
0
1
manager SEC>> show interface 11.0
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
11.0
GE
UP-DN-Failed
<none>
<none>
<none>
GE24SFP
Interface Faults
Loss of Link.................... Major
Provisioning
Provisioning Profile............
Direction.......................
Auto Negotiation................
Speed...........................
Duplex..........................
Flow Control....................
Remote Monitoring...............
AutoProv
Customer
On
Auto
Auto
Auto
Off
Actual
Direction....................... Customer
Physical Address................ EC:CD:6D:03:6E:B7
VLAN Information
Acceptable Frame Types.......... All
Ingress Filtering............... On
TPID............................ 0x8100
Software Reference for SwitchBlade x3100 Series Switches
271
Interface Management
GE Interfaces
TAGALL.......................... Off
Dynamic MAC Learning Limit...... 0
Untagged VLAN................... 1
Software Reference for SwitchBlade x3100 Series Switches
272
Interface Management
GE Interfaces
2.4 XE Interfaces
2.4.1 Overview
Interface management includes state management, configuration, alarms, audits and optics query.
The only provisionable attribute for an XE interface is FLOW, which can be either ON or OFF, and defaults to OFF.
The XE interfaces can also be configured for either CUSTOMER or NETWORK direction.
There are two attributes that can be set:
• FLOW - (ON, OFF)
• DIRECTION - (CUSTOMER, NETWORK)
Note:
Refer to the SwitchBlade x3112 Installation Guide for information on XFP and SFP+ models.
The XE6SFP only supports 10G SFP+ modules. Standard 1G SFP modules can be inserted and queried using the SHOW
INTERFACE OPTICS command, but they will not link up. A "Pluggable Module Not Supported" alarm will be raised when an
unsupported module is inserted.
2.4.2 Example Output
Following is an example output.
show interface eth:0.0
--- XE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
0.0
XE
UP-UP-Online
voip2 ring primary Uplink
<none>
<none>
XE4
Provisioning
Provisioning Profile............ AutoProv
Flow Control.................... Off
Remote Monitoring............... On
Actual
Direction....................... Network
Port Speed...................... 10 Gbps
Physical Address................ EC:CD:6D:03:26:55
VLAN Information
Acceptable Frame Types..........
Ingress Filtering...............
TPID............................
TAGALL..........................
VLAN-tagged only
On
0x8100
Off
Software Reference for SwitchBlade x3100 Series Switches
273
Interface Management
GE Interfaces
Dynamic MAC Learning Limit...... 0
Tagged VLAN(s).................. 100,102,200,300,400,402,500-501,600,10011003
Packet Statistics
Octets..........................
Unicast Packets.................
Discarded Packets...............
Errored Packets.................
Input
Output
------------- ------------1389760201948 1470700206344
2
4
1042177
11700122
0
0
0
0
Software Reference for SwitchBlade x3100 Series Switches
274
Interface Management
GE Interfaces
2.4.3 Interface (Common) Commands
The following tables list the commands available to configure and manage interfaces on the SBx3112 switch.
TABLE 2-2
Interface Commands
Commands
CREATE PROFILE GEPORT
CREATE PROFILE XEPORT
DESTROY PROFILE PORT_TYPE
DISABLE INTERFACE
ENABLE INTERFACE
SET INTERFACE
SET INTERFACE DESCRIPTION
SET INTERFACE GE
SET INTERFACE XE
SET INTERFACE PROFILE
SET INTERFACE REMOTEID
SET PROFILE GEPORT
SHOW INTERFACE
SHOW INTERFACE OPTICS
Software Reference for SwitchBlade x3100 Series Switches
275
Interface Management
GE Interfaces
CREATE PROFILE GEPORT
Syntax
CREATE PROFILE=name GEPORT
[ AUTONEGOTIATION={ ON | OFF } ]
[ SPEED={ AUTONEGOTIATE | 10 | 100 | 1000 } ]
[ DUPLEX={ AUTONEGOTIATE | FULL | HALF } ]
[ FLOWCONTROL={ AUTONEGOTIATE | ON | OFF } ]
[ ADMINSTATE={ UP | DOWN } ]
Description
The GEPORT parameter identifies the profile as a Gigabit Ethernet (GE) interface profile. As a GE
interface profile, only GE interface options are available to the user.
Mode
Manager
Options
Refer to SET INTERFACE GE.
Release Note
NA
Example
CREATE PROFILE=ge_example SPEED=1000 DUPLEX=FULL
Software Reference for SwitchBlade x3100 Series Switches
276
Interface Management
GE Interfaces
CREATE PROFILE XEPORT
Syntax
CREATE PROFILE=name XEPORT [ FLOWCONTROL={ ON | OFF } ] [ ADMINSTATE={ UP |
DOWN } ]
Description
The GEPORT parameter identifies the profile as a Gigabit Ethernet (GE) interface profile. As an GE
interface profile, only GE interface options are available to the user.
Mode
Manager
Options
Refer to SET INTERFACE XE.
Release Note
NA
Example
CREATE PROFILE=xe_example ADMINSTATE=DOWN
Software Reference for SwitchBlade x3100 Series Switches
277
Interface Management
GE Interfaces
DESTROY PROFILE PORT_TYPE
Syntax
DESTROY PROFILE=name port_type
Description
Destroys a profile for the specified port type (GEPORT or XEPORT). No other attributes are
required. Any managed entity that had a Profile applied is set to None (no profile association).
Mode
Manager
Options
NA
Release Note
NA
Example
create profile=fred XEPORT adminstate=down Info
(033561): Successfully created profile(s) fred officer
destroy profile=fred XEPORT
Info (033571): Successfully destroyed profile(s) fred
Software Reference for SwitchBlade x3100 Series Switches
278
Interface Management
GE Interfaces
DISABLE INTERFACE
Syntax
DISABLE INTERFACE={ type:id-range | id-range | ifname-list } [ FORCE ]
Description
This command should be used with caution. Places the interface(s) in the DOWN administrative state.
FORCE will do this even is the interface is operationally UP.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The INTERFACE parameter allows the filtering of interfaces. Interfaces to be displayed may be selected by type
or a type:id/name list (e.g., ETH:4.4-4.8/name1,name2)
NA
ALL
FORCE
Will disable the interface even if it is operationally UP.
NA
NA
Release Note
NA
Note
Disabling the GE24POE interface has no effect on the port’s ability to provide power.
Example
DISABLE INTERFACE=1.2 FORCE
Info (039512): Operation Successful (XE4 Slot 1 Port 2)
Software Reference for SwitchBlade x3100 Series Switches
279
Interface Management
GE Interfaces
ENABLE INTERFACE
Syntax
ENABLE INTERFACE={ type:id-range | id-range | ifname-list }
Description
Places the interface in the UP administrative state and attempts to make the port in-service.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
INTERFACE
The INTERFACE parameter allows the filtering of interfaces. Interfaces to be displayed may be selected by type
or a type:id/name list (e.g., ETH:4.4-4.8/name1,name2)
NA
NA
NA
Example
enable interface 0.23
Info (039512): Operation Successful (GE24POE Slot 0 Port 23)
Software Reference for SwitchBlade x3100 Series Switches
280
Interface Management
GE Interfaces
SET INTERFACE
Syntax
SET INTERFACE={ type:id-range | id-range | ifname-list | ALL } [ ACCEPTABLE={
ALL | VLAN | HVLAN } ]
[ INFILTERING={ OFF | ON } ]
[ TAGALL={ ON | OFF } ]
[ TPID=tpidvalue ]
[ LEARNLIMIT={ 1..64 | OFF } ]
Description
Modifies the value of parameters for system interfaces.
Mode
Manager
Options
Option
Description
Range
Default
Value
ACCEPTABLE
Sets the acceptable frame types
NA
NA
NA
ON
all - tagged and untagged)
VLAN-VLAN tagged only
HVLAN-HVLAN - tagged only.
INFILTERING
Sets the ingress filtering settings ON or OFF. Infiltering
is the validation of VLANs on an interface.
ON - if a received frame’s VLAN does not match the
interface’s VLAN membership, it is dropped.
TAGALL
Controls whether all the frames are to be tagged or not
NA
OFF
TPID
Used to identify the frame as a tagged frame.The value
of the TPID for an 802.1q ethernet tagged frame is
0x8100
NA
NA
NA
TBS
Note:
LEARNLIMIT
There is a limited number of TPIDs for a
given card that can be applied to all of the
ports on the card. For the XE4 the limit
is 2, and for the GE24 cards the limit is 8.
Specifies the maximum number of MAC addresses that
can be learned for an interface. A MAC address/VID pair
counts as one, so for example one MAC associated with
three VIDs would count as three against the LEARNLIMIT.
Release Note
NA
Example
SET INTERFACE 0.22INFILTERING ON TAGALL OFF LEARNLIMIT 32
Software Reference for SwitchBlade x3100 Series Switches
281
Interface Management
GE Interfaces
SET INTERFACE DESCRIPTION
Syntax
SET INTERFACE={ type: | type:id-range | id-range | ifname-list | ALL }
DESCRIPTION={ description | NONE }
Description
Used to modify attributes common to all interfaces.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The interface(s) that will have their description(s) set.
NA
NA
DESCRIPTION
Provides a label that is used to identify the purpose or
function of an interface.
NA
NA
NONE - sets the Description back to none if it previously had a name.
Release Note
NA
Example
SET INTERFACE 0.23 DESCRIPTION Customer_POE
Info (010017): Operation Successful
Software Reference for SwitchBlade x3100 Series Switches
282
Interface Management
GE Interfaces
SET INTERFACE GE
Syntax
SET INTERFACE={ type: | type:id-range | id-range | ifname-list | ALL }
GE
[ AUTONEGOTIATION={ ON | OFF } ]
[ SPEED={ AUTONEGOTIATE | 10 | 100 | 1000 } ]
[ DUPLEX={ AUTONEGOTIATE | FULL | HALF } ]
[ FLOWCONTROL={ AUTONEGOTIATE | ON | OFF } ]
[ DIRECTION={ NETWORK | CUSTOMER } ]
[ FORCE ]
Description
Modifies the provisioning attributes for the specified interface or list of interfaces. One or more individual attributes or a profile name are specified. Some individual attributes can be modified while the
interface is in-service. These in-service modified attributes are downloaded to the hardware dynamically. For other attributes, the interface must be disabled (See DISABLE INTERFACE) If a profile is used
to modify all attributes, the interface must be disabled first, and all attributes are downloaded again
when the interface is enabled.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The GE interfaces that are being modified.
NA
NA
AUTONEGOTIATION
Specifies whether automatic negotiation of transmission
parameters for GE ports is allowed. The user may set
this parameter only when the interface is disabled.
NA
ON
If ON, the port has increased flexibility to communicate
with the remote peer. The port has the ability to advertise flow control and to provide single direction fault
coverage. The port will drive the link state up and down
based on the ability to communicate with the remote
peer, triggering on both transmit and receive failures
(LOS).
If OFF, the port state is driven by receive failure (LOS).
Flow control is still provided as long as the FLOWCONTROL parameter is ON.
SPEED
The speed of the interface (10, 100, 1000, AUTO). Note
that some combinations are with other parameters are
incompatible. (Refer to Section 2.3.)
NA
AUTO
DUPLEX
The duplex mode to be used (AUTONEGOTIATE|FULL|HALF).
NA
AUTONEGOTIATE
Software Reference for SwitchBlade x3100 Series Switches
283
Interface Management
GE Interfaces
Option
Description
Range
Default
Value
FLOWCONTROL
Specifies whether flow control is enabled for GE ports.
For GE ports, the parameter can either be ON or OFF.
NA
OFF
NA
CUSTOMER
NA
NA
If ON, the port can generate and respond to pause signals with the remote peer.
If OFF, pause is ignored and not generated, and potential
for packet loss is increased.
FLOWCONTROL is independent of AUTONEGOTIATION.
The user can set this parameter only when the interface
is disabled.
DIRECTION
NETWORK - The interface is toward another system,
and so data packets from multiple customers are carried
over the link.
CUSTOMER - The interface is toward a customer site
and all data streams are associated with the customer.
FORCE
Release Note
Suppress any confirmation message.
NA
Example
SET INTERFACE 0.23 GE DIRECTION=NETWORK
Info (020186): Successfully modified interface(s) 0.23
Software Reference for SwitchBlade x3100 Series Switches
284
Interface Management
GE Interfaces
SET INTERFACE XE
Syntax
SET INTERFACE={ type: | type:id-range | id-range | ifname-list | ALL }
XE
[ FLOWCONTROL={ ON | OFF } ]
[ DIRECTION={ NETWORK | CUSTOMER } ]
[ FORCE ]
Description
Changes attributes for the specified XE interface.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The XE interfaces that are being modified.
NA
NA
FLOWCONTROL
Specifies whether flow control is enabled for GE ports.
For XE4 ports, the parameter can either be ON or OFF.
NA
OFF
NA
NETWORK
NA
NA
If ON, the port can generate and respond to pause signals with the remote peer.
If OFF, pause is ignored and not generated, and potential
for packet loss is increased.
The user can set this parameter only when the interface
is disabled.
DIRECTION
NETWORK - The interface is toward another system,
and so data packets from multiple customers are carried
over the link.
CUSTOMER - The interface is toward a customer site
and all data streams are associated with the customer.
FORCE
Suppress any confirmation message.
Release Note
NA
Example
SET INTERFACE ALL FLOWCONTROL ON DIRECTION NETWORK
Software Reference for SwitchBlade x3100 Series Switches
285
Interface Management
GE Interfaces
SET INTERFACE PROFILE
Syntax
SET INTERFACE={ type: | type:id-range | id-range | ifname-list | ALL }
PROFILE=name
Description
Applies the Profile to the interface. If double quotes are used after PROFILE, the interface has no Profile.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The interfaces that are having their profile set.
NA
NA
PROFILE
The name of the profile being applied.
NA
NA
Release Note
NA
Example
SET INTERFACE 1.23 PROFILE=poe_on
Software Reference for SwitchBlade x3100 Series Switches
286
Interface Management
GE Interfaces
SET INTERFACE REMOTEID
Syntax
SET INTERFACE={ type: | type:id-range | id-range | ifname-list | ALL }
REMOTEID={ remote-id | NONE }
Description
Sets the remote id for the interface.
Mode
Manager
Options
Option
Description
Range
Default
Value
REMOTEID
Used by DHCP servers to identify a RELAY AGENT.
Setting this parameter is optional. The default is the
MAC address of the switch the RELAY AGENT is running on. The user can specify the REMOTEID by entering a string of 1 to 31 ASCII characters.
NA
NONE
Release Note
NA
Example
SET INTERFACE=ETH:0.23 REMOTEID=DVLK-x3112-A01
Software Reference for SwitchBlade x3100 Series Switches
287
Interface Management
GE Interfaces
SET PROFILE GEPORT
Syntax
SET PROFILE=name GEPORT
[ AUTONEGOTIATION={ ON | OFF } ]
[ SPEED={ AUTONEGOTIATE | 10 | 100 | 1000 } ]
[ DUPLEX={ AUTONEGOTIATE | FULL | HALF } ]
[ FLOWCONTROL={ AUTONEGOTIATE | ON | OFF } ]
[ ADMINSTATE={ UP | DOWN } ]
Description
The GEPORT parameter identifies the profile as a Gigabit Ethernet (GE) interface profile. As an GE
interface profile, only GE interface options are available to the user.
Mode
Manager
Options
Refer to SET INTERFACE GE.
Release Note
NA
Example
SET PROFILE=ge_example SPEED=100 DUPLEX=FULL
Software Reference for SwitchBlade x3100 Series Switches
288
Interface Management
GE Interfaces
SHOW INTERFACE
Syntax
SHOW INTERFACE [ ={ type: | type:id-range | id-range | ifname-list | ALL } ]
[ CARD=slot-list ] [ STATE={ UP | DOWN | ALL } ]
[ DIRECTION={ NETWORK | CUSTOMER | INTERNAL } ]
[ DESCRIPTION ] [ FULL ]
Description
Displays information about interfaces in the system. Information provided includes interface type,
interface ID, interface name, physical ports associated with the interface, interface direction, interface
mode (UP or DOWN) and the last change time (based on the system uptime).
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The interfaces that will have information displayed.
NA
ALL
CARD
The slot number for the card interfaces to display.
NA
NA
STATE
The state of the interfaces:
NA
ALL
NA
ALL
- UP - Operationally UP
- DOWN- Operationally DOWN (The Admin state can
be UP or DOWN).
- ALL - Both UP and DOWN
DIRECTION
NETWORK - The interface is toward another system,
and so data packets from multiple customers are carried
over the link.
CUSTOMER - The interface is toward a customer site
and all data streams are associated with the customer.
Release Note
DESCRIPTION
Includes the DESCRIPTION value for the displayed
interfaces.
NA
NA
FULL
Gives complete information for each interface type
NA
NA
NA
Example
E135 - manager SEC>> SHOW INTERFACE CARD=1
--- GE Interfaces --Interface
----------1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
State
----UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-UP
Autonegotiate Flow Control Duplex Speed
Direction
------------- ------------ ------ -------- --------On
Customer
On
Customer
On
Customer
On
Customer
On
Customer
On
Customer
On
Customer
On
Customer
On
Customer
On
Customer
On
Off
Full
1 Gbps
Customer
Software Reference for SwitchBlade x3100 Series Switches
289
Interface Management
1.11
1.12
1.13
1.14
1.15
1.16
1.17
1.18
1.19
1.20
1.21
1.22
1.23
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
UP-DN
GE Interfaces
On
On
On
On
On
On
On
On
On
On
On
On
On
-
-
-
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
Customer
--- General Interfaces --Interface
State Name
--------------- ----- ---------LAG:1
UP-UP mylag2
Software Reference for SwitchBlade x3100 Series Switches
290
Interface Management
GE Interfaces
SHOW INTERFACE OPTICS
Syntax
SHOW INTERFACE [ ={ type: | type:id-range | id-range | ifname-list | ALL } ]
[ OPTICS ] [ FULL ]
Description
Shows the optics data, as a subset of the data contained the SFP/XFP memory. For the user to query
the optics on an interface, the card must be operationally UP but the state of the interface does not
matter, as long as the SFP/XFP module is physically present.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
INTERFACE
The interfaces that will have information displayed.
NA
ALL
OPTICS
Shows the optics specifications
NA
NA
FULL
Gives complete information for the interfaces specified.
NA
NA
NA
Example
E135 - manager SEC>> SHOW INTERFACE OPTICS
--- Interface Optics ---
Interface
----------10.0
10.1
10.2
10.3
Port
Type
----XE
XE
XE
Transceiver
Type
-----------XFP
XFP
XFP
Nominal
Bit Rate
Tx/Rx Power
Temperature
---------- ---------------- -----------/10000
0.5739/0.6255
30.9 C
10000
0.5698/0.5744
32.1 C
10000
0.5627/0.5619
33.2 C
19:19:23 manager SEC>> show interface 1.0 optics
--- Interface Optics --Interface..........................
Type...............................
State..............................
Port Uptime........................
Description........................
Optics Specification
Transceiver Type................
Nominal Bit Rate................
Vendor Name.....................
Vendor Part Number..............
Vendor Revision.................
Vendor Serial Number............
Date Code.......................
Wavelength......................
Internal Temperature............
Transmit Power..................
Receive Power...................
1.0
GE
UP-DN
000:00:00:00
<none>
SFP
1300 Mbits/sec
AGILENT
QBCU-5730R
AK0549GHFA
051211
Not Available
Not Available
Not Available
Not Available
Software Reference for SwitchBlade x3100 Series Switches
291
3. Power over Ethernet (PoE)
3.1 Introduction
The SBx3112 switch provides Power over Ethernet (PoE) capability with the GE24POE card. The GE24POE card allows up
to 24 devices (one per port) to receive power from the Ethernet faceplate connection. With PoE technology, a supported
Ethernet-based terminal (known as a Powered Device or PD) can receive up to 30 watts of power over the same Ethernet
cable as data. Examples of PDs include IP phones, wireless access points, and IP cameras.
Power can be carried over Ethernet cables in one of two ways:
• Mode A uses the data pairs 1-2 and 3-6.
• Mode B uses the spare pairs 4-5 and 7-8, which are unused in 10/100BASE-T. The power applied allows data flow to be
maintained regardless of power status.
Note:
The IEEE PoE Power Standard 802.3af only allows one set of wires to be used per device. Mode B is not supported
on the GE24POE card.
The IEEE 802.3af standard defines support for devices up to 15.4 watts. (A newer standard IEEE 802.3at extends the power
range to 25.5 watts.)
3.1.1 Definitions
The following terms are used throughout this chapter:
• PoE (Power over Ethernet) - the 802.3af PoE feature that allows power to be carried over the same Ethernet infrastructure as data
• PSE (Power Sourcing Equipment) - the source, such as an Ethernet switch, that is responsible for supplying power to one
or more devices by Ethernet cable
• PD (Powered Device) - the device receiving power by Ethernet cable from a PSE
• PoE PSU (Power Supply Unit) - one of the devices providing power to the shelf for use in powering PDs
• Allocated power - the amount of power the PoE manager on the Central Fabric Control (CFC) card has given to a PoE
line card to use; it may be greater or less than the amount of power the card has requested.
• Requested power - the amount of power a port has requested for PoE. It is equal to the port's user power limit (if set)
or based on the determined classification of the discovered PD. Ports with no discovered PD are not requesting power.
The card's requested power is the sum of all ports.
• Actual power - the actual, instantaneous, power draw of a port or card as measured by the PSE.
Software Reference for SwitchBlade x3100 Series Switches
292
Power over Ethernet (PoE)
Introduction
3.2 GE24POE Card Operation
3.2.1 Performance and Capacity
The maximum number of supported devices is determined by the number of installed PoE power supplies as well as the class
of PD installed at each PoE port. Refer to the following table.
TABLE 3-1
Performance and Capacity for the PSUs (for PoE)
Configuration
Class 2 PDs (7W)
Class 3 PDs (15.4W)
Class 4 PDs (30W)
2 PoE PSUs (2400W)
240/240 ports (100%)
155/240 ports (64.6%)
80/240 (33.3%)
1 PoE PSU (1200W)
171/240 ports (71.3%)
77/240 ports (32.1%)
40/240 ports (16.7%)
For example, with a single PSU supplying 1200 watts and Class 2 PDs drawing 7 watts each over 171 ports, 71% of the total
available ports can use power.
3.2.2 Hardware Limitations
Of the two solutions for providing power over Ethernet cable, only Mode A (using data pairs 1-2 and 3-6) is supported on
the GE24POE.
Only two ports per card at a time are able to detect PDs. The maximum detection period for a PD is 500ms. This is followed
by a 75ms classification period. Given 24 ports per card, this leads to an estimated recovery time (for PoE) of 6.9 seconds,
which is illustrated in the following calculation:
[24 (total ports) / 2 (ports at a time)] * [500ms (detection period) + 75ms (classification period)] = 6.9 seconds
Each GE24POE card has a minimum power allocation of 37W that it can draw from the shared pool. (By disabling all POE
ports on the card, you can reduce the allocation to 0W.)
3.2.3 Hardware Detection
Whenever any device is plugged into a port supporting PoE, the system must determine if it is a powered device and, if so,
how much power it needs. The PSE is responsible for managing this process.
The first step is to detect the presence of a PD on the port. When any device is attached to the port (whether or not it supports PoE) the PSE applies a small amount of voltage to the line. It then looks for a 25 K-Ohm “signature” resistor on the
device. This resistor is located on the front-end of the PD and is isolated from the rest of the circuitry until detection is complete. If this resistor is detected, the device is accepted as a valid PD.
The next step is for the PSE to attempt to classify the device. To do this it applies a voltage of between 15.5 and 20.5 Vdc to
the line for a short period of time (10-75 ms). The amount of current it draws indicates the power class of the device. If the
PD does not support classification, it is assigned the default class of 0 and a maximum unclassified power consumption of
15.4W is assumed (Classes using greater than 15.4W MUST support classification). Otherwise the device is assigned a class
indicating the maximum amount of power it will draw.
When detection and classification are complete, the full voltage is applied gradually (to minimize noise on the line). This voltage is maintained until the PD is disconnected or an error condition is detected.
3.2.4 Power Allocation
In Release 14.2 the SBx3112 will support two 1200W PoE PSUs for a total of 2400W of available PoE power. This is enough
to power a subset of the ports in some cases, but not all. When there is no longer sufficient PoE power remaining to service
new PDs, then the shelf is at capacity and some ports will not receive power. The power allocation system is responsible for
determining which ports will receive power.
Software Reference for SwitchBlade x3100 Series Switches
293
Power over Ethernet (PoE)
Introduction
Not all PDs draw the same amount of power. The amount of power that is actually needed determines the device's class.
There are currently 4 supported classes: Class 1 (4W), Class 2 (7W), Class 3 (15.4W), and Class 4 (30W). The number of
supported devices per shelf depends on the classes of the devices in use.
The user also has the additional ability to set a power limit for a port manually. If the device tries to draw more power than
the user limit, the port will be shut down (just as if it had exceeded the port's classified power limit). The port power limit, if
set, is used in the power allocation algorithm instead of the PD class detected. For instance, if the power limit is less than the
PD class limit, then the power delta is still available for use by other ports.
In addition to the shelf power limit (determined by the installed PoE PSUs) each card has an additional limit of 720W. The
total amount of power consumed by the ports on a card cannot exceed this amount even if the shelf has power available.
It is sometimes important to ensure that selected ports always receive power even when the system is at capacity. To support this, each port is given a priority level: critical, high, or low (with low as the default). Critical priority ports are serviced
first, then high and low (if enough power is available).
To ensure deterministic behavior, the slot and port number of each interface is also taken into account when determining
power allocation. Within each level, priority will be given to the lower number slots (and then lower number ports). For
example, if ports 1.1, 2.1, and 1.3 were all low priority and higher priority ports needed power, then 2.1 would be disabled
first followed by 1.3 then 1.1. This is mainly for deterministic behavior and should not be relied upon by the customer as a
means of controlling which ports receive power.
In order to ensure that power distribution is handled correctly and to prevent ports from bouncing as devices come up, only
two PDs per card will be allowed to come up at a time.
If a PD is removed from a port (or the PoE feature on that port is disabled) when the system is at capacity, then the next
highest priority port that is not already getting power will now receive power.
If a PD is connected to a port when the system is at capacity and the new port is a higher priority than other ports already
getting power, then the lowest priority port(s) will lose power and the newly connected port will receive power.
The determination of whether or not a port is capable of being powered is determined entirely by the PoE state and the
presence on the port of a supported PD. The port's administrative state, as well as the state of the PD’s Ethernet, has no
effect. Provided that the connection to the PD is maintained, a port that is providing power will continue to even if the port
is administratively disabled or if the PD disables its Ethernet. This allows the port or the device to disable traffic without shutting down power.
3.2.5 CFC Power Management
The CFC is responsible for setting the maximum power allowed by each PoE card.
It does this by going through the ports on each slot (starting with the ports on slot 0) and summing the requested usage for
all enabled ports that have detected a PD. The requested usage for a port is the user defined power limit (if set) or the class's
power limit (if user power limit is not set). The first pass allocates power for critical priority ports, followed by high priority
ports, and then low priority ports (if any power remains). Any power left over after this allocation is divided evenly amongst
the slots (so that they can more quickly respond to detected PDs before the CFC has time to respond). The CFC’s power
allocation algorithm is performed each time a PD is detected or removed (or a port is enabled/disabled).
Each card also has a minimum power limit of 37W. The CFC ensures that any card with enabled PoE ports must get at least
37W regardless of requested power. If all ports have PoE disabled, then the card will not be allocated power.
The CFC will alarm the card or the system if the requested power need was not able to be met. At this point there may or
may not be alarms on the interfaces (the actual power draw may not have exceeded the allocation), but the user is warned
that there is not enough allocated power to meet the requested need.
The CFC also calculates the power allocation for the cases where any currently installed PoE PSU is removed and sends
down those card power limits as well so that the GE24POE card can quickly reallocate power in the case of PSU removal.
Software Reference for SwitchBlade x3100 Series Switches
294
Power over Ethernet (PoE)
Configuring the GE24POE Card
3.2.6 Card Power Management
The GE24POE card is responsible for limiting each port to its port power limit (which is the class limit if no user limit is set)
as well as taking the total card power (determined by the CFC) and allocating it to each of the ports based on priority. The
difference here is that (due to hardware limitations) instead of comparing the sum of each port's class power to the card
limit, it uses instead the actual current power usage of the ports. The impact of this is that some ports may be receiving
power when the CFC’s algorithm would have assumed they would not be. These ports would be the first to lose power if
higher priority ports on the card began to need more power.
3.2.7 LEDs
The faceplate for the GE24POE card has two light-emitting diodes (LEDs) per port. The top left LED indicates traffic status
while the top right LED is reserved for PoE status. The following table shows the meanings for this LED.
Note:
Disabling PoE on all ports on a card will turn off the LED, even if there is a card fault that would result on all ports
being solid amber.
TABLE 3-2
GE24PoE LEDs and Meanings
LED
Meaning
Off
PoE disabled or no PD detected
Solid Green
PD detected/providing power
Flashing Green
Unused
Solid Amber
PD fault or PSE failed
Flashing Amber
PD insufficient power
3.3 Configuring the GE24POE Card
3.3.1 Default Configuration
The default PoE state for each port is ENABLED.
3.3.2 Configuration Guidelines
3.3.2.1 Restrictions and Limitations
• Only data pairs 1-2 and 3-6 can supply power on the GE24POE.
• The total amount of power consumed by the ports on a card cannot exceed 720W even if the shelf has power available.
• Only two ports per card at a time are able to detect PDs. The maximum detection period for a PD is 500ms.
3.3.2.2 Feature Interactions
This section describes the interactions between provisioning PoE and other features on the SBx3112.
• System recovery
The configuration settings identified in this document are persisted in the iMAP database. During system recovery, these settings are applied to the associated port/interface like any other configuration setting.
• Redundant operation
Software Reference for SwitchBlade x3100 Series Switches
295
Power over Ethernet (PoE)
Configuring the GE24POE Card
The configuration settings identified by this document are mirrored between the CFCs in a duplex configuration. Switchovers
(both controlled and uncontrolled) will have no impact on any ports providing power to a PD.
• System upgrades
The configuration settings identified in this document are expected to survive over upgrades from one release to the next.
• Logging
The PoE system will generate management (MGMT) logs whenever the operational state of the port changes. This includes
the discovery or removal of a PD as well as disabling power to a port due to PoE power capacity issues. Refer to the Allied
Telesis Log Manual.
3.3.2.3 Configuration Procedure
A typical PoE configuration procedure involves the following steps:
•
•
•
•
Display the ports on the PoE card to check their status
Set the priorities for power allocation on the ports to prevent outages on critical devices.
Set the power limit for the ports if CLASS is not used.
Set the threshold for monitoring power usage (optional).
For example, if five cards are provisioned in the switch, there will be 120 ports available. If 50 Class 2 devices, 10 Class 3
devices, and 30 Class 4 devices are connected, they would require 1400 watts of power, while the shelf only supplies 1200W.
This configuration requires that some ports will be dropped to maintain critical power support for Class 4 devices.
Ports provisioned on PoE cards by class type:
• Class 4 - provisioned on 0.0-0.14, 1.0-1.14 (30 devices, 900 watts)
• Class 2 - 0.5, 1.5, 2.0-2.23, 3.0-3.23 (50 devices, 350 watts)
• Class 3 - 0.6-0.10, 6.0-6.4 (10 devices, 154 watts)
Levels of priority set on the PDs:
• All 30 Class 4 devices as Critical priority.
• Of the 50 Class 2 devices, 12 are set to High priority, 38 are Low priority
• Class 3 - All 10 are set to Low priority (5 are on slot 0 and 5 are on slot 6).
The following procedure shows the commands used to configure the GE24POE card on the SBx3112 switch.
TABLE 3-3
Step
Configuration procedure for PoE
Command
Description
Show the current status of the ports on the card(s).
1
SHOW POE INTERFACE=ALL
Displays the ports on the interface. All ports are
enabled by default.
Set the priorities on the ports with Class 4 devices.
2
SET POE INTERFACE=0.0-0.14, 1.0-1.14
PRIORITY=CRITICAL
Changes the priority of the ports from LOW to
CRITICAL for ports on slot 0 and slot 1.
Set the power limit on the Class 4 devices in slot 1.
3
SET POE INTERFACE=1.0-1.14 POWERLIMIT=2200MW
Modifies the power limit on ports 1.0-1.14 to a
maximum of 22W.
Set the PoE threshold for the shelf.
Software Reference for SwitchBlade x3100 Series Switches
296
Power over Ethernet (PoE)
TABLE 3-3
Configuring the GE24POE Card
Configuration procedure for PoE
Step
Command
Description
4
SET POE THRESHOLD=80
Monitors the power usage on the shelf by sending
an alarm when the threshold is exceeded.
Show the current status of the ports on the selected interface.
5
SHOW POE INTERFACE=0.*, 1.*
Software Reference for SwitchBlade x3100 Series Switches
Displays the current configuration of the ports.
297
Power over Ethernet (PoE)
Configuring the GE24POE Card
3.3.3 PoE Commands
The following tables list the commands available to configure and manage the PoE feature on the SBx3112 switch.
TABLE 3-4
PoE Commands
Commands
DISABLE POE INTERFACE
ENABLE POE INTERFACE
RESET POE COUNTER INTERFACE
SET POE INTERFACE
SET POE THRESHOLD
SHOW POE COUNTER INTERFACE
SHOW POE INTERFACE
SHOW POE
Software Reference for SwitchBlade x3100 Series Switches
298
Power over Ethernet (PoE)
Configuring the GE24POE Card
DISABLE POE INTERFACE
Syntax
DISABLE POE INTERFACE={ type:id-range | id-range | ifname-list | ALL }
Description
Disables the POE interface. This is independent of the interface’s administrative state, meaning that a
port with PoE disabled could still be UP-UP and passing traffic.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical ports
NA
NA
type:id-range - the type of available ports, such as
ETH:7.0 or a range (ETH:8.0-8.9)
id-range - used with type (type:id) to query the physical
ports; the numerical identifier of the interface
ifname-list - list of interface names, if not numerical
ALL - all applicable interfaces in the system
Release Note
NA
Example
DISABLE POE INTERFACE 1.23
Service may be affected, are you sure (Y/N)? y
Info (020185): Successfully disabled interface(s) ETH:[1.23]
Software Reference for SwitchBlade x3100 Series Switches
299
Power over Ethernet (PoE)
Configuring the GE24POE Card
ENABLE POE INTERFACE
Syntax
ENABLE POE INTERFACE={ type:id-range | id-range | ifname-list | ALL } [ PRIORITY={ CRITICAL | HIGH | LOW } ] [ POWERLIMIT={ CLASS | 1..30000 } ]
Description
Enables the POE interface so it may pass traffic. The priority controls which interfaces are granted
power when the power demand exceeds the available PoE power capacity. Low priority ports are the
first to be powered down, followed by high priority ports. By default all ports are low priority. The
power limit allows the user to set the maximum power that the port can draw before shutting down.
The default PoE state for each port is enabled. .
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical ports
NA
NA
NA
LOW
NA
CLASS
type:id-range - the type of available ports, such as
ETH:7.0 or a range (ETH:8.0-8.9)
id-range - used with type (type:id) to query the physical
ports; the numerical identifier of the interface
ifname-list - list of interface names, if not numerical
ALL - all applicable interfaces in the system
PRIORITY
Specifies which interfaces are given power when the
power demand exceeds the available PoE power capacity.
CRITICAL - Critical priority ports are given power first
in a capacity shortage.
HIGH - Next priority to receive power in a capacity
shortage, if power is available.
LOW - First ports to be powered down in a capacity
shortage.
POWERLIMIT
Specifies the maximum power that the port can draw
before shutting down, in milliwatts.
CLASS - the power class of the device. The PSU
identifies the class of the PD and uses the power
limit that applies to that class: Class 1 (4W), Class
2 (7W), Class 3 (15.4W), and Class 4 (30W).
1...30000 - range of power in milliwatts
Release Note
NA
Example
ENABLE POE INTERFACE=1.23
Software Reference for SwitchBlade x3100 Series Switches
300
Power over Ethernet (PoE)
Configuring the GE24POE Card
RESET POE COUNTER INTERFACE
Syntax
RESET POE COUNTER INTERFACE [ ={ type:id-range | id-range | ifname-list | ALL
} ]
Description
Resets the counters for the POE interface(s).
Mode
Manager
Options
Option
Description
Default Value
Default
Value
INTERFACE
A logical representation of one or more physical ports
NA
NA
type:id-range - the type of available ports, such as
ETH:7.0 or a range (ETH:8.0-8.9)
id-range - used with type (type:id) to query the physical
ports; the numerical identifier of the interface
ifname-list - list of interface names, if not numerical
ALL - all applicable interfaces in the system
Release Note
NA
Example
RESET POE COUNTER INTERFACE=1.23
Software Reference for SwitchBlade x3100 Series Switches
301
Power over Ethernet (PoE)
Configuring the GE24POE Card
SET POE INTERFACE
Syntax
SET POE INTERFACE={ type:id-range | id-range | ifname-list | ALL } [ PRIORITY={ CRITICAL | HIGH | LOW } ] [ POWERLIMIT={ CLASS | 1..30000 } ]
Description
Sets the PoE options for one or more interfaces. The PRIORITY parameter controls which interfaces
are granted power when the power demand exceeds the available PoE power capacity. Low priority
ports are the first to be powered down, followed by high priority ports. By default all ports are low
priority. The power limit allows the user to set the maximum power that the port can draw before
shutting down.
Mode
Manager
Options
Option
Description
Default Value
Default
Value
INTERFACE
A logical representation of one or more physical ports
NA
NA
LOW
LOW
CLASS
CLASS
type:id-range - the type of available ports, such as
ETH:7.0 or a range (ETH:8.0-8.9)
id-range - used with type (type:id) to query the physical
ports; the numerical identifier of the interface
ifname-list - list of interface names, if not numerical
ALL - all applicable interfaces in the system
PRIORITY
Specifies which interfaces are given power when the
power demand exceeds the available PoE power capacity.
CRITICAL - Critical priority ports are given power first
in a capacity shortage.
HIGH - Next priority to receive power in a capacity
shortage, if power is available.
LOW - First ports to be powered down in a capacity
shortage.
POWERLIMIT
Specifies the maximum power that the port can draw
before shutting down, in milliwatts.
CLASS - the power class of the device. The default
class is 0, which is allocated 15.4W by default.
The supported classes are: Class 1 (4W), Class 2 (7W),
Class 3 (15.4W), and Class 4 (30W). The number of
devices capable of being supported per shelf depends on
the class of the devices in use.
1...30000 - range of power in milliwatts; use to manually
set the power limit instead of using CLASS.
Release Note
NA
Example
SET POE INTERFACE=1.23 POWERLIMIT=CLASS PRIORITY=HIGH
Software Reference for SwitchBlade x3100 Series Switches
302
Power over Ethernet (PoE)
Configuring the GE24POE Card
SET POE THRESHOLD
Syntax
SET POE THRESHOLD=1..99
Description
Sets the PoE options for the system for the power usage threshold. This is the percentage of the total
power available that is currently being used (instantaneous usage, not requested usage). The default
threshold is 99 percent. When the threshold is exceeded, an alarm notification is recorded.
Mode
Manager
Options
Option
Description
Range
Default
Value
THRESHOLD
Percentage of total power available that is currently in
use. The range is 1-99 percent.
99
99
Release Note
NA
Example
SET POE THRESHOLD=75
Software Reference for SwitchBlade x3100 Series Switches
303
Power over Ethernet (PoE)
Configuring the GE24POE Card
SHOW POE COUNTER INTERFACE
Syntax
SHOW POE COUNTER INTERFACE [ ={ type:id-range | id-range | ifname-list | ALL
} ]
Description
Shows the counters for the POE interface(s).
PoE counters are fault and status events. These are defined as follows:
Mode
•
MPS Absent - Maintenance power signature is the signal a PD sends to the switch to indicate that
the PD is connected and requires power; indicates the number of times a detected PD has no longer
requested power from the port
•
Invalid - indicates a fault with the connected PD
•
Denied - the number of times PDs requesting power on the port have been denied due to insufficient power available
•
Overload - the number of times a connected PD attempted to draw more than 15.4 watts
•
Short - the number of times the switch provided insufficient current to a connected PD.
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical ports
NA
NA
type:id-range - the type of available ports, such as
ETH:7.0 or a range (ETH:8.0-8.9)
id-range - used with type (type:id) to query the physical
ports; the numerical identifier of the interface
ifname-list - list of interface names, if not numerical
ALL - all applicable interfaces in the system
Release Note
NA
Example
officer SEC>> SHOW POE COUNTER INTERFACE=1.0-1.4
--- PoE Interface Counters --------------------------------------Interface
----------1.0
1.1
1.2
1.3
1.4
MPS Absent
-----------12
6
0
0
Invalid
--------0
3
0
0
Software Reference for SwitchBlade x3100 Series Switches
Denied
--------0
3
0
0
Overload
---------0
0
0
0
Short
-------0
0
1
0
304
Power over Ethernet (PoE)
Configuring the GE24POE Card
SHOW POE INTERFACE
Syntax
SHOW POE INTERFACE [ ={ type:id-range | id-range | ifname-list | ALL } ] [
FULL ]
Description
Displays the PoE attributes and settings for one or more interfaces.
Mode
User
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical ports
NA
NA
NA
NA
type:id-range - the type of available ports, such as
ETH:7.0 or a range (ETH:8.0-8.9)
id-range - used with type (type:id) to query the physical
ports; the numerical identifier of the interface
ifname-list - list of interface names, if not numerical
ALL - all applicable interfaces in the system
FULL
Shows full information for the specified command.
Release Note
NA
Example
When a specific interface is included, the SHOW POE INTERFACE command
shows the main attributes for the specified interface. With the FULL
option, this command shows the configuration options and the actual
status.
officer SEC>> SHOW POE INTERFACE=1.*,2.0
--- POE Power Status --PoE
POE
Interface State
Priority Limit Power Status
Class
Actual
--------- -------- -------- ----- -------------- ---------- ---------1.0
Disabled Low
7.0W Disabled
2 (7W)
0W
1.1
Enabled High
CLASS Powered
3 (15.4W) 8.7W
1.2
Enabled Low
15.0W No PD Detected 0W
1.3
Enabled Critical 10.0W Fault Present 0 (15.4W)
0W
1.4
Enabled Critical 5.5W Powered
2 (7W)
6.4W
1.5
Enabled High
5.0W Disabled
4 (30W)
0W ...
2.0
Enabled High
CLASS Disabled
0W
officer SEC>> SHOW POE INTERFACE=1.1 FULL
--- POE Power Status --Interface.............................
POE State.............................
Priority..............................
Power Limit...........................
Actual
Power Status........................
Class...............................
Power...............................
Voltage.............................
Current.............................
Software Reference for SwitchBlade x3100 Series Switches
1.0
Enabled
Low
CLASS
Powered
3 (15.4W)
4.3W
50.1V
86mA
305
Power over Ethernet (PoE)
Configuring the GE24POE Card
SHOW POE
Syntax
SHOW POE [ CARD={ slot-list | ALL } ]
Description
Displays the power usage for the shelf and/or supported cards. If no card is selected then all cards are
shown.
Mode
User
Options
Option
Description
Range
Default
Value
CARD
The slot number for the PoE card (module) in the shelf.
NA
NA
slot-list - a comma-separated or a dash range of slots
ALL - shows all applicable cards on the shelf.
Release Note
NA
Example
officer SEC>> SHOW POE CARD=ALL
--- POE Power Status --Shelf Power Total.....................
Shelf Power Requested.................
Shelf Power Available.................
Shelf Power Actual....................
Shelf Power Threshold.................
Card
---0
1
2
3
7
8
10
11
Allocated
-----------53W
51W
500W
182W
51W
51W
51W
261W
Requested
---------30W
16W
510W
168W
0W
30W
16W
247W
Software Reference for SwitchBlade x3100 Series Switches
Actual
------24W
9W
439W
168W
0W
26W
15W
207W
1200W
1017W
183W
888W
99%
Min Voltage
-----------50.0V
50.0V
50.0V
50.0V
50.0V
50.0V
50.0V
50.0V
Max Voltage
-----------57.0V
57.0V
57.0V
57.0V
57.0V
57.0V
57.0V
57.0V
306
4. Layer Two Switching
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Switching
Switching Commands
Link Aggregation (LAG)
LAG Commands
VLAN (802.3)
VLAN Commands
Spanning Tree Introduction: STP, RSTP, MSTP and BPDU Cop
Spanning Tree Commands
Ethernet Protection Switched Ring (EPSR) and SuperLoop Prevention
EPSR and SuperLoop Commands
Upstream Forwarding Only (UFO) Mode
Upstream Control Protocol (UCP)
HVLAN (Port Based and VLAN Based)
HVLAN Commands
VLAN Translation
VLAN Translation Commands
Software Reference for SwitchBlade x3100 Series Switches
307
Layer Two Switching
4.1 Switching
4.1.1 Overview
As a layer 2 switching device, the Allied Telesis SBx3112 ensures data packets arrive at their proper destination by using:
• VLAN - This is a software-defined subnetwork that allows devices to be grouped into one logical broadcast domain.
• MAC address - The MAC address uniquely identifies each hardware device attached to the network.
The layer 2 switching process includes four separate but related processes:
1.
Ingress Rules admit or discard frames based on their VLAN tagging.
2.
Learning Process learns the MAC addresses for each VLAN as frames are admitted to each interface.
3.
Forwarding Process determines which interfaces the frames are forwarded to.
4.
Egress Rules determine for each frame whether VLAN tags are included in the Ethernet frames that are Transmitted.
Since this is layer 2, the learning process assumes that each host on the extended LAN has a unique data link layer address,
and all data link layer frames have a header which includes the source (sender) MAC address and destination (receiver) MAC
address.
4.1.2 Ingress Rules
When a frame first arrives at a port, the Ingress Rules for the port will check the VLAN tagging in the frame to determine
whether it will be discarded or forwarded to the Learning Process.
Every frame received by the switch must be associated with a VLAN. If a received frame is untagged, then the port's untagged
VLAN Identifier (VID) will be associated with the received frame. Since every port belongs to one or more VLANs, every
incoming frame will have a VID to indicate which VLAN it belongs to.
The Ingress Rule will check whether the port, in which the frame was received on, belongs to the VLAN indicated by the
received frame's VID. If the port is not a member of the VLAN, then the frame will be discarded; otherwise, the frame will be
passed on to the Learning Process.
4.1.3 Learning Process
When a layer 2 ethernet switch first receives frames, the switch floods the data packets. The Learning Process uses an adaptive learning algorithm -- sometimes called backward learning -- to discover the location (port) of each host on the extended
LAN and ensure frames are sent to their destination as efficiently as possible.
All frames admitted by the Ingress Rules on any port are passed on to the Learning Process, where the frame's source MAC
address and numerical (VID) are compared with entries in the Forwarding Database for the VLAN (also known as a MAC
address table, or a forwarding table) maintained by the switch. The Forwarding Database contains one entry for every unique
host MAC address the switch knows in each VLAN.
If the frame's source address is not already in the Forwarding Database for the VLAN, the address is added (MAC address
and VLAN ID) and an ageing timer for that entry is started. If the frame's source address is already in the Forwarding Database, the ageing timer for that entry is restarted.
By default, switch learning is enabled, and it can be disabled or enabled using the commands:
DISABLE SWITCH LEARNING
ENABLE SWITCH LEARNING
Caution: If the Learning Process is disabled, MAC addresses are no longer added to the forwarding database, and as the
ageingtimer (discussed next) expires and frames with their source addresses and VLAN IDs are no longer learned,
the system will slowly depopulate its forwarding database
Software Reference for SwitchBlade x3100 Series Switches
308
Layer Two Switching
If the ageing timer for an entry in the Forwarding Database expires before another frame with the same source address and
VID is received, the entry is removed from the Forwarding Database. This prevents the Forwarding Database from being
filled up with information about hosts that are inactive or have been disconnected from the network, while ensuring that
entries for active hosts are kept alive. By default, the ageing timer is enabled, and it can be disabled or enabled using the commands
ENABLE SWITCH AGEINGTIMER
DISABLE SWITCH AGEINGTIMER
The ageing timer can be modified and has a range of 10 - 630 seconds. By default, the ageing time is set to a value of 300 second (5 minutes).
The Forwarding Database relates a host's (source) address to a port on the switch, and is used by the switch to determine
from which port (if any) to transmit frames with a destination MAC address matching the entry in the host map.
To display the contents of the Forwarding Database, use the SHOW SWITCH FDB command. The output includes:
•
•
•
•
VLAN or HVLAN - The VID Identifier for the VLAN or HVLAN.
Interface - The interface from which the MAC address was learned.
MAC Address - The MAC address as learned from the source address field of a frame. Example: 00:0C:25:00:13:8C.
Status - Whether the MAC address was learned from the source address field of a frame.
manager SEC>> show switch fdb interface 0.1
--- Switch Forwarding Database --Slot
VLAN
Interface ID
MAC Address
Status
----------0
0
0
0
0
0
0
0
0
0
----------1
1
1
1
1
1
1
1
1
1
--------------0.1
0.1
0.1
0.1
0.1
0.1
0.1
0.1
0.1
0.1
---------------------00:58:F8:3F:8F:9F
04:6D:D6:B6:16:BA
06:46:69:F9:38:9D
0A:37:F5:3A:50:B5
0C:1E:A0:ED:3E:23
0E:68:72:C3:CC:8E
10:2A:7E:46:55:B7
12:61:E5:FE:D3:00
16:31:91:FB:7B:5A
1A:3D:A3:21:66:53
-------Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
4.1.4 Forwarding Process
The Forwarding Process forwards received frames that are to be relayed to other ports in the same VLAN. If a frame is
received on the port for a destination in a different VLAN, it will need to be serviced by a Layer 3 switch/router external to
the SBx3112 product.
4.1.5 Egress Rules
Once the Forwarding Process has determined which ports the frame is to be forward to, the Egress Rules for each port
determine if the outgoing frame is to be VLAN-tagged with its numerical VLAN Identifier (VID).
When an interface is added to a VLAN, the VLAN is configured to transmit either untagged or tagged VLAN packets. This is
done using the commands to add or set the VLAN interface. Refer to 4.3.2.1 on VLAN tagging.
4.1.6 MAC Thrash Limiting (SBx3112)
As explained in the previous sections, the four related processes listed in 4.1.1 result in traffic being sent directly to its
proper destination with a system that maps VLANs to unique MAC addresses on specific interfaces. However, it is possible
that duplicate MAC addresses can occur legitimately (called a MAC move), and these can occur on different interfaces or on
Software Reference for SwitchBlade x3100 Series Switches
309
Layer Two Switching
the same interface. The MAC Thrash Limiting feature detects and handles this scenario where MAC moves occur at a high
rate.
4.1.6.1 Duplicate Addresses on Inter-card Interfaces (System Wide)
If the same address is seen on more than one interface a number of times, there is a possible loop condition. Any time a MAC
move occurs, it is considered a potential duplicate address. When the first MAC move is detected a system-wide one second
timer starts. During this second, the MAC move count increments. If the count exceeds 128 before the second expires, a
duplicate address condition is declared and the following actions occur:
•
•
•
•
•
The interface on which the next MAC move occurs is learning disabled. Packets received will continue to forward.
The interface will stay in a learning disabled state for 60 seconds.
The interface that currently has the MAC address is not affected, and its learning is not disabled.
Up until the second expires, these actions continue for every succeeding MAC move.
An alarm is generated, and a trap is sent.
When the second expires, the process for detecting MAC moves starts again.
4.1.6.2 Duplicate Addresses on Intra-card Interface
If a duplicate MAC address is detected on an intra-card interface in a very short period of time, the following actions occur:
• The interface is learning disabled immediately (there is no one-second timer or 128 limit). Packets received will continue to forward.
• The Line Card sends a message to the CFC to inform the FDB Management system that the interface has been disabled
because of MAC Thrash Limiting.
• The interface will stay in a learning disabled state for 60 seconds.
4.1.7 Clearing the Forwarding Database (FDB)
There are two ways in which an address can be cleared from the switch FDB.
The contents of the FDB can be manually cleared by using the CLEAR SWITCH FDB command:
• VLAN or HVLAN - The VID Identifier for the VLAN or HVLAN.
• MAC Address - The MAC address as learned from the source address field of a frame. Example: 00:0C:25:00:13:8C
• Interface - The interface from which the MAC address was learned.
Alternatively, there is an option to have the MAC addresses remain in the FDB after the interface fails. MAC addresses can be
dynamically removed from the FDB by using the following command:
SET SWITCH MACREMOVALMODE={AGEONLY|AGEANDSTATE}
The default setting, AGEANDSTATE, removes dynamic FDB entries upon regular ageing time-outs and on interface out-ofservice state changes.
The optional setting, AGEONLY, removes dynamic FDB entries upon regular ageing time-outs but does not remove them on
interface out-of-service state changes.
4.1.8 Viewing Switch Settings
The SHOW SWITCH command displays configuration information for the switch functions.
officer SEC>> show switch
--- Switch Configuration ------------------Learning.............................. On
Software Reference for SwitchBlade x3100 Series Switches
310
Layer Two Switching
Ageing Timer..........................
Ageingtimer...........................
Age-Only FDB Clear....................
Number of SM Ports....................
Number of NM Ports....................
Number of HVLAN.......................
Number of Standard VLAN...............
Number of
VLAN.................... 0
Hash Select ..........................
On
300
Off
96
4
0
1
ALL
--------------------------------------------
The displayed switch settings are:
• Learning - Whether or not the switch's dynamic learning and updating of the Forwarding Database is enabled; one of
“ON” or “OFF”.
• Ageing Timer - Whether or not the ageing timer is enabled; one of “ON” or "OFF".
• Ageingtimer - The value in seconds of the ageing timer, after which a dynamic entry is removed from the Forwarding
Database.
• Age-Only FDB Clear:
• As displayed above, the attribute Age-Only FDB Clear is Off, which indicates that the default AGEANDSTATE setting is currently ON.
• If the attribute Age-Only FDB Clear is On, the optional AGEONLY setting is currently ON.
• Number of SM Ports - The number of fixed switch downlink Line Card interfaces.
• Number of NM Ports - The number of switch uplink interfaces.
Note:
The concept of NM and SM Ports does not apply to the SBx3112; it will be replaced with the term Line Card in a
future release.
• Number of HVLAN - The number of HVLANs in the switch.
• Number of Standard VLAN - The number of standard 802.1q VLANs in the switch.
• Number of UFO VLAN - The number of upstream forwarding-only VLANs in the switch. In a UFO VLAN, the traffic
from downstream interfaces is forwarded only to upstream interface(s). Also includes the type of MACREMOVAL set for
the system.
• Hash Select - The current hash selection setting.
4.1.9 Configuring the Forwarding Database
4.1.9.1 Default Configuration
By default, the Switch Learning and Ageingtimer are set to ENABLED, so the FDB is dynamically learned and updated, and
AGEINGTIMER determines when a dynamic entry is removed.
4.1.9.2 Restrictions and Limitations
When a learn limit is set on an interface and that limit is exceeded there is no log or trap sent. (This is different than the feature for the iMAPs where an “FDB management overflow” log, a CARD046, and associated SNMP trap would be generated.)
The SBx3112 supports a maximum 16K MAC address table size. If this learn limit is exceeded, those MAC addresses (in
excess of the 16K limit) are flooded.
4.1.9.3 Feature Interactions for Interface Learn Limit and TPID
The SET INTERFACE TPID and SET INTERFACE LEARNLIMIT commands affect this feature.
Software Reference for SwitchBlade x3100 Series Switches
311
Layer Two Switching
• The SBx3112 supports a maximum 16K MAC address table size. On a per-port basis, if LEARNLIMIT=OFF then the port
can learn up to the system maximum. If LEARNLIMIT=1..64, then the port can fully support that limit. This applies both
XE4 and GE24 interfaces.
• Unlike legacy iMAP, there is a limited number of TPIDs for a given card -- that can be applied to all card ports. For the
XE4, the limit is 2 different TPIDs. For GE24 cards, the limit is 8 different TPIDs.
4.1.9.4 Configuration Procedure - Dynamically Clearing the FDB
The following procedure demonstrates the behavior of the FDB when MAC addresses are configured to be dynamically
cleared -- using the SET SWITCH MACREMOVALMODE command.
TABLE 4-1
Step
Configuration Procedure for Clear FDB (Dynamically)
Command
Description/Notes
View current switch settings. The “Age-Only FDB Clear” parameter is “Off” -- indicating the default MAC removal mode
as AGEANDSTATE.
1
show switch
--- Switch Configuration -----------------------------------------------------Learning..............................
Ageing Timer..........................
Ageingtimer...........................
Age-Only FDB Clear............... Off
Number of SM Ports....................
Number of NM Ports....................
Number of HVLAN.......................
Number of Standard VLAN...............
Number of UFO VLAN....................
Hash Select ..........................
On
On
300
196
24
2
261
14
ALL
View contents of the FDB.
2
show switch fdb
--- Switch Forwarding Database --Slot
VLAN
Interface ID
MAC Address
----------- ----------- --------------- ---------------------0
420
0.0
00:00:CD:0E:B1:F0
0
420
0.0
00:0C:25:00:FC:59
0
2100
0.0
00:0C:25:00:FC:59
0
3511
0.23
00:00:02:00:0B:99
Dynamic
11
512
11.23
00:02:02:00:AB:15
11
512
11.23
00:02:02:00:AB:AF
11
512
11.23
00:02:02:00:AC:05
11
512
11.23
00:02:02:00:BC:A7
Status
--------------Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Disable interface 0.23 in order to observe behavior of FDB.
3
disable interface 0.23
First, disable interface.
Verify that the entry for interface 0.23 has been removed from FDB.
Software Reference for SwitchBlade x3100 Series Switches
312
Layer Two Switching
TABLE 4-1
Step
Command
4
show switch fdb
Configuration Procedure for Clear FDB (Dynamically)
Description/Notes
--- Switch Forwarding Database --Slot
----------0
0
0
0
0
0
11
11
11
11
VLAN
----------420
420
420
420
420
2100
512
512
512
512
Interface ID
--------------0.0
0.0
0.0
0.0
0.0
0.0
11.23
11.23
11.23
11.23
MAC Address
---------------------00:00:CD:0E:B1:F0
00:0C:25:00:FC:59
94:0C:6D:B6:49:65
94:0C:6D:BC:47:B5
94:0C:6D:BC:49:54
00:0C:25:00:FC:59
00:02:02:00:AB:15
00:02:02:00:AB:AF
00:02:02:00:AC:05
00:02:02:00:BC:A7
Status
--------------Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Slot
VLAN
Interface ID
MAC Address
----------- ----------- --------------- ---------------------0
420
0.0
00:00:CD:0E:B1:F0
0
420
0.0
00:0C:25:00:FC:59
0
2100
0.0
00:0C:25:00:FC:59
0
3511
0.23
00:00:02:00:0B:99
Dynamic
11
512
11.23
00:02:02:00:AB:15
11
512
11.23
00:02:02:00:AB:AF
11
512
11.23
00:02:02:00:AC:05
11
512
11.23
00:02:02:00:BC:A7
Status
--------------Dynamic
Dynamic
Dynamic
Re-enable the interface 0.23.
5
enable interface 0.23
Verify that interface 0.23 reappears in FDB.
6
show switch fdb
--- Switch Forwarding Database ---
Dynamic
Dynamic
Dynamic
Dynamic
Change the MAC Removal mode so that a MAC address is removed only when it is aged out.
7
set switch macremovalmode ageonly
Verify that the MAC Removal mode has changed to AGEONLY (i.e., the “Age-Only FDB Clear” parameter is “On”).
8
show switch
--- Switch Configuration ------------------------------------------------------
.
Learning..............................
Ageing Timer..........................
Ageingtimer...........................
Age-Only FDB Clear............... On
Number of SM Ports....................
Number of NM Ports....................
Number of HVLAN.......................
Number of Standard VLAN...............
Number of UFO VLAN....................
Hash Select ..........................
On
On
300
<<Notice this is now "On"
196
24
2
261
14
ALL
Disable interface 0.23 again
9
disable interface 0.23 force
Software Reference for SwitchBlade x3100 Series Switches
313
Layer Two Switching
TABLE 4-1
Step
Configuration Procedure for Clear FDB (Dynamically)
Command
Description/Notes
Verify that the MAC address now remains -- where as, it was immediately removed before
10
show switch fdb
--- Switch Forwarding Database --Slot
VLAN
Interface ID
MAC Address
Status
----------- ----------- --------------- ---------------------- --------------0
420
0.0
00:00:CD:0E:B1:F0
Dynamic
0
420
0.0
00:0C:25:00:FC:59
Dynamic
0
2100
0.0
00:0C:25:00:FC:59
Dynamic
0
3511
0.23
00:00:02:00:0B:99 Dynamic <<still present!
11
512
11.23
00:02:02:00:AB:15
Dynamic
11
512
11.23
00:02:02:00:AB:AF
Dynamic
11
512
11.23
00:02:02:00:AC:05
Dynamic
11
512
11.23
00:02:02:00:BC:A7
Dynamic
Software Reference for SwitchBlade x3100 Series Switches
314
Layer Two Switching
4.1.10 Switching Commands
This subsection provides an alphabetical reference for commands used to configure the Forwarding Database (FDB). For
information about spanning trees, including configuration procedures, refer to 4.4.
TABLE 4-2
Switching Commands
Commands
CLEAR SWITCH FDB (HVLAN)
CLEAR SWITCH FDB (VLAN)
DISABLE SWITCH AGEINGTIMER
DISABLE SWITCH LEARNING
ENABLE SWITCH AGEINGTIMER
ENABLE SWITCH LEARNING
SET SWITCH AGEINGTIMER
SET SWITCH FDBSIZE
SET SWITCH MACREMOVALMODE
SHOW SWITCH
SHOW SWITCH FDB
SHOW SWITCH INTERNALMAC
Software Reference for SwitchBlade x3100 Series Switches
315
Layer Two Switching
CLEAR SWITCH FDB (HVLAN)
Syntax
CLEAR SWITCH FDB [INTERFACE={type:id-range|id-range|ifname-list| ALL}]
[ADDRESS=macaddress] [HVLAN={hvlanname|vid}]
Description
Clears the contents of the Forwarding Database for the specified HVLAN.
Mode
Manager
Options
Option
Description
Range
Default Value
INTERFACE
The interface from which the MAC address was learned
NA
NA
MAC_Address
A specific MAC address as learned from the source
address field of a frame. Example: 00:0C:25:00:13:8C
NA
ALL - All
learned MAC
addresses
HVLAN
The VID Identifier for the HVLAN.
NA
NA
Release Note
NA
Example
CLEAR SWITCH FDB INTERFACE=8.0 HVLAN=236
Software Reference for SwitchBlade x3100 Series Switches
316
Layer Two Switching
CLEAR SWITCH FDB (VLAN)
Syntax
CLEAR SWITCH FDB [INTERFACE={type:id-range|id-range|ifname-list| ALL}]
[ADDRESS=macaddress] [VLAN={vlanname|vid}]
Description
Clears the contents of the Forwarding Database for the specified VLAN.
Mode
Manager
Options
Option
Description
Range
Default Value
INTERFACE
The interface from which the MAC address was learned
NA
NA
MAC Address
A specific MAC address as learned from the source
address field of a frame. Example: 00:0C:25:00:13:8C
NA
ALL - All learned
MAC addresses
VLAN
The VID Identifier for the VLAN.
NA
NA
Release Note
NA
Example
CLEAR SWITCH FDB INTERFACE=8.0 VLAN=123
Software Reference for SwitchBlade x3100 Series Switches
317
Layer Two Switching
DISABLE SWITCH AGEINGTIMER
Syntax
DISABLE SWITCH AGEINGTIMER
Description
Disables the ageing timer from ageing out dynamically learned entries in the Forwarding Database. The
default setting for the ageing timer is enabled.
If the switch finds no matching entries in the Forwarding Database during the Forwarding Process, then
all switch interfaces in the VLAN/HVLAN will be flooded with the packet (except the interface on
which the packet was received).
Mode
Manager
Note
Disabling the switch ageing timer is not recommended.
Options
None
Release Note
NA
Example
DISABLE SWITCH AGEINGTIMER
Software Reference for SwitchBlade x3100 Series Switches
318
Layer Two Switching
DISABLE SWITCH LEARNING
Syntax
DISABLE SWITCH LEARNING
Description
Disables the dynamic learning and updating of the Forwarding Database. The default setting for the
learning function is enabled.
If the switch finds no matching entries in the Forwarding Database during the Forwarding Process, then
all switch interfaces in the VLAN/HVLAN will be flooded with the packet (except the interface on
which the packet was received).
Mode
Manager
Options
None
Release Note
NA
Example
DISABLE SWITCH LEARNING
Software Reference for SwitchBlade x3100 Series Switches
319
Layer Two Switching
ENABLE SWITCH AGEINGTIMER
Syntax
ENABLE SWITCH AGEINGTIMER
Description
Enables the ageing timer to age out dynamically learned entries in the Forwarding Database. The
default setting for the ageing timer is enabled. If the switch finds no matching entries in the Forwarding
Database during the Forwarding Process, then all switch interfaces in the VLAN/HVLAN will be
flooded with the packet, except the interface on which the packet was received.
Mode
Manager
Options
NA
Release Note
NA
Example
ENABLE SWITCH AGEINGTIMER
Software Reference for SwitchBlade x3100 Series Switches
320
Layer Two Switching
ENABLE SWITCH LEARNING
Syntax
ENABLE SWITCH LEARNING
Description
Enables the dynamic learning and updating of the Forwarding Database. The default setting for the
learning function is enabled. If the switch finds no matching entries in the Forwarding Database during
the Forwarding Process, then all switch interfaces in the VLAN/HVLAN will be flooded with the
packet, except the interface on which the packet was received.
Mode
Manager
Options
NA
Release Note
NA
Example
ENABLE SWITCH LEARNING
Software Reference for SwitchBlade x3100 Series Switches
321
Layer Two Switching
SET SWITCH AGEINGTIMER
Syntax
SET SWITCH AGEINGTIMER=10..630
Description
The SET SWITCH AGEINGTIMER sets the threshold value (in seconds) of the ageing timer. Afterwards, a dynamic entry in the Forwarding Database is automatically removed.
If the switch finds no matching entries in the Forwarding Database during the Forwarding Process, then
all switch interfaces in the VLAN/HVLAN will be flooded with the packet (except the interface on
which the packet was received).
Mode
Manager
Options
Option
Description
Range
Default
Value
AGEINGTIMER
Time (in seconds) after which a dynamic entry in the
Forwarding Database is automatically removed.
10-630
300 seconds
The maximum setting of 630 seconds is approximately
10.5 minutes.
The valid ageing timer range for the SBx3112 is 10 to
630. This range may be different for other products in
the SBx3100 family.
Release Note
NA
Note
Changing the ageing time will only affect entries added to the Forwarding Database after the timer has
been changed.
Example
SET SWITCH AGEINGTIMER=300
Software Reference for SwitchBlade x3100 Series Switches
322
Layer Two Switching
SET SWITCH FDBSIZE
Syntax
SET SWITCH FDBSIZE={ 16K | 32K } RESTARTSYSTEM [ FORCE ]
Description
This command sets the value of the FDBSIZE attribute. Setting this attribute will require a system
restart. Any cards that are incompatible with this FDB size will not be allowed to come online. If there
is no change in FDBSIZE the user is notified with an informative message and no action is taken.
The SHOW SWITCH command will show that the FDB size has been changed.
Mode
Manager
Options
Option
Description
Range
Default
Value
FDBSIZE
Specify the desired maximum nominal size of the
FDB in terms of MAC address capacity
16K, 32K
NA
RESTARTSYSTEM
There will be a prompt that a system restart will
take place.
NA
NA
FORCE
There will be no prompt that a system restart will
take place.
NA
NA
Note
When the user tries to place into service a card that cannot support the configured FDBSIZE parameter, there is a failure raised against the card with the message “Incomptaible DB size.” The user must
change the FDBSIZE so that card can be placed into service, or use a card that matches the configured
FDBSIZE. This alarm will not appear if a higher priority message (card not persent or incompatible
load) is also present.
Note
This command is rejected if any currently inservice cards are incomptible with the new setting.
Example
officer SEC>> SET SWITCH FDBSIZE=32K RESTARTSYSTEM
(Error xxxxx) Cards 0,1 cannot support the new FDB size and must be disabled.
officer SEC>>
officer SEC>> DISABLE CARD 0,1
Service may be affected, are you sure (Y/N)? y
Info (039512): Operation Successful (GE24POE Slot 0)
Info (039512): Operation Successful (GE24POE Slot 1)
officer SEC>>
officer SEC>> SET SWITCH FDBSIZE=32K
Error (000001): The command entered is incomplete.
Please refer to the following list of expected parameters:
RESTARTSYSTEM - User acknowledgement of the required system restart
officer SEC>>
officer SEC>> SET SWITCH FDBSIZE=32K RESTARTSYSTEM
Setting the switch FDB size automatically restarts the system.
Cards that cannot support the new FDB size will not boot.
Do you want to proceed (Y/N)? Y
Software Reference for SwitchBlade x3100 Series Switches
323
Layer Two Switching
SET SWITCH MACREMOVALMODE
Syntax
SET SWITCH MACREMOVALMODE={AGEONLY|AGEANDSTATE}
Description
Provides the option to have the MAC addresses remain in the FDB after the interface fails.
Note:
If the AGEONLY parameter is set and a device is physically moved from one port to another, the device’s MAC
address will naturally appear on the new port. This is regarded as a legitimate MAC move. The resulting duplicate
MAC address will be detected/handled by the MAC Thrash Limiting feature as decribed in MAC Thrash Limiting
(SBx3112).
Mode
Manager
Options
Option
Description
Range
MACREMOVALMODE
AGEANDSTATE - removes dynamic FDB entries upon
regular ageing time-outs and on interface out-of-service
state changes.
NA
Default
Value
AGEANDSTATE
AGEONLY - removes dynamic FDB entries upon regular
ageing time-outs but does not remove them on interface
out-of-service state changes.
Release Note
NA
Example
SET SWITCH MACREMOVALMODE=AGEANDSTATE
Software Reference for SwitchBlade x3100 Series Switches
324
Layer Two Switching
SHOW SWITCH
Syntax
SHOW SWITCH
Description
Displays configuration information for the switch functions.
Mode
Manager
Options
NA
Release Note
NA
Example
E135 - manager SEC>> SHOW SWITCH
--- Switch Configuration -----------------Learning..............................
Ageing Timer..........................
Ageingtimer...........................
Age-Only FDB Clear....................
Number of SM Ports....................
Number of NM Ports....................
Number of HVLAN.......................
Number of Standard VLAN...............
Number of UFO VLAN....................
Hash Select ..........................
On
On
300
Off
182
18
0
22
1
ALL
-------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
325
Layer Two Switching
SHOW SWITCH FDB
Syntax
SHOW SWITCH FDB [ INTERFACE={ type:id-range | id-range | ifname-list | ALL} ]
[ ADDRESS=macaddress ] [ HVLAN={ hvlanname | vid } ]
Description
Displays the contents of the Forwarding Database.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
INTERFACE
An interface name or ID
NA
NA
ADDRESS
A MAC address. You can use the wildcard (*) character
to filter for a range of MAC addresses
NA
ALL
HVLAN
The name of id of an HVLAN
NA
ALL
NA
Example
SHOW SWITCH FDB INTERFACE=3.*,11.22
--- Switch Forwarding Database --Slot
----------3
3
3
3
3
3
3
3
3
3
3
3
3
11
11
11
11
VLAN
----------420
420
512
512
10
402
402
402
420
420
420
512
512
1415
1415
1415
1415
Interface ID
--------------3.1
3.1
3.1
3.1
3.2
3.2
3.2
3.2
3.2
3.2
3.2
3.2
3.2
11.22
11.22
11.22
11.22
MAC Address
---------------------00:00:CD:0E:B1:F0
00:09:6B:09:1C:32
00:0C:31:D4:60:00
00:15:77:F5:68:61
00:18:8B:A7:F0:00
00:00:CD:1D:C1:C2
00:00:CD:23:28:6F
00:0A:5E:61:B2:37
00:0C:25:00:05:AD
00:0C:25:00:06:AE
00:0C:25:00:FC:59
00:02:02:00:AC:0A
00:02:02:00:BC:5B
00:00:CD:0E:B1:F0
00:09:6B:09:1C:32
00:0D:DA:0C:01:3C
EC:CD:6D:03:10:CC
Software Reference for SwitchBlade x3100 Series Switches
Status
-------Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
326
Layer Two Switching
SHOW SWITCH INTERNALMAC
Syntax
SHOW SWITCH INTERNALMAC [ { INTERFACE={ type:id-range | id-range | ifnamelist | ALL } | CARD={ slot-list | ALL } } ] [ ADDRESS=macaddress ]
Description
Displays the all the internal MAC addresses assigned to all the external and internal ports of all the
card types.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
INTERFACE
The id type, name, or ALL
NA
ALL
CARD
The slot number or ALL
NA
ALL
ADDRESS
A specific MAC address
NA
ALL
NA
Example
SHOW SWITCH INTERNALMAC
--- Internal MAC Address --Slot
----------5
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
8
8
8
8
Interface ID
--------------0
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
1.10
1.11
1.12
1.13
1.14
1.15
1.16
1.17
1.18
1.19
1.20
1.21
1.22
1.23
8.0
8.1
8.2
8.3
Card Type
----------CFC200
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
Software Reference for SwitchBlade x3100 Series Switches
MAC Address
---------------------00:0C:25:04:00:0C
00:0C:25:04:02:F7
00:0C:25:04:02:F8
00:0C:25:04:02:F9
00:0C:25:04:02:FA
00:0C:25:04:02:FB
00:0C:25:04:02:FC
00:0C:25:04:02:FD
00:0C:25:04:02:FE
00:0C:25:04:02:FF
00:0C:25:04:03:00
00:0C:25:04:03:01
00:0C:25:04:03:02
00:0C:25:04:03:03
00:0C:25:04:03:04
00:0C:25:04:03:05
00:0C:25:04:03:06
00:0C:25:04:03:07
00:0C:25:04:03:08
00:0C:25:04:03:09
00:0C:25:04:03:0A
00:0C:25:04:03:0B
00:0C:25:04:03:0C
00:0C:25:04:03:0D
00:0C:25:04:03:0E
00:0C:25:04:02:48
00:0C:25:04:02:49
00:0C:25:04:02:4A
00:0C:25:04:02:4B
327
Layer Two Switching
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
8
10
10
10
10
11
11
11
11
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
8.12
8.13
8.14
8.15
8.16
8.17
8.18
8.19
8.20
8.21
8.22
8.23
10.0
10.1
10.2
10.3
11.0
11.1
11.2
11.3
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
GE24POE
XE4
XE4
XE4
XE4
XE4
XE4
XE4
XE4
Software Reference for SwitchBlade x3100 Series Switches
00:0C:25:04:02:4C
00:0C:25:04:02:4D
00:0C:25:04:02:4E
00:0C:25:04:02:4F
00:0C:25:04:02:50
00:0C:25:04:02:51
00:0C:25:04:02:52
00:0C:25:04:02:53
00:0C:25:04:02:54
00:0C:25:04:02:55
00:0C:25:04:02:56
00:0C:25:04:02:57
00:0C:25:04:02:58
00:0C:25:04:02:59
00:0C:25:04:02:5A
00:0C:25:04:02:5B
00:0C:25:04:02:5C
00:0C:25:04:02:5D
00:0C:25:04:02:5E
00:0C:25:04:02:5F
00:0C:25:04:00:BC
00:0C:25:04:00:BD
00:0C:25:04:00:BE
00:0C:25:04:00:BF
00:0C:25:04:00:40
00:0C:25:04:00:41
00:0C:25:04:00:42
00:0C:25:04:00:43
328
Layer Two Switching
4.2 Link Aggregation (LAG)
4.2.1 Introduction
The Link Aggregation Group (LAG) feature, defined in 802.3ad, allows multiple physical links to be joined into a LAG, which
creates one virtual link. If one link fails, traffic is distributed to the remaining inservice links. Links can be added or deleted
from the LAG, depending on traffic requirements.
The following figure shows a basic LAG configuration for the SBx3112.
= Line
Card
lagid 1
lagid 2
= Interface
SBx3112
SBx3100
CFC
FIGURE 4-1
Upstream Protection Using LAG - SBx3112
The LAG feature works on all the Allied Telesis products, but there are key differences in how they can be deployed for the
SBx3100.
• The SBx3100 supports cross-card LAG, across like interfaces (GE or XE), on all line cards. The SB x3100 supports one
hash select algorithm for the entire switch, which can be set using the set switch hash select CLI command. Setting the
switch hash select affects the behavior of all existing LAGs.
• The SBx3100 also supports the Link Aggregation Control Protocol (LACP) feature. When enabled, this feature allows
the SBx3100 to exchange LACP messages (LACPDUs) with neighboring systems, for the purpose of aggregating links connected between the systems. The SBx3100 continues to support static-mode link aggregation (LAG), which requires
manual configuration of the LAG on the near and far-end systems. Therefore, the SBx3100 can statically or dynamically
configure LAGs via LACP.
• The SBX3100 supports Upstream Forwading Only (UFO) VLANs, allowing users with certain configurations (such as subtending rings) to increase the bandwidth capacity of the uplinks. Refer to 4.2.7.3 for how this is configured.
4.2.2 Feature Overview
IEEE Standard 802.3ad specifies a means of aggregating one or more physical links into a logical link of increased bandwidth
and reliability, between two nodes in a local or metropolitan area network. The resulting logical link is referred to as a LAG,
Software Reference for SwitchBlade x3100 Series Switches
329
Layer Two Switching
which is comprised of N parallel, full duplex, point-to-point links operating at the same speed. MAC clients then utilize the
LAG as if it were a single link.
Link Aggregation enables setting up grouped links between two nodes, of greater bandwidth than the individual physical links.
This is accomplished by creating a LAG and assigning one or more physical links (ports) to the group. The newly formed
aggregation will have a single MAC address for use by the associated MAC Client. The fact that there are multiple physical
links carrying frames is transparent to the Client.
Ports have their own unique, globally administered MAC address, which are used as the source address for frame exchanges
initiated by Link Aggregation sublayer entities. LACP and Marker protocols use a multicast destination address (01-80-C200-00-02) for exchanges and do not impose any requirement for a port to recognize more than one unicast address on
received frames. Similarly, Aggregators have their own unique, globally administered MAC address, which, per IEEE, can be
the MAC of one of the LAG member ports.
Depending on the direct physical links available between two nodes in the network, it is possible to add or delete links from
the aggregation group. This enables tuning of the LAG size/speed and helps to optimize bandwidth allocation between the
nodes. Prior to link aggregation or logical trunking, bandwidth allocation was solely dependent on the number and data rate
of individual physical links (limited by equipment speeds available at the time) . In order to increase bandwidth, hardware
upgrades were required to utilize faster physical layer technology as it became available (which was typically by orders-ofmagnitude and with a price-tag to match). Without some form of link aggregation or trunking of individual links, there was
no mechanism for increasing bandwidth incrementally.
4.2.3 Static versus Dynamic Link Aggregation
Static link aggregation involves manually provisioning and activating LAGs on the two end-systems, connected via multiple
physical links. This is accomplished with CLI commands on the running system. Steps required include creation of the LAG,
assigning links/ports to the LAG, setting parameters to specify LAG and port behavior, and finally activating the LAG. These
steps must be performed on both systems, with a priori knowledge of the physical links and their characteristics. In staticmode, Link Aggregation Control Protocol Data Units (LACPDUs) are not exchanged between two systems to configure
LAGs.
With dynamic link aggregation, the two systems will automatically enable configured links that can be aggregated within the
LAGs (i.e. admin keys match, run-time attributes match, operational state is up, etc.) without user intervention. This is
accomplished by the exchange LACPDUs between systems, which provide state information for each port.
Note:
Most equipment vendors with deployed systems supporting LACP require users to specify which links are actually
aggregatable, by assigning them to a LAG or trunk group, after which time LACP will manage and optimize the
aggregation. The SBx3112 also requires configuring LAG member ports via applicable CLI commands (see LAG
Commands section).
Protocol partners are referred to as "Actor" and "Partner". The term "Actor" always refers to the local system and "Partner"
always refers to the remote system, from the perspective of the local system. LACPDUs contain Actor and Partner state
information. LACPDUs are transmitted periodically or when either partner has a need to transmit (NTT). Primary reasons
for NTT are Actor state changes, and when the Actor believes that its Partner does not have correct/current knowledge of
the Actor's state. This is determined by examining the Partner's LACPDUs, which contains Actor and Partner state information, from the perspective of the Partner.
Partners can operate in one of two administratively controlled LACP modes: "active" or "passive". Active mode indicates
that the Actor will attempt to initiate LACP regardless of its Partner's mode (speak always). Passive mode indicates that the
Actor will only send LACPDUs if its Partner is in the active mode (speak when spoken to).
When static-mode LAG is configured on both systems connected by one or more links, it is up to the local link/port fault
detection and handling mechanism on each system to remove failed ports from the LAG. This typically requires a loss-of-signal/loss-of-link event or hardware failure being detected and processed. If a media converter is employed between the systems, it is possible that a fault could occur that does not result in a loss-of signal/loss-of-link event. In this case, the link
would be down, but the failure undetected. Traffic would continue to be sent over the failed link, resulting in lost traffic.
Software Reference for SwitchBlade x3100 Series Switches
330
Layer Two Switching
Running LACP over all links in the LAG avoids this problem, since periodic LACPDUs would not be received by one or both
systems, and the failure would be detected at the individual link level.
Another advantage of running LACP is that Actor and Partner information is exchanged to determine and confirm eligibility
of specific links to be aggregated. This additional level of automatic configuration validation can detect and prevent aggregation of links that are possibly mis-wired between the systems or not truly capable of being aggregated. Note that a limitation
inherent in LACP is that remote system IDs are not evaluated (but there is some level of validation).
Note:
Refer to Bi-Directional Forward Detection (BFD) for a similar feature that can detect hardware or link problems
that have not been reported,
4.2.4 Overview of LAG Commands/States
4.2.4.1 Creating and Activating a LAG
Creating a LAG is done using the CREATE LAG INTERFACE command, and this where the user defines the type of LAG.
Setting the MODE=STATIC indicates that the LAG must be configured on both systems, and will not participate in LACP.
LACP requires setting the MODE=DYNAMIC. The mode is further refined by setting the ROLE attribute to either ACTIVE
or PASSIVE. Setting the ROLE=ACTIVE indicates that the local system will seek to initiate exchange of LACP messages to
negotiate and configure available links in an aggregation with the far-end. Setting the ROLE=PASSIVE indicates that the local
system will only respond to LACP messages when received from another system with ROLE=ACTIVE (essentially, a "speak
only when spoken to" mode of operation).
Note:
In previous releases, the MODE parameter was set via the SET LAG command, and was set to ON or OFF to
control activating the LAG. The MODE parameter now controls the static or dynamic mode of the LAG, and is
specified when the LAG is created using the CREATE LAG INTERFACE command. Refer to the Release Notes for
how saved text configuration files can be modified.
When creating the LAG, the user must specify at least one LAG member port.
Note:
Previously an empty LAG could be created and member port(s) added afterwards. There is no longer support for
"empty” LAGs. Refer to the Release Notes for any upgrade issues.
When a LAG is created, is has a state of disabled. To activate the LAG, the user uses the ENABLE INTERFACE (for LAG
Type) command with an interface of type LAG. This interacts with the Admin and Operational state, as described below.
Note:
In previous releases, the MODE=ON/OFF parameter as part of SET LAG was used.
4.2.4.2 LAG Admin State
The LAG has an Admin state similar to other interfaces; LAG will support an admin state of "enabled" (UP) and "disabled"
(DN), as specified by ENABLE INTERFACE (for LAG Type) or DISABLE INTERFACE (for LAG Type)
Enabling a LAG allows the LAG's administratively enabled ports to attempt to achieve the UP operational state. All LAG
member ports that are able to achieve a state of UP-UP-Online will be aggregated together in hardware and are capable of
carrying traffic. If all of the ports go UP, then the LAG will go UP-UP-Online. But if there is a mix of UP and DN enabled
links, the LAG will be UP-UP-Degraded, since the bandwidth is less than what the user configured.
Disabling a LAG administratively results in all member ports being disabled operationally. The member links' states will
become UP-DN-AutoDisabled. (This is similar to how ports are operationally disabled for the BPDU COP feature.) When all
provisioned LAG member ports transition to UP-DN-AutoDisabled, the resulting LAG state will be DN-DN-Offline. Note
that disabling the LAG does not change the administrative state of the member interfaces, since it could result in losing the
user-configured administrative state if the LAG were to be administratively re-enabled.
Provisioned LAG member ports can still be enabled/disabled individually via the CLI. In the event that all provisioned member ports of a given LAG are disabled administratively, and their operational state follows (to DN), the LAG containing these
Software Reference for SwitchBlade x3100 Series Switches
331
Layer Two Switching
ports will also have a DN operational state. The difference in this case is that the LAG state would show UP-DN-Dependency, since the admin state for the LAG itself was never disabled.
The default administrative state for a LAG is disabled (DN).
4.2.4.3 Adding/Deleting Ports and Ethernet (Q-Bridge Port) Attributes to LAG
The following Q-Bridge Port parameters provide LAGs with the same characteristics as Ethernet interfaces in the system:
•
•
•
•
•
Acceptable Frame Types - accept ALL, VLAN, or HVLAN frame types
Ingress Filtering Enabled - filtering ON or OFF
TPID - value of Tag Protocol ID (0x0000..0xFFFF) - 0x8100
TAGALL - double-tagging ON or OFF
Learn Limit - Dynamic MAC Learn Limit OFF or 1..64
When the LAG is initially created (CREATE LAG INTERFACE), it inherits the Q-Bridge Port settings of the first member port
specified. All candidate LAG member ports must have the same Q-Bridge Port settings to be successfully added to the LAG.
This will provide LAGs with the same characteristics as Ethernet interfaces in the system.
Therefore, when an interface is provisioned to be a LAG member port, all Q-Bridge Port attributes must match that of the
LAG. If they do not match, the user must use the appropriate SET INTERFACE (For lag type) parameters to change the
interface's settings and then attempt to add the interface to the LAG again. (Attributes can be queried via SHOW INTERFACE (for LAG Type) and SHOW LAG commands.)
Note:
The user cannot set these attributes directly on the LAG using the SET LAG command. The SET INTERFACE (For
lag type) command must be used.
When a LAG member port is deleted from a LAG via DELETE LAG INTERFACE command (see the next section), it will
retain the Q-Bridge Port settings that it shared with the LAG. Once deleted from the LAG, the user may change the settings
using the SET INTERFACE (For lag type) command. If the user attempts to change Q-Bridge Port settings on an interface
that is currently a LAG member port, the command will fail with an error.
4.2.4.4 Deleting LAG Member Ports
Prior to Release 16.0, it was possible to remove a member port from a LAG, regardless of its administrative or operational
state. This could result in a loop condition, since all LAG member ports must terminate at the same two endpoints (by definition). The LAG member ports must now be administratively disabled (and thus driving its operational state to disabled)
prior to being deleted from a LAG. This can be accomplished one of two ways.
• Disable the port using the DISABLE INTERFACE command, prior to issuing the DELETE LAG INTERFACEcommand.
• Issue the DELETE LAG INTERFACE command, and if the interface being deleted is UP-UP-Online, the user is informed
the interface will automatically be disabled (admin=DN, oper=DN). The user can accept this auto-disable, after which
the interface will be deleted from the LAG. If the user rejects the auto-disable, the interface will remain UP-UP-Online
and the DELETE LAG command will not complete and there will be an error message..
Either of these methods will prevent potential loop conditions.
4.2.4.5 Destroying a LAG
All link members must be disabled before or during the destruction of a LAG to prevent loops in the network. The user may
first disable the link members and then destroy the LAG, or the user can just destroy the LAG and the system will ask permission to disable the link members as part of the destroy operation. The user can use the FORCE option to skip the
request for permission.
Software Reference for SwitchBlade x3100 Series Switches
332
Layer Two Switching
4.2.4.6 Summary of Administrative and Operational Status
The following table summarizes the releationship of the Admin and Operational Status over member ports.
TABLE 4-3
Relation of Administrative and Operational States for LAG
State
Interface
Admin State
Operational
State
Admin State of
LAG is DN
LAG:1
DN
DN
1.0
Don’t care
DN
1.1
Don’t care
DN
3.0
Don’t care
DN
Operational
state of all member ports is DN
LAG to attain
Operational status of UP
LAG:1
Don’t care
DN
1.0
Don’t care
DN
1.1
Don’t care
DN
3.0
Don’t care
DN
LAG:1
UP
UP
1.0
UP
UP
1.1
Don’t care
Don’t care
3.0
Don’t care
Don’t care
Notes
Regardless of the state of member ports, if the Admin
state of the LAG is Down, the Member Port Operational states are driven to Down and the LAG Operational state is also Down.
Regardless of Admin state of LAG and Member Ports,
if the Oper state of ALL Member Ports is Down, the
LAG Oper state is driven to Down.
Note that if the Admin state of all Member Ports is
DOWN, this effectively drives LAG Oper state to
DOWN.
For a LAG to attain UP Operational state, the LAG
Admin state must be UP, and ONE OR MORE Member Ports must also have UP Admin state AND Operational state.
4.2.4.7 Setting of ADMINKEY as Unique Identifier
In previous releases, the LAG’s unique ID was created by the system in the order of creation, starting with LAG:0. In release
16.0, the ADMINKEY (part of CREATE LAG INTERFACE) can be used as the unique identifier, so the LAG ID does not need
to follow the order of creation. Since the identifier is now LAG:x , where x is the Admin Key rather than that previous 1-up
number, some numeric identifiers may change over an upgrade.
4.2.5 Alarms for LAG States
Previously, there were no alarms raised against LAGs. In release 16.0, there are alarms for failed or degraded LAG operational states. In release 16.0 the following interface alarms will now be supported for LAG interfaces in a similar manner to
other interfaces.
Note:
Refer to the Log Reference Manual for a listing of all log messages and maintenance actions.
4.2.5.1 LAG Alarms
• "All Parents Non-Administratively Down" - (INTF001) - This indicates that all the administratively enabled member ports
in a LAG are currently failed (indicating that loss-of-link, or some other failure has occurred on all enabled member ports)
and the LAG itself has an UP administrative state (indicating that the LAG should be enabled and carrying traffic if possible). Under these conditions the LAG will have a state of UP-DN-Failed.
This alarm is cleared by the following:
• One or more member ports achieve the UP-UP-Online state.
• Administratively disabling the LAG, resulting in a DN-DN-Offline state for the LAG.
Software Reference for SwitchBlade x3100 Series Switches
333
Layer Two Switching
• Administratively disabling all the member ports, resulting in a UP-DN-Dependency state for the LAG.
• "Bandwidth Degraded" - (INTF003) - indicates that one or more enabled LAG member ports are currently DOWN operationally, with one or more LAG member ports still currently UP operationally. This alarm is used to inform the user that
the LAG is currently not capable of carrying the maximum bandwidth that would be available if all enabled member ports
were UP-UP-Online. Under these conditions the LAG will have a state of UP-UP-Degraded.
This alarm is cleared by the following:
• All member ports achieve the UP-UP-Online state.
• Administratively disabling the LAG, resulting in a DN-DN-Offline state for the LAG
• Administratively disabling all the member ports, resulting in a UP-DN-Dependency state for the LAG.
4.2.5.2 Port Alarms (PORT003)
Two port alarms help the user understand the LAG state:
• "No LACP Sync" alarm - will be raised against a dynamic LAG member port that is up enough to pass LACPDU packets
but has not yet achieved sync with the partner.
• "Link Attribute Mismatch" alarm - will be raised against a static or dynamic LAG member port that does not match the
operational physical attributes (speed or duplex settings) of the links already in the LAG.
These alarms can be cleared by disabling the port or ensuring the link negotiates to the same value as the LAG.
4.2.6 Setting the Switch Hash Select
The hash select can be set at any time and persists across system or card reboots. When new LAGs are created, their hash
select will be determined by the switch-wide hash select setting. The SHOW SWITCH command can be used to view the
configured hash select.
Using this SBx3112-specific command SET SWITCH HASH SELECT the user controls the global hash selection setting. The
SHOW SWITCH command includes a field to display the current hash selection setting, and the SHOW LAG command uses
the existing “Select Criteria” field to show the current hash selection setting.
show switch
--- Switch Configuration ------------------Learning..............................
Ageing Timer..........................
Ageingtimer...........................
Age-Only FDB Clear....................
Number of SM Ports....................
Number of NM Ports....................
Number of HVLAN.......................
Number of Standard VLAN...............
Number of UFO VLAN....................
Hash Select ..........................
On
On
300
Off
165
35
2
125
2
ALL
--------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
334
Layer Two Switching
4.2.7 Configuring LAG
4.2.7.1 Default Configuration
When an SBx3100 switch is initially booted up, LAG is configured as follows:
• There are no LAGs configured. (‘No LAGs currently exist’)
4.2.7.2 Basic Configuration Steps
Following is the hierarchy of steps for configuring a LAG:
1.
Create the LAG (CREATE LAG iNTERFACE)
• This creates the LAG and must include at least one interface
• The first interface in the command has the Q-settings that apply to all interfaces on the LAG
• If the default settings are OK, all interfaces are included, and all interfaces are enabled, the user can go to Step 5.
2.
Ensure all interfaces share same settings (SET INTERFACE)
• These are the attributes for the ethernet interface (VLAN configuration, speed, duplex, autonegotation, direction)
• To change a setting, the interface must be disabled, the attributes changed, and then enabled.
3.
Ensure all interfaces have same Q-BRIDGE settings (SET INTERFACE for LAG)
• These are the attributes for the LAG that enable it to have an Ethernet interface.
• To change a setting, the interface must be disabled, the attributes changed, and then enabled.
4.
Add interfaces to the LAG
• All interfaces must have the same settings.
• If any attribute does not match, there is an errored response.
5.
Enable the LAG (ENABLE INTERFACE for LAG) to give the LAG an Admin state of UP.
• All ports must be enabled.
• The first port to go up (selected with the CREATE LAG command), determines the interface and LAG ethernet settings
• When more than one port is UP, the LAG goes to state UP-UP with as status of Online (all links up) or Degraded.
Following is the hierarchy of steps for taking down a LAG:
1.
Disable the LAG to set the LAG to an ADMIN state of DOWN
• Each port goes to state UP-DOWN-AutoDisabled
• When all ports are set to UP-DOWN-AutoDisabled, LAG goes to state DN-DN-OFFLINE.
2.
Disable all of the member ports to set their Admin State to DOWN.
3.
Delete the LAG member ports from the LAG
4.
Destroy the LAG.
Note:
In practice, the user can input DESTROY LAG <lag_name> FORCE and the LAG is deleted.
4.2.7.3 Setting the VLANs in the LAG in UFO Mode
The steps to include a VLAN in UFO mode are similar to the steps in 4.2.7.2, as in this example for a static LAG.
1.
Make sure all interfaces to be used in the LAG share the same setting (as mentioned in step 2 in 4.2.7.2).
SET INTERFACE=(interface list), GE DIRECTION=NETWORK
Software Reference for SwitchBlade x3100 Series Switches
335
Layer Two Switching
2.
Create the LAG(s), for example creating a PRIMARYUPSTREAM and SECONDARYUPSTREAM LAG for UFO setup.
CREATE LAG=primarylag1 INTERFACE=ETH:1.0-1.3,3.10-3.13 MODE=static ADMINKEY=10
CREATE LAG=secondarylag1
KEY=11
3.
INTERFACE=ETH:1.14-1.17,3.4-3.7 MODE=static ADMIN-
Create the UFO VLAN, setting it to UFO.
CREATE VLAN=v445 VID=445 FORWARDINGMODE=UPSTREAMONLY
4.
Add the UFO VLAN to the LAGs
ADD VLAN=445 INTERFACE= LAG:[10-11] FRAME=TAGGED
5.
Set the PRIMARYUPSTREAM and SECONDARYUPSTREAM on the appropriate LAG
SET VLAN=445 INTERFACE=LAG:[10] FORWARDING=PRIMARYUPSTREAM
SET VLAN=445 INTERFACE=LAG:[11] FORWARDING=SECONDARYUPSTREAM
Software Reference for SwitchBlade x3100 Series Switches
336
Layer Two Switching
4.2.7.4 Configuration Guidelines (both Static and Dynamic)
Following is a summary of the provisioning rules to follow when creating LAG groups:
• The SBx3100 supports a maximum of 127 LAGs configured on the system at one time. A maximum of eight member
•
•
•
ports per LAG is supported.
When a LAG is first created, one or more member interfaces must be specified. The LAG will be initialized with the set
of physical and Ethernet Q-Bridge Port attributes associated with the first member port successfully added. Refer to
CREATE LAG INTERFACE.
Provisioning of individual Ethernet Q-Bridge Port attributes is not allowed if the interface belongs to a LAG. However,
these settings can be configured on the LAG itself, and all member ports will automatically be configured to share these
same settings.
A LAG member port must be disabled (using DISABLE INTERFACE command) before it can be removed from a LAG
(using DELETE LAG INTERFACE command). This is to prevent loops in the network.
All ports in the LAG group must share the same untagged and tagged VLAN configuration.
•
• All physical attributes (speed, duplex, autonegotiate settings) of a LAG member port must be consistent with the LAG
when the links are configured into the LAG. This means that the link must have the potential to operate at the LAG's settings. A setting of "auto-negotiation" along with any speed is therefore allowed, but (for example) links configured for
fixed speeds of 100M and 1G in the same LAG is not allowed. Also, duplex setting to half-duplex on any link in the LAG
is not allowed.
The “LAG speed” is determined by the speed of the first port added to the LAG. If the user tries to add a second interface with a different speed, there will be a “port speed does not match LAG speed” error message.
• A LAG can be administratively disabled. Disabling a LAG adds an "AutoDisabled" secondary state to member ports. Any
ports that were UP-UP-Online become UP-DN-AutoDisabled. Any ports that are operationally down (due to failure or
admin action) remain in that state since the port's own reason for being down takes precedence over the influence of the
aggregate.
• A LAG can be administratively enabled. Enabling a LAG removes member ports' "AutoDisabled" secondary states. If one
or more member ports are able to attain the UP-UP-Online state, the LAG will be considered operationally UP.
• The LAG group has an Operational State. An Operational State of UP means the LAG group has been provisioned and
one or more ports are in an Operational State of UP.
• A maximum of 8 ports can be provisioned in a single LAG.
4.2.7.5 Restrictions and Limitations
Following are restrictions for LAG in general:
•
•
•
•
•
•
•
Ports cannot have egress rate limiting configured.
Ports cannot have a traffic descriptor configured.
Once an interface belongs to a LAG group, changing individual interface attributes is not allowed using the LAG interface.
All ports must have the same Classifier configuration.
The port direction must match that of the lag, as determined by the first port added to the LAG.
Aggregations between more than two systems in a single LAG are not allowed.
Link Aggregation is supported only on point-to-point links with MACs operating in full duplex mode
4.2.7.6 Feature Interactions
• UFO mode is supported on a LAG interface. The product supports 16 UFO VLANs.
• Other features, such as VLAN and STP, can be configured against the lag-id or LAG interface ID.
Software Reference for SwitchBlade x3100 Series Switches
337
Layer Two Switching
• LAG and (R)STP are compatible; a LAG can be created (or interfaces added to a LAG) regardless of the STP state. Also,
STP can be disabled/enabled on an interface regardless of whether the interface is in a LAG or not.
4.2.7.7 Configuration Procedure - Creating a Dynamic LAG
The following table shows the configuration hierachy to follow to ensure that a LAG is configured correctly, as well as deconfigured.
The following procedure shows the commands used to create the LAG
TABLE 4-4
Step
Configuration Procedure for Creating a Cross-Card LAG - Static
Command
Description/Notes
Ensure that physical interfaces that you wish to combine into a LAG have matching provisioning attributes (e.g., VLAN
configuration, speed, duplex, auto-negotiation, direction, Q-settings, etc.)
Create the LAG, including the interfaces and ensuring the mode is dynamic
1
create lag main int 1.3,2.2-2.3,9.1-9.5 mode=dynamic
Enable the interfaces, including the lag ID
2
enable interface=1.3,2.2-2.3,9.1-9.5,main
Info (039512): Operation Successful (XE4 Slot
1 Port
3)
Info (039512): Operation Successful (XE4 Slot
2 Port
2)
Info (039512): Operation Successful (XE4 Slot
2 Port
3)
Info (039512): Operation Successful (XE6SFP Slot
9 Port
1)
Info (039512): Operation Successful (XE6SFP Slot
9 Port
2)
Info (039512): Operation Successful (XE6SFP Slot
9 Port
3)
Info (039512): Operation Successful (XE6SFP Slot
9 Port
4)
Info (039512): Operation Successful (XE6SFP Slot
9 Port
5)
Info (020184): Successfully enabled interface(s) main
Review the LAG for general attributes.
Software Reference for SwitchBlade x3100 Series Switches
338
Layer Two Switching
TABLE 4-4
Configuration Procedure for Creating a Cross-Card LAG - Static
Step
Command
Description/Notes
3
15:36:06 officer SEC>> sh lag main
--- LAG Info Data --MAC Address......................................... EC:CD:6D:4F:8F:F3
System Priority..................................... 65535
LAG Name............................................
Interface...........................................
State...............................................
Configured Interfaces ..............................
H/W Aggregated Interfaces...........................
Mode................................................
Select Criteria.....................................
Speed...............................................
Direction...........................................
Acceptable Frame Type...............................
Ingress Filtering ..................................
TPID................................................
TAGALL..............................................
Dynamic MAC Learning Limit..........................
Admin Key...........................................
main
LAG:2
UP-UP-Online
1.3,2.2-2.3,9.1-9.5
1.3,2.2-2.3,9.1-9.5
Dynamic
port both & ip both & mac both
80 Gbps
Network
VLAN
On
0x8100
Off
0
2
LACP Information
---------------Oper Key............................................
Individual..........................................
LACP Control Ready..................................
Partner LAG ........................................
Role ...............................................
2
No
Yes
0x19,00:0C:25:04:01:AC,0x1
Active
Member Interfaces
----------------LACP Port
Port
------ LACP
Machine
Interface Number
Priority
Rx
Periodic Tx
---------- ----------- -------------------------------ETH:1.3
260
32768
Current
Slow
ETH:2.2
515
32768
Current
Slow
ETH:2.3
516
32768
Current
Slow
ETH:9.1
2306
32768
Current
Slow
ETH:9.2
2307
32768
Current
Slow
ETH:9.3
2308
32768
Current
Slow
ETH:9.4
2309
32768
Current
Slow
ETH:9.5
2310
32768
Current
Slow
States ---Mux
----------Collecting/
Distributing
Collecting/
Distributing
Collecting/
Distributing
Collecting/
Distributing
Collecting/
Distributing
Collecting/
Distributing
Collecting/
Distributing
Collecting/
Distributing
Review the LAG for interface attributes
Software Reference for SwitchBlade x3100 Series Switches
339
Layer Two Switching
TABLE 4-4
Configuration Procedure for Creating a Cross-Card LAG - Static
Step
Command
4
15:36:09 officer SEC>> sh int main
Description/Notes
--- LAG Interfaces --Name...............................
State..............................
Description........................
Provisioned Ports..................
Enabled Ports......................
Mode...............................
Select Criteria....................
Speed..............................
Direction..........................
LAG:2
main
UP-UP-Online
<none>
1.3,2.2-2.3,9.1-9.5
1.3,2.2-2.3,9.1-9.5
Dynamic
port both & ip both & mac both
80 Gbps
Network
VLAN Information
Acceptable Frame Types..........
Ingress Filtering...............
TPID............................
TAGALL..........................
Dynamic MAC Learning Limit......
Tagged VLAN(s)..................
VLAN-tagged only
On
0x8100
Off
0
10,415,420,512,2400-2407,3000,3002
The FDB should now display LAG as the interface.
5
show switch fdb
Slot
VLAN
Interface ID
MAC Address
Status
----------- ----------- --------------- ---------------------- -------2
402
2.0
00:00:CD:1D:C1:C2
Dynamic
2
402
2.0
00:00:CD:23:28:6F
Dynamic
2
402
2.0
00:04:13:36:66:4D
Dynamic
(output omitted)
1-2, 9
420
main (LAG:2)
00:0C:25:04:01:AC
Dynamic
(output omitted)
Software Reference for SwitchBlade x3100 Series Switches
340
Layer Two Switching
4.2.8 Configuration Procedure - Destroying a LAG
To destroy a LAG, the user can perform these steps (the order of the first two steps is not important).
1.
Disable the LAG to set the LAG to an ADMIN state of DOWN
• Each port goes to state UP-DOWN-AutoDisabled
• When all ports are set to UP-DOWN-AutoDisabled, LAG goes to state DN-DN-OFFLINE.
2.
Disable all of the member ports to set their Admin State to DOWN.
3.
Destroy the LAG.
The following procedure shows the commands used to destroy the LAG.
Note:
Using the DESTROY command with with FORCE option destroys the LAG in one step.
TABLE 4-5
Step
Configuration Procedure for Destroying a LAG
Command
Description/Notes
Disable the LAG and its interfaces
1
disable interface 1.3,2.2-2.3,9.19.5,main
Disables the LAG and puts each port to UPDOWN-AutoDisabled.
Destroy the LAG
2
destroy lag main
Member port(s) will be automatically disabled, and service may be affected.
Do you still want to destroy the LAG (Y/N)? y
Info (010017): Operation Successful
Verify that the LAG has been destroyed
3
show lag
--- LAG Info Data ----------------------------------------------------------------------LAG Name
Provisioned Ports
Mode
Select Criteria
Admin Key Index
------------------------------- --------------------------------------------------------LAG Name
Enabled Ports
Speed
Oper State
Dir
Interface ID
------------------------------- ----------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
341
Layer Two Switching
4.2.9 LAG Commands
The following tables list the commands available to configure and manage LAG on the SBx3112 switch.
TABLE 4-6
LAG Commands
Commands
ADD LAG INTERFACE
CREATE LAG INTERFACE
DELETE LAG INTERFACE
DISABLE INTERFACE (for LAG Type)
ENABLE INTERFACE (for LAG Type)
DESTROY LAG
RESET LAG COUNTER
SET INTERFACE (For lag type)
SET LAG
SET SWITCH HASH SELECT
SHOW INTERFACE (for LAG Type)
SHOW LAG
The following table describes the global hash selection settings that are available with the SET SWITCH HASH SELECT command, and the corresponding display in the SHOW LAG command:
TABLE 4-7
SBx3112 - SET SWITCH HASH SELECT Parameters
Parameter
Value
LAG Hashing Behavior
MAC
macsrc & macdest
Hash based only on layer 2 source and destination MAC in packet
IP
ipsrc & ipdest
Hash based on layer 3 source and destination IP in packet. If layer 3 data
is not present in the packet, hash based on layer 2 source and destination
MAC
MACANDIP
ipboth & macboth
Hash based on both source and destination MAC and IP. If layer 3 data is
not present in the packet, hash based on layer 2 source and destination
MAC
IPANDPORT
portboth & ipboth
Hash based on both layer 4 source and destination port (UDP/TCP) and
layer 3 source and destination IP. If packet is not UDP/TCP, then hash
based on the IP addresses. If layer 3 data is not present in the packet,
hashed based on layer 2 source and destination MAC
ALL
portboth & ipboth &
macboth
Hash based on layer 4 source and destination port (UDP/TCP), layer 3
source and destination IP, and layer 2 source and destination MAC. If
packet is not UDP/TCP, then hash based on the IP addresses and MAC
addresses. If layer 3 data is not present in the packet, hashed based on
layer 2 source and destination MAC.
This is the default setting, to get the best randomization
Software Reference for SwitchBlade x3100 Series Switches
342
Layer Two Switching
Software Reference for SwitchBlade x3100 Series Switches
343
Layer Two Switching
ADD LAG INTERFACE
Syntax
ADD LAG={ lagname | type:id }
INTERFACE={ type:id-range | id-range | ifname-list }
Description
This command adds interfaces to a Link Aggregation Group (LAG). The LAG must already exist before
interfaces are assigned to it (see CREATE LAG INTERFACE).
All interfaces in a LAG must operate at the same speed, autonegotiate setting, and must be in full
duplex mode, but these settings do not have to match for configuring the member interface. All interfaces in the LAG must have the same VLAN configuration and Q-Bridge Port settings.
Once an interface is added to the LAG, Q-Bridge attributes are managed on the aggregate (i.e. the
LAG interface) rather than the individual link.
Mode
Manager
Options
Option
Description
Range
Default
Value
LAG
The lagname already created.
NA
NA
NA
NA
lagname – name of the LAG instance, as specified by
user via CREATE LAG INTERFACE command.
type:id - the type of interface (in this case LAG) and a
single interface identifier (id). This value is the one generated with the CREATE LAG INTERFACE command.
INTERFACE
A logical representation of one or more physical interfaces.
type:id-range - the type of interface (such as ETH) and
one or more interface identifiers (id-range).
id-range – one or more interface identifiers.
ifname-list - list of interface names, if not numerical
Refer to Configuration Guidelines (both Static and
Dynamic) for how all of the LAG commands work
together.
Release Note
NA
Note
Interfaces of type "LAG" cannot be added to a LAG (no support for combining LAGs).
Example
ADD LAG=test_lag
INTERFACE=ETH:0.1-0.3,1.0-1.3
Software Reference for SwitchBlade x3100 Series Switches
344
Layer Two Switching
CREATE LAG INTERFACE
Syntax
CREATE LAG=lagname
INTERFACE={ type:id-range | id-range | ifname-list }
[ MODE={ STATIC | DYNAMIC}] [ ROLE={ ACTIVE | PASSIVE }
[ ADMINKEY=1..1024 ]
]
Description
Creates a Link Aggregation Group (LAG). When a LAG is created, a unique name must be specified.
When the CREATE LAG INTERFACE command is processed and completes successfully, the user will
be informed of the auto-generated interface identifier. The lagname or the interface identifier can be
used for subsequent ADD, DELETE, DESTROY, DISABLE, ENABLE, SET, and SHOW LAG commands.
One or more interfaces that will comprise the LAG must be specified at LAG creation time. Additional interfaces can be added to the LAG at a later time via ADD LAG INTERFACE command.
Mode
Manager
Options
Option
LAG
Description
Range
Default
Value
A single LAG instance.
NA
NA
NA
NA
NA
STATIC
NA
ACTIVE
lagname – name given to the LAG.
INTERFACE
A logical representation of one or more physical interfaces.
type:id-range - the type of interface (such as ETH) and
one or more interface identifiers (id-range)
id-range – one or more interface identifiers
ifname-list - list of interface names, if not numerical
MODE
The MODE parameter controls behavior of the LAG.
The modes are described as follows:
STATIC - specifies that the interfaces belonging to the
LAG do not have Link Aggregation Control Protocol
(LACP) running. For aggregation to work, the interfaces
in the LAG must be connected to interfaces in a LAG on
the far-end that is also in the STATIC mode. This is
"statically configured link ” configuration
DYNAMIC - specifies that the interfaces belonging to
the LAG will run Link Aggregation Control Protocol
(LACP). This is "dynamically configured link aggregation".
ROLE
The ROLE parameter controls the LACP behavior of the
LAG. This parameter is applicable only when LAG
MODE=DYNAMIC.
ACTIVE - causes ports in the LAG to initiate LACP
negotiation with the ports in the LAG it is connected to,
by sending LACP packets. This is "dynamically configured link aggregation".
PASSIVE - causes the ports in the LAG to respond to
LACP packets, but does not initiate LACP negotiation.
The ports will speak LACP only when spoken to. This is
"passive dynamically configured link aggregation".
Software Reference for SwitchBlade x3100 Series Switches
345
Layer Two Switching
Option
Description
Range
Default
Value
ADMINKEY
The 802.3ad admin key value for the LAG. It is used to
identify specific groups of ports capable of aggregation.
A default value is set by the system if one is not specified. (If the user inputs ADMINKEY=3, for example, this
will give the LAG group the label LAG:3.)
1-1024
NA
Release Note
NA
Note
To run LACP between two systems, at least one of the systems must have ROLE set to ACTIVE.
Example
CREATE LAG=test_lag INTERFACE=0.0,0.1 MODE=DYNAMIC ROLE=PASSIVE
Software Reference for SwitchBlade x3100 Series Switches
346
Layer Two Switching
DELETE LAG INTERFACE
Syntax
DELETE LAG={ lagname | type:id }
INTERFACE={ type:id-range | id-range | ifname-list | ALL }
[ FORCE ]
Description
Deletes one or more interfaces from a Link Aggregation Group (LAG).
Mode
Manager
Options
Option
Description
Range
Default
Value
LAG
The lagname already created.
NA
NA
A single LAG instance.
NA
NA
NA
NA
INTERFACE
lagname – name of the LAG instance, as specified by
user via CREATE LAG INTERFACE command.
type:id - the type of interface (in this case LAG) and a
single interface identifier (id). Note that the interface
type and .
FORCE
Used to delete the member interface regardless of current state. If the interface is currently enabled, it will
automatically be set to a disabled administrative state
and deleted from the LAG.
Release Note
NA
Note
Any member interface being deleted from the LAG must be administratively disabled via DISABLE
INTERFACE command. Disabling the interface prevents loops in the network when the interface is
deleted from the LAG.
Example
DELETE LAG=test_lag
INTERFACE=1.0
Software Reference for SwitchBlade x3100 Series Switches
347
Layer Two Switching
DESTROY LAG
Syntax
DESTROY LAG={ lagname | type:id } [ FORCE ]
Description
The DESTROY LAG command destroys a Link Aggregation Group (LAG). The LAG being destroyed
must be administratively disabled via DISABLE INTERFACE {type:id-range|id-range|ifname-list|ALL}
command, where type=LAG. Moreover, the link members are always disabled before being removed
from the LAG. It is not necessary to delete all interfaces from the LAG prior to destroying it, however,
the interface list and all associated LAG parameter settings are destroyed along with the LAG.
Mode
Manager
Options
Option
Description
Range
Default
Value
LAG
The lagname already created.
NA
NA
FORCE
The FORCE option may be used to destroy the LAG
regardless of current state. If the LAG is currently
enabled and the FORCE option is used, the LAG will
automatically be set to a disabled administrative state,
which results in all member interfaces being operationally disabled and deleted from the LAG.
NA
NA
Release Note
NA
Example
DESTROY LAG=test_lag
Software Reference for SwitchBlade x3100 Series Switches
348
Layer Two Switching
DISABLE INTERFACE (FOR LAG TYPE)
Syntax
DISABLE INTERFACE {type:id-range|id-range|ifname-list|ALL}
Description
The DISABLE INTERFACE command results in operational state of all LAG member ports being set to
DOWN. This command can be invoked for an INTERFACE where TYPE=LAG and identified by IDRANGE. If ALL member ports attain a DN operational state, the LAG will attain DN-DN-Offline
operational state. If the DISABLE INTERFACE operation is successful, the "State" of the LAG will be
displayed as DN-DN-Offline in the SHOW LAG and SHOW INTERFACE command output.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical interfaces.
NA
NA
type:id-range - the type of interface (LAG in this case)
and one or more interface identifiers (id-range).
id-range – one or more interface identifiers.
ifname-list - list of interface names, if not numerical.
ALL – keyword for disabling all interfaces currently configured in the system.
Release Note
NA
Note
NA
Example
Refer to the following commands:
DISABLE INTERFACE=LAG:1
Software Reference for SwitchBlade x3100 Series Switches
349
Layer Two Switching
ENABLE INTERFACE (FOR LAG TYPE)
Syntax
ENABLE INTERFACE {type:id-range|id-range|ifname-list|ALL}
Description
The ENABLE INTERFACE command results result in operational state of all LAG member ports being
set to UP (enabled). This command can be invoked for an INTERFACE where TYPE=LAG and identified by ID-RANGE. If one or more member Ports has Admin state set to UP, and is able to attain UPUP-Online operational state, the LAG will attain UP-UP-Online (if all links are up) or UP-UP-Degraded
(not all links up) operational state. Provisioned Ports with UP-UP-Online state will also appear in
Enabled Port list, indicating that the port is participating in LAG. If the ENABLE INTERFACE operation
is successful, the "State" of the LAG will be displayed as UP-UP-Online in the SHOW LAG and SHOW
INTERFACE command output.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical interfaces.
NA
NA
type:id-range - the type of interface (LAG in this case)
and one or more interface identifiers (id-range).
id-range – one or more interface identifiers.
ifname-list - list of interface names, if not numerical.
ALL – keyword for disabling all interfaces currently configured in the system.
Release Note
NA
Note
NA
Example
Refer to the following commands:
ENABLE INTERFACE=LAG:1
Software Reference for SwitchBlade x3100 Series Switches
350
Layer Two Switching
RESET LAG COUNTER
Syntax
RESET LAG={ lagname | type:id-range | ifname-list | ALL } COUNTER
Description
The RESET LAG COUNTER command clears all LACPDU count information pertaining to Link
Aggregation Groups (LAGs) configured on the system. LACP statistics for individual LAGs are cleared
by specifying a valid lagname, type:id-range, or comma-separated list of interface names. If a valid lagname is not known, or if statistic for all LAGs is to be reset, use the ALL keyword to reset LACP statistics for all configured LAGs. If a lagname, type:id-range, comma-separated list of interface names, or
ALL keyword is not specified, the statistic cleared will be that of RESET LAG ALL COUNTER.
Mode
Manager
Options
Option
Description
Range
Default
Value
LAG
One or more LAG instances.
NA
NA
lagname – name of the LAG instance, as specified by
user via CREATE LAG command.
type:id-range - the type of interface (in this case LAG)
and one or more interface identifier (id-range).
ifname-list - list of interface names, if not numerical.
ALL – keyword for showing data for all LAGs currently
configured in the system.
Release Note
NA
Example
RESET LAG=test_lag
COUNTER
Software Reference for SwitchBlade x3100 Series Switches
351
Layer Two Switching
SET INTERFACE (FOR LAG TYPE)
Syntax
SET INTERFACE {type:id-range|id-range|ifname-list|ALL}
[ACCEPTABLE=(VLAN|HVLAN|ALL)]
[INFILTERING=(OFF|ON)]
[TPID=0x000..0xFFFF]
[TAGALL=(OFF|ON)]
[LEARNLIMIT=(OFF|1..64)]
Description
The SET INTERFACE command modifies the provisioning attributes for the specified interface or list
of interfaces. (In command responses these are the Q-bridge attributes.)
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical interfaces.
NA
NA
type:id-range - the type of interface (LAG in this case)
and one or more interface identifiers (id-range).
id-range – one or more interface identifiers.
ifname-list - list of interface names, if not numerical.
ALL – keyword for enableing all interfaces currently
configured in the system.
ACCEPTABLE
Parameter specifies the Acceptable Frame Types –
accept ALL, VLAN, or HVLAN frame types.
NA
ALL
INFILTERING
Parameter specifies if Ingress Filtering is Enabled – filtering ON or OFF
NA
ON
TPID
Parameter contains the value of Tag Protocol ID, which
is specified as a 4-digit hex value.
(0x0000..0x
FFFF)
0x8100
TAGALL
Parameter controls whether double-tagging is enabled
or not.
ON,OFF
OFF
LEARNLIMIT
Parameter specifies the number of dynamic MAC
addresses that can be learned.
OFF, 1-64
OFF
Release Note
NA
Note
DIRECTION is for a future release.
Example
Refer to the following commands:
SET INTERFACE=LAG:1 TPID=0x5000 LEARNLIMIT=ON
Software Reference for SwitchBlade x3100 Series Switches
352
Layer Two Switching
SET LAG
Syntax
SET LAG {
= { lagname | type:id }
{ROLE= PASSIVE | ACTIVE}
and
SET LAG
{INTERFACE= { type:id-range | id-range | ifname-list | ALL }
[LACPINTERFACEPRIORITY={ 1..65535 }
]
[LACPTIMEOUT={ SHORT | LONG }
]
| [LACPSYSTEMPRIORITY=={ 1..65535 }]
}
Description
The SET LAG command modifies an existing Link Aggregation Group (LAG). This command can be
used to change the ROLE setting on the LAG or the LACP System Priority and LACP Timeout values
for LAG member interfaces. If a user desires to change the set of interfaces comprising the LAG, the
ADD LAG INTERFACE and DELETE LAG INTERFACE commands must be used. Once the LAG is
created, it is not possible to change the LAG name, ADMINKEY or MODE setting.
Mode
Manager
Options
Option
Description
Range
Default
Value
LAG
A single LAG instance.
NA
NA
1-65535
NA
lagname – name of the LAG instance, as specified by
user via CREATE LAG INTERFACE command.
type:id - the type of interface (in this case LAG) and a
single interface identifier (id).
ROLE
The ROLE parameter controls the LACP behavior of the
LAG. This parameter is applicable only when LAG
MODE=DYNAMIC.
ACTIVE - causes ports in the LAG to initiate LACP
negotiation with the ports in the LAG it is connected to,
by sending LACP packets. This is "dynamically configured link aggregation".
PASSIVE - causes the ports in the LAG to respond to
LACP packets, but does not initiate LACP negotiation.
The ports will speak LACP only when spoken to. This is
"passive dynamically configured link.”
INTERFACE
A logical representation of one or more physical interfaces.
type:id-range - the type of interface (such as ETH) and
one or more interface identifiers (id-range).
id-range – one or more interface identifiers.
ifname-list - list of interface names, if not numerical.
ALL – keyword for deleting all interfaces currently configured in the LAG.
LACPINTERFACEPRIORITY
The LACP Interface Priority setting.
Interface Priority is used by LACP to determine which
interfaces to aggregate. . Interfaces with lower numerical value of INTERFACEPRIORITY have higher priority
and are selected first.
Software Reference for SwitchBlade x3100 Series Switches
353
Layer Two Switching
Option
Description
Range
Default
Value
LACPTIMEOUT
The LACP Timeout setting for an interface.
NA
NA
1-65535
NA
Timeout is used by LACP to inform LACP partner on
far-end the rate at which it would like to receive LACP
updates.
SHORT - corresponds to preference to receive updates
once every 1 second.
LONG - corresponds to preference to receive updates
once every 30 seconds.
LACPSYSTEMPRIORITY
The LACP System Priority setting.
System Priority is used to help resolve conflicts in
choice of aggregation groups. The system with the
lower numerical value of SYSTEMPRIORITY has higher
priority.
Release Note
NA
Note
NA
Example
Refer to the following commands:
SET
SET
SET
SET
LAG=test_lag ROLE=ACTIVE
LAG INTERFACE 1.0 LACPINTERFACEPRIORITY=5000
LAG INTERFACE 2.0 LACPTIMEOUT=LONG
LAG LACPSYSTEMPRIORITY=10000
Software Reference for SwitchBlade x3100 Series Switches
LACPTIMEOUT=SHORT
354
Layer Two Switching
SET SWITCH HASH SELECT
Syntax
SET SWITCH HASH
SELECT={ MAC | IP | MACANDIP | IPANDPORT | ALL }
Description
This command applies to the SBx3112, and controls the global hash selection setting. The SHOW
SWITCH command includes a new field to display the current hash selection setting, and the SHOW
LAG command uses the existing “Select Criteria” field to show the current hash selection setting.
Mode
Manager
Options
Release Note
Example
Option
Description
Range
Default
Value
SELECT
Refer to Table 4-7.
NA
NA
NA
SET SWITCH HASH SELECT=MAC
SET SWITCH HASH SELECT
Software Reference for SwitchBlade x3100 Series Switches
355
Layer Two Switching
SHOW INTERFACE (FOR LAG TYPE)
Syntax
SHOW INTERFACE [{type:id-range|id-range|ifname-list|ALL}] [FULL]
Description
The SHOW INTERFACE command displays information pertaining to LAG type interfaces.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
A logical representation of one or more physical interfaces.
NA
ALL
NA
NA
type:id-range - the type of interface (LAG in this case)
and one or more interface identifiers (id-range).
id-range – one or more interface identifiers.
ifname-list - list of interface names, if not numerical.
ALL – keyword for showing all interfaces currently configured in the system.
FULL
Release Note
Example
Keyword to display all available information for one or
more interfaces.
NA
Refer to the following commands:
show interface
(other output omitted)
--- LAG Interfaces --Interface
State Name
--------------- ----- ---------LAG:1
UP-DN testLag
Show intrface lag:1 full
--- LAG Interfaces --Interface..........................
Name...............................
State..............................
Description........................
Provisioned Ports..................
Enabled Ports......................
Mode...............................
Select Criteria....................
Speed..............................
Direction..........................
LAG:1
main
UP-DN-Dependency
<none>
3.1-3.2,7.0-7.5
None
Dynamic
port both & ip both & mac both
No ports in this Gb LAG
Network
VLAN Information
Acceptable Frame Types..........
Ingress Filtering...............
TPID............................
TAGALL..........................
Dynamic MAC Learning Limit......
VLAN-tagged only
On
0x8100
Off
0
Software Reference for SwitchBlade x3100 Series Switches
356
Layer Two Switching
Tagged VLAN(s).................. 10,415,420,512,2400-2407,3000,3002
Software Reference for SwitchBlade x3100 Series Switches
357
Layer Two Switching
SHOW LAG
Syntax
SHOW LAG [ = { lagname | type:id-range | ifname-list | ALL }
[ INTERFACE= { type:id-range | id-range | ifname-list | ALL }
[ COUNTER ] ]
[ FULL ]
Description
The SHOW LAG command displays information pertaining to Link Aggregation Groups (LAGs) configured on the system.
]
Individual LAGs can be displayed by specifying a valid lagname, type:id-range, or comma-separated list
of interface names. If a valid lagname is not known, or if information for all LAGs is desired, use the
ALL keyword to display all configured LAGs.
If a lagname, type:id-range, comma-separated list of interface names, or ALL keyword is not specified,
the output displayed will be that of SHOW LAG ALL. If the INTERFACE keyword is specified, the
SHOW command displays LACP information pertaining to Link Aggregation (LAG) member interfaces.
LACP information for individual LAG member interfaces can be displayed by specifying one or more
interfaces. If a valid interface is not known, or if information for all interfaces is desired, use the ALL
keyword to display all configured LAG member interfaces.
If one or more LAG member interfaces are not specified, or ALL keyword is not specified, the output
displayed will be that of SHOW LAG INTERFACE ALL.
The system settings include the system MAC address and the LACPSYSTEMPRIORITY. The system
with the lower numerical value of LACPSYSTEMPRIORITY has higher priority. Supported values are [
1..65535].
Mode
User
Options
Option
Description
Range
Default
Value
LAG
One or more LAG instances.
ALL
ALL
ALL
ALL
NA
NA
lagname – name of the LAG instance, as specified by user via
CREATE LAG command.
type:id-range - the type of interface (in this case LAG) and one
or more interface identifier (id-range).
ifname-list - list of interface names, if not numerical.
ALL – keyword for showing data for all LAGs currently configured in the system.
INTERFACE
A logical representation of one or more physical interfaces.
type:id-range - the type of interface (such as ETH) and one or
more interface identifiers (id-range).
id-range – one or more interface identifiers.
ifname-list - list of interface names, if not numerical.
ALL – keyword to configure all interfaces with the specified
interface priority.
COUNTER
LACPDU count information pertaining to Link Aggregation
Groups (LAGs) configured on the system.
Software Reference for SwitchBlade x3100 Series Switches
358
Layer Two Switching
Option
Description
Range
Default
Value
FULL
Keyword to display all available information for one or more
LAGs
NA
NA
Release Note
NA
Example
Refer to the following commands:
show lag
--- LAG Info Data ---
Name
--------test_lag
maple
jefferson
syrup
State
-------------------DN-DN-Offline
DN-DN-Offline
DN-DN-Offline
DN-DN-Offline
Interface
--------LAG:1
LAG:3
LAG:5
LAG:6
Mode
--------Dynamic
Dynamic
Dynamic
Dynamic
Config Ports
--------------3.1-3.2,7.0-7.5
11.4
10.0
11.5
officer SEC> show lag sfp
--- LAG Info Data --------------------------------------------------------------
--- LAG Info Data --MAC Address........................... 00:00:00:00:00:00
System Priority....................... 25
LAG Name..............................
Interface.............................
State.................................
Configured Interfaces ................
H/W Aggregated Interfaces.............
Mode..................................
Select Criteria.......................
Speed.................................
Direction.............................
Acceptable Frame Type.................
Ingress Filtering ....................
TPID..................................
TAGALL................................
Dynamic MAC Learning Limit............
Admin Key.............................
sfp
LAG:1
DN-DN-Offline
3.1-3.2,7.0-7.5
None
Dynamic
port both & ip both & mac both
No ports in this Gb LAG
Network
VLAN
On
0x8100
Off
0
1
LACP Information
---------------Oper Key..............................
Individual............................
LACP Control Ready....................
Partner LAG ..........................
Role .................................
0
Yes
No
0x0,00:00:00:00:00:00,0x0
Active
Software Reference for SwitchBlade x3100 Series Switches
359
Layer Two Switching
Member Interfaces
-----------------
Interface
----------ETH:3.1
ETH:3.2
ETH:7.0
ETH:7.1
ETH:7.2
ETH:7.3
ETH:7.4
ETH:7.5
LACP Port
Number
----------0
0
0
0
0
0
0
0
Port
Priority
----------32768
32768
32768
32768
32768
32768
32768
32768
------- LACP
Rx
----------Undefined
Undefined
Undefined
Undefined
Undefined
Undefined
Undefined
Undefined
Machine
Periodic Tx
----------Unknown
Unknown
Unknown
Unknown
Unknown
Unknown
Unknown
Unknown
States -Mux
--------Undefined
Undefined
Undefined
Undefined
Undefined
Undefined
Undefined
Undefined
officer SEC>> show lag test_lag counter
--- LACP Counter Data ------- LACPDUs ----- ----- Marker ------ - PDU/Mrk Errors -Interface
Sent
Received
Sent
Received
Sent
Received
--------- --------- --------- --------- --------- --------- --------ETH:3.1
0
0
0
0
0
0
ETH:3.2
0
0
0
0
0
0
ETH:7.0
0
0
0
0
0
0
ETH:7.1
0
0
0
0
0
0
ETH:7.2
0
0
0
0
0
0
ETH:7.3
0
0
0
0
0
0
ETH:7.4
0
0
0
0
0
0
ETH:7.5
0
0
0
0
0
0
Software Reference for SwitchBlade x3100 Series Switches
360
Layer Two Switching
4.3 VLAN (802.3)
4.3.1 Introduction
A VLAN is a virtual subnetwork that allows devices to be grouped into one logical broadcast domain. This allows broadcasts
from one VLAN to be sent only to members on the same VLAN.
4.3.2 Virtual LANs (VLANs)
4.3.2.1 VLAN Tagging
An Ethernet packet can contain a VLAN tag, with fields that specify VLAN membership (the VLAN ID or VID) and user priority. The VLAN tag is described in IEEE Standard 802.3ac, and is four octets that can be inserted between the Source Address
and the Type/Length fields in the Ethernet packet. To accommodate the tag, Standard 802.3ac also increased the maximum
allowable length for an Ethernet frame to 1522 octets (the minimum size is 64 octets). IEEE Standard 802.1q specifies how
the data in the VLAN tag is used to switch frames. VLAN-aware devices are able to add the VLAN tag to the packet header.
VLAN-unaware devices cannot add or read the VLAN tag.
•
•
•
•
Ethernet packets which contain a VLAN tag are referred to as tagged frames.
Switch ports that transmit tagged frames are referred to as tagged ports.
Ethernet packets which do not contain the VLAN tag are referred to as untagged frames.
Switch ports that transmit untagged frames are referred to as untagged ports.
A VLAN can therefore consist of:
• A set of untagged ports, in which the ports receive and transmit untagged packets.
• A set of tagged ports, in which all ports for the VLAN transmit tagged frames
• A mixture of tagged and untagged ports, where on some ports the VLAN receives and transmits tagged frames and on
other ports the VLAN receives and transmits untagged frames.
The SBx3112 accepts VLAN tagged frames, and support the VLAN switching required by these tags. A network can contain
a mixture of VLAN aware devices and VLAN unaware devices (e.g., workstations and legacy switches that do not support
VLAN tagging). The SBx3112 can be configured to send VLAN-tagged or untagged frames on each port, depending on
whether or not the devices connected to the port are VLAN aware. By assigning a port to two different VLANs (one as an
untagged port and another as a tagged port), it is possible for the port to transmit both VLAN-tagged and untagged frames.
When VLAN membership is determined using VLAN tagging, switch ports and network resources can be used more efficiently, since a port can belong to several VLANs. Moreover, one port can be used to uplink (trunk) all VLAN traffic between
the SBx3112 and another VLAN-aware switch, since this port can be configured to include all VLANs on the SBx3112.
When devices cannot include VLAN tagging, the VLAN membership is determined by which port its packets arrive on; all
untagged traffic arriving on a certain port belongs to that VLAN.
4.3.2.2 Standard VLAN Configuration
Figure 4-2 shows a sample configuration for setting up a VLAN in STD mode. The following explanation is based on this figure.
When a standard VLAN is configured, the Forwarding Database and VLAN/port mappings are set as follows:
TABLE 4-8
FDB
Software Reference for SwitchBlade x3100 Series Switches
Port Mapping
361
Layer Two Switching
TABLE 4-8
VID=5
MAC=00:50:94:31:33:00
8.4
VID=5
MAC=00:50:94:31:60:3D
9.8
When the Control Module receives the Source Address and VID, it performs two steps:
1.
Learning - The Source Address-VLAN ID pair are checked against the FDB, and if it is not there the values are added.
2.
Forwarding - The Destination Address is checked against the port mapping, and if the port mapping exists, it forwards the
data onto that port. Otherwise, it floods all ports for that VLAN.
SBx3112
Port 0.0
SBx3100
CM
Port to Port Forwarding
Slot 8
Slot 9
Port 4
MAC=00:50:94:31:33:00
VID=5
Port 8
VLAN=Marketing
MAC=00:50:94:31:60:3D
VID=5
Std_VLAN_Cnfg_3112
FIGURE 4-2
Standard VLAN Configuration in the SBx3112
4.3.2.3 MAC Address Limiting for an Interface
In setting the VLAN attributes for an interface or an interface list, the user can specify the maximum number of MAC addresses that can
be learned for an interface, or set the limit to OFF. This is useful in controlling how many MAC addresses can be learned against the customer interface.
Note:
A single MAC address learned against a specific VID counts as one against the learn limit.
4.3.2.4 Syntax for Adding a VLAN to an Ethernet Interface
Provisioning a VLAN with the various configurations is done by ADDing the VLAN (or set of VLANs) with the Ethernet
physical and virtual interfaces that are associated with the configuration interface. In most cases, the user will add a VLAN to
a single ethernet interface, and this is done in provisioning examples in this Guide. In some cases, however, the user may wish
to associate a VLAN with a set of virtual interfaces that reside on a set of physical interfaces. The syntax to support this is
as follows:
ADD VLAN <interface type>:slot.<interface range | list>
• The range is <number> - <higher number>
• A list is <number>,<higher number>,<higher number>,etc.
For example, with the command:
ADD VLAN=100 INTERFACE=ETH:[9.0-15],[11.0-23] FRAME=UNTAGGED
Software Reference for SwitchBlade x3100 Series Switches
362
Layer Two Switching
This can be read from right to left to see how the syntax is used.
• VLAN 100 is being added to interfaces 0 through 23 on slot 11.
• VLAN 100 is also being added to interfaces 0 through 15 on slot 9.
This syntax is shown in the output of the SHOW VLAN command.
show vlan 100
--- VLAN Information ------------------------------------------------------------ VLAN Information ---------------------------------------Type..................................
Name..................................
Identifier............................
Status................................
Forwarding Mode.......................
IP module attached....................
Configured Untagged Interfaces
Downstream..........................
Downstream (restricted).............
Current Untagged Interfaces
Downstream..........................
Downstream (restricted).............
Tagged Interfaces
Downstream..........................
Downstream (restricted).............
VLAN Translation interfaces...........
MVR Receiver interfaces...............
Note:
VLAN
vlan10
10
Static
Standard
<none>
ETH:[10.1-23]/LAG:[5]
<none>
ETH:[10.1-23]/LAG:[5]
<none>
LAG:[1,7,1024]
<none>
<none>
<none>
This format is also used as part of the file created by the BACKUP CONFIG command and is displayed when using the
SHOW CONFIG command.
4.3.2.5 Syntax for Simultaneously Creating Multiple VLANs
It is possible to create multiple VLANs (at once) by specifying a range of VIDs rather than specifying a VLAN name in the
CREATE VLAN command:
CREATE VLAN VID {vid-range}
For n VIDs, the system will assign n VLAN names in the following format:
vlan<VID-1>
vlan<VID-2>
...
vlan<VID-n>
4.3.3 Configuring Standard VLANs
4.3.3.1 Default Configuration
• As a default, there is one VLAN (VID 1), which cannot be created or destroyed.
• The default VLAN is associated with all Line Card interfaces and is in standard (non-UFO) mode.
• When creating a VLAN, its default forwarding mode is standard (non-UFO) and it is assigned to the default STP.
• When an interface is added to a VLAN, it has untagged framing as its default with no VLAN translation.
4.3.3.2 Configuration Guidelines
• The SBx3112 system supports up to 4094 VLANs and supports VLAN translation on all 4094 VLANs.
• Once an interface is added to a VLAN, it can only be associated with a single spanning tree.
• If adding interface that is part of a link aggregation group (LAG), all of the interfaces in the LAG must in the same VLAN.
Software Reference for SwitchBlade x3100 Series Switches
363
Layer Two Switching
4.3.3.3 Configuration Procedure
The following procedure shows the commands used to create a standard VLAN, add an interface, and destroy the VLAN.
TABLE 4-9
Step
Configuration Procedure for Creating a Standard VLAN
Command
Description/Notes
Create the VLAN
1
create vlan videoHD vid 4004 forwardingmode STD
Creates a new VLAN named “videoHD” with a
VID of 4004 that’s configured for standard
(STD) forwarding.
View information related to new VLAN
2
show vlan videoHD
--- VLAN Information ---------------------------------------------------------Forwarding Tagged Interfaces
Untagged Interfaces
Mode
--------------- ---- ---------- ---------------------- -----------------------
3
Name
VID
videoHD
4004 Standard
<none>
<none>
show vlan videoHD full
--- VLAN Information ---------------------------------------------------------Type..................................
Name..................................
Identifier............................
Status................................
Forwarding Mode.......................
IP module attached....................
Untagged Interfaces
Downstream..........................
Downstream (restricted).............
Tagged Interfaces
Downstream..........................
Downstream (restricted).............
VLAN Translation interfaces...........
VLAN
videoHD
4004
Static
Standard
<none>
<none>
<none>
<none>
<none>
<none>
Add an interface to the new VLAN
4
add vlan videoHD interface 0.23 frame
tagged
Adds interface 0.23 (configured for tagged framing) to the new VLAN.
Verify that interface has been added to VLAN
5
show vlan videoHD
--- VLAN Information ---------------------------------------------------------Name
VID
Forwarding Tagged Interfaces
Untagged Interfaces
Mode
--------------- ---- ---------- ---------------------- ----------------------videoHD
4004 Standard
ETH:[0.23]
Software Reference for SwitchBlade x3100 Series Switches
<none>
364
Layer Two Switching
TABLE 4-9
Configuration Procedure for Creating a Standard VLAN
Step
Command
Description/Notes
6
show vlan videoHD full
--- VLAN Information ---------------------------------------------------------Type..................................
Name..................................
Identifier............................
Status................................
Forwarding Mode.......................
IP module attached....................
Untagged Interfaces
Downstream..........................
Downstream (restricted).............
Tagged Interfaces
Downstream..........................
Downstream (restricted).............
VLAN Translation interfaces...........
VLAN
videoHD
4004
Static
Standard
<none>
<none>
<none>
ETH:[0.23]
<none>
<none>
Destroy the VLAN. (Before a VLAN can be destroyed, all its associated interfaces must be deleted.)
7
delete vlan 4004 interface 0.23
Deletes interface 0.23 from VLAN 4004.
DESTROY VLAN=4004
Destroys VLAN 4004.
Verify that VLAN has been destroyed
8
SHOW VLAN=4004
--- VLAN Information ---------------------------------------------------------No information to display
The following procedure shows how to create several standard VLANs using a single command.
TABLE 4-10
Step
Configuration Procedure - Creating Multiple VLANs at Once
Command
Description/Notes
Create a series of VLANs. Rather than specifying the VLAN names. Specify a range of desired VIDs.
1
Creates a series of 10 VLAN with VIDs that
range from 3201 to 3210. The system sequentially assign names to the VLANs -- based on
the range of VIDs.
CREATE VLAN VID=3201-3210
View information related to the new VLANs
2
show vlan 3201-3210
--- VLAN Information ---------------------------------------------------------Name
VID Forwarding Tagged Interfaces
Untagged Interfaces
Mode
--------------- ---- ---------- ---------------------- ----------------------vlan3201
vlan3202
vlan3203
vlan3204
vlan3205
vlan3206
vlan3207
vlan3208
vlan3209
vlan3210
3201
3201
3203
3204
3205
3206
3207
3208
3209
3210
Standard
Standard
Standard
Standard
Standard
Standard
Standard
Standard
Standard
Standard
<none>
<none>
<none>
<none>
<none>
<none>
<none>
<none>
<none>
<none>
Software Reference for SwitchBlade x3100 Series Switches
<none>
<none>
<none>
<none>
<none>
<none>
<none>
<none>
<none>
<none>
365
Layer Two Switching
Software Reference for SwitchBlade x3100 Series Switches
366
Layer Two Switching
4.3.4 VLAN Commands
This subsection provides an alphabetical reference for commands used to configure VLANs.
TABLE 4-11
VLAN Commands
Commands
ADD VLAN INTERFACE
CREATE VLAN VID
DELETE VLAN INTERFACE
DESTROY VLAN
SET VLAN FORWARDINGMODE
SET VLAN INTERFACE
SHOW VLAN
Software Reference for SwitchBlade x3100 Series Switches
367
Layer Two Switching
ADD VLAN INTERFACE
Syntax
ADD VLAN={ vlanname-list | vid-range }
INTERFACE={ type:id-range | id-range | ifname-list | ALL }
[ FRAME={ UNTAGGED | TAGGED } ]
[ TRANSLATE={ 1..4094 | NONE } ]
[ FORWARDING={ PRIMARYUPSTREAM | SECONDARYUPSTREAM | DOWNSTREAM | RESTRICTED
| STP | UCP | EPSR } ]
[ MCASTSTATICROUTERPORT={ NO | IGMP | MLD | BOTH | YES } ]
Description
Associates a VLAN with a physical interface. When doing this, some restrictions must be considered.
Refer to 4.3.2.
For IGMP and MLD snooping, the command allows the interface to be configured as a static multicast
router port for the VLAN. If the "MCASTSTATICROUTERPORT" parameter is set to "NO", the interface will not be considered a static multicast router port on the VLAN for either IGMP or MLD (but
may still become a dynamic multicast router port). If it is set to "IGMP" or "MLD", the interface will be
considered a static multicast router port for the specified protocol. If it is set to "BOTH" or "YES" , the
interface will be considered a static multicast router port for both IGMP and MLD. By default, the
static multicast router port designation is set to "NO". Refer to IGMP and MLD Snooping.
Mode
Manager
Options
Option
Description
Range
Default Value
INTERFACE
Specifies the type of physical port. For a VLAN,
interfaces can have a type of ETH or LAG. The
LAG interface type can have more than one physical ports associated with it.
NA
NA
NA
UNTAGGED
NA
None
Interfaces can be queried by using 'type:id-range',
'name-list' or 'ALL' options. For example, 'ETH:2.0',
'ETH:2.1-2.4', where 2.0,2.1 etc. are the actual
physical ports and are used as the interface Id's in
this representation.
FRAME
Specifies whether a VLAN tag header is included in
each frame transmitted on the specified interfaces.
TAGGED - a VLAN tag is added to frames prior to
transmission. The interface is then called a tagged
interface for this VLAN.
UNTAGGED - the frame is transmitted without a
VLAN tag. The interface is then called an untagged
interface for this VLAN.
TRANSLATE
The VLAN identifier from which the VLAN is
translated.
Software Reference for SwitchBlade x3100 Series Switches
368
Layer Two Switching
Option
Description
Range
Default Value
FORWARDING
The FORWARDING parameter is only applicable
when the VLAN is in UPSTREAMONLY forwarding
(UFO) mode. The interface’s role for VLAN can
be:
NA
Downstream
NA
NO
PRIMARYUPSTREAM - all frames that are received
on the other interfaces will be sent out this interface.
SECONDARYUPSTREAM - all frames that are
received on the other interfaces will be sent out
this interface if there is a fault with the PRIMARYUPSTREAM.
DOWNSTREAM - Only frames that are received
over the UPSTREAM interface may be switched to
the DOWNSTREAM interface.
STP - The Spanning Tree Protocol will dynamically
determine the upstream interface.
UCP - For the specified VLANs the UCP protocol
will determine the UPSTREAM interface dynamically.
EPSR - The VLAN(s) are part of an EPSR configuration and the EPSR protocol determines the
UPSTREAM interface.
MCASTSTATICROUTERPORT
For IGMP and MLD snooping, the command allows
the interface to be configured as a static multicast
router port for the VLAN.
If the “MCASTSTATICROUTERPORT” parameter
is set to “NO”, the interface will not be considered
a static multicast router port on the VLAN for
either IGMP or MLD (but may still become a
dynamic multicast router port).
If it is set to “IGMP” or “MLD”, the interface will
be considered a static multicast router port for the
specified protocol.
If it is set to “BOTH” or “YES” , the interface will
be considered a static multicast router port for
both IGMP and MLD. By default, the static multicast router port designation is set to “NO”. This
parameter is only valid on the SBx3100.
Release Note
Modified - This command has the option MCASTSTATICROUTERPORT added.
Example
ADD VLAN=6 INTERFACE=8.1 FRAME=TAGGED
Software Reference for SwitchBlade x3100 Series Switches
369
Layer Two Switching
CREATE VLAN VID
Syntax
CREATE VLAN=vlanname VID=2..4094 [FORWARDINGMODE={STD|UPSTREAMONLY}]
Description
The CREATE VLAN command creates a Virtual LAN (VLAN) entry with a unique name and identifier
(VID). When a VLAN entry is created, it is assigned to the default STP. To change the VID of an existing VLAN, the VLAN must be removed with the DESTROY VLAN command and created again.
For the SBx3100, the user can configure up to 16 VLANs that are UFO, and these can be anywhere in
the 2-4094 range.
Mode
Manager
Options
Option
Description
Range
Default
Value
VLAN
The name for the VLAN.
NA
NA
VID
The ID number of the VLAN.
NA
NA
FORWARDINGMODE
STD - Traffic can be forwarded to either upstream
or downstream interfaces.
NA
STD
UPSTREAMONLY - Traffic can only be forwarded
to upstream interfaces.
Release Note
NA
Example
CREATE VLAN=videoHD vid=4004 FORWARDINGMODE=STD
Software Reference for SwitchBlade x3100 Series Switches
370
Layer Two Switching
DELETE VLAN INTERFACE
Syntax
DELETE VLAN={ vlanname-list | vid-range } INTERFACE={ type:id-range | idrange | ifname-list | ALL }
Description
Removes the interface association from the specified Virtual LAN (VLAN). Once an untagged port is
disassociated with all user-defined VLANs, it is automatically added to the default VLAN (VID=1). A
user cannot remove the association between the default VLAN and an untagged port if the port has no
other HVLAN/VLAN associations.
Mode
Manager
Product
Options
Option
Description
Range
Default
Value
VLAN
A comma-delimited list of VLAN names or VLAN
number range (e.g., 4-6).
NA
NA
INTERFACE
The interface that is being disassociated with the
VLAN.
NA
NA
Release Note
NA
Example
DELETE VLAN=4004 INTERFACE=0.23
Software Reference for SwitchBlade x3100 Series Switches
371
Layer Two Switching
DESTROY VLAN
Syntax
DESTROY VLAN={ vlanname-list | vid-range
Description
Destroys the specified Virtual LAN (VLAN) or all VLANs in the switch. The default VLAN (VID=1)
cannot be destroyed. If ALL is specified then all VLANs except the default VLAN are destroyed. A
VLAN cannot be destroyed if interfaces still belong to it.
Mode
Manager
| ALL }
Product
Options
Option
Description
Range
Default
Value
VLAN
A comma-delimited list of VLAN names or VLAN
number range (e.g., 4-6).
NA
NA
Release Note
NA
Example
DESTROY VLAN=4004
Software Reference for SwitchBlade x3100 Series Switches
372
Layer Two Switching
SET VLAN FORWARDINGMODE
Syntax
SET VLAN={ vlanname-list | vid-range } FORWARDINGMODE={ STD | UPSTREAMONLY }
Description
Changes the type of VLANs specified to either Standard or Upstream Forwarding Only (UFO). For
information on UFO VLANs refer to Upstream Forwarding Only (UFO) Mode.
Mode
Manager
Product
Options
Option
Description
Range
Default
Value
VLAN
A comma-delimited list of VLAN names or VLAN
number range (e.g., 4-6).
NA
NA
FORWARDINGMODE
STANDARD - Traffic can be forwarded to either
upstream or downstream interfaces.
NA
NA
UPSTREAMONLY - Traffic can only be forwarded
to upstream interfaces.
Release Note
NA
Example
SET VLAN=4004 FORWARDINGMODE=UPSTREAMONLY
Software Reference for SwitchBlade x3100 Series Switches
373
Layer Two Switching
SET VLAN INTERFACE
Syntax
SET VLAN={ vlanname-list | vid-range } INTERFACE={ type:id-range | id-range |
ifname-list | ALL } [ FRAME={ UNTAGGED | TAGGED } ] [ TRANSLATE={ 1..4094 |
NONE } ] [ FORWARDING={ PRIMARYUPSTREAM | SECONDARYUPSTREAM | DOWNSTREAM |
RESTRICTED | STP | UCP | EPSR } ]
[ MCASTSTATICROUTERPORT={ NO | IGMP | MLD | BOTH | YES } ]
Description
The SET VLAN INTERFACE command specifies:
- the framing type (tagged or untagged) on the interfaces in a Virtual LAN (VLAN)
- an interface's forwarding role for VLANs that are in UPSTREAMONLY forwarding mode
- the VLAN identifier from which the VLAN is to be translated.
For IGMP and MLD snooping, the command allows the interface to be configured as a static multicast
router port for the VLAN. The "MCASTSTATICROUTERPORT" parameter (for the SBx3100) behaves
in the same manner as in the ADD VLAN INTERFACE command.
Mode
Manager
Product
Options
Option
Description
Range
Default
Value
INTERFACE
Specifies the type of physical port. For a VLAN,
interfaces can have a type of ETH or LAG. The
LAG interface type can have more than one physical ports associated with it.
NA
NA
NA
NA
NA
NA
Interfaces can be queried by using 'type:id-range',
'name-list' or 'ALL' options. For example, 'ETH:2.0',
'ETH:2.1-2.4', where 2.0,2.1 etc. are the actual
physical ports and are used as the interface Id's in
this representation.
FRAME
Specifies whether a VLAN tag header is included in
each frame transmitted on the specified interfaces.
TAGGED - a VLAN tag is added to frames prior to
transmission. The interface is then called a tagged
interface for this VLAN.
UNTAGGED - the frame is transmitted without a
VLAN tag. The interface is then called an untagged
interface for this VLAN.
TRANSLATE
Specifies the VLAN identifier from which the
VLAN is translated.
Software Reference for SwitchBlade x3100 Series Switches
374
Layer Two Switching
Option
Description
Range
Default
Value
FORWARDING
The FORWARDING parameter is only applicable
when the VLAN is in UPSTREAMONLY forwarding
(UFO) mode. The interface’s role for VLAN can
be:
NA
NA
NA
NO
PRIMARYUPSTREAM - all frames that are received
on the other interfaces will be sent out this interface.
SECONDARYUPSTREAM - all frames that are
received on the other interfaces will be sent out
this interface if there is a fault with the PRIMARYUPSTREAM.
DOWNSTREAM - Only frames that are received
over the UPSTREAM interface may be switched to
the DOWNSTREAM interface.
RESTRICTED - The VLAN cannot be used by all
interfaces at the same time.
STP - The Spanning Tree Protocol will dynamically
determine the upstream interface.
UCP - For the specified VLANs the UCP protocol
will determine the UPSTREAM interface dynamically regardless of the type of configuration.
EPSR - The VLAN(s) are part of an EPSR configuration.
MCASTSTATICROUTERPORT
For IGMP and MLD snooping, the command allows
the interface to be configured as a static multicast
router port for the VLAN. Refer to ADD VLAN
INTERFACE
Release Note
Modified - This command has the option MCASTSTATICROUTERPORT added.
Example
SET VLAN=600 INTERFACE=10.0
Software Reference for SwitchBlade x3100 Series Switches
FORWARDING=PRIMARYUPSTREAM
375
Layer Two Switching
SHOW VLAN
Syntax
SHOW VLAN [ ={ vlanname-list | vid-range | ALL } ] [ FORWARDINGMODE={ STD |
UPSTREAMONLY | ALL } ] [ FULL ]
Description
Displays information about the specified Virtual LAN (VLAN). If no VLAN name or identifier is specified, then ALL is assumed. If ALL is used, a summary of all VLANs is presented.
Mode
Manager
Options
Option
Description
Range
Default
Value
VLAN
A comma-delimited list of VLAN names, the VLAN
number range (such as 4-6) or ALL
NA
ALL
FORWARDINGMODE
STD - displays VLANs that are forwarding traffic to
both upstream and downstream interfaces.
NA
ALL
NA
Summary output
UPSTREAMONLY - displays VLANs that are forwarding traffic to upstream interfaces only.
ALL - displays both STD and UPSTREAMONLY
VLANs.
FULL
Displays detailed information for each VLAN.
Release Note
Modified - The output is changed for Release 17.0
Note
For IGMP and MLD snooping, this command will also display any multicast router ports that have been
statically configured using the "MCASTSTATICROUTERPORT" parameter in the "ADD/SET VLAN
INTERFACE" commands. Refer to the example.
Example
SHOW VLAN=300
--- VLAN Information ------------------------------------------------Type..................................
Name..................................
Identifier............................
Status................................
Forwarding Mode.......................
IP module attached....................
Configured Untagged Interfaces
Downstream..........................
Downstream (restricted).............
Current Untagged Interfaces
Downstream..........................
Downstream (restricted).............
Tagged Interfaces
Downstream..........................
Downstream (restricted).............
VLAN Translation interfaces...........
MVR Receiver interfaces...............
IGMP Static Router Port Interfaces....
MLD Static Router Port Interfaces.....
VLAN
vlan300
300
Static
Standard
<none>
ETH:[1.0-3],ETH:[7.0-23]
<none>
ETH:[1.0-3],ETH:[7.0-23]
<none>
<none>
<none>
<none>
<none>
ETH:[7.1-2]
ETH:[7.1-2]
Software Reference for SwitchBlade x3100 Series Switches
376
Layer Two Switching
4.4 Spanning Tree Introduction: STP, RSTP, MSTP and BPDU Cop
This chapter describes and provides configuration procedures for:
• Spanning Tree Protocol (STP and RSTP)
• Multiple Spanning Tree Protocol (MSTP)
• BPDU COP
For detailed information about the commands used to configure spanning trees, see Spanning Tree Commands
4.4.1 Introduction
4.4.1.1 Spanning Tree Modes
STP can run in one of three modes: STP, RSTP or MSTP. A device running RSTP is compatible with other devices running STP;
a device running MSTP is compatible with other devices running RSTP or STP. By default, on a device in MSTP mode each
port automatically detects the mode of the device connected to it (MSTP, RSTP or STP), and responds in the appropriate
mode by sending messages (BPDUs) in the corresponding format. Ports on a device in RSTP mode can automatically detect
and respond to connected devices in RSTP and STP mode. Particular ports can also be forced to only operate in a particular
mode.
• STP
The Spanning Tree Protocol (STP) is the original protocol defined by IEEE standard 802.1D-1988. It creates a single spanning
tree over a network.
By default, STP is disabled on all interfaces.
• RSTP
Rapid Spanning Tree Protocol (RSTP) also creates a single spanning tree over a network. Compared with STP, RSTP provides
for more rapid convergence to an active spanning tree topology. RSTP is defined in IEEE standard 802.1D-2004.
By default, when STP is enabled, the system operates in RSTP mode.
• MSTP
The Multiple Spanning Tree Protocol (MSTP) addresses the limitations in the previous spanning tree protocols, STP and RSTP,
within networks that use multiple VLANs with topologies that employ alternative physical links. It supports multiple spanning
tree instances on any given link within a network, and supports large networks by grouping bridges into regions that appear
as a single bridge to other devices.
MSTP is defined in IEEE standard 802.1Q-2005. The protocol builds on, and remains compatible with, the previous IEEE standards defining STP and RSTP. (MSTP is provided in release 14.2.)
4.4.2 Overview of Spanning Trees
A Spanning Tree instance is a (named) logical representation of the underlying data structures and control mechanisms
that provide a simple, fully-connected active network topology for a set of bridges and the LANs that connect them in a network.
4.4.3 Spanning Tree Protocol (STP and RSTP)
The Spanning Tree Protocol (STP) makes it possible to automatically disable redundant paths in a network to avoid network
loops, and to re-enable them when it is necessary to maintain connectivity in the event of a fault in the network (such as the
failure of a link or a switch).
Software Reference for SwitchBlade x3100 Series Switches
377
Layer Two Switching
The spanning tree algorithm prunes redundant paths from the topology (i.e. marking paths as unavailable so frames are not
transmitted over those paths). The resulting loop-free topology set of switches and active paths is called the logical spanning
tree.
A logical spanning tree has the following elements:
• Each switch in the extended LAN has a unique bridge ID. This is a combination of the a switch's priority component (a
value assigned by default or via manual configuration) and its the switch's MAC address.
• The switch with the numerically lowest bridge ID is considered the root bridge of the logical spanning tree.
• Each port on a switch has a unique port ID. This is a combination of the port's priority component (a value assigned by
default or via manual configuration) and an internally assigned, unique numeric location identifier local to the bridge.
• Each port connecting a switch to a LAN has an associated path cost. This is a value assigned by switch software as a
•
•
•
•
default based on port speed, or via manual user configuration, that provides an indication of the latency or resource consumption that would be encountered if a frame were to be transmitted on that port.
The root path cost for a particular path from a port, a LAN, or switch to the root bridge is the sum of the port path
costs incurred if a frame were to be transmitted on that path to the root bridge.
The root port of a switch is the port on the switch with the lowest root path cost. If two or more ports on a switch have
the same root path cost, the root port is the port with the numerically lowest port ID.
The designated bridge of a LAN is the switch on the LAN with the lowest root path cost. If two or more switches on
the LAN have the root path cost, the designated bridge is the switch with the lowest bridge ID.
A designated port of a switch is a port that connects a LAN to its designated bridge.
Note:
For the SBx3112, RSTP is the default STP setting.
4.4.3.1 Protocol Concepts
4.4.3.2 Protocol Communication
To ensure that the switches in the extended LAN agree about root bridge, root port, and designated bridge elections, they
must communicate information about bridge IDs and root path costs to other switches. This communication is accomplished
via the exchange of messages known as Configuration Bridge Protocol Data Units (BPDUs), also known as hello
messages.
There is also the need to communicate when changes occur in the network topology (e.g. link failure or a new bridge). This
type of communication is accomplished via the exchange of Topology Change Notification (TCN) BPDUs.
4.4.3.3 Spanning Tree Port States
An SBx3112 switch port that is participating in spanning tree operations can be in one of six states. A summary of the states
is provided in Table 4-12.
TABLE 4-12
Spanning Tree Port States
State
Meaning
Transition
Blocking
The port is disabled for receiving and transmitting normal traffic frames. It may receive
BPDU frames, but does not transmit them. It
does not add information about any MAC
address from either Received BPDUs to its
forwarding database
This is the initial state for each port.
The switch also places the ports into
his state to eliminate network loops,
or if its perception if the network
topology changes (new root port or
root bridge).
Software Reference for SwitchBlade x3100 Series Switches
378
Layer Two Switching
TABLE 4-12
Spanning Tree Port States
State
Meaning
Transition
Listening
The port does not receive or transmit traffic
data frames.It may receive and transmit
BPDUs. It does not add information about
source MAC addresses from received BPDUs
to the forwarding database.
The switch places ports into this sate
if it is a candidate for participating in
the spanning tree topology.
Learning
The port does not receive or transmit traffic
data frames. It may receive and transmit
BPDUs. It adds source MAC address information from the BPDU to the forwarding database.
The switch places ports into this
state upon expiration of a forwarding
delay timer while in the listening
state, unless something has caused
the port to be placed in the blocking
state.
Forwarding
The normal state for a port. The port is
enabled and receiving and transmitting traffic
data frames as well as BPDUs, and is adding
source MAC address information for all
frames to the forwarding database.
The switch places ports into this
state upon expiration of a forwarding
delay timer while in the learning
state, unless something has caused
the port to be placed in the blocking
state.
Disable
No BPDUs are received or transmitted on the
port
The switch places ports into this
state based on manual actions.
Excluded
Port has been removed from STP operations.
When a port is originally designated
as taking part in STP, and is then
removed from STP, the port can have
a role of DESIGNATED and a state
of EXCLUDED.
Note:
For Rapid STP (explained in 4.4.3.5), the “blocking” and “listening” states shown above are combined into a single
“discarding” state
4.4.3.4 Convergence
The process by which the switches in the extended LAN come to agreement about the logical spanning tree topology is
known as convergence. This process includes several key steps:
• The switches set their ports to the listening state. They elect a root bridge by exchanging hello messages to determine
which switch has the lowest bridge ID.
• The root bridge initiates calculation of root path costs. Each switch uses information received from other switches, along
with its own port cost information, to compute its own root path cost. It forwards this cost information along to other
switches; eventually, the correct root path cost for every path in the extended LAN will be computed.
• Each switch elects a root port for that switch.
• The switches elect a designated bridge for each physical LAN, based on the root path cost for the switches
• Any port that is determined not to be a root port or a designated port is set to the blocking state.
• After the expiration of forwarding delay timers, every root port and designated port is set to the forwarding state. Once
this is done, traffic may flow over the extended LAN, without any network loops being present.
If a link or switch fails, or the network topology otherwise changes, the network starts the convergence process again to
reach a new spanning tree topology.
Software Reference for SwitchBlade x3100 Series Switches
379
Layer Two Switching
4.4.3.5 Rapid Spanning Tree (RSTP)
In the 802.1d Spanning Tree Algorithm and Protocol, timer driven processing controls how each port goes through the STP
state transitions before be placed into a “forwarding” mode where normal traffic flow is supported. In the Rapid Spanning
Tree Algorithm and Protocol (RSTP), significant time savings are accomplished using rapid STP port state transitions in many
of the expected network topology change scenarios. The time savings is accomplished through additional information
exchange and new “hand shake” processing between the ports of LAN connected bridges. The concept of a point-to-point
connection is introduced to identify when a port is connected to exactly one other bridge. This condition must exist for
some of the above mentioned rapid state transitions to take place. The concept of edge ports is also introduced to completely
bypass the state transition process when a port is known to be connected to a single host.
The parameters that are associated with RSTP are included below.
4.4.3.6 Spanning Tree Parameters
The following subsection provides an overview of parameters that are of particular importance in setting up a configuration.
4.4.3.7 Bridge Priority
Bridge IDs are used in root bridge elections. The root bridge is the switch in the extended LAN with the numerically lowest
bridge ID value. This is guaranteed to identify a single bridge due to the unique MAC address component. The user is allowed
to change the bridge priority component to override the arbitrary root selection that will result from only comparing MAC
addresses when the default bridge priorities are in use.
Bridge IDs are also used in designated bridge elections. Normally the switch with the lowest root path cost is the designated
bridge for a physical LAN. If more than one switch ties has the same lowest root path cost, then the designated bridge is the
switch with the numerically lowest numbered bridge priority ID value.
The value of the PRIORITY parameter is used to set the writable portion of the bridge ID. The default bridge priority is
32768. To change the STP priority value, use the SET STP PRIORITY command
Note:
The range is from 0 to 65535 (a limitation of RSTP) in increments of 4096.
4.4.3.8 Port Priority
Port IDs are used in root port elections. Normally, the port with the lowest root path cost is the root port for the switch. If
more than one port ties for the lowest root path cost, then the root port is the port with the lowest numerical port ID (as
assigned by the system).
The default port priority value is 128. The port priority values can be configured on a per-port basis, as a value from zero to
240, in accordance with IEEE Std 802.1d, 1998 Edition. However, the storage space (number of bits) allocated to the priority
component of the port ID is reduced to support bridges with larger numbers of ports, since this only left room for port
numbers from 1-255.
Note:
To maintain compatibility for comparison with previous versions of STP, the port priority is now considered to be a
value between 0-240 that can only be provisioned in increments of 16.
4.4.3.9 Interface Path Costs
Interlace path costs are used in root path cost calculations, which are a factor in root interface and designated bridge elections. By default, interface path costs are related to the bandwidth capacity of the interfaces; however, the default values may
be changed by the user to reflect other factors (e.g. propagation delay, link quality, desired traffic level, etc.)
The default values and recommended ranges for path cost are as follows:
• Interface Speed: 10 Mbps
• Default Path Cost: 100
Software Reference for SwitchBlade x3100 Series Switches
380
Layer Two Switching
• Recommended Range: 50-600
• Interface Speed: 100 Mbps
• Default Path Cost: 10
• Recommended Range: 10-60
• Interface Speed: 1 Gbps
• Default Path Cost: 20
• Recommended Range: 3-10
The path cost values identified above reflect what is implemented in the initial SBx3112 product release as identified in IEEE
Std.802.1d, 1998 Edition. The corresponding default values and recommended ranges for path cost as specified in IEEE Std.
802.1w-2001 to support RSTP and MSTP are shown in the table below.
• Interface Speed: 10 Mbps
• Default Path Cost: 2,000,000
• Recommended Range: 200,000-20,000,000
• Interface Speed: 100 Mbps
• Default Path Cost: 200,000
• Recommended Range: 20,000-2,000,000
• Interface Speed: 1 Gbps
• Default Path Cost: 20,000
• Recommended Range: 2,000-200,000
A calculation is shown below that can be used to determine the recommended path cost value to use for intermediate link
speeds:
20,000,000,000 / (link speed in kb/s)
In LAN environments where bridges are in use that are operating different revision levels of STP, all the bridges must be configured to use compatible path cost value ranges. This will either require the older STP revision level bridges to be reconfigured to use the ranges specified in the newer standard, or the bridges with newer STP revisions will need to be configured to
utilize the ranges from the older standard. The range of path cost values available from the older STP standard may be insufficient to support the data rates available in newer bridges.
The default PATHCOST values and the range of recommended PATHCOST values depend on the interface speed (as indicated above). If the path cost for an interface is not explicitly set, it will vary as the speed of the interface varies. Setting the
path cost to a larger value on a particular interface is likely to reduce the traffic over the LAN connected to it. This may be
appropriate if the LAN has lower bandwidth, or if there are reasons for limiting the traffic across it. To modify the STP interface path cost, use the command:
SET STP INTERFACE
If the path cost of an interface has been explicitly set to a particular value, it can be returned to its self-adjusting default path
cost and priority, using the following command:
SET STP INTERFACE={type:id-range|id-range|ifname-list|ALL} DEFAULT
Each interface also has a path cost, which is used if the interface is the root interface for the STP on the switch. The path cost
is added to the root path cost field in configuration messages received on the interface to determine the total cost of the
path to the root bridge. To modify the STP interface path cost, use the command:
SET STP INTERFACE={type:id-range|id-range|ifname-list|ALL} PATHCOST=path-cost
Note:
The range of the path-cost value for STP mode is 1..65535. For RSTP mode, it is 1..200000000.
To display STP interface information, use the command:
Software Reference for SwitchBlade x3100 Series Switches
381
Layer Two Switching
SHOW STP INTERFACE[={type:id-range|id-range|ifname-list|ALL}]
4.4.3.10 STP Timer Control Parameters
The Spanning Tree Protocol uses three configurable parameters for the time intervals that control the flow of STP information on which the dynamic STP topology depends:
• HELLOTIME (default 2 seconds) - This value determines how often the switch sends hello messages if it is the root
bridge, or if it is trying to determine the root bridge identity in the network. Setting a shorter value makes the network
more robust, in that network changes can be detected more rapidly. Setting a longer value reduces network traffic and
processing overhead.
• MAXAGE (default 20 seconds) - This value determines the maximum “age” of dynamic spanning tree configuration
information (e.g. the root bridge ID, designated ports, and root ports). If this information has not been refreshed by hello
messages before the timer expires, the information is discarded and the spanning tree must reconverge. If this timer is
too short, the spanning tree will undergo reconvergence unnecessarily, resulting in network outages. If the timer is too
long, the spanning tree may be slow to react to changes in network topology.
• FORWARDDELAY (default 15 seconds) - This value is used in the convergence process to allow for propagation of
hello messages through the network. The timer represents how long ports are in the listening and learning states. By using
this delay, the network has time for all the switches to agree on the spanning tree configuration. If the timer is too short,
ports may reach the forwarding state before a stable topology has been reached. This may result in network loops that
serious degrade overall network performance. If the timer is too long, it will cause unnecessary delays in enabling the
ports for passing bearer traffic. (At the default timer, the network will require at least 30 seconds for ports to transition
from “blocking” to “forwarding”, since each port will spend 15 seconds in the “listening” state and 15 seconds in the
“learning” state. All switches in the same spanning tree topology must use the same values for these parameters. The
parameter values actually used by each switch are those sent by the root bridge, and forwarded to all other switches by
the designated bridges.
Each switch that participates in the spanning tree (i.e. each switch in the extended LAN) must use the same values for these
timers; otherwise, the convergence process would be unpredictable and unstable. To ensure that the timer values are consistent throughout the network, the timers for all the switches are set to values configured for the root bridge, once the identity of the root bridge has been determined.
The recommended relationship between the timer values can be expressed using the following formulae:
MAXAGE >= HELLOTIME x (number of network “hops” in longest path through network)
MAXAGE >= 2 x (HELLOTIME + 1 second)
MAXAGE <= 2 x (FORWARDDELAY - 1 second)
To modify the parameters controlling these time intervals, use the command SET STP and the appropriate parameter.
4.4.3.11 The Priority Parameter
The value of the PRIORITY parameter is used to set the writable portion of the bridge ID, for example, the first two octets
of the (8-octet long) Bridge Identifier. The remaining 6 octets of the bridge IDs are given by the MAC address of the switch.
The Bridge Identifier parameter is used in all Spanning Tree Protocol packets transmitted by the switch. The first two octets,
specified by the PRIORITY parameter, determine the switch’s priority for becoming the root bridge or a designated bridge in
the network, with a lower number indicating a higher priority. In fairly simple networks, for instance those with a small number of switches in a meshed topology, it may make little difference which switch is selected to be the root bridge, and no
modifications may be needed to the default PRIORITY parameter, which has a default value of 32768. In more complex networks, one or more switches are likely to be more suitable candidates for the root bridge role, by virtue of being more centrally located in the physical topology of the network. In these cases, the STP PRIORITY parameters for at least one of the
switches should be modified. To change the STP priority value, use the command SET STP PRIORITY=bridge-priority, where bridge-priority is 0..65535 for STP mode and 0..65535 in steps of 4096 in RSTP mode. To restore STP timer
and priority defaults, use the command SET STP DEFAULT.
Software Reference for SwitchBlade x3100 Series Switches
382
Layer Two Switching
Changing the STP PRIORITY, using either of the previous commands, restarts the STP algorithm, so that elections for the
root bridge and designated bridges begin anew, without resetting STP counters. To display general information about STPs on
the switch, use the command SHOW STP.
4.4.3.12 Force Version
This parameter is used for RSTP. This parameter allows the user to specify that the bridge should operate in the
STP_ORIGINAL mode, RSTP, or STP_COMPATIBLE_RSTP mode. If the STP_COMPATIBLE_RSTP mode is chosen,
the RSTP will be compatible with other switches in the network that may not use RSTP and therefore use older parameter
values and ranges.
4.4.3.13 Edge Port
This parameter allows the user to specify a port as an “Edge Port” when it is expected that a port will be directly connected
to a host (i.e. a port at the “edge” of the Bridged LAN). Additional processing is associated with the use of this parameter to
verify that a port identified as an “Edge Port” by the user is not actually connected to another bridge. This parameter and its
associated processing can facilitate a port state transition directly to the forwarding state as part of the RSTP processing.
In the SET STP INTERFACE command, set EDGEPORT=TRUE to enable this for RSTP.
4.4.3.14 Point-to-Point Port
This parameter allows the user to specify a port as a Point-to-Point Port when it is expected that it will be connected to exactly
one other bridge. Additional processing is associated with this parameter to automatically determine whether or not the
port should be considered a point-to-point connection, when so indicated by the user via (auto).parameter setting
The Point-to-Point Port parameter, and its associated processing, is utilized by the RSTP to facilitate the rapid transition of a
port into the forwarding state under certain conditions specific to Point-to-Point ports only.
In the SET STP INTERFACE command, set POINT2POINT=TRUE or AUTO to enable this for RSTP.
Note:
In most cases, select AUTO so that the system can determine the port connection.
4.4.3.15 Transmit Hold Count
This parameter allows the user to specify the maximum BPDU transmission rate for any port on the bridge, which therefore
determines how much STP control traffic is going into the network. The default value for this parameter is 6, indicating that
at most 3 BPDUs can be transmitted from any port in a given Hello Time period (2 seconds by default).
In the SET STP command, the parameter is TXMAX; the range is 1 to 10 (with the default of 6).
4.4.3.16 Enable/Disable STP
The default Spanning Tree instance is disabled (by default) at switch start up, and Spanning Tree instances created by a user
are disabled by default when they are created. To enable or disable Spanning Tree instances, use the commands ENABLE/
DISABLE STP.
4.4.3.17 Enable/Disable Interface
When an STP is enabled in a looped or meshed network, it dynamically enables and disables particular ports belonging to it,
to eliminate redundant links. All ports in a VLAN belong to the same STP, and their participation in STP configuration is
enabled by default when STP is enabled, and hence the possibility of them being elected to the STP's active topology. To
enable or disable particular ports for participation or exclusion from STP operations, use the commands ENABLE and DISABLE STP INTERFACE.
Software Reference for SwitchBlade x3100 Series Switches
383
Layer Two Switching
This command also supports the TOPOLOGYCHANGE parameter to control the detection of topology changes on the
associated port. This allows the disabling of topology change detection on ports that are known to be connected to single
end stations that could cause the Topology Change Notification mechanism to be triggered for the entire network when the
end station is power cycled.
4.4.3.18 Display Counters
To display STP counters, use the following command, with the results shown below.
SHOW STP COUNTER
officer SEC> SHOW STP COUNTER
--- STP Counter Information --------------------------------------------------STP Instance Name.....................
STP Packets Transmitted...............
STP Packets Received..................
Configuration BPDU Transmitted........
Configuration BPDU Received...........
TCN BPDU Transmitted..................
TCN BPDU Received.....................
Invalid BPDU..........................
Port Disabled.........................
Invalid Protocol......................
Invalid Type..........................
Invalid Message Age...................
Configuration BPDU length.............
TCN BPDU length.......................
MAIN
0
0
0
0
0
0
0
0
0
0
0
0
0
-------------------------------------------------------------------------------
4.4.3.19 Reset STP
The spanning tree algorithm can be recalculated at any time, and all timers and counters be initialized, using the command
RESET STP.
4.4.3.20 (R)STP and VLAN Interaction
Since STP is a port-based topology and VLAN is a logic-based topology (over a physical port), the user needs to understand
how these two work together so that the blocked links that are part of (R)STP convergence do not have unintended consequences for the VLANs that are carried over these ports.
Note:
With the MSTP feature, there can be an additional (R)STP instance based on a (set of) VLANs. However, the
configuration rules listed here should be understood first, since they apply to understanding the MSTP instances.
Refer to the following figure, which shows an (R)STP topology in which two physical links are blocked and two VLANs are
configured.
Software Reference for SwitchBlade x3100 Series Switches
384
Layer Two Switching
A
VLAN 100
(TDMdata)
1
0.2
0.0
4
VLAN 50
(TDMdata)
0.0
VLAN 100 on Device A is
disconnected
from the network
0.1
0.1
B
VLAN 50
(TDMdata)
5
0.1
0.1
D
VLAN 100
(TDMdata)
C
0.0
VLAN 50
(TDMdata)
2
A
D
= Devices
1
5
= Links
0.0
0.2
VLAN 100
(TDMdata)
= VLAN 50
= VLAN 100
= Links blocked
(ports blocked)
= Physical Link
VLAN_STP
FIGURE 4-3
3
STP Network with Multiple VLANs - STP Blocks Two Ports and VLAN is Isolated
To prevent loops, STP convergence has blocked links 4 and 5. For VLAN 50, this is not a problem; VLAN 50 follows a physical
loop and so actually mimics the loop and needs to be blocked. VLAN 100, however, is a non-looped VLAN, and so with physical link 4 being blocked, the VLAN on Device A is disconnected from the network and cannot send or receive data.
From this figure two rules follow:
• There should be no non-looped VLANs in the STP network.
• Looped VLANs should follow physical loops of the STP network
4.4.4 Example (R)STP Configuration - Standard VLAN
Once the topology stabilizes, in each system one of the ports will become the root port (the one closest to the root bridge
as determined by STP) and the other port(s) become the designated port. The port which is the root port is considered to be
the upstream port and the port which is not the root port (designated port) is considered to be the downstream port.
To prevent one of the systems from becoming the Spanning Tree root bridge, the network design must ensure that the
appropriate STP parameters are set such that the root bridge is always located above the ring configuration.
4.4.5 Configuring (R)STP
4.4.6 Default STP Configuration (Customer and Network Ports)
By default the SBx3112 series product has the following STP set-up:
• There is one STP instance that cannot be destroyed. Its name is “MAIN” and its initial state is disabled.
• By default all ports will belong to the default STP.
Software Reference for SwitchBlade x3100 Series Switches
385
Layer Two Switching
Interfaces have the DIRECTION attribute that can be NETWORK or CUSTOMER. Usually, the user does not want interfaces with a direction of CUSTOMER to participate in STP.
The CUSTOMER-direction interfaces default is not to be included (i.e. STP is disabled for those interfaces).
4.4.7 Configuration Procedure
The SBx3112 is a designated bridge in the network shown in Figure 4-4. Interface 0.22 serves as the root port. Interfaces
0.20, 0.21, 1.2, 1.3, and 11.0 serve as designated ports. Interface 0.0 serves as an alternate port.
32768 / 00:0C:25:00:06:AD
32768 / 00:0C:25:00:06:AD
ROOT
BRIDGE
SBx3112
0.22
0.22
Designated
Forwarding
11.0
SBx3100
32768 / EC:CD:6D:03:10:CB
1.3
Designated
Forwarding
1.2
Forwarding
32768 / 00:0C:25:00:06:AD
0.21
Designated
0.20
Designated
1.3
Forwarding
Designated
Forwarding
Changing
the Root Port
1.2
0.21
Designated
Forwarding
Designated
0.20
0.0
Designated
Forwarding
Designated
Forwarding
Designated
Forwarding
ROOT
BRIDGE
Forwarding
0.0
32768 / EC:CD:6D:03:10:CB
Designated
11.0
SBx3100
Alternate
Discarding
Forwarding
Designated
SBx3112
Forwarding
Root
Forwarding
DESIGNATED
BRIDGE
ROOT
BRIDGE
Alternate
Starting RSTP
Configuration
Discarding
SBx3112
0.22
11.0
SBx3100
Root
32768 / EC:CD:6D:03:10:CB
0.0
Forwarding
Designated
Forwarding
Changing
the Root Bridge
1.3
Designated
FIGURE 4-4
Forwarding
Forwarding
1.2
Designated
Forwarding
0.21
Designated
Forwarding
Designated
0.20
RSTP Network - Changing Root Port and Changing a Designated Bridge to Root
The following procedure shows the commands used to configure RSTP parameters in order to change the SBx3112’s root
port as well as to change it from being a designated bridge to being the root bridge in the network.
TABLE 4-13
Step
Configuration Procedure for RSTP
Command
Description/Notes
Enable STP
1
enable stp
A single STP instance (MAIN) is created. The
default mode is RSTP.
View the current RSTP configuration
The root bridge has a priority of 32768 and a MAC address of 00:0C:25:00:06:AD. The SBx3112 has a priority of 32768
and a MAC address of EC:CD:6D:03:10:CB. The SBx3112 is forwarding on its root port (0.22) and designated ports
(0.20, 0.21, 1.2, 1.3, 11.0), while discarding on its alternate port (0.0).
Software Reference for SwitchBlade x3100 Series Switches
386
Layer Two Switching
TABLE 4-13
Step
Command
2
show stp
Configuration Procedure for RSTP
Description/Notes
--- STP Information ---------------------------------------------------------Spanning Tree Type...................... RSTP
Instance Name......................... MAIN (0)
Instance State........................ ENABLED
Root Bridge ID Priority............ 32768
Root Bridge ID MAC Address....... 00:0C:25:00:06:AD
Max Age (seconds)..................... 20
Hello Time (seconds).................. 2
Forward Delay (seconds)............... 15
Bridge ID Priority................. 32768 (priority 32768 mstid 0)
Bridge ID MAC Address............ EC:CD:6D:03:10:CB
Bridge Max Age (seconds).............. 20
Bridge Hello Time (seconds)........... 2
Bridge Forward Delay (seconds)........ 15
Int
Role
State
Cost Prio.Number
Type
----- ---------- ---------- ---------- ----------- ------------------------0.0
ALTERNATE
DISCARDING
20000 128.321
RSTP
0.20 DESIGNATED
FORWARDING
200000 128.341
RSTP
0.21 DESIGNATED
FORWARDING
200000 128.342
RSTP
0.22 ROOT
FORWARDING 20000 128.343
RSTP
1.2
DESIGNATED
FORWARDING
2000 128.387
RSTP
1.3
DESIGNATED
FORWARDING
2000 128.388
RSTP
11.0 DESIGNATED
FORWARDING
20000 128.1025
RSTP
Change the SBx3112’s root port
The root port switches from interface 0.22 to 0.0, while interface 0.22 becomes a discarding alternate port.
3
set stp interface 0.0 pathcost 2000
Reduces the path cost from 20000 to 2000 on
interface 0.0.
Verify the root port change
4
show stp
--- STP Information ---------------------------------------------------------Spanning Tree Type......................
Instance Name.........................
Instance State........................
Root Bridge ID Priority.................
Root Bridge ID MAC Address............
Max Age (seconds).....................
Hello Time (seconds)..................
Forward Delay (seconds)...............
Bridge ID Priority......................
Bridge ID MAC Address.................
Bridge Max Age (seconds)..............
Bridge Hello Time (seconds)...........
Bridge Forward Delay (seconds)........
RSTP
MAIN (0)
ENABLED
32768
00:0C:25:00:06:AD
20
2
15
32768 (priority 32768 mstid 0)
EC:CD:6D:03:10:CB
20
2
15
Int
Role
State
Cost
Prio.Numbe
Type
----- ---------- ---------- ---------- ----------- ------------------------0.0
ROOT
FORWARDING
2000 128.321
RSTP
0.20 DESIGNATED
FORWARDING
200000 128.341
RSTP
0.21 DESIGNATED
FORWARDING
200000 128.342
RSTP
0.22 ALTERNATE DISCARDING 20000 128.343
RSTP
1.2
DESIGNATED
FORWARDING
2000 128.387
RSTP
1.3
DESIGNATED
FORWARDING
2000 128.388
RSTP
11.0 DESIGNATED
FORWARDING
20000 128.1025
RSTP
Reset RSTP to default configuration.
5
set stp default
The root port is changed from interface 0.0
back to interface 0.22.
View RSTP configuration
Software Reference for SwitchBlade x3100 Series Switches
387
Layer Two Switching
TABLE 4-13
Step
Command
6
show stp
Configuration Procedure for RSTP
Description/Notes
--- STP Information ------------------------------------------------------------Spanning Tree Type......................
Instance Name.........................
Instance State........................
Root Bridge ID Priority.................
Root Bridge ID MAC Address............
Max Age (seconds).....................
Hello Time (seconds)..................
Forward Delay (seconds)...............
Bridge ID Priority......................
Bridge ID MAC Address.................
Bridge Max Age (seconds)..............
Bridge Hello Time (seconds)...........
Bridge Forward Delay (seconds)........
RSTP
MAIN (0)
ENABLED
32768
00:0C:25:00:06:AD
20
2
15
32768 (priority 32768 mstid 0)
EC:CD:6D:03:10:CB
20
2
15
Int
Role
State
Cost
Prio.Number
Type
----- ---------- ---------- ---------- ----------- ------------------------0.0
ALTERNATE
DISCARDING
20000 128.321
RSTP
0.20 DESIGNATED
FORWARDING
200000 128.341
RSTP
0.21 DESIGNATED
FORWARDING
200000 128.342
RSTP
0.22 ROOT
FORWARDING 20000 128.343
RSTP
1.2
DESIGNATED
FORWARDING
2000 128.387
RSTP
1.3
DESIGNATED
FORWARDING
2000 128.388
RSTP
11.0 DESIGNATED
FORWARDING
20000 128.1025
RSTP
Switch the SBx3112 from a designated bridge to the root bridge
7
set stp priority 1000
Reduces the priority from 32768 to 1000
(rounded down to 0). This results in the
SBx3112 switching from a designated bridge to
the root bridge.
Verify the root bridge change
8
show stp
--- STP Information ----------------------------------------------------------Spanning Tree Type...................... RSTP
Instance Name......................... MAIN (0)
Instance State........................ ENABLED
Root Bridge ID Priority............ 0
Root Bridge ID MAC Address....... EC:CD:6D:03:10:CB
Max Age (seconds)..................... 20
Hello Time (seconds).................. 2
Forward Delay (seconds)............... 15
Bridge ID Priority................. 0 (priority 0 mstid 0)
Bridge ID MAC Address............ EC:CD:6D:03:10:CB
Bridge Max Age (seconds).............. 20
Bridge Hello Time (seconds)........... 2
Bridge Forward Delay (seconds)........ 15
Int
----0.0
0.20
0.21
0.22
1.2
1.3
11.0
Role
---------DESIGNATED
DESIGNATED
DESIGNATED
DESIGNATED
DESIGNATED
DESIGNATED
DESIGNATED
State
Cost Prio.Number
---------- ---------- ----------FORWARDING
20000 128.321
FORWARDING
200000 128.341
FORWARDING
200000 128.342
FORWARDING
20000 128.343
FORWARDING
2000 128.387
FORWARDING
2000 128.388
FORWARDING
20000 128.1025
Type
------------------------RSTP
RSTP
RSTP
RSTP
RSTP
RSTP
RSTP
4.4.8 Multiple Spanning Tree Protocol (MSTP)
The previous subsections have described the STP and RSTP features and how they are configured. It is also possible to configure multiple (R)STP instances on a VLAN basis, so this is called the Multiple Spanning Tree Protocol (MSTP).
Software Reference for SwitchBlade x3100 Series Switches
388
Layer Two Switching
With MSTP, separate spanning tree instances are created for VLANs (or groups of VLANs). Each of the separate instances
elect root bridges, root ports, and designated bridges independently.
When an (R)STP network is configured and no VLANs are configured (only the default VLAN), each device and each port are
considered part of the same extended LAN, and so all participate in the same convergence process. Therefore all devices and
ports are part of a single (R)STP instance. As VLANs are added, they are still part of the single spanning tree instance.
Note:
As VLANs are configured, the user must be careful to ensure that the physical (link) and virtual (VLAN) connections
work together and do not lead to any disconnected VLANs.
This association of multiple VLANs with the one spanning tree is called a Common and Internal Spanning Tree, or CIST.
Bridges configured within a CIST behave as a single spanning tree system automatically.
With MSTP, additional spanning tree instances can be created and associated with the VLANs defined on the device. These
additional spanning tree instances are called Multiple Spanning Tree Instances (MSTI).
Note:
Each VLAN can be associated with only one instance.
Bridges that share a common set of MSTIs (each with their associated set of VLANS) make up an MST region, with each
MSTI forming a logical network topology; this is explained below.
Figure 4-5 shows an example of a network using MSTP. Note that the CIST has been omitted for simplicity.
Note:
Since MSTP is a set of RSTP instances, the user should be familiar with the concepts of the single (R)STP instance,
explained in previous subsections.
= Physical Link
= MST Instance 1 (V_60)
= MST Instance 2 (V_80)
V_60
V_80
= MSTRegion1
= CIST Spanning
Tree Instance
= VLAN on MST
Instance 2 block
= VLAN on MST
Instance 1 block
0.3
0.2
0.1
V_80
A
V_60
1
4
MSTRegion1
0.2
V_80
B
Regional
V_60 Root
Bridge
MSTI2
A
D = Devices
1
4
0.1
Regional
Root
V_60
Bridge
MSTI1
= Links
0.1
V_80
D
0.2
2
0.1
0.2
3
V_60
C
V_80
MSTP_config_no_secondary
FIGURE 4-5
Concept of an MSTP Network
Software Reference for SwitchBlade x3100 Series Switches
389
Layer Two Switching
In Figure 4-5, there are two MST instances, Instance 1 with VLAN 60 and Instance 2 which includes VLAN 80. Only one
VLAN is associated with each instance; more than one VLAN can be associated with an MST instance, but this simple example helps to demonstrate key concepts.
For MST Instance 1, the VLAN is blocked on physical link 3, so that no traffic over VLAN 60 can traverse between bridges C
and D. For MST Instance 2, the VLAN is blocked on physical link 4, so that no traffic over VLAN 80 can traverse between
bridges A and D. With this topology, no loops are formed for each MSTP instance.
With this topology, if link 2 is now physically blocked, there will also be a block over MST Instances 1 and 2 over Physical Link
2. As a result, Bridge C is blocked from the network for MST Instance 2 (VLAN 80) and Bridges C and D are blocked from
the network for MST Instance 1 (VLAN 60).
To correct this, MST Instance 1 will unblock its VLAN (V_60) over physical link 3, and Instance 2 will unblock its VLAN
(V_80) over Physical Link 4. The resulting topology will now allow for no loops and no bridge is isolated. Refer to Figure 4-6.
= Physical Link
= MST Instance 1 (V_60)
= MST Instance 2 (V_80)
V_60
V_80
= CIST Spanning
Tree Instance
= MST Region 1
0.3
0.2
0.1
V_80
A
V_60
1
4
MST Region 1
0.2
V_80
V_60
B
Regional
Root
Bridge
MSTI 2
A
D
= Devices
1
4
= Links
0.1
Regional
Root
Bridge
MSTI 1
= Physical Link 2 is blocked, VLANs
for MSTI on Physical Links 3 and 4 are
unblocked
0.1
V_80
V_60
D
0.2
2
3
0.1
0.2
V_60
C
V_80
MSTP_config_no_secondary_rec
FIGURE 4-6
MSTP Recovery when Physical Link Blocked
4.4.8.1 MTSP Region
When a set of switches have the same MSTI configuration (meaning the set of switches have the same MSTIs and their VLAN
associations), these switches can make an MSTP region. This allows the group of switches to be placed under a common
administration; the region appears as one large bridge to the rest of the network spanning tree (i.e. the CIST). Since there is
one overall network instance, which connects all the regions, blocking on boundary ports would occur so that there would
be no loops into and out of the MST Region. Refer to the following figure.
Note:
One feature, Cisco Compatible STP Mode, allows the Allied Telesis SBx3112 to participate in the same MSTP region
with one or more adjacent Cisco bridges that do not meet the 802.1s MST standard.
To form an MSTP Region, all bridges that make up the region must share these attributes:
Software Reference for SwitchBlade x3100 Series Switches
390
Layer Two Switching
•
•
•
•
MSTP Instances
VLANs associated with these instances
MSTP Region Name
MSTP Region Revision Level
Refer to Figure 4-7, which shows the MST Region as part of the larger CIST. The CIST represents a spanning tree outside
the MST region, but also has a spanning tree inside the region (the IST), and can carry all VLAN traffic outside the MST
region.
Note that it is not required that VLANs are configured on all the ports (interfaces), although it is necessary if the user wishes
traffic for a specific VLAN (which is part of an Instance) to be carried over that port. Not configuring VLANs on the port can
be useful in the following scenarios:
• The user wishes to block VLAN traffic without changing the existing spanning tree
• As the MST Region is created, no loops are created.
= Physical Link
= MST Instance 1 (V_60)
= Network Spanning
Tree Instance
Root
Bridge
CIST
= MST Instance 2 (V_80)
= MST Region 1
V_60
V_80
= VLAN on MST
Instance 2 blocked
= VLAN on MST
Instance 1 blocked
0.3
V_60
V_80
0.2
0.1
V_80
A
V_60
4
1
MST Region 1
V_80
B
Regional
V_60 Root
Bridge
MSTI 2
A
D = Devices
1
4
0.1
Regional
V_60
Root
Bridge
MSTI 1
= Links
0.1
0.2
0.2
D
V_80
0.2
2
3
0.1
0.2
V_60
C
V_80
MSTP_Region_concept
FIGURE 4-7
Concept of an MSTP Region
Software Reference for SwitchBlade x3100 Series Switches
391
Layer Two Switching
4.4.8.2 Provisioning Parameters
Many of the commands and parameters for MSTP are similar to (R)STP, since the user is still creating an (R)STP instance that
must go through a convergence process. However, some parameters are unique for MSTP, or some value for a common
parameter is different, and these are highlighted.
Following are the key parameters that are data filled for (R)STP; for each there is a summary for the parameter (or a reference to an earlier subsection, especially 4.4.3.6), and how MSTP uses the parameter.
4.4.8.3 Bridge ID
Bridge IDs are used in root bridge elections. The root bridge is the switch in the extended LAN with the numerically lowest
bridge ID value. This is guaranteed to identify a single bridge due to the unique MAC address component. The user is allowed
to change the bridge priority component to override the arbitrary root selection that will result from only comparing MAC
addresses when the default bridge priorities are in use.
Bridge IDs are also used in designated bridge elections. Normally the switch with the lowest root path cost is the designated
bridge for a physical LAN. If more than one switch has the same lowest root path cost, then the designated bridge is the
switch with the numerically lowest bridge ID value.
The default bridge priority value is 32768. A bridge priority can be configured as a value from zero to 65535, in accordance
with IEEE Std 802.1D, 1998 Edition. For MSTP, however, the priority component of the bridge ID is reduced to support MSTP
operations, to allow for the unique identification of each MSTI in a bridge as part of a “system ID” that represents a (12-bit)
numerical extension to the MAC address. This avoids the potential need to allocate up to 4094 additional MAC addresses
per bridge to uniquely identify each MSTI. The reallocation of (bits in) the bridge ID contents was done in a manner that supports backwards compatibility with IEEE Std. 802.1D, 1998 Edition.
As a result, the bridge priority component has been modified to be a (4-bit) value between 0-65535 that can only be provisioned in increments of 4096. This was done to allow for direct comparison with values from earlier versions of STP.
For Bridges that are running MSTP, there will be MSTI definitions to support the different VLANS defined for the bridge. Each
of the MSTIs will have its own Bridge Identifier with the composition described above, except that each will include the
Bridge MAC address as a component of the Bridge ID. Each will have a priority component, as described above, which can be
independently provisioned from the other spanning tree instances defined for the same bridge.
The final component is an identifier called the “system ID extension” that is used to uniquely identify each of the MSTIs for a
bridge. The CIST for each bridge will use the system ID extension value of zero. Any other MSTI defined for the bridge will
utilize a value called the MSTID that identifies the MSTI. The MSTID parameter is described in a later section.
4.4.8.4 Port ID
Port IDs are used in root port elections. Normally, the port with the lowest root path cost is the root port for the switch. If
more than one port ties for the lowest root path cost, then the root port is the port with the lowest numerical port ID.
The default port priority value is 128. The IEEE Std 802.1D, 1998 Edition includes priority values on a per-port basis from
zero to 255. For the Allied Telesis SBx3112, the storage space (number of bits) allocated to the priority component of the
port ID is reduced to support bridges with larger numbers of ports, since this only left room for port numbers from 1-255.
To maintain compatibility for comparison with previous versions of STP, the port priority is a value between 0-240 that can
only be provisioned in increments of 16.
For Bridges that are running MSTP, the priority component of the Port ID is repeated for the CIST, and each MSTI defined for
the bridge. This allows the user complete independent control over the port configurations for each Spanning
Tree instance.
Software Reference for SwitchBlade x3100 Series Switches
392
Layer Two Switching
4.4.8.5 Port Path Costs
Port path costs are used in root path cost calculations, which are a factor in selecting root ports and designated bridges. By
default, port path costs are related to the bandwidth capacity of the ports; however, the default values may be changed by the
user to reflect other factors (e.g. propagation delay, link quality, desired traffic level, etc.)
The values for port path costs are listed in 4.4.3.9. For MSTP, the internal port path cost and the external port path cost are
represented by one port path cost parameter described there.
4.4.8.6 Port participation
If ports on a switch are members of an extended LAN or VLAN that does not require use of the spanning tree protocol (i.e.,
if the VLAN is administered such that no network loops could exist), then spanning tree protocol operations can be disabled
for those ports. However, if a port is a member of multiple VLANs, then the spanning tree protocol must be enabled on that
port for all those VLANs or none of them; a mixed configuration is not supported.
If spanning tree protocol operations are disabled for a port, it may still pass bearer traffic to and from other ports, regardless
of whether or not the spanning tree protocol is used for those other ports.
For bridges that run MSTP, port participation in the spanning tree may be disabled on a per MSTI basis. This means that
VLAN traffic associated with the disabled MSTI may flow freely through those ports
Note:
Spanning tree instances (MSTIs) themselves may not be disabled individually.
4.4.8.7 Force Version
Refer to 4.4.3.12. The value specifies whether STP or RSTP is to be used on a bridge. For MSTP the value 2 (RSTP) is used.
4.4.8.8 Edge Port
Refer to 4.4.3.13, and is part of RSTP processing in that it identifies a port is directly connected to the host. For MSTP, this
value is also used.
4.4.8.9 Point-to-Point Port
Refer to 4.4.3.14, and is used by MSTP.
Note:
In most cases, select AUTO so that the system can determine the port connection.
4.4.8.10 Transmit Hold Count
Refer to 4.4.3.15, and is used by MSTP processing.
4.4.8.11 Max Hops (Unique for MSTP)
For MSTP, an additional mechanism is added to control the circulation of old information within a spanning tree instance
(CIST and MSTIs). Each BPDU sent for MSTP will contain a “remaining hop count” field. The value is initially set by the root
bridge for the spanning tree instance (i.e., the Regional Root) where the BPDU originates. The field is then decremented at
each bridge that the information passes through. Once the field reaches zero, the information stops circulating.
The Max Hops parameter allows the user to specify the value that this field will be initialized to should the bridge for which
it is provisioned become the root of a spanning tree instance. By default, the max hops parameter is set to the same value as
max age.
Software Reference for SwitchBlade x3100 Series Switches
393
Layer Two Switching
4.4.8.12 Multiple Spanning Tree Instance ID (Unique for MSTP)
When the user creates a new Spanning Tree instance for a bridge, a number between 1 and 4096 must be specified to
uniquely identify this Multiple Spanning Tree Instance (MSTI) to other bridges connected to this bridge using LAN segments.
The user also provides a name when the spanning tree instance is created which may be used for all commands on the local
bridge which require a spanning tree instance to be identified. When the name “MAIN” is provided, the Common and Internal Spanning Tree instance (CIST) is utilized by the command processing. The MSTID for the CIST is zero.
4.4.8.13 MST Configuration Table (Unique for MSTP)
To associate one or more VLANs with a spanning tree instance, the ADD STP command is used with the name or MST ID of
a spanning tree instance and one or more VLANs (by name or VID). The MST Configuration Table contains the VLAN to
Spanning Tree mapping for a particular Bridge that is running MSTP. By default, all VLANs defined for a Bridge running MSTP
will be mapped to CIST. As additional MSTIs are defined for the Bridge, this table will be filled in as the user provisions the
desired mapping of defined VLANs for the bridge to the new MSTI.
4.4.9 Configuring MSTP
4.4.9.1 Default Configuration
The default is the same as with (R)STP; only an RSTP instance exists, labeled MAIN with id 0, and it is disabled.
4.4.9.2 Configuration Guidelines
• To meet the redundancy and load balance needs of the network, the minimum number of MSTIs necessary should be created. This implies putting as many bridges as possible into an MST Region. With this minimum number of MSTIs, multiple
VLANs can be assigned to each one.
• When multiple VLANs are mapped to the MSTI, port blocking will occur for all the VLANs on the ports that are blocked
by the MSTI.
• An interface must be enabled against MAIN before it can be enabled to any other MSTP instance. (Before enabling an
MSTP instance against an interface, the MAIN instance must be enabled against that interface as well.) Otherwise you will
receive an error message, as shown here.
show stp interface=1.2 // 1.2 is excluded from MAIN instance
--- STP Interfaces Information -----------------------------------------------STP Instance
Forwarding
Learning
Discarding
Excluded
Interfaces
Interfaces
Interfaces
Interfaces
---------------- --------------- --------------- --------------- -----------MAIN
1.2
mst9
mst10
1.2
enable stp inst mst9 int 1.2 // attempting to include 1.2 in mst9
Error (040482): Could not enable MSTP instance for interface since MAIN
instance is excluded
enable stp int 1.2 // enabling all instances against interface 1.2
Info (040409): Spanning Tree Protocol operation is now enabled for the
specified interface/interface-list (1.2)// Repeated for each instance
Software Reference for SwitchBlade x3100 Series Switches
394
Layer Two Switching
show stp interface=1.2 // mst9 now has 1.2 included
--- STP Interfaces Information -----------------------------------------------STP Instance
Forwarding
Learning
Discarding
Excluded
Interfaces
Interfaces
Interfaces
Interfaces
---------------- --------------- --------------- --------------- -----------MAIN
1.2
mst9
1.2
mst10
1.2
-
• You cannot disable the MAIN instance against an interface if other instances are enabled against that interface. Otherwise
you will receive an error message, as shown here.
disable stp inst main interface=1.0
Error (040483): Could not exclude interface for MAIN instance while active
for other MSTP instance(s)
4.4.9.3 Configuration Procedure
The following table shows the basic steps to configure the MSTP instances shown in Figure 4-5 with:
•
•
•
•
•
•
The MST region named MSTRegion1.
The MSTP instances named MSTID1 and MSTID2.
VLANs 60 and 80 are already created and added to the device interfaces.
RSTP is enabled on all of the devices.
RSTP is enabled on all the connecting interfaces of the devices.
Device B defaults to the Regional Root Bridge.
TABLE 4-14
Step
Configuration Procedure for MSTP
Command
Description (Optional)
Set the stp version to MSTP on Devices A-D
1
SET STP PROTOCOL=MSTP
A single MSTP instance (MAIN) is created containing all created VLANs.
Create a region on Devices A-D
2
SET STP MSTREGION=MSTRegion1
Region appears as one large bridge to the rest of
the network.
Create the MSTP instances MSTI1 and MSTI2 on Devices A-D.
3
CREATE STP INSTANCE=MSTI1 MSTID=1
CREATE STP INSTANCE=MSTI2 MSTID=2
Set Device D to be Regional Root Bridge (optional). Command for Device D only..
4
SET STP INSTANCE=MSTI1 PRIORITY=1
Changing the Regional Root Bridge for MSTI1 to
be Device D. This would also have to be done for
MSTI2 if the default Regional Root Bridge is not
for Device B.
Associate VLANs with MSTP instances on Devices A-D
Software Reference for SwitchBlade x3100 Series Switches
395
Layer Two Switching
TABLE 4-14
Configuration Procedure for MSTP
Step
Command
5
ADD STP INSTANCE=1 VLAN=60
ADD STP INSTANCE=2 VLAN=80
Description (Optional)
Show the configuration on Device A
6
officer SEC>> show stp inst all full
--- STP Information -------------------Spanning Tree Type...................... MSTP (CIST)
Instance Name......................... MAIN (0)
Instance State........................ ENABLED
VLAN Associations....................... 1 (2-59,61-79,81-4094)
Root Bridge ID Priority................. 32768
.....................................
Int
Role
State
Cost Prio.Number Type
----- ---------- ---------- ---------- ----------- -----0.1 DESIGNATED FORWARDING
200000 128.834
MSTP
0.2 DESIGNATED FORWARDING
20000 128.848
MSTP
0.3 ROOT
FORWARDING
20000 128.848
RSTP (boundary)
------------------------------------------------------------------- STP Information --------------------------------------------Spanning Tree Type...................... MSTP (MSTI)
Instance Name......................... MSTI1 (1)
Instance State........................ ENABLED
VLAN Associations....................... 60
Regional Root Bridge ID Priority........ 32769
..................................................
Int
Role
State
Cost Prio.Number Type
----- ---------- ---------- ---------- ----------- ---------0.1 DESIGNATED FORWARDING
200000 128.834
MSTP
0.2 ROOT
FORWARDING
20000 128.848
MSTP
0.3 MASTER
FORWARDING
20000 128.848
RSTP (boundary)
--- STP Information ---------------------------------------------Spanning Tree Type...................... MSTP (MSTI)
Instance Name......................... MSTI2 (2)
Instance State........................ ENABLED
VLAN Associations....................... 80
Regional Root Bridge ID Priority........ 32770
..................................................
Int
Role
State
Cost Prio.Number Type
----- ---------- ---------- ---------- ----------- ---------0.1 ROOT
FORWARDING
200000 128.834
MSTP
0.2 DESIGNATED FORWARDING
20000 128.848
MSTP
0.3 MASTER
FORWARDING
20000 128.848
RSTP (boundary)
--------------------------------------------------------------officer SEC>> show stp
--- MSTP Configuration Identifier Information ---------------------Format Selector................................ 0
Region Name.................................... region1
Revision Level................................. 0
---------------------------------------------------------------------- Spanning Tree Instance Summary --------------------------------STP Instance
MSTID
STP State
Root Port Vlan(s) Associated
-------------- -------- ------------ ---------- ------------------MAIN
0
ENABLED
0.2
1 (2-59,61-79,81-4094)
MSTI1
1
ENABLED
0.2
60
MSTI2
2
ENABLED
0.1
80
Software Reference for SwitchBlade x3100 Series Switches
396
Layer Two Switching
TABLE 4-14
Step
Configuration Procedure for MSTP
Command
Description (Optional)
Destroy the instance, this will automatically put the VLAN(s) back in to the MAIN instance .
7
officer SEC>> show stp instance msti2
--- STP Information -----------------------------------------------Spanning Tree Type...................... MSTP (MSTI)
Instance Name......................... MSTI2 (2)
Instance State........................ ENABLED
VLAN Associations....................... 80
Regional Root Bridge ID Priority........ 32770
..................................................
Int
Role
State
Cost Prio.Number Type
----- ---------- ---------- ---------- ----------- ---------0.1 ROOT
FORWARDING
200000 128.834
MSTP
0.2 DESIGNATED FORWARDING
20000 128.848
MSTP
0.3 MASTER
FORWARDING
20000 128.848
RSTP (boundary)
--------------------------------------------------------------officer SEC>> destroy stp instance msti2
Info (010017): Operation Successful
officer SEC>> show stp
--- MSTP Configuration Identifier Information ---------------------Format Selector................................ 0
Region Name.................................... region1
Revision Level................................. 0
---------------------------------------------------------------------- Spanning Tree Instance Summary --------------------------------STP Instance
MSTID
STP State
Root Port Vlan(s) Associated
-------------- -------- ------------- ---------- ------------------MAIN
0
ENABLED
0.2
80 (1-59,61-79,81-4094)
MSTI1
1
ENABLED
0.2
60
(MSTI2 is not included and VLAN 80 is back in MAIN)
--------------------------------------------------------------------
4.4.10 BPDU COP
4.4.10.1 Overview
An SBx3112 interface could be connected to some other device (i.e.a switch or media converter), Some part of the hardware could go out of service, but the hardware fault would not be detected. and a netwrok loop could result. To prevent the
network loop from affecting the entire network, when the SBx3112 feature BPDU Cop enabled, when the interface does not
recieve a BPDU that interface will be temporarily or permanently disabled depending on how the interface is configured
The parameter BPDUCOP={ ON | OFF } is part of the SET STP INTERFACE command and is set against the specific interface(s).
There is a second parameter (TIMEOUT=0..2048), that when set to a non-zero value determines how many minutes the
system will wait before it tries to re-enable the interface.
4.4.10.2 Feature without AutoRecovery (TIMEOUT=0)
When a BPDU is received and the feature is activated, the operational state goes to DOWN and the state changes to AUTO-DISABLED,
as shown in 4.4.11.
Note that once the interface is set to AutoDisabled by the system, the user must disable and enable the interface to clear the
alarm and bring the interface back into service. In other words, once an interface is placed out of service by the
BPDU Cop feature, it will stay disabled unless it is explicitly brought back up by the user.
Software Reference for SwitchBlade x3100 Series Switches
397
Layer Two Switching
4.4.10.3 Feature with Auto Recovery (TIMEOUT=1 to 2048, Default = 10)
With the TIMEOUT parameter, the Auto-Recovery is activated, and this allows the option to have the system wait 1 to 2048
minutes before automatically re-enabling the interface.
When BPDU Cop is enabled, the auto recovery is also enabled by default, with TIMEOUT set at 10 minutes.
4.4.10.4 Summary of Feature Operation
Table 4-15 shows the state of the interface, how the parameters can be set, and how the feature will work. Included in the
table are possible (although uncommon) situations where the user may change a parameter while the interface is in a failed
state.
TABLE 4-15
Interface
State
BPDUCOP
(Y/N)
Normal
Y
(no faults)
Normal
Feature Operation for BPDU Cop
TIMEOUT = n
(0..2048)
Manual Change
made by User
n=0
None
If there is an unexpected BPDU, feature is
activated. The interface is disabled and must
be re-enabled by the user
None
If there is an unexpected BPDU, feature is
activated. After n minutes, the system will
re-enable the interface.
(Auto-recovery
disabled)
Y
(no faults)
n = 1..2048
(Auto-recovery
enabled)
Result
Fault State
Y
n = 1..2048
User changes BPDUCOP to N
The fault is cleared immediately (interface is
re-enabled) by the system, but the feature is
now disabled.
Fault State
Y
n=0
User changes BPDUCOP to N
The fault is not cleared (user must re-enable
interface), and the feature is now disabled.
Fault State
Y
n = 1..2048
User changes n to 0
Fault is not cleared (user must re-enable
interface), and the fault will not clear automatically the next the feature is invoked.
Fault State
Y
n=0
User changers to a nonzero value
Auto-recovery is being invoked, and once
the command is accepted the system will
wait n minutes and re-enable the interface.
Fault State
Y
n = 1..2048
User changes n to
another value
The previous value is used for system
recovery, and the new value is used the next
time
4.4.11 Configuring BPDU Cop
In the following procedure, STP and BPDU Cop are set up on an interface (0.23 on a GE24POE line card), with at first the
default TIMEOUT value (10) used.
Software Reference for SwitchBlade x3100 Series Switches
398
Layer Two Switching
TABLE 4-16
Step
Configuration Procedure for BPDU Cop
Command
Description (Optional)
Ensure that (R)STP is enabled. Note that 0.23 is not included in the interface set.
1
SHOW STP
--- STP Information ----------------------------------------------------Spanning Tree Type...................... RSTP
Instance Name......................... MAIN (0)
Instance State........................ ENABLED
............................................................
Int
Role
State
Cost Prio.Number
Type
----- ---------- ---------- ---------- ----------- ---------------0.0
ROOT
FORWARDING
20000 128.321
RSTP
0.22 ALTERNATE DISCARDING
20000 128.343
RSTP
1.2
DESIGNATED FORWARDING
2000 128.387
RSTP
1.3
DESIGNATED FORWARDING
2000 128.388
RSTP
11.23 DESIGNATED FORWARDING
200000 128.1048
RSTP
Enable BPSU Cop for the 0.23 interface
2
SET STP INTERFACE=0.23 BPDUCOP=ON
Enable STP for the 0.23 interface
3
ENABLE STP INTERFACE=0.23
Info (040409): Spanning Tree Protocol operation is now enabled for the
specified interface/interface-list (0.23)
Review the status of the interface
Software Reference for SwitchBlade x3100 Series Switches
399
Layer Two Switching
TABLE 4-16
Step
Command
4
SHOW STP
Configuration Procedure for BPDU Cop
Description (Optional)
--- STP Information -----------------------------------------------------Spanning Tree Type...................... RSTP
Instance Name......................... MAIN (0)
Instance State........................ ENABLED
Root Bridge ID Priority................. 32768
(output omitted)
Int
Role
State
Cost Prio.Number
----- ---------- ---------- ---------- ----------0.0
ROOT
FORWARDING
20000 128.321
0.22 ALTERNATE DISCARDING
20000 128.343
0.23 DESIGNATED FORWARDING
200000 128.344
1.2
DESIGNATED FORWARDING
2000 128.387
1.3
DESIGNATED FORWARDING
2000 128.388
Type
--------------------RSTP
RSTP
RSTP
RSTP
RSTP
SHOW STP INTERFACE=0.23 FULL
------------- STP Information for Port 0.23 ----------------------------Spanning Tree Instance Name...........
Port ID...............................
Role................................
State...............................
Priority............................
Pathcost............................
(output omitted)
BPDU Cop..............................
timeout.............................
MAIN (0)
33112
DESIGNATED
FORWARDING
128
200000
ON
10
If a loop occurs, BPDU Cop disables the interface, sends a SYSLOG, and raises an alarm.
5
SHOW INTERFACE=0.23
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
0.23
GE
UP-DN-AutoDisabled
<none>
<none>
<none>
GE24SFP
Interface Faults
Unexpected BPDU Received........ Major
(output omitted)
6
SHOW ALARM
(output omitted)
--- Interface(Port) Alarms --Interface
Fault
Severity
------------ ------------------------------- -------0.1
Loss of Link
Major
0.21
Loss of Link
Major
0.23
Unexpected BPDU Received
Major
Time Stamp
-----------17:55:07 05/21
17:55:07 05/21
10:11:19 05/25
Once the loop is removed, the interface is re-enabled, the fault clears, and traffic resumes after the 10-minute time-out.
Change the TIMEOUT values to 0. With the interface and BPDU Cop enabled, this change is immediate.
7
SET STP INTERFACE=0.23 TIMEOUT=0
If a loop occurs, BPDU Cop disables the interface and it remains disabled.
Software Reference for SwitchBlade x3100 Series Switches
400
Layer Two Switching
TABLE 4-16
Configuration Procedure for BPDU Cop
Step
Command
8
SHOW INTERFACE=0.23
Description (Optional)
--- GE Interfaces --Interface..........................
Type...............................
State..............................
Description........................
Remote ID..........................
External Profile...................
Card Type..........................
0.23
GE
UP-DN-AutoDisabled
<none>
<none>
<none>
GE24SFP
Interface Faults
Unexpected BPDU Received........ Major
Manually re-enable the interface
9
DISABLE INTERFACE=0.23 FORCE
Info (039512): Operation Successful (GE24SFP Slot
ENABLE INTERFACE=0.23
Info (039512): Operation Successful (GE24SFP Slot
0 Port 23)
0 Port 23)
SHOW INTERFACE=0.23
--- GE Interfaces --Interface.......................... 0.23
Type............................... GE
State.............................. UP-UP-Online
(output omitted)
Software Reference for SwitchBlade x3100 Series Switches
401
Layer Two Switching
4.4.12 Spanning Tree Commands
This subsection provides an alphabetical reference for commands used to configure RSTP, STP or MSTP. For information
about spanning trees, including configuration procedures, see 4.4.
TABLE 4-17
Spanning Tree Commands
Commands
ADD STP INSTANCE VLAN
ADD TRACE STP
CREATE STP INSTANCE MSTID
DELETE STP INSTANCE VLAN
DELETE TRACE STP
DESTROY STP INSTANCE
DISABLE STP
ENABLE STP
RENAME STP INSTANCE
RESET STP
SET STP
SHOW STP
SHOW TRACE STP
Software Reference for SwitchBlade x3100 Series Switches
402
Layer Two Switching
ADD STP INSTANCE VLAN
Syntax
ADD STP INSTANCE={ stpname | mstid } VLAN={ vlanname | vid-range }
Description
For MSTP. By default, all VLANs (and therefore all ports), belong to the Common STP instance, the
CIST. Once created, VLANs can be associated with the MSTI using this command: (VLANs can also be
dis-associated with the MSTI as well.) The user can continue to associate VLANs with MSTIs until
there are no VLANs associated with the CIST.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The name of the Multiple Spanning Tree instance
(MSTI) to create
NA
NA
VLAN
The name or numerical VLAN identifier.
1-4094
NA
Release Note
NA
Example
ADD STP INSTANCE=mst9 VLAN=420
Software Reference for SwitchBlade x3100 Series Switches
403
Layer Two Switching
ADD TRACE STP
Syntax
ADD TRACE STP [ INSTANCE={ stpname | mstid | MAIN | ALL } ]
[ EVENT={ BPDU | ALL } ]
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
Description
Adds filter criteria for which Spanning Tree Protocol traces to generate. BPDU traces can be filtered
by instance, and/or by interface. You then can use the ENABLE TRACE OUTPUT=CLI to view the
output.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The Spanning Tree Instance of the trace
NA
NA
EVENT
The event trace to add. Currently this is only
BPDUs.
NA
ALL
INTERFACE
The interface against which the trace will be
applied.
NA
NA
See Note below when applying this utility to a
LAG.
Release Note
NA
Note
It is possible to reference a LAG, either by name or symbol (e.g. LAG:1) to identify all the member
ports from that LAG as currently defined in the system. However, if the LAG port membership is modified subsequent to that reference, the TRACE STP utility will not include the changes. The user should
make the corresponding updates to the TRACE STP utility (use the ADD TRACE command against the
LAG again) to reflect the updated LAG port membership. Then the SHOW TRACE STP command will
include the updated LAG membership.
Example
ADD TRACE STP LAG:3, LAG:4 << LAG:3 has 6.10, LAG:4 has 6.13
Info (010017): Operation Successful
E136 09:33:31>> show trace stp
--- STP Traces ---------------------------------------------------------------Trace
----------------1
Event
----------------BPDU
MSTID
----------------0
Interfaces
----------------6.10, 6.13
-------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
404
Layer Two Switching
CREATE STP INSTANCE MSTID
Syntax
CREATE STP INSTANCE=stpname MSTID=1..4094 [ PRIORITY=0..65535 ]
Description
For MSTP, create an STP instance and give it a name as well as ID. VLANs can then be associated with
this instance.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The name of the existing interface that this route will
use. To display interface names, use the IP LIST INTERFACES command.
NA
NA
MSTID
The number to assign (0 is reserved for the CIST).
NA
NA
PRIORITY
Determines the switch's priority for becoming the root
bridge or a designated bridge in the network, with a
lower number indicating a higher priority.
0..65535 for
STP mode
32768
0..65535 in
steps of 4096 in
RSTP or MSTP
modes
Release Note
NA
Example
(Create mstp instance mstd9, mstp and region already set)
officer SEC>> create stp instance mst9 mstid 9
Info (010017): Operation Successful
show stp
--- MSTP Configuration Identifier Information ---------------------------------Format Selector................................ 0
Region Name.................................... region10
Revision Level................................. 10
-------------------------------------------------------------------------------
--- Spanning Tree Instance Summary ------------------------------------------STP Instance
MSTID
STP State
Root Port
Vlan(s) Associated
----------------- -------- --------------- ---------- --------------MAIN
0
DISABLED
NA
1 (2-4094)
mst9
9
DISABLED
NA
None
Software Reference for SwitchBlade x3100 Series Switches
405
Layer Two Switching
DELETE STP INSTANCE VLAN
Syntax
DELETE STP INSTANCE={ stpname | mstid | ALL } VLAN={ vlanname | vid-range |
ALL }
Description
Disassociates a VLAN (range) with an STP instance. Once all VLANs are disassociated, the instance
can be destroyed.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The spanning tree instance(s) that will have VLANs
removed.
NA
NA
VLAN
The VLAN(s) that will be removed from the instance.
NA
NA
Release Note
NA
Example
DELETE STP INSTANCE=mstd9 VLAN=420
Software Reference for SwitchBlade x3100 Series Switches
406
Layer Two Switching
DELETE TRACE STP
Syntax
DELETE TRACE STP [ INSTANCE={ stpname | mstid | MAIN | ALL } ] [ EVENT={ BPDU
| ALL } ] [ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
Description
Removes specified trace criteria for STP traces.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The instance form which the trace will be deleted.
NA
NA
EVENT
All events or BPDUs
0.0.0.0
0.0.0.0
INTERFACE
The interface(s) where the trace will be removed.
If no IP address is
supplied, the natural mask of the IP
address is used.
If no IP
address is
supplied,
the natural
mask of the
IP address
is used.
Release Note
NA
Example
DELETE TRACE STP INSTANCE 2
Software Reference for SwitchBlade x3100 Series Switches
407
Layer Two Switching
DESTROY STP INSTANCE
Syntax
DESTROY STP INSTANCE={ stpname | mstid | ALL }
Description
Once all relevant VLANs are disassociated with the STP instance, the Instance itself can be destroyed.
(You cannot destroy to default STP instance, or CIST.)
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The instance to be destroyed.
NA
NA
Release Note
NA
Example
DESTROY STP INSTANCE=mstd9
Software Reference for SwitchBlade x3100 Series Switches
408
Layer Two Switching
DISABLE STP
Syntax
DISABLE STP
[ { [ INSTANCE={ stpname | mstid | MAIN | ALL }
INTERFACE={ type:id-range | id-range | ifname-list | ALL }
[ TOPOLOGYCHANGE ] ] |
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } [ TOPOLOGYCHANGE
] ] } ]
Description
Disables Spanning Tree Protocol operations for the system. When this command is issued, all ports in
the system are set to the STP FORWARDING state so that they are traffic capable. The STP port state
displayed for all ports is STP DISABLED to indicate that STP operations are disabled.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The instance to be disabled.
NA
NA
INTERFACE
The interface(s) on which STP will be disabled.
NA
NA
TOPOLOGYCHANGE
Controls the detection of topology changes on the
associated port. This allows the disabling of topology
change detection on ports that are known to be connected to single end stations that could cause the Topology Change Notification mechanism to be triggered for
the entire network when the end station is power
cycled.
NA
NA
Release Note
NA
Example
(Disable instance on all interfaces)
officer SEC>> disable stp int all
Spanning Tree Protocol operation is now disabled for the specified interface/
interface-list (0-3,6-7,9-11.0-3,8.0-23)
Software Reference for SwitchBlade x3100 Series Switches
409
Layer Two Switching
ENABLE STP
Syntax
ENABLE STP [ {
[ INSTANCE={ stpname | mstid | MAIN | ALL }
INTERFACE={ type:id-range | id-range | ifname-list | ALL } [ { TOPOLOGYCHANGE
| RSTPCHECK } ] ] |
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } [ { TOPOLOGYCHANGE | RSTPCHECK } ] ] }
Description
Used to enable Spanning Tree Protocol operations for the system. When this command is issued, all
interfaces in the system that have not been identified by the user to be excluded from STP operations
are processed by the Spanning Tree Protocol algorithm (see DISABLE STP for information on interface
exclusion from STP operations).
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The instance to be enabled.
NA
NA
INTERFACE
The interface(s) on which STP will be enabled.
NA
NA
RSTPCHECK
The interface can be forced to go for migration
check. This parameter is functional only in the
RSTP and STP_COMPATIBLE_RSTP operational
mode.
NA
NA
TOPOLOGYCHANGE
Controls the detection of topology changes on the
associated port. This allows the disabling of topology
change detection on ports that are known to be connected to single end stations that could cause the Topology Change Notification mechanism to be triggered for
the entire network when the end station is power
cycled.
NA
NA
Release Note
NA
Example
(Enable stp and show the all of the interfaces included)
enable stp
Info (010017): Operation Successful
show stp inst all
--- STP Information -----------------------------------------------------------Spanning Tree Type...................... MSTP (CIST)
Instance Name......................... MAIN (0)
Instance State........................ ENABLED
Root Bridge ID Priority................. 0
............................................................
Int
Role
State
Cost Prio.Number
Type
----- ---------- ---------- ---------- ----------- ------------------------0.0
DESIGNATED DISCARDING
2000 128.321
MSTP (boundary)
0.2
DESIGNATED DISCARDING
2000 128.323
MSTP
1.0
DESIGNATED DISCARDING
2000 128.385
MSTP
1.1
DESIGNATED DISCARDING
2000 128.386
MSTP
Software Reference for SwitchBlade x3100 Series Switches
410
Layer Two Switching
1.2
1.3
2.0
2.1
8.1
9.1
9.3
10.1
10.3
11.1
ALTERNATE
ROOT
BACKUP
BACKUP
DESIGNATED
DESIGNATED
DESIGNATED
BACKUP
BACKUP
BACKUP
DISCARDING
FORWARDING
DISCARDING
DISCARDING
FORWARDING
DISCARDING
DISCARDING
DISCARDING
DISCARDING
DISCARDING
2000
2000
2000
2000
200000
2000
2000
2000
2000
2000
128.387
128.388
128.449
128.450
128.834
128.898
128.900
128.962
128.964
128.1026
MSTP
MSTP
MSTP
MSTP
MSTP
MSTP
MSTP
MSTP
MSTP
MSTP
--------------------------------------------------------------------------------- STP Information ----------------------------------------------------------Spanning Tree Type...................... MSTP (MSTI)
Instance Name......................... mst9 (9)
Instance State........................ ENABLED
Regional Root Bridge ID Priority........ 9
.....................................................
Int
Role
State
Cost Prio.Number
Type
----- ---------- ---------- ---------- ----------- ------------------------0.0
DESIGNATED DISCARDING
2000 128.321
MSTP (boundary)
0.2
DESIGNATED DISCARDING
2000 128.323
MSTP
1.0
DESIGNATED DISCARDING
2000 128.385
MSTP
1.1
DESIGNATED DISCARDING
2000 128.386
MSTP
1.2
ALTERNATE DISCARDING
2000 128.387
MSTP
1.3
ROOT
FORWARDING
2000 128.388
MSTP
2.0
BACKUP
DISCARDING
2000 128.449
MSTP
2.1
BACKUP
DISCARDING
2000 128.450
MSTP
8.1
DESIGNATED DISCARDING
200000 128.834
MSTP
9.1
DESIGNATED DISCARDING
2000 128.898
MSTP
9.3
DESIGNATED DISCARDING
2000 128.900
MSTP
10.1 BACKUP
DISCARDING
2000 128.962
MSTP
10.3 BACKUP
DISCARDING
2000 128.964
MSTP
11.1 BACKUP
DISCARDING
2000 128.1026
MSTP
----------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
411
Layer Two Switching
RENAME STP INSTANCE
Syntax
RENAME STP INSTANCE={ stpname | mstid } TO=stpname
Description
Rename the STP instance (using the name or id to specify) to another name. When the name is
changed, all the associated interface information is changed as well.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The original instance name.
NA
NA
TO
The new name for the instance.
NA
NA
Release Note
NA
Example
(Renaming mst9 to msttst)
rename stp instance mst9 to msttst
Info (010017): Operation Successful
show stp inst all
--- STP Information ---------------------------------------Spanning Tree Type...................... MSTP (CIST)
(information omitted)
--- STP Information --------------------------------------Spanning Tree Type......................
Instance Name.........................
Instance State........................
Regional Root Bridge ID Priority........
Regional Root Bridge ID MAC Address...
Max Age (seconds).....................
Hello Time (seconds)..................
Forward Delay (seconds)...............
Bridge ID Priority......................
Bridge ID MAC Address.................
Bridge Max Age (seconds)..............
Bridge Hello Time (seconds)...........
Bridge Forward Delay (seconds)........
MSTP (MSTI)
msttst (9)
ENABLED
9
00:0C:25:04:01:AB
20
2
15
9 (priority 0 mstid 9)
00:0C:25:04:01:AB
20
2
15
Int
Role
State
Cost Prio.Number Type
----- ---------- ---------- ---------- ----------- -----------8.1
DESIGNATED FORWARDING
200000 128.834
MSTP
Software Reference for SwitchBlade x3100 Series Switches
412
Layer Two Switching
RESET STP
Syntax
RESET STP [ { INSTANCE={ stpname | mstid | MAIN | ALL } | LEARNCISCODIGEST } ]
Description
Resets the counters for the default STP instance and forces the spanning tree algorithm to restart. This
causes this bridge to temporarily assume the role of “root bridge” and declare all its ports as “designated ports”, as would happen when the bridge is powered cycled or rebooted.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The instance to be reset.
NA
NA
LEARNCISCODIGEST
Specifies the Cisco MST configuration digest for the
bridge that should be copied/stored.
NA
NA
Release Note
NA
Example
RESET STP INSTANCE=msttst
Software Reference for SwitchBlade x3100 Series Switches
413
Layer Two Switching
SET STP
Syntax
SET STP { INSTANCE={ stpname | mstid | MAIN | ALL } { DEFAULT | PRIORITY=0..65535 |
INTERFACE={ type:id-range | id-range | ifname-list | ALL } { DEFAULT | [ PATHCOST=path-cost ] [ PORTPRIORITY=port-priority ]
[ EDGEPORT={ TRUE | FALSE } ]
[ POINT2POINT={ TRUE | FALSE | AUTO } ]
[ BPDUCOP={ ON | OFF } ] [ TIMEOUT=0..2048 ] } } |
DEFAULT | [ PRIORITY=0..65535 ] [ FORWARDDELAY=4..30 ] [ HELLOTIME=1..10 ]
[ MAXAGE=6..40 ] [ TXMAX=1..10 ] [ MAXHOPS=6..40 ] [ MSTREGION=regionname ] [
REVISIONLEVEL=0..65535 ] [ CISCOCONFIGURATIONDIGEST=hexstring ]
[ CISCOLEARNEDINTERFACE={ type:id | id | ANY } ] |
PROTOCOL={ STP_ORIGINAL | RSTP | STP_COMPATIBLE_RSTP | MSTP |
CISCO_COMPATIBLE_MSTP } [ FORCE ] |
INTERFACE={ type:id-range | id-range | ifname-list | ALL } { DEFAULT |
[ PATHCOST=path-cost ] [ PORTPRIORITY=port-priority ] [ EDGEPORT={ TRUE |
FALSE } ] [ POINT2POINT={ TRUE | FALSE | AUTO } ]
[ BPDUCOP={ ON | OFF } ] [ TIMEOUT=0..2048 ] } }
Description
Allows a user to modify select STP parameters.
Mode
Manager
Options
Option
Description
Range
Default
Value
INSTANCE
The Spanning Tree instance
NA
NA
INTERFACE
The interface(s) selected that will have their settings
modified.
NA
NA
DEFAULT
Resets the STP settings to their defaults.
NA
NA
The default settings are as follows:
- FORWARDDELAY - 15 seconds.
- HELLOTIME
- 2 seconds.
- MAXAGE
- 20 seconds.
- PRIORITY
- FORCE
- 32768.
- RSTP.
PRIORITY
Determines the switch's priority for becoming the root
bridge or a designated bridge in the network, with a
lower number indicating a higher priority.
0..65535
32768
INTERFACE
The interface(s) which are to have their spanning tree
information modified.
NA
NA
PATHCOST
Used if the interface is the root port for the STP on the
switch. The path cost is added to the root path cost field
in configuration messages received on the interface to
determine the total cost of the path to the root bridge.
NA
NA
STP Mode - 1..1000000
RSTP Mode - 1 - 200000000
Software Reference for SwitchBlade x3100 Series Switches
414
Layer Two Switching
Option
Description
Range
Default
Value
PORTPRIORITY
Used to determine which interface should be the root
port for the STP if two interfaces are connected in a
loop. A lower number indicates the higher priority.
128
128
EDGEPORT
Whether the interface is an edge port. Spanning Tree
protocol will be turned off for the specified interface
TRUE
TRUE
POINT2POI
NT
Interface connection type. whether to treat interface as: a point-to-p connection
auto detection
auto detection
- shared medium connection
- apply automatic detection criteria
BPDUCOP
Enable or disable an interface specific feature that will
detect the receipt of a Spanning Tree Protocol specific
information message (i.e., BPDU) and bring down the
associated interface operationally.
OFF
OFF
TIMEOUT
Controls the automatic recovery of an interface which
has been operationally disabled via the BPDU COP failure detection mechanism. The units for this parameter
are in minutes. If a zero (0) value is entered for this
parameter it indicates that automatic recover has been
disabled.
10 minutes
10 minutes
Note: BPDUCOP must be set to ON. Refer to BPDU
COP.
FORWARDDELAY
Determines how long the interfaces remain in each of the
Listening and Learning states before moving on to the
Forwarding state in the active topology, that is, half the
time between when it is decided that the interface will
become part of the spanning tree, and when it is allowed
to forward traffic.
15 seconds
15 seconds
HELLOTIME
Determines how often the switch sends Hello messages
containing spanning tree configuration information if it is
the root bridge, or is trying to become the root bridge in
the network.
2
2
MAXAGE
Determines the maximum time that dynamic STP configuration information is stored in the switch, before it is
considered too old, and discarded.
20 seconds
20 seconds
TXMAX
The maximum number of BPDUs that can be transmitted
on an interface per second.
TBS
TBS
MAXHOPS
The maximum number of bridges a BPDU can travel
through before aging out.
TBS
TBS
MSTREGION
The MST region name for the bridge, which is used in
conjunction with REVISIONLEVEL and VLAN to MSTI
associations to define the MST region for the bridge.
NA
NA
REVISIONLEVEL
MST revision level for the bridge, which is used to define
the MST region for the bridge.
TBS
TBS
Software Reference for SwitchBlade x3100 Series Switches
415
Layer Two Switching
Option
Description
Range
Default
Value
CISCOCONFIGURATIONDIGES
T
Specifies the Cisco MST configuration digest to be
backed up or restored from a text config file.
NA
NA
CISCOLEARNEDINTERFACE
The interface that the Cisco MST configuration digest
will be learned on.
NA
NA
PROTOCOL
Identifies which version of the Spanning Tree Protocol to
run, and should be made based upon what version of
Spanning Tree is being run on all the other bridges in the
network.
RSTP
RSTP
- original STP
- Rapid Spanning Tree (RSTP)
- STP compatible version of RSTP.
- MSTP
- CISCO_COMPATIBLE_MSTP
Release Note
NA
Example
(set protocol as mstp)
officer SEC>> set stp protocol mstp
Info (010017): Operation Successful
show stp
--- MSTP Configuration Identifier Information ---------------------------------Format Selector................................ 0
Region Name.................................... 00:0C:25:04:01:AB
Revision Level................................. 0
-----------------------------------------------------------------------------
--- Spanning Tree Instance Summary -----------------------------------------STP Instance
MSTID
STP State
Root Port Vlan(s) Associated
----------------- -------- --------------- ---------- ---------------------MAIN
0
DISABLED
NA
1 (2-4094)
Software Reference for SwitchBlade x3100 Series Switches
416
Layer Two Switching
SHOW STP
Syntax
SHOW STP [ { [ INSTANCE={ stpname | mstid | MAIN | ALL } ] [ INTERFACE={
type:id-range | id-range | ifname-list | ALL } ] [ FULL ] | COUNTER } ]
Description
The SHOW STP command displays the system wide STP information for the bridge.
Mode
User
Options
Option
Description
Range
Default
Value
INSTANCE
The instance that will be displayed.
NA
NA
INTERFACE
The interface(s) that will be displayed.
NA
NA
FULL
Includes all attributes, including the number of topology
changes that have occurred.
NA
NA
COUNTER
Counter information includes transmitted and received
BPDU counts, as well as other count information.
NA
NA
When an interface parameter is specified the counter
values represent the count values for the given interface(s) which contribute to the total system level
counts. When no interface parameter is specified, the
counter values show represent the total system level
counts. (All the counter values are reset to zero when
the RESET STP command is entered.)
Release Note
NA
Example
(shows default at startup)
show stp
--- STP Information ------------------------------------------Spanning Tree Type...................... RSTP
Instance Name......................... MAIN (0)
Instance State........................ DISABLED
Max Age (seconds)..................... 20
Hello Time (seconds).................. 2
Forward Delay (seconds)............... 15
Bridge ID Priority...................... 32768 (priority 32768 mstid 0)
Bridge ID MAC Address................. 00:0C:25:04:01:AB
Bridge Max Age (seconds).............. 20
Bridge Hello Time (seconds)........... 2
Bridge Forward Delay (seconds)........ 15
Int
Role
State
Cost Prio.Number
Type
----- ---------- ---------- ---------- ----------- -------------------------
Software Reference for SwitchBlade x3100 Series Switches
417
Layer Two Switching
SHOW TRACE STP
Syntax
SHOW TRACE STP [ INSTANCE={ stpname | mstid | MAIN | ALL } ] [ EVENT={ BPDU |
ALL } ] [ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
Description
Displays the current set of trace criteria for STP.
Mode
User
Options
Option
Description
Range
Default
Value
INSTANCE
The instance where the trace will be displayed.
NA
NA
EVENT
Specify whether BPDU or ALL will be shown
NA
NA
INTERFACE
The interface(s) where the trace will be displayed.
NA
NA
Release Note
NA
Example
SHOW TRACE STP
--- STP Traces ---------------------------------------------------------------Trace
-----------1
Event
----------------BPDU
MSTID
--------------0
Interfaces
--------------0.22
------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
418
Layer Two Switching
4.5 Ethernet Protection Switched Ring (EPSR) and SuperLoop
Prevention
4.5.1 EPSR Introduction
Ethernet Protection Switched Ring (EPSR) is a protection scheme for Ethernet networks, specifically for ring-based network
topologies. EPSR provides a 50 milliseconds switching time for an Ethernet-based ring network, similar to that provided by
the Synchronous Optical Network (SONET) protocol, to maintain layer 2 redundancy in the network.
EPSR assists the multicast streams in being redirected around a faulty link in a ring network fast enough to result in an uninterrupted multicast service. The EPSR protocol provides fast protection switching to layer 2 switches which are interconnected in an Ethernet ring topology.
Note:
EPSR is only supported on ring topology networks.
EPSR is available only on ring topology networks comprised of nodes that are physically connected to form a ring. Each node
on the ring will have two Ethernet ports connected to the ring. EPSR operates over these Ethernet ports.
4.5.2 Overview of EPSR Configuration
The protection scheme for an Ethernet ring network basically operates by configuring an EPSR domain on the ring. The vlans
that require fault protection are configured on all the ring ports and are assigned to the EPSR domain. All such vlans are
referred to as the protected vlans. Additionally, a control vlan is assigned to the EPSR domain and is used to send and receive
the EPSR protocol control messages over the ring network that are then used accordingly by all the nodes to prevent loops
in the network and ensure that none of the nodes are isolated from the network.
Note:
There can only be one control vlan per EPSR domain and is configured to use tagged frames. This control vlan is
unique to this domain and cannot be re-used for another domain. Also, the control vlan is provisioned to have the
highest priority p-bit setting (as per IEEE 802.1p) and is mapped to the highest priority queue in the system.
One of the nodes in the ring is designated as the MASTER node while all the other nodes are designated as TRANSIT nodes.
For example, in the figures accompanying this text, Allied Telesis System C is designated the master node while all the other
systems are designated transit nodes. One ring port on the master node is designated to be the Primary Port (PP) and the
other ring port is designated to be the Secondary Port (SP).
When the ring is operating normally, the master node blocks its SP port for all data traffic belonging to the EPSR domain, preventing a loop on the ring. The layer 2 Ethernet switching and learning mechanisms operate normally on each of the nodes in
the ring. However, the control vlan traffic is not blocked at the SP port and is allowed to flow through. This does not pose a
problem, because the control messages originate either at a master node or transit node but always terminate at the master
node.
An EPSR ring network is shown in Figure 4-8 below:
Software Reference for SwitchBlade x3100 Series Switches
419
Layer Two Switching
To / From Network
= Physical Link
2.1
= Control VLAN (V_60)
= Data VLAN (V_80)
0.1
1.1
V_80
= data VLAN is blocked
over Physical Link 3
A
V_60
1
4
0.2
V_80
0.1
V_60
B
A
D
= Devices
1
4
= Links
V_80
V_60
D
1.1
1.2
Master
Node
2
3
1.1
0.2
V_60
C
PP
V_80
SP
EPSR_Topology__non_UFO
FIGURE 4-8
An EPSR Ring Topology (Standard VLAN)
When the master node detects a physical link break in the ring, it unblocks its SP port and allows the flow of data traffic
through the EPSR domain. This mode continues until the master node determines that the break in the ring has been
restored; at which point, it goes back to its normal operating procedure.
4.5.3 EPSR Terms and Definitions
To implement EPSR, the user is required to configure the PP and SP ports and EPSR protocol to support the fault detection
and recovery in the network. Configuration data is as follows:
• Hello Time
The rate at which the EPSR protocol Health control message is sent by the master node for this EPSR domain.
• FailoverTime
Time for which the master node waits before declaring that it has detected a break in the ring for this EPSR domain.
• Flap
The minimum number of seconds that a master node must remain in the failed state (before moving to the complete
state), even if the ring has recovered from its fault condition. This delay is to limit unnecessary blocking and unblocking of
the secondary port when a link in the ring is flapping (intermittently recovering from its fault). The default is 0.
• Ringports
The two ports that are members of the EPSR domain.
• Protected Vlan(s)
The Data vlans which require protection on the EPSR domain.
Software Reference for SwitchBlade x3100 Series Switches
420
Layer Two Switching
• Control Vlan
The unique vlan which will be used for EPSR messaging for the EPSR domain.
Configuration requirements and commands will be covered in detail later in this section.
Note:
With the Allied Telesis SBx3112, if both fibers are cut on a single node, and one of the fibers is restored, the Allied
Telesis SBx3112 will recover and begin processing traffic. This applies whether the node is a Master Node or
another node on the ring. However, this scenario applies only when both ring ports on the same node have failed.
More complicated failure scenarios are handled by a specific feature, Enhanced Recovery, described in 4.5.6.
4.5.4 EPSR Protocol
The EPSR protocol is used to provide the EPSR functionality in Allied Telesis layer 2 systems. EPSR protocol control messages
are transported around the ring network for an EPSR domain via its control vlan. The messages can originate at the master
node or at the transit node; however, they will always terminate at the master node. These messages are used to provide fast
protection switching, for a given EPSR domain, in the layer 2 systems interconnected to form the Ethernet ring.
An Allied Telesis system with EPSR implemented can be part of more than one ring network. As a result, there can be more
than one EPSR domain on such a system, one for each of the EPSR protected rings of which it is a member. Note that there
can also be more than one EPSR domain running in a system when it is part of only one ring network, with each domain
assigned its own set of protected vlans. This helps manage the bandwidth available in the ring, with some data traffic going
one way around the ring and other data traffic going the other way around the ring, depending on which domain the data vlan
is on.
4.5.4.1 EPSR Protocol Procedures
The master node and the transit nodes that make up the Ethernet ring use the Fault Detection and Fault Restoration procedures provided by the EPSR protocol to maintain the continuous flow of the non-control traffic in the ring.
1.
Fault Detection Procedure - Two kinds of fault detection procedures are defined to detect a fault. The polling procedure
is the fail-safe mechanism executing in the master node in case the unsolicited fault message procedure in a transit node
fails
• Master Node Polling Fault Detection Procedure (4.5.4.2)
• Transit Node Unsolicited Fault Message Fault Detection Procedure (4.5.4.3)
2.
Master Node and Transit Node Fault Detected Correction Procedure (4.5.4.4)
3.
Fault Restoration Procedure (4.5.4.5)
• Master Node Restoration Procedure
• Transit Node Restoration Procedure
Each of the above procedure are discussed in the following subsections.
4.5.4.2 Master Node Polling Fault Detection Procedure
The master node uses the polling procedure as a fail-safe mechanism to detect a fault in the ring. It does this by sending an
EPSR health control message via its PP port (only) every HELLOTIME seconds (which is a configured value as seen earlier).
Under normal conditions, when there is no fault in the ring, this health message will make it across the network and will be
received by the master node over its SP port. However, if there is a fault anywhere in the network, the health message will
not be received by the master node over its SP port. To detect this condition, the master node starts a failover timer (using
the configured FAILOVERTIME) every time it sends the health message. If the health message is not received by the master
node over its SP port before the failover timer expires, then it declares a fault in the ring and takes appropriate measure.
Note:
Because of the fact that messages could get lost in the network, the FAILOVERTIME configured value must be at
least twice the value of the HELLOTIME configured value.
Software Reference for SwitchBlade x3100 Series Switches
421
Layer Two Switching
4.5.4.3 Transit Node Unsolicited Fault Message Fault Detection Procedure
Unlike the polling procedure described above, where the burden is upon the master node to eventually detect a fault in the
ring in a fail-safe manner, this procedure is used by the transit node to detect a fault on its attached ring port and immediately
notify the master node of the fault. This is accomplished by sending an EPSR Links-Down control message over a functioning
link. A fault link spans two nodes; therefore, both of the transit nodes that detect the fault send the EPSR Links-Down control message to the master node. When this occurs, the transit node(s) in question alter the state of the EPSR domain from
Links-Up state to Links-Down and maintains this state until the transit node Fault Restoration procedures are executed.
Also, the state of the faulty port is set to Blocked. However, the state of the functioning ring port is maintained at Forwarding.
4.5.4.4 Master Node and Transit Node Fault Detected Correction Procedure
When the master node detects a fault in the ring using either of the above described procedures, it takes the following
actions:
• Declares the EPSR domain to be in a failed state (from the complete state the EPSR domain was in before the fault was
detected).
• Unblocks its SP port for the Data traffic for this EPSR domain
• Flushes its own forwarding database (FDB) for just the two ring ports
• Sends an EPSR Ring-Down-Flush-FDB control message to all the transit nodes via both its PP port and SP port.
As the EPSR domain non-control traffic starts flowing, each of the nodes (both master and transit) then re-learn the layer 2
addresses on the flushed ring ports again to reflect the newly collapsed network topology. The master node continues to follow the Master Node Polling Fault Detection Procedure and as long as the fault is still present in the ring, the EPSR domain
will continue to remain in the failed state. This newly constructed network topology exists until the fault in the ring is corrected; then the fault restoration procedures take over and restore the ring to its original normally operating state.
The EPSR stabilized topology under normal operating conditions is shown in Figure 4-8. For a link fault detected between
Allied Telesis System A and Allied Telesis System B, Figure 4-9 shows the new EPSR stabilized topology after the fault detection and corrections procedures have been executed.
Software Reference for SwitchBlade x3100 Series Switches
422
Layer Two Switching
To / From Network
= Physical Link
= Control VLAN (V_60)
= Data VLAN (V_80)
2.1
= Physical Link 1
is blocked, so Device
A and B report break
to Master Node C
1.1
0.1
V_80
A
V_60
1
4
0.2
0.1
B
V_80
V_60
B
A
D
= Devices
1
4
= Links
V_80
V_60
D
1.1
1.2
Master
Node
2
3
Data VLAN is
unblocked
PP
1.1
0.2
V_60
C
V_80
SP
EPSR_Topology_50_Post_Fault
FIGURE 4-9
An EPSR stabilized Network after Ring Fault (Standard VLAN)
4.5.4.5 Master Node Fault Restoration Procedure
When the fault in the ring between Allied Telesis System A and Allied Telesis System B is fixed, the polling EPSR Health control message that was being sent by the master node over its PP port (sent even when the fault is present) is now received
over its SP port. The master node then takes the following actions to restore the ring back from that shown in Figure 4-9 to
its original normally operating state.
1.
Declares the EPSR domain to be in a complete state from the failed state it was in before the fault was corrected.
2.
Blocks its SP port for data VLAN traffic for this EPSR domain.
3.
Flushes its own forwarding database (FDB) for the two ring ports.
4.
Sends an EPSR Ring-Up-Flush-FDB control message to all the transit nodes via both its PP port and SP port.
As the EPSR domain non-control traffic starts flowing again, all nodes (both master and transit) then re-learn the layer 2
addresses again to reflect the newly complete network topology. The master node continues to follow the Polling Fault
Detection procedure and, since the fault is no longer present, the EPSR domain continues to remain in the complete state
The network topology, restored to its normally operating state, continues to operate until a fault is detected, when, again,
the above mentioned procedures are re-executed. EPSR maintains a continuous, uninterrupted operation of the user’s network.
4.5.4.6 Transit Node Fault Restoration Procedure
The transit node(s) that span the faulty link will delay the starting of the flow of data traffic over the link once the fault has
been fixed and the link restored. The reason for this delay is to prevent the master node from viewing the fixed link as a loop
in the network. The loop is caused because the transit node has corrected the fault for the domain before the master node
detects that the fault is restored and blocks its SP port for the domain’s data traffic. In order to avoid this situation, the transit node(s), after detecting that the broken link has been restored, follow these fault restoration procedures:
Software Reference for SwitchBlade x3100 Series Switches
423
Layer Two Switching
1.
Ensure that the protected vlans are still in a blocked state for the repaired port. The state of the restored port was set as
blocked earlier when the state of the domain went from Links-Up to Links-Down
2.
Change the state of the EPSR domain from Links-Down to Pre-forwarding
3.
Wait for the EPSR Ring-Up-Flush-FDB control message from the master node. This is the trigger that ensures that the
master node has detected the restoration of the fault in the ring, flushed its FDB, and blocked its SP port for the domain
non-control traffic.
4.
Flush its FDB, for both the ring ports, upon receiving the above trigger message from the master node
5.
Change the state of the EPSR domain from Pre-Forwarding to Links-Up when the flow of the domain non-control
traffic can start to flow again ensuring that there is no loop present in the ring. At this point, the state of the port is set to
Forwarding.
4.5.5 Dual Ring Configuration
The discussion above had an underlying assumption that there is an Ethernet ring access network consisting of Allied Telesis
systems that are physically connected to form a ring using EPSR functionality to provide redundancy at the layer 2 level. The
master node in this EPSR-enabled ring network is the one which is considered to be the layer 2 aggregating switch with an
uplink to the core. However, there could be a case where the access network consists of multiple rings, interconnected to
form a more complex access network with uplinks to the core network. An example of such a network is shown in Figure 410.
Software Reference for SwitchBlade x3100 Series Switches
424
Layer Two Switching
To / From Network
0.3
PP
SP
Master
Node
A
0.2
0.1
V_80
V_60
4
1
0.2
0.1
B
V_80
D
V_60
A
D = Devices
1
4
0.1
0.2
2
3
Data VLAN is
unblocked
V_60
0.1
C
0.2
= Physical Link
= Control VLAN (V_60)
= Data VLAN (V_80)
= Control VLAN (V_90)
= Data VLAN (V_80)
V_80
= Data VLAN on Physical SP
Link 1 is blocked
= Data VLAN on Physical
Link 5 is blocked
0.4
0.3
PP
V_90
5
8
0.2
0.1
E
V_80
V_80
V_60
= Links
V_90
C
D = Devices
1
4
G
V_80
V_90
= Links
0.1
0.2
6
7
0.2
0.2
V_90
F
V_80
EPSR_Topology_Dual_UFO
FIGURE 4-10
Configuration of Ring Ports in Interconnected EPSR Ring Networks
One of the systems, Allied Telesis System C, is common to Ethernet access ring Networks 1 and 2. As indicated, this system
is a master node for ring network 1 and a transit node for the ring network 2. System A in ring network 2 is the master
node for that ring. The remainder of the systems in both networks are considered to be transit nodes.
The initial configuration of the FORWARDING parameter is set using the SET VLAN INTERFACE command for the ports
in all the systems in both networks. Note that the master node ports are manually configured as upstream or downstream and remain so, whereas the transit node ports could be configured as UCP - eventually stabilizing as upstream or
downstream as the topology dictates.
Software Reference for SwitchBlade x3100 Series Switches
425
Layer Two Switching
4.5.6 Enhanced Recovery (Multiple Link Failure)
The fault detection and recovery procedure described in 4.5.4 hold true when there is a single link failure in the network. In
case of multiple link failure, one or more of the transit nodes can become isolated and remain in isolation even after the
recovery of one or more failed links; these recovered links could have provided some level of connectivity to the node, if not
for concern over network loops. Refer to the following figure, which shows a multiple link failure scenario.
To / From Network
= Physical Link
= Control VLAN (V_60)
= Data VLAN (V_80)
2.1
1.1
V_80
0.1
SP
A
PP
V_60
1
6
Master
Node
0.2
2.1
B
V_80
V_60
B
A
F
= Devices
1
6
= Links
D
V_80
V_60
F
1.1
0.2
2
X
X
515
0.2
1.2
B
V_80
B
V_60
V_80
V_60
E
1.0
0.1
X
C
4
V_60
1.1
0.2
3
D
V_80
FIGURE 4-11
EPSR Network with Multiple Link Faults
In this network, systems C, D and E are isolated from the core network. Moreover if link 5 between system E and F is
restored, there is no Ring-Up-Flush FDB message, the ports on link 5 cannot be changed to Forwarding, and systems D and
E will still be cut off from traffic, even though link 5 is restored.
The Enhanced Recovery feature changes the processing of this condition in both the Master and Transit nodes so that some
additional network connectivity can be restored when one or more links in a multiple-link failure are restored, but there is
still at least one link that has not been restored.
Software Reference for SwitchBlade x3100 Series Switches
426
Layer Two Switching
When the Master and Transit nodes are operating in Enhanced Recovery EPSR mode, a Transit node that has recovered its
failed ring port and has its other port in a non-failed state will send a message (called a Link-Forward-Request message
or LFR message) to the Master node that it has recovered its failed port. When the Master node receives this message, it
starts a Link-Forward-Request-Process timer, or LFRP timer (fixed at 4 seconds). If the timer expires and the Master node
has not been able to recover the ring from the multiple-link failure, the Master mode sends a message back to this Transit
node that it can safely restore traffic on its recovered link.
Note:
If the Transit node has both ring ports in a failed state and one port recovers, the Transit can safely enable traffic on
the one recovered port since it knows the ring is not yet a loop because of the other port’s failed state.
If the multiple link failure condition is resolved and the Master Node is able to restore the normal ring before the 4-second
LFRP timer expires, it sends out its normal “Ring-Up-Flush-FDB” message, and the recovery procedure described in 4.5.4.6 is
followed.
When the Transit node sends the LFR message asking if it can recover traffic on its restored link, it also starts an LFR timing interval (fixed at 6 seconds). If this timer expires and the Transit node has received from the Master Node neither a
message that it can recover its failed link nor a Ring-Up-Flush-FDB message, it will resend the message asking that it restore
message to its recovered link.
Note:
The scenario described above is labeled EPSR+, and it assumes that there is communication between the Transit
node with the recovered port and the Master node.
It is also possible that the Master node may be in a failed state or is unreachable. In this scenario, when the Transit node
resends the LFR message asking that it restore its recovered link and does not receive a response, the Transit node will go
ahead and begin traffic on its recovered port.
Note:
This scenario, in which the Transit Node cannot communicate with the Master node and still begins traffic on its
recovered port, is labeled EPSR++.
The Transit node will continue to pass traffic over its recovered ports until communication with the Master node is restored.
At this point, the Master node will send out its normal “Ring-Up-Flush-FDB” message, and the recovery procedure described
in 4.5.4.6 is followed.
This feature is activated with the parameter ENHANCEDRECOVERY, that is added to the existing EPSR command CREATE
EPSR MASTER | TRANSIT.
The ENHANCEDRECOVERY parameter is also added to the SET EPSR and SETDEFAULTS EPSR.
4.5.7 Log Output for EPSR
The user can configure log output to capture logs that monitor the EPSR and can track any change of state. (Refer to the Log
Management section.) As well as the CFCP category, there is the EPSR category that includes a reason for the failed domain.
The following output includes the EPSR category:
===
Start of logs
===
CLI001 2012-03-21 07:45:19
1571 INFO
User: "officer" at IP: "10.52.19.13" entered CLI command:
SHOW EPSR=e8
CFCP014 2012-03-21 07:45:05
1570 INFO
Domain
: e8
Description: Master Node EPSR State Change
Old State : Failed
New State : Complete
CLI001 2012-03-21 07:44:41
1569 INFO
User: "officer" at IP: "10.52.19.13" entered CLI command:
Software Reference for SwitchBlade x3100 Series Switches
427
Layer Two Switching
SHOW LOG CATEGORY=epsr
CLI001 2012-03-21 07:44:38
1568 INFO
User: "officer" at IP: "10.52.19.13" entered CLI command:
SHOW EPSR=e8
CFCP014 2012-03-21 07:44:35
1567 INFO
Domain
: e8
Description: Master Node EPSR State Change
Old State : Complete
New State : Failed
** EPSR000 2012-03-21 07:44:35
1566 INFO
Failed Domain : e8
Failure Reason: Ring failed due to loss of health messages
<<< removed ring port from control vlan on Transit node >>>
CLI001 2012-03-21 07:44:02
1565 INFO
User: "officer" at IP: "10.52.19.13" entered CLI command:
SHOW EPSR=e8
CFCP014 2012-03-21 07:43:59
1564 INFO
Domain
: e8
Description: Master Node EPSR State Change
Old State : Failed
New State : Complete
CLI001 2012-03-21 07:42:23
1563 INFO
User: "officer" at IP: "10.52.19.13" entered CLI command:
SHOW LOG CATEGORY=epsr
CFCP014 2012-03-21 07:42:19
1562 INFO
Domain
: e8
Description: Master Node EPSR State Change
Old State : Complete
New State : Failed
** EPSR000 2012-03-21 07:42:19
1561 INFO
Failed Domain : e8
Failure Reason: Ring failed due to receipt of Link Down message
<<< disabled port between Master and Transit node >>>
Software Reference for SwitchBlade x3100 Series Switches
428
Layer Two Switching
4.5.8 Configuring EPSR
4.5.8.1 Default Configuration
When an SBx3112 switch is initially booted up, EPSR will be configured as follows:
• There are no EPSR domains configured.
• Enhanced Recovery is not active (ENHANCEDRECOVERY=OFF).
• Enhanced Recovery survives restarts and upgrades.
4.5.8.2 Configuration Guidelines
• When used with BFD, a maximum of 64 domains, with up to 50 protected VLANs per domain, can be provisioned for
EPSR. (Refer to 7.7 for a description of BFD.)
• When provisioning EPSR on a ring, the user should avoid creating any network loops. There are many ways to configure a
network in a ring topology without producing a loop within the network. Some of these approaches can involve disabling
one of the ring's links while configuring the EPSR domains and the protected VLANs; however, disabling one of the ring's
links may not be an acceptable approach because doing so removes the ring's redundancy while provisioning. Another
approach is to add the vlans to the EPSR domain first, and then add the vlans to the interfaces.
• When provisioning a system, the user can fill in the attributes “name” and “location” to identify the system. These are for
administrative purposes and do not affect the working of EPSR.
• To prevent system isolation, the SP and PP ports should be configured on different cards.
• As mentioned in 4.5.3, the ringFlapTimer is needed to prevent unnecessary opening and closing of the Secondary port
when a link in the ring is flapping, and is started when the Master node moves into the failed state. The master cannot
come out of the failed state until the ringFlapTimer expires even if it detects that the ring is complete. The ringFlapTimer
defaults to zero. It is recommended that you set this to a non-zero value if there are many EPSR domains, many protection vlans, and/or BFD enabled on EPSR interfaces. The actual value will depend on your specific network.
• Because of MAC Thrash Limiting, there is a further restriction to using different cards for the PP and SP ports on the
Master Node:
• If the Enhanced Recovery feature is configured (refer to 4.5.6), you must use different cards for the SP and PP ports.
• If the SP and PP ports are configured on the same card, you cannot use the Enhanced Recovery feature.
Note:
With the MAC Thrash Limiting Feature, just one duplicate MAC address on an intracard interface will disable
learning and cause VLAN flooding of traffic on EPSR ring ports. Also, with EPSR+/++, the Transit Node sends the
(same) LFR message to both the PP and SP of the Master Node. If the PP and SP are on the same card of the Master
Node, MAC Thrash Limiting will see this as a learning violation.
4.5.8.3 Feature Interactions for Enhanced Recovery
• To work with other vender EPSR products based on the RFC3619 which do not recover from multiple link failure, the
CREATE EPSR or SET EPSR commands enable the feature on per EPSR domain. Moreover, this feature must be enabled
on the Master node and all the Transit nodes (e.g., SET EPSR=ALL ENHANCEDRECOVERY=ON command).
• With ENHANCEDRECOVERY=ON for all nodes in the ring, ensure that on the Master Node RINGFLAPTIME is set to
0 (the default) to avoid the possibility of creating a loop. (Refer to 4.5.3 and SET EPSR.)
• There are restrictions on using Enhanced Recovery and SuperLoop. Refer to 4.5.12
• The LFRP timer and LFR timing interval are fixed at 4 and 6 seconds respectively, and cannot be changed.
4.5.9 EPSR Interoperability
Allied Telesis EPSR is based on RFC3619 - Extreme Networks'™ Ethernet Automatic Protection Switching (EAPS)1 Version 1
whether as the Master or Transit node and can interoperate with Extreme Networks’ switches that also supports EAPS.
Software Reference for SwitchBlade x3100 Series Switches
429
Layer Two Switching
When Extreme is the master, ensure that the following configuration is completed on the Extreme EAPS master switch:
config eaps name failtime expiry-action actionvalue
name is the domain name the Extreme is the master for and the actionvalue specifies the action taken by the master when
the failover timer expires. actionvalue can be either open-secondary-port or send-alert.
In order to ensure that the Extreme Networks’ switch interoperates with the SBx3112, use the following command for configuring domains where Extreme is the master:
config eaps name failtime expiry-action open-secondary-port
Caution: DO NOT set the expiry-action in the above command to send-alert. If expiry-action is set to send-alert, the
Extreme master will not be fully interoperable, which can cause a segment of the ring to be isolated under certain
failure conditions.
4.5.10 Configuration Procedure
The following tables shows the basic steps to configure a Master Node (Device C Figure 4-9) Table 4-17 and a Transit Node
(Device B Figure 4-9) Table 4-18 with:
•
•
•
•
The EPSR domain name is allied.
The CONTROL VLAN is 60, the DATA VLAN is 80.
The interfaces on all devices are on separate cards.
The interfaces are all configured as network interfaces.
TABLE 4-18
Step
Configuration Procedure for EPSR - Configure a Master Node
Command
Description/Notes
Create the EPSR domain
1
CREATE EPSR=allied MASTER ENHANCEDRECOVERY=ON
ENHANCEDRECOVERY is optional; it can also
be set later using the “SET EPSR” command.
Set the GE interfaces to have a direction of NETWORK facing.
2
SET INTERFACE=0.2,1.1 GE DIRECTION=NETWORK
GE interfaces are CUSTOMER facing by default
and XE interfaces are NETWORK facing by
default. EPSR interfaces must be NETWORK
facing.
Create the Control VLAN and associate it with the EPSR interfaces as FRAME=TAGGED
3
CREATE VLAN=V_60 VID=60
ADD VLAN 60 INTERFACE 0.2,1.1
FRAME=TAGGED
To prevent system isolation in the event of a
card failure EPSR interfaces should be on separate cards.
Define the interface for the EPSR domain that will be PRIMARY and SECONDARY
4
ADD EPSR ALLIED INTERFACE=0.2 TYPE=PRIMARY
ADD EPSR ALLIED INTERFACE=0.3 TYPE=SECONDARY
Add the CONTROL VLAN to the EPSR domain
5
ADD EPSR=allied VLAN=60 TYPE=CONTROL
Enable the EPSR domain
6
ENABLE EPSR=allied
1. Extreme Networks is a registered trademark of Extreme Networks, Inc. All Rights Reserved
Software Reference for SwitchBlade x3100 Series Switches
430
Layer Two Switching
TABLE 4-18
Step
Configuration Procedure for EPSR - Configure a Master Node
Command
Description/Notes
Create the DATA VLAN and add the VLAN to the EPSR domain.
7
You will receive a warning that the VLAN does
not have any ports associated with it. Adding
the VLAN to the EPSR Domain first then to the
interface will prevent network loops on this
VLAN.
CREATE VLAN=V_80 VID=80
ADD EPSR=allied VLAN=80 TYPE=DATA
Add the Data VLAN to the interfaces.
8
ADD VLAN=80 INTERFACE=0.2,1.1 FRAME=TAGGED
SHOW the status of the EPSR domain.
9
officer SEC>> show ep allied
--- EPSR Domain Information --EPSR Domain Name......................
EPSR Domain Node Type.................
EPSR Domain State.....................
MAC Address of Master Node............
EPSR Domain Status....................
Control Vlan..........................
Enhanced Recovery.....................
Primary Interface.....................
Physical State of Primary Interface...
Primary Interface Type................
Primary Interface State...............
Primary Interface Priority............
Primary Interface Priority Rank.......
Secondary Interface...................
Physical State of Secondary Interface.
Secondary Interface Type..............
Secondary Interface State.............
Secondary Interface Priority..........
Secondary Interface Priority Rank.....
Hello Timer (seconds..................
Failover Timer (seconds)..............
RingFlap Timer (seconds)..............
Hello Time Remaining (seconds)........
Failover Time Remaining (seconds).....
RingFlap Time Remaining (seconds).....
Hello Sequence........................
Data Vlans............................
Software Reference for SwitchBlade x3100 Series Switches
allied
Master
COMPLETE
00:0C:25:00:05:AD
Enabled
60
ON
ETH:[0.2]
UP
DOWNSTREAM
PHYSICALLY FORWARDING
0
0
ETH:[1.1]
UP
DOWNSTREAM
PHYSICALLY BLOCKED
0
0
1
2
0
1
0
0
809
80
431
Layer Two Switching
TABLE 4-19
Step
Configuration Procedure for EPSR - Configure a Transit Node
Command
Description/Notes
Create the EPSR domain
1
CREATE EPSR=allied TRANSIT ENHANCEDRECOVERY=ON
ENHANCEDRECOVERY is optional; it can also
be set later using the “SET EPSR” command.
Set the GE interfaces to have a direction of NETWORK facing
2
SET INTERFACE=0.2,1.1 GE DIRECTION=NETWORK
GE interfaces are CUSTOMER facing by default
and XE interfaces are NETWORK facing by
default. EPSR interfaces must be NETWORK
facing.
Create the Control VLAN and associate it with the interfaces as FRAME=TAGGED
3
CREATE VLAN=V_60 VID=60
ADD VLAN 60 INTERFACE 0.2,1.1
FRAME=TAGGED
The interfaces should be on separate cards.
Add the interfaces to the EPSR domain
4
ADD EPSR=allied INTERFACE=0.2,1.1
Add the CONTROL VLAN to the EPSR domain
5
ADD EPSR=allied VLAN=60 TYPE=CONTROL
Enable the EPSR domain
6
ENABLE EPSR=allied
Create the DATA VLAN and add the VLAN to the EPSR domain.
7
CREATE VLAN=V_80 VID=80
ADD EPSR=allied VLAN=80 TYPE=DATA
You will receive a warning that the VLAN does
not have any ports associated with it. Adding
the VLAN to the EPSR Domain first then to the
interface will prevent network loops on this
VLAN.
Add the DATA VLAN to the interfaces
8
ADD VLAN=80 INTERFACE=0.2,1.1
FRAME=TAGGED
Software Reference for SwitchBlade x3100 Series Switches
432
Layer Two Switching
TABLE 4-19
Step
Configuration Procedure for EPSR - Configure a Transit Node
Command
Description/Notes
SHOW the status of the EPSR domain
9
officer SEC>> show ep allied
--- EPSR Domain Information --EPSR Domain Name......................
EPSR Domain Node Type.................
EPSR Domain State.....................
MAC Address of Master Node............
EPSR Domain Status....................
Control Vlan..........................
Enhanced Recovery.....................
Ring Interface # 1....................
Physical State of Ring Interface # 1..
Ring Interface # 1 Type...............
Ring Interface # 1 State..............
Ring Interface # 1 Priority...........
Ring Interface # 1 Priority Rank......
Ring Interface # 2....................
Physical State of Ring Interface # 2..
Ring Interface # 2 Type...............
Ring Interface # 2 State..............
Ring Interface # 2 Priority...........
Ring Interface # 2 Priority Rank......
Data Vlans............................
Software Reference for SwitchBlade x3100 Series Switches
allied
Transit
LINKS-UP
00:0C:25:00:AA:80
Enabled
60
ON
ETH:[0.2]
UP
DOWNSTREAM
LOGICALLY FORWARDING
0
0
ETH:[1.1]
UP
UPSTREAM
PHYSICALLY FORWARDING
0
0
80
433
Layer Two Switching
4.5.11 SuperLoop Prevention
With interconnected topologies, it is possible to have a condition called a SuperLoop, if all of the following conditions exist.
• The network has two or more EPSR domains.
• The protected (data) VLAN overlaps two or more EPSR domains.
• The EPSR domains and the overlapping protected VLANs share a common link.
4.5.11.1 Overview of EPSR SuperLoop Ring Port Priority Configuration
To prevent a SuperLoop condition from occurring, the concept of certain ring interfaces having a specified priority is used.
This priority is assigned to the interfaces that make up the common link shared by EPSR domains. The value range is 0 to 127.
By default, the priority of each of the ring interfaces for an EPSR domain is 0 (the lowest priority). The higher values, however, are used when there are interconnected EPSR rings in which the SuperLoop condition needs to be avoided.
To use the priorities, the user should take the following steps:
1.
Review the network topologies and see which ring segments have conditions in which the SuperLoop condition could
occur.
2.
Assign these ring segments a unique priority number. The user should start with 127 for the ring segment that is closest
to the upstream network and go down in intervals of 1 (127, 126, 125..) for the ring segments as they go farther away
form the upstream network.
3.
Assign the interfaces for the common link with the priority of the ring segment.
4.
Assign the interfaces for the master node with the priority of the ring segment.
The following figures show the result of taking these steps.
Figure 4-12 shows a sample interconnected topology where priorities have been configured. Also, a nested ring has been
included. Ring 1 is closest to the upstream network and is therefore assigned priority 127. For the control VLAN (V_60), this
priority has been assigned to the master node interfaces and the common link interfaces. Ring 2 has priority 126 and its control VLAN (V_90) has this priority assigned to its master node and common link interfaces. Ring 3 (the nested loop within
ring segment 2) has priority 125 and its control VLAN (V_40) has this priority assigned to its master node and common link
interfaces.
Figure 4-13 shows what happens when there is a fault with the common link. Since ring segment 1 has the higher priority on
the interface, it will unblock its SP interface, but the lower priority ring segments 2 and 3 will not. As a result, the SuperLoop
condition is prevented.
Caution: As long as a fault exists in the common link, the lower priority masters will continue to block their SP interfaces,
even if another fault occurs in the high priority ring. This could result in loss of service for some nodes in the
lower priority rings.
Software Reference for SwitchBlade x3100 Series Switches
434
Layer Two Switching
Note 1
= Interface priorities of Master Node
and common link interface match
Note 2
= Interface priorities of Transit Nodes
not including common link are 0
(default value)
To / From Network
= Physical Link
0.3
= EPSR Blocking
0.2
0.1
V_80
V_60
Note 2
Note 1
SP
= Ring 1 Control VLAN (V_60)
= Ring 2 Control VLAN (V_90)
= Ring 3 Control VLAN (V_40)
= Data VLAN (V_80)
127
0.2
V_80
0.1
Master
Node
(M1)
V_60
0.1
PP
V_80
V_60
0.2
127
0.1
127
126
126
V_90
V_90
125
1.1
125
1.0
V_80
0.3
0.1
0.3
V_80
Note 2
0.2
V_60
127
0.1
0.2
V_60
V_40
V_40
Note 1
Note 1
Master Node
(M3)
125
125
0.2
0.2
0.1
V_40
0.1
V_80
V_80
V_90
V_90
Note 1
0.1
Note 1
Master
Node
(M2)
126
V_80
0.2
126
SP
FIGURE 4-12
0.2
0.2
V_90
V_80
PP
EPSR_Topology_SuperLoop_nested
Ring Interface Priorities - Ring Segments
Software Reference for SwitchBlade x3100 Series Switches
435
Layer Two Switching
To / From Network
= Physical Link
Note 1= Only SP interface of highest
priority is unblocked, so no
superloop created
0.3
= EPSR Blocking
Note 1
0.2
0.1
V_80
V_60
Note 2
Note 1
SP
= Ring 1 Control VLAN (V_60)
= Ring 2 Control VLAN (V_90)
= Ring 3 Control VLAN (V_40)
= Data VLAN (V_80)
127
0.2
V_80
0.1
Master
Node
(M1)
V_60
0.1
126
V_90
1.0
125
V_40
126
V_90
125
V_40
Master Node
(M3)
125
0.2
V_80
0.3
0.1
Note 2
0.3
V_80
V_60
127
1.1
127
0.1
V_60
0.2
0.1
X
127
0.2
PP
V_80
V_60
125
0.2
0.2
0.1
V_40
0.1
V_80
V_80
V_90
V_90
Master
Node
(M2)
0.1
126
V_80
0.2
126
SP
FIGURE 4-13
0.2
0.2
V_90
V_80
PP
EPSR_Topology_SuperLoop_nested_Break
Ring Interface Priorities - only Highest Priority Unblocks and Prevents SuperLoop
Software Reference for SwitchBlade x3100 Series Switches
436
Layer Two Switching
4.5.11.2 Feature Interaction
The following features support SuperLoop prevention
• In the output, the Data Vlan Countcolumn shows how many protected VLANs are included in the EPSR domain.
• For the SHOW EPSR command, the user can easily determine Non-peer SuperLoop and Peer SuperLoop configurations.
• The parameter PRIORITY is available in the ADD EPSR INTERFACEand SET EPSR commands.
4.5.12 SuperLoop Configuration Requirements
4.5.12.1 Configuration Rules
Since a control VLAN can have many associated data VLANs, and common links can span multiple ring segments, understanding and then configuring a system with common links with shared data VLANs can become complex. The following rules
should be kept in mind when designing the domains with common links and shared data VLANs.
1.
It is possible that two or more domain instances could share a common link and the same data VLAN(s), and yet each
domain could still have its own unique set of data VLANs. To prevent this configuration, note the following:
Note:
2.
The network should be configured such that domain instances sharing a common link should have their data VLANs
segregated; domains should either have a unique set of data VLANs (so no data VLANs are shared with other
domains) or have domains that share data VLANs should have only those shared data VLANs in them. This is
enforced through the CLI, and is explained in more detail in the subsection on the example configuration.
No two domain instances with a common ring port with shared data VLANs can have the same priority value on the
common interface.
Note:
If the user tries to do this, the CLI will fail the command, and the domain(s) cannot be enabled.
3.
The user should avoid defining any of the overlapping domains with a Master node on the common link between the two
domains. (This rule is followed in the configuration in Figure 4-12.) If it is necessary that a Master node be defined on a
common link (e.g., where an "inner core" ring is surrounded on all sides by other EPSR rings), the common link where the
secondary port is defined for the Master node must not be shared with a domain of higher relative priority (i.e. the Master node can only be defined with its secondary port on a common link which is shared with a lower priority domain).
The configuration in Figure 4-13 would break this rule; if a Master node on either side of the common link were defined,
the domain with the higher priority (127) would have to be configured with its Secondary Port on the ring port which is
not the common link.
4.
In a Superloop configuration, EPSR Enhanced Recovery Mode (4.5.6) should not be used; when the lower priority ring of
a Superloop configuration has more than one link failure, and one of those failed links is a common segment and the
other is not on a common segment, the Master node on that lower priority ring will open up its secondary port to traffic
flow (since it will receive a Link Down message for the non-common segment Transit node). If the non-common link is
then recovered from the failed state, it will transition its recovered ring port to a forwarding state, either due to response
from the Master node with a PLF message when it receives a Link-Forward-Request (LFR) from the transit node, or due
to timeout if no response is received from the Master node. In this case, with a common segment still failed, a Superloop
would be formed.
5.
To configure xSTP and a SuperLoop configuration in a network, refer to 4.5.15 and its rules on EPSR/xSTP coordination,
since SuperLoop is an interconnected EPSR configuration
4.5.12.2 Interoperability (General)
1.
The SuperLoop feature will interoperate with any third party switches that have implemented RFC 3619 as part of the
network, provided that those third-party switches are not:
• Configured as a Master node for a domain with a common link
• Located on either end of a common link within the SuperLoop topology.
Software Reference for SwitchBlade x3100 Series Switches
437
Layer Two Switching
2.
Any Network Access product which is running software that includes the SuperLoop feature can be placed anywhere in
the SuperLoop ring topology (i.e., regardless of whether it is adjacent to a common link or not).
3.
Any Network Access product which does not have the SuperLoop feature included in the software it is running cannot
act as a Master node for a domain with a common link or as a transit node on either end of a common link when placed
within a SuperLoop ring topology.
4.
A traditional (non-SuperLoop) EPSR ring network (made up of Network Access products and/or third party switches)
can subtend from any node that is part of an EPSR SuperLoop network topology and is not required to have the SuperLoop feature running in any of the nodes in that subtended ring.
4.5.12.3 Interoperability (Extreme Products)
The SBx3112 contains processing to allow for increased interoperability with Extreme Networks products that are running
Extreme Networks proprietary “EAPS Shared-Ports protocol” in a network topology similar to the SuperLoop topologies
discussed in this Section.
In this scenario, an Extreme Networks product is located on each end of the common link, with one configured as “Controller” and the other as “Partner”. Processing is provided by the Network Access products to be compatible with the Extreme
Networks products in this configuration provided the following restrictions are applied:
• The SBx3112 can only operate as a Transit node anywhere within any of the rings sharing a common link that are running
Extreme Networks proprietary “EAPS Shared-Ports protocol”.
• The SBx3112 cannot be configured as either the “Controller” or the “Partner” nodes which are located on either end of
the common link, anywhere within any of the rings sharing a common link that are running Extreme Networks proprietary “EAPS Shared-Ports protocol”.
4.5.12.4 SuperLoop with Complex Topologies (EPSR Logical Domain Types)
As a result of the SuperLoop feature, there arethree types of EPSR logical domains:
• Non-SuperLoop Domain -The configuration rules are
• A protected VLAN canbe shared by two or more domains, but a Common Link is not allowed.
• A Common Link cannot be configured between two systems.
• Non-peer SuperLoop Domains - In this configuration, a SuperLoop domain is one which is part of a physical ring segment that shares a Common Link with another ring segment. However, these domains are considered as non-peer
because each domain does not share the same protected VLANs with the other(s). From the protocol viewpoint, this
behavior is the same as the Non-SuperLoop.The priority of the shared ring port of the domains is set to 0.
• Peer SuperLoop Domains - This is one which is part of a physical ring segment that not only shares a common link
with another segment but also has the same set of protected data vlans as all the other “peer SuperLoop” domains in
the SuperLoop topology part (the SuperLoop nodes is part of) of the interconnected EPSR access network. Moreover,
the priority value of the shared ring port must be set greater than 0 and a rank of 0 or 1. (A description of rank is
included in the next subsection on the CLI overview.)
4.5.13 Configuring SuperLoop
This section describes complex topologies. The control and data VLANs are, to reduce possible confusion, not shown.
Refer to Figure 4-14 for an example of Peer SuperLoop Domains with disjointed ring segments. Because there are two separate Common Links, they can have their own set of priorities. Overlap of priority numbers is not an issue. Since they are still
Peer SuperLoop domains, all five rings segments share the same set of data VLANs.
Software Reference for SwitchBlade x3100 Series Switches
438
Layer Two Switching
127
M1
127
= Blocked SP interface
Note 2
= Common Link
127 127
T1
T1
127 127
T1
T2
126 126
T2
T2
126 126
T2
Note 2
126
Note 1
T3
T1
T1
126
M2
= All interfaces not
numbered are 0 (default)
= With non-shared common link,
can use same priority number
Note 1
Ring Segment Priority 127
T1
T1
T1
Note 1
Note 1
Ring Segment Priority 126
T2
T2
126 126
T2
T3
125 125
T3
Ring Segment Priority 125
125
M3
Note 2
126
M2
126
T3
125
T3
Note 1
Ring Segment Priority 126
T2
T2
126 126
T2
T3
125 125
T3
Ring Segment Priority 125
125
M3
Note 1
T3
125
EPSR_Topology_SuperLoop_complex1
FIGURE 4-14
SuperLoop Example - Disjointed Ring Segments
4.5.13.1 Default Configuration
When an SBx3112 switch is initially booted up, the SuperLoop will be configured as follows:
• No EPSR domains have been created, and so the SuperLoop feature is not configured.
4.5.14 Configuration Procedure
Figure 4-15 shows a network consisting of two protected ring segments that share a common link. The two ring segments
(ring segments 1 and 2) make up two EPSR domains that share the same set of data VLANs. There are two SBx3112 systems
(System A and System F). System A is a Transit Node shared by both ring segments 1 and 2. System F is a Master Node on
ring segment 1. This network represents a Peer SuperLoop EPSR logical domain (as described in section 4.5.12.4) because
both ring segments share a common link as well as the same set of protected VLANs.
Note:
Each interface on the common link must have the same VLAN configuration. So, the VLAN configuration on
interface 3.2 (on System A) must match the configuration on interface 11.4 (on System E).
Software Reference for SwitchBlade x3100 Series Switches
439
Layer Two Switching
To / From Network
= Physical Link
B
= EPSR Blocking
Transit
Node
iMAP 9100
1
4
4.0
5.2
V_6
V_20
RING 1
(EPSR Domain = “allied-1”)
V_300
5
9.2
A
C
SBx3112
10.1
11
0.0
V_20
11
V_300
3.2
iMAP 9810
10.2
D
Transit
Node
V_200
V_6
SBx3112
3
Master
Node 1
10
V_20
V_300
V_6
iMAP 9700
11.2
6
F
10
V_20
11.4
E
Transit
Node
PP
0.2
V_20
0.1
RING 2
(EPSR Domain = “allied-2”)
10
V_200
V_300
Transit
Node
V_6
To / From Network
V_6
“Common Link”
iMAP 9700
8.2
0.0
1.1
V_200
10
SP
0.0
V_20
11.2
10.2
V_300
SP
PP
11
11
7
V_6
2
Master
Node 2
= Ring 1 Control VLAN (V_200)
= Ring 2 Control VLAN (V_300)
= Data VLAN (V_6)
= Data VLAN (V_20)
FIGURE 4-15
A
F
= Devices
1
7
= Links
SuperLoop Example - Peer SuperLoop Domain
The following procedure shows the steps to configure SBx3112 System A as a common Transit Node on both ring segments
and to set the port priority for the common link so as to prevent a SuperLoop condition from occurring.
TABLE 4-20
Step
Configuration Procedure for SuperLoop - Peer SuperLoop Domain
Command
Description
Create EPSR domain for ring segment 1
1
CREATE EPSR=allied-1 TRANSIT
Creates an EPSR domain named “allied-1” (for
ring segment 1) with the Enhanced Recovery
feature enabled. The SBx3112 System A is configured as a Transit node on this domain.
Default status of domain is Disabled.
Software Reference for SwitchBlade x3100 Series Switches
440
Layer Two Switching
TABLE 4-20
Step
Command
2
show epsr allied-1
Configuration Procedure for SuperLoop - Peer SuperLoop Domain
Description
--- EPSR Domain Information --EPSR Domain Name...................... allied-1
EPSR Domain Node Type................. Transit
EPSR Domain State..................... IDLE
MAC Address of Master Node............ 00:00:00:00:00:00
EPSR Domain Status.................... Disabled
Control Vlan.......................... Enhanced Recovery..................... ON
Ring Interface # 1.................... <unknown>
Physical State of Ring Interface # 1.. <unknown>
Ring Interface # 1 Type............... <unknown>
Ring Interface # 1 State.............. <unknown>
Ring Interface # 1 Priority........... <unknown>
Ring Interface # 1 Priority Rank...... <unknown>
Ring Interface # 2.................... <unknown> Physical State of Ring Interface # 2.. <unknown>
Ring Interface # 2 Type............... <unknown>
Ring Interface # 2 State.............. <unknown>
Ring Interface # 2 Priority........... <unknown>
Ring Interface # 2 Priority Rank...... <unknown>
Data Vlans............................ -
Create EPSR domain for ring segment 2
3
CREATE EPSR=allied-2 TRANSIT
4
show epsr allied-2
Creates an EPSR domain named “allied-2” (for
ring segment 2) with the Enhanced Recovery
featured enabled. The SBx3112 System A is
configured as a Transit node on this domain.
Default status of domain is Disabled.
--- EPSR Domain Information --EPSR Domain Name......................
EPSR Domain Node Type.................
EPSR Domain State.....................
MAC Address of Master Node............
EPSR Domain Status....................
Control Vlan..........................
Enhanced Recovery.....................
Ring Interface # 1....................
Physical State of Ring Interface # 1..
Ring Interface # 1 Type...............
Ring Interface # 1 State..............
Ring Interface # 1 Priority...........
Ring Interface # 1 Priority Rank......
Ring Interface # 2....................
Physical State of Ring Interface # 2..
Ring Interface # 2 Type...............
Ring Interface # 2 State..............
Ring Interface # 2 Priority...........
Ring Interface # 2 Priority Rank......
Data Vlans............................
allied-2
Transit
IDLE
00:00:00:00:00:00
Disabled
ON
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
<unknown>
-
Create the control and data VLANs
5
create vlan vid 6,20,200,300
Creates 4 VLANs with the following IDs: 6, 20,
200 and 300.
Add control/data VLANs to the interfaces (with TAGGED framing)
Software Reference for SwitchBlade x3100 Series Switches
441
Layer Two Switching
TABLE 4-20
Configuration Procedure for SuperLoop - Peer SuperLoop Domain
Step
Command
Description
6
ADD VLAN=6 INTERFACE=ETH:[0.0],[3,8-9.2]
FRAME=TAGGED
Adds interfaces 0.0, 3.2, 8.2 and 9.2 to VLAN 6
and sets framing to tagged.
ADD VLAN=20 INTERFACE=ETH:[3,8-9.2]
FRAME=TAGGED
Adds interfaces 3.2, 8.2 and 9.2 to VLAN 20
and sets framing to tagged.
ADD VLAN=200 INTERFACE=ETH:[3,8.2]
FRAME=TAGGED
Adds interfaces 3.2 and 8.2 to VLAN 200 and
sets framing to tagged.
ADD VLAN=300 INTERFACE=ETH:[3,9.2]
FRAME=TAGGED
Adds interfaces 3.2 and 9.2 to VLAN 300 and
sets framing to tagged.
Delete the interfaces from the default VLAN
7
DELETE VLAN=1 INTERFACE=ETH:[0.0],[3.2],
[8.2],[9.2]
8
show vlan
Deletes interfaces 0.0, 3.2, 8.2 and 9.2 from the
default VLAN (VID=1).
--- VLAN Information ------------------------------------------------------------------------Name
VID
Forwarding Tagged Interfaces
Untagged Interfaces
Mode
--------------- ---- ---------- ------------------------------- ----------------------------default
1
vlan6
vlan20
vlan200
vlan300
6
10
200
300
Standard
Standard
Standard
Standard
Standard
<none>
ETH:[0.0],[3,8-9.2]
ETH:[3,8-9.2]
ETH:[3,8.2]
ETH:[3,9.2]
ETH:[0.1-3],[1-2,6-7,10-11.0-3],
[3,8-9.0-1,3-23]
<none>
<none>
<none>
<none>
Set GE interfaces to the NETWORK direction
9
set interface 8.2 ge direction network
set interface 9.2 ge direction network
set interface 3.2 ge direction network
Configures the GE interfaces for the Network
direction.
Add interfaces to the “allied-1” domain
10
ADD EPSR=allied-1 INTERFACE=ETH:[8.2]
ADD EPSR=allied-1 INTERFACE=ETH:[3.2]
Adds interfaces 8.2 and 3.2 to the “allied1” EPSR domain.
Add interfaces to the “allied-2” domain
11
ADD EPSR=allied-2 INTERFACE=ETH:[9.2]
ADD EPSR=allied-2 INTERFACE=ETH:[3.2]
Adds interfaces 9.2 and 3.2 to the “allied2” EPSR domain.
Add control VLAN to the “allied-1” domain
12
ADD EPSR=allied-1 VLAN=200 TYPE=CONTROL
Adds VLAN 200 to the “allied-1” EPSR
domain as the control VLAN.
Add the data VLANs to the “allied-1” domain
Software Reference for SwitchBlade x3100 Series Switches
442
Layer Two Switching
TABLE 4-20
Configuration Procedure for SuperLoop - Peer SuperLoop Domain
Step
Command
Description
13
ADD EPSR=allied-1 VLAN=6 TYPE=DATA
Adds VLAN 6 to the “allied-1” EPSR
domain as a data VLAN.
ADD EPSR=allied-1 VLAN=20 TYPE=DATA
Adds VLAN 20 to the “allied-1” EPSR
domain as a data VLAN.
Review configuration information for the “allied-1” domain
14
show epsr allied-1
--- EPSR Domain Information --EPSR Domain Name......................
EPSR Domain Node Type.................
EPSR Domain State.....................
MAC Address of Master Node............
EPSR Domain Status....................
Control Vlan..........................
Enhanced Recovery.....................
Ring Interface # 1....................
Physical State of Ring Interface # 1..
Ring Interface # 1 Type...............
Ring Interface # 1 State..............
Ring Interface # 1 Priority...........
Ring Interface # 1 Priority Rank......
Ring Interface # 2....................
Physical State of Ring Interface # 2..
Ring Interface # 2 Type...............
Ring Interface # 2 State..............
Ring Interface # 2 Priority...........
Ring Interface # 2 Priority Rank......
Data Vlans............................
allied-1
Transit
IDLE
00:00:00:00:00:00
Disabled
200
ON
ETH:[8.2]
UP
RING
PHYSICALLY FORWARDING
0
0
ETH:[3.2]
UP
RING
PHYSICALLY FORWARDING
0
0
6, 20
Add the control VLAN to the “allied-2” domain
15
ADD EPSR=allied-2 VLAN=300 TYPE=CONTROL
Adds VLAN 300 to the “allied-2” EPSR
domain as the control VLAN.
Add the data VLANs to the “allied-2” domain
16
add epsr allied-2 vlan 6 type data
Adds VLAN 6 to the “allied-2” EPSR
domain as a data VLAN.
add epsr allied-2 vlan 20 type data
Adds VLAN 20 to the “allied-2” EPSR
domain as a data VLAN.
Review configuration information for the “allied-2” domain
Software Reference for SwitchBlade x3100 Series Switches
443
Layer Two Switching
TABLE 4-20
Step
Command
17
show epsr allied-2
Configuration Procedure for SuperLoop - Peer SuperLoop Domain
Description
--- EPSR Domain Information --EPSR Domain Name......................
EPSR Domain Node Type.................
EPSR Domain State.....................
MAC Address of Master Node............
EPSR Domain Status....................
Control Vlan..........................
Enhanced Recovery.....................
Ring Interface # 1....................
Physical State of Ring Interface # 1..
Ring Interface # 1 Type...............
Ring Interface # 1 State..............
Ring Interface # 1 Priority...........
Ring Interface # 1 Priority Rank......
Ring Interface # 2....................
Physical State of Ring Interface # 2..
Ring Interface # 2 Type...............
Ring Interface # 2 State..............
Ring Interface # 2 Priority...........
Ring Interface # 2 Priority Rank......
Data Vlans............................
allied-2
Transit
IDLE
00:00:00:00:00:00
Disabled
300
ON
ETH:[9.2]
UP
RING
PHYSICALLY FORWARDING
0
0
ETH:[3.2]
UP
RING
PHYSICALLY FORWARDING
0
0
6, 20
Set the priority for the “common” link (shared by both domains)
18
SET EPSR=allied-1 INTERFACE=ETH:[3.2]
PRIORITY=10
Makes the “allied-1” EPSR domain the lowpriority ring (by assigning it a priority of 10).
19
SET EPSR=allied-2 INTERFACE=ETH:[3.2]
PRIORITY=11
Makes the “allied-2” EPSR domain the highpriority ring (by assigning it a higher priority of
11).
Enable both EPSR domains
20
Enables the “allied-1” and “allied-2”
EPSR domains on System A.
ENABLE EPSR=allied-1,allied-2
Note: This enable command must be issued
with both domains specified at the same time.
Review data VLANs per EPSR domain
21
show epsr datavlans
--- EPSR Domain Information ---
EPSR Domain Overlapping Domain(s)/Shrd Ring Port Data Vlans
----------- ------------------------------------ -----------allied-1
allied-2/3.2
6,20
allied-2
allied-1/3.2
Software Reference for SwitchBlade x3100 Series Switches
6,20
444
Layer Two Switching
TABLE 4-20
Step
Configuration Procedure for SuperLoop - Peer SuperLoop Domain
Command
Description
Review full configuration information for each EPSR domain
22
show epsr full
--- EPSR Domain Information --EPSR Domain Name......................
EPSR Domain Node Type.................
EPSR Domain State.....................
MAC Address of Master Node............
EPSR Domain Status....................
Control Vlan..........................
Enhanced Recovery.....................
Ring Interface # 1....................
Physical State of Ring Interface # 1..
Ring Interface # 1 Type...............
Ring Interface # 1 State..............
Ring Interface # 1 Priority...........
Ring Interface # 1 Priority Rank......
Ring Interface # 2....................
Physical State of Ring Interface # 2..
Ring Interface # 2 Type...............
Ring Interface # 2 State..............
Ring Interface # 2 Priority...........
Ring Interface # 2 Priority Rank......
Data Vlans............................
allied-1
Transit
LINKS-UP
00:15:77:F5:68:61
Enabled
200
ON
ETH:[8.2]
UP
DOWNSTREAM
PHYSICALLY FORWARDING
0
0
ETH:[3.2]
UP
UPSTREAM
PHYSICALLY FORWARDING
10
0
6, 20
--- EPSR Domain Information --EPSR Domain Name......................
EPSR Domain Node Type.................
EPSR Domain State.....................
MAC Address of Master Node............
EPSR Domain Status....................
Control Vlan..........................
Enhanced Recovery.....................
Ring Interface # 1....................
Physical State of Ring Interface # 1..
Ring Interface # 1 Type...............
Ring Interface # 1 State..............
Ring Interface # 1 Priority...........
Ring Interface # 1 Priority Rank......
Ring Interface # 2....................
Physical State of Ring Interface # 2..
Ring Interface # 2 Type...............
Ring Interface # 2 State..............
Ring Interface # 2 Priority...........
Ring Interface # 2 Priority Rank......
Data Vlans............................
allied-2
Transit
LINKS-UP
00:0C:25:00:05:33
Enabled
300
ON
ETH:[9.2]
UP
DOWNSTREAM
PHYSICALLY FORWARDING
0
0
ETH:[3.2]
UP
UPSTREAM
PHYSICALLY FORWARDING
11
1
6, 20
4.5.15 EPSR and (R)STP Interaction
You can coordinate EPSR and (R)STP so that devices can take part in both EPSR and (R)STP. By data filling certain parameters
correctly, the blocking of links to remove loops is coordinated.
4.5.15.1 EPSR and STP Interaction
The EPSR and (R)STP topologies conceptually do the same thing: provide a protection scheme for the network while blocking certain links to prevent loops. The key difference between the two features, however, is that:
• EPSR requires the user to explicitly create the ring configuration and to decide where blocking will occur for the data
VLAN(s).
• (R)STP configures where links are to be broken based on user provisioned values which are calculated to determine the
lowest cost paths for data traffic. This is used to determine which paths allow data traffic and where links should be
blocked to prevent loops.
It is possible to coordinate these features (through the provisioning of key parameters) so that certain devices can take part
in both EPSR and (R)STP. By data filling these parameters correctly, the blocking of links to remove loops is coordinated.
Software Reference for SwitchBlade x3100 Series Switches
445
Layer Two Switching
Note:
One key aspect of providing this coordination is that provisioning must ensure that with ports that are part of both
EPSR and (R)STP, their spanning tree states must be controlled by EPSR. This is explained in more detail later.
The following configurations are supported:
• Connection of an (R)STP subnetwork to a single node in the EPSR ring.
• Connection of an (R)TP subnetwork to two adjacent nodes of the EPSR ring.
Figure 4-16 shows these two configurations.
Note:
UCP is used with EPSR and STP to determine the upstream direction of the UFO VLAN interface configured on the
port. In setting these interfaces as UCP, any node in the EPSR ring can be the Master Node.
= Physical Link
= Control VLAN (V_60)
= Data VLAN (V_80)
To / From NetworkRoot
Bridge
U
0.3
D
D
0.2
0.1
V_80
= data VLAN is blocked
over Physical Link 3 (SP)
A
V_60
1
4
0.2
B
V_80
V_60
D = Devices in EPSR topology
C
G = Devices in RSTP topology
1
8 = Links
B
U
0.1
D
D = Downstream (by UCP)
D
V_80
V_60
U = Upstream (by UCP)
0.1
D
0.2
A
U
0.2
8
Master Node
2
U
V_60
PP
SP
C
0.1
0.1
0.2
3
V_80
U
V_80
G
0.3
0.2
D
5
= physical link is blocked
by STP over Physical Link 8
3
= path costs set so will
never be blocked by STP
unless no other choice
D
7
U
0.1
E
U
V_80
0.1
D
D
0.2
0.2
6
F
V_80
EPSR_STP_Interop_60
FIGURE 4-16
Note:
Possible EPSR/RSTP Configurations
The Multiple Spanning Tree Protocol (MSTP) is also available (refer to Section 4.4). However, implementing MSTP
and EPSR features on the same system is not recommended, and so is explained separately.
Software Reference for SwitchBlade x3100 Series Switches
446
Layer Two Switching
4.5.15.2 Configuration Overview - EPSR and (R)STP
The communication of STP/RSTP information to other bridges via the exchange of messages known as Configuration Bridge
Protocol Data Units (BPDUs), Topology Change Notification (TCN) BPDUs, and RST BPDUs.
For the feature interaction, these take place as part of the STP/RSTP processing on the NSP product nodes which are configured to run EPSR and STP/RSTP together, as well as the nodes which are only running STP/RSTP.
4.5.15.3 Configuration Requirements - EPSR and (R)STP
Following are the key concepts/parameters that must be understood for the feature interaction to function correctly:
• Protocol Communication (BPDUs)
For ports that are participating in both EPSR & STP/RSTP, when the STP/RSTP processing that is “attempting” to control
the spanning tree states of alternate or backup ports indicates that those ports are in a “blocked” or “discarding” state,
BPDUs will not be transmitted on those ports, even though in fact they are actually “forwarding” due to EPSR control.
There is also communication added between the EPSR protocol and STP/RSTP within the NSP product node to signal
when a port has been unblocked as a result of the EPSR ring being restored to full service following recovery of a failed
link. This event will be processed rather than port enable event by the STP/RSTP feature.
• Convergence (selection of root bridge)
The root bridge for the overall Spanning Tree for the network in this type of configuration must either be one of the EPSR
ring nodes, or a bridge which is at a “higher level” in the network and connects directly via one of the nodes on the EPSR
ring. In other words the root bridge can NOT be a node from one of the STP/RSTP sub-networks, nor can it be a “higher
level” network node that only connects via a link to one of the STP/RSTP sub-networks.
4.5.15.4 Port Costs
When a network is being setup to utilize an EPSR ring in conjunction with STP or RSTP sub-networks, the port paths costs
of all the links involved will need to be reviewed and potentially modified by the user. At a minimum, the port path costs for
all the “shared” links from the EPSR ring will need to be set artificially low (e.g., to a value of 1,2, or 3) to keep the STP/RSTP
algorithm processing from attempting to block those links.
In addition, whenever STP sub-networks are in use, it may be necessary to raise the path costs of the links in each STP subnetwork such that the combined cost for a traffic path through any one of those sub-networks can not be lower than the
cost to traverse the EPSR ring.
Note:
This will only be an issue in a scenario where a link (or bridge) on the EPSR ring has failed.
This restriction is a side effect of the low magnitude and limited range of path cost values used for STP. When RSTP is in use,
the same general principal applies (i.e., RSTP sub-network path costs must be greater than path cost for EPSR ring), but due
to the greater magnitude of path cost value utilized for RSTP by default, this becomes much easier to accomplish through
provisioning.
When provisioning an EPSR and RSTP network with shared links, there can be a warning at the CLI about path costs, this can
occur if the user is going from separate EPSR / RSTP networks to one with the shared link, and when the user enables RSTP
on a port that has EPSR configured, the message will appear.
Software Reference for SwitchBlade x3100 Series Switches
447
Layer Two Switching
4.5.16 EPSR and SuperLoop Commands
This subsection provides an alphabetical reference for commands used to configure EPSR.
TABLE 4-21
EPSR Commands
Commands
ADD EPSR INTERFACE
ADD EPSR VLAN
ADD TRACE EPSR MESSAGETYPE
CREATE EPSR MASTER | TRANSIT
DELETE EPSR INTERFACE
DELETE EPSR VLAN
DELETE TRACE EPSR MESSAGETYPE
DESTROY EPSR
DISABLE EPSR
ENABLE EPSR
SET EPSR
SET EPSR INTERFACE
SETDEFAULTS EPSR
SHOW EPSR
Software Reference for SwitchBlade x3100 Series Switches
448
Layer Two Switching
ADD EPSR INTERFACE
Syntax
ADD EPSR=epsrdomain
INTERFACE={ type:id-range | id-range | ifname-list }
[ TYPE={ PRIMARY | SECONDARY } ]
[ PRIORITY=0..127 ]
Description
Adds an Interface to the already existing EPSR domain. Only one interface can be specified at a time
when the EPSR domain is of 'Master' node type. If it's a 'Transit' node type then the user can specify
two interfaces at a time. (More than two interfaces are not allowed in any case.)
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The domain name of the EPSR.
NA
NA
INTERFACE
The Ethernet interface that is being configured as
part of the EPSR.
NA
NA
TYPE
For a system that is being designated as the Master
Node, whether the interface will be a PRIMARY
PORT (PP) or Secondary port (SP)
NA
SECONDARY
PRIORITY
Sets the ring port priority for a domain when the
ring port is part of a common link spanning one or
more superloop segments. Refer to 4.5.11.
0
0
Release Note
NA
Example
ADD EPSR=allied-1 INTERFACE=ETH:[8.2]
Software Reference for SwitchBlade x3100 Series Switches
449
Layer Two Switching
ADD EPSR VLAN
Syntax
ADD EPSR={ epsrdomain-list } VLAN={ vlanname-list | vid-range } [ TYPE={ CONTROL | DATA } ]
Description
Adds a VLAN to the already existing EPSR domain. The user can add a VLAN as a CONTROL or
DATA type. The interfaces associated with the EPSR domains should be tagged members of the CONTROL or DATA vlan being added to that domain.
Mode
Manager
Options
Option
Description
Range
Default Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
VLAN
The VLAN(s) that are being added to the EPSR
configuration.
NA
NA
TYPE
CONTROL - A VLAN that carries the EPSR configuration messages. A CONTROL vlan must be
NA
DATA
of UFO type. A CONTROL vlan, once added
to any EPSR domain, cannot be added to any
other domain either as CONTROL or DATA
type
DATA - A VLAN that carries traffic. One or more
VLANs can be configured as DATA VLANs in one
EPSR domain. A DATA vlan cannot be associ-
ated with two EPSR domains that are part of
the same physical RING network (EPSR
domains having the same interfaces provisioned).
Release Note
NA
Example
ADD EPSR ALLIED VLAN=1200 TYPE=CONTROL
Software Reference for SwitchBlade x3100 Series Switches
450
Layer Two Switching
ADD TRACE EPSR MESSAGETYPE
Syntax
ADD TRACE EPSR [ ={ epsrdomain-list | ALL } ]
MESSAGETYPE={ HEALTH | RINGUPFLUSH | RINGDOWNFLUSH | LINKDOWN | LINKFORWARDREQUEST | PERMISSIONLINKFORWARD | QUERYLINKSTATUS | ALL }
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
Description
Add an EPSR trace to an interface. Detailed call events pertaining to a port or set of ports can be
obtained by defining and enabling trace log criteria.
Mode
Manager
Options
Release Note
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
MESSAGETYPE
The EPSR message types
NA
ALL
INTERFACE
The interfaces where the TRACE will occur
NA
NA
NA
Example
ADD TRACE EPSR NC MESSAGETYPE HEALTH
Software Reference for SwitchBlade x3100 Series Switches
451
Layer Two Switching
CREATE EPSR MASTER | TRANSIT
Syntax
CREATE EPSR=epsrdomain { TRANSIT | MASTER [ HELLOTIME=0..65535 ] [ FAILOVERTIME=0..65535 ] [ RINGFLAPTIME=0..65535 ] } [ ENHANCEDRECOVERY={ ON | OFF } ]
Description
Used to create an EPSR domain. The domain being created is either a 'Transit' or 'Master' type.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
MASTER_or_TRAN
SIT
The type of domain,
NA
One from
the list is
required
If MASTER, then the system is a MASTER node and
the TIME parameters must be specified; otherwise
default values are used.
If TRANSIT, only ENHANCEDRECOVERY can be
specified.
HELLOTIME
The rate at which the EPSR protocol Health control message is sent by the master node for this
EPSR domain.
NA
1
FAILOVERTIME
Time for which the master node waits before
declaring that it has detected a break in the ring for
this EPSR domain.
NA
2
RINGFLAPTIME
The minimum number of seconds that a master
node must remain in the failed state (before moving to the complete state), even if the ring has
recovered from its fault condition.
NA
0
ENHANCEDRECOVERY
Allows a partial recovery of the ring even if there
are links that are down.
NA
OFF
Release Note
NA
Example
CREATE EPSR=allied MASTER
Software Reference for SwitchBlade x3100 Series Switches
452
Layer Two Switching
DELETE EPSR INTERFACE
Syntax
DELETE EPSR={ epsrdomain-list | ALL } INTERFACE={ type:id-range | id-range |
ifname-list | ALL }
Description
Deletes an Interface from the already existing EPSR domain. This operation is only allowed when the
EPSR domain is disabled.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
INTERFACE
The interfaces that will be deleted from the EPSR
domain.
NA
NA
Release Note
NA
Example
DELETE EPSR=allied-1 INTERFACE=ETH:[8.3]
Software Reference for SwitchBlade x3100 Series Switches
453
Layer Two Switching
DELETE EPSR VLAN
Syntax
DELETE EPSR={ epsrdomain-list | ALL } VLAN={ vlanname | vid | ALL }
Description
Deletes a VLAN from the already existing EPSR domain. This operation is only allowed when the EPSR
domain is disabled.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
VLAN
The VLAN(s) that are going to be deleted from the
EPSR domain
NA
NA
Release Note
NA
Example
DELETE EPSR=allied VLAN=403
Software Reference for SwitchBlade x3100 Series Switches
454
Layer Two Switching
DELETE TRACE EPSR MESSAGETYPE
Syntax
DELETE TRACE EPSR [ ={ epsrdomain-list | ALL } ] [ MESSAGETYPE={ HEALTH |
RINGUPFLUSH | RINGDOWNFLUSH | LINKDOWN | LINKFORWARDREQUEST | PERMISSIONLINKFORWARD | QUERYLINKSTATUS | ALL } ] [ INTERFACE={ type:id-range | id-range |
ifname-list | ALL }
Description
Delete the events which match the given filters.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
MESSAGETYPE
The EPSR message types
NA
If not input,
will default to
wildcard (ALL)
INTERFACE
The interfaces where the TRACE will occur
NA
If not input,
will default to
wildcard (ALL)
Release Note
NA
Example
DELETE TRACE EPSR GA MESSAGETYPE HEALTH
Software Reference for SwitchBlade x3100 Series Switches
455
Layer Two Switching
DESTROY EPSR
Syntax
DESTROY EPSR={ epsrdomain-list | ALL }
Description
Used to destroy the already existing EPSR domains. The EPSR domain must be disabled before it can
be destroyed. See DISABLE EPSR.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
Release Note
NA
Example
DESTROY EPSR=allied-1
Software Reference for SwitchBlade x3100 Series Switches
456
Layer Two Switching
DISABLE EPSR
Syntax
DISABLE EPSR={ epsrdomain-list | ALL }
Description
Used to disable the EPSR domain.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
Release Note
NA
Example
DISABLE EPSR=allied
Software Reference for SwitchBlade x3100 Series Switches
457
Layer Two Switching
ENABLE EPSR
Syntax
ENABLE EPSR={ epsrdomain-list | ALL }
Description
Used to enable the EPSR domain. Before any EPSR domain can be enabled, the Control Vlan, Primary
and Secondary interfaces should have been provisioned on that EPSR domain.
Mode
Manager
Options
Option
Description
Range
Default Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
Release Note
NA
Example
ENABLE EPSR=allied-1,allied-2
Software Reference for SwitchBlade x3100 Series Switches
458
Layer Two Switching
SET EPSR
Syntax
SET EPSR={ epsrdomain-list | ALL } [ HELLOTIME=1..32767 ] [ FAILOVERTIME=2..65535 ] [ RINGFLAPTIME=0..65534 ] [ ENHANCEDRECOVERY={ ON | OFF } ]
Description
Used to set the values of hello time, failover time and ringflap time for the EPSR domains. This command is valid only for Master type of EPSR domains. This operation is only allowed when the EPSR
domain is disabled.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
HELLOTIME
The rate at which the EPSR protocol Health control message is sent by the master node for this
EPSR domain.
NA
1
FAILOVERTIME
Time for which the master node waits before
declaring that it has detected a break in the ring for
this EPSR domain.
NA
2
RINGFLAPTIME
The minimum number of seconds that a master
node must remain in the failed state (before moving to the complete state), even if the ring has
recovered from its fault condition.
NA
0
ENHANCEDRECOVERY
Allows a partial recovery of the ring even if there
are links that are down.
NA
OFF
Release Note
NA
Example
SET EPSR=allied-2 HELLOTIME=5
Software Reference for SwitchBlade x3100 Series Switches
459
Layer Two Switching
SET EPSR INTERFACE
Syntax
SET EPSR=epsrdomain INTERFACE={ type:id | id | ifname } [ TYPE={ PRIMARY |
SECONDARY } ] [ PRIORITY=0..127 ]
Description
Used to change the interface designation in the EPSR domain. This operation is valid only for Master
type of EPSR domains. This operation is only allowed when the EPSR domain is disabled.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
INTERFACE
The Ethernet interface that is being configured as
part of the EPSR. For the SBx3112 these are on the
XE4.
NA
NA
TYPE
For a system that is being designated as the Master
Node, whether the interface will be a PRIMARY
PORT (PP) or Secondary port (PP)
NA
NA
PRIORITY
Sets the ring port priority for a domain when the
ring port is part of a common link spanning one or
more superloop segments. Refer to
NA
NA
Release Note
NA
Example
SET EPSR=allied-1 INTERFACE=ETH:[3.2] PRIORITY=10
Software Reference for SwitchBlade x3100 Series Switches
460
Layer Two Switching
SETDEFAULTS EPSR
Syntax
SETDEFAULTS EPSR={ epsrdomain-list | ALL } [ HELLOTIME ] [ FAILOVERTIME ] [
RINGFLAPTIME ][ENHANCEDRECOVERY]
Description
Used to reset the values of hello time, failover time, or ringflap time back to defaults. This operation is
only allowed when the EPSR domain is disabled.
Mode
Manager
Options
Option
Description
Range
Default
Value
EPSR
The name(s) that has been given to the EPSR
domain(s)
NA
NA
HELLOTIME
The rate at which the EPSR protocol Health control message is sent by the master node for this
EPSR domain.
NA
1
FAILOVERTIME
Time for which the master node waits before
declaring that it has detected a break in the ring for
this EPSR domain.
NA
2
RINGFLAPTIME
The minimum number of seconds that a master
node must remain in the failed state (before moving to the complete state), even if the ring has
recovered from its fault condition.
NA
0
ENHANCEDRECOVERY
Allows a partial recovery of the ring even if there
are links that are down.
NA
OFF
Release Note
NA
Example
SETDEFAULTS EPSR=allied-2 HELLOTIME
Software Reference for SwitchBlade x3100 Series Switches
461
Layer Two Switching
SHOW EPSR
Syntax
SHOW EPSR [ ={ epsrdomain-list | ALL } ] [ { FULL | DATAVLANS } ]
Description
Used to display the information about the EPSR domains. SHOW EPSR and SHOW EPSR ALL command displays the summary information about all the provisioned EPSR domains in the system. The
SHOW EPSR epsrdomain command displays the detailed information about that specific EPSR domain.
Mode
User
Options
Release Note
Option
Description
Range
Default
Value
EPSR
The name(s) that have been given to the EPSR
domain(s).
NA
ALL
FULL
Provides information on both CONTROL and
DATA VLANS
NA
NA
DATAVLANS
Lists the DATA VLAN(s) for the domain(s)
NA
NA
NA
Example
SHOW EPSR
--- EPSR Domain Information ---
Data
Node
EPSR Domain Type
Domain State
----------- ------- -----------e163
Master EN/COMPLETE
Ctrl
Interface(s) (Phy. State, Type, Vlan
Vlan
State, Prio)Count
------ ------------------------------- -----4
8.18 (UP,DNSTRM,PHYFWD,0(0)),
19
8.19 (UP,DNSTRM,PHYBLK,0(0))
test
Master
DIS/IDLE
-
-
0
videoring
Master
EN/COMPLETE
6
11.0 (UP,DNSTRM,PHYFWD,0(0)),
1
8.22 (UP,DNSTRM,PHYBLK,0(0))
e164
Transit EN/LINKS-UP
5
8.18 (UP,DNSTRM,PHYFWD,0(0)),
1
8.19 (UP,UPSTRM,PHYFWD,0(0))
E135 - manager SEC>> sh epsr=videoring
--- EPSR Domain Information --EPSR Domain
EPSR Domain
EPSR Domain
MAC Address
EPSR Domain
Name......................
Node Type.................
State.....................
of Master Node............
Status....................
videoring
Master
COMPLETE
00:0C:25:04:00:0D
Enabled
Software Reference for SwitchBlade x3100 Series Switches
462
Layer Two Switching
Control Vlan..........................
Enhanced Recovery.....................
Primary Interface.....................
Physical State of Primary Interface...
Primary Interface Type................
Primary Interface State...............
Primary Interface Priority............
Primary Interface Priority Rank.......
Secondary Interface...................
Physical State of Secondary Interface.
Secondary Interface Type..............
Secondary Interface State.............
Secondary Interface Priority..........
Secondary Interface Priority Rank.....
Hello Timer (seconds..................
Failover Timer (seconds)..............
RingFlap Timer (seconds)..............
Hello Time Remaining (seconds)........
Failover Time Remaining (seconds).....
RingFlap Time Remaining (seconds).....
Hello Sequence........................
Data Vlans............................
6
OFF
ETH:[11.0]
UP
DOWNSTREAM
PHYSICALLY FORWARDING
0
0
ETH:[8.22]
UP
DOWNSTREAM
PHYSICALLY BLOCKED
0
0
1
2
0
1
0
0
57937
512
Software Reference for SwitchBlade x3100 Series Switches
463
Layer Two Switching
4.6 Upstream Forwarding Only (UFO) Mode
4.6.1 Overview
For the SBx3100, a VLAN can be created where all data from ports associated with that VLAN must be forwarded only to
the upstream port. This segregation of traffic is done when:
• Certain types of services require only connections between the port and an upstream device.
• Security must be maintained (a malicious subscriber on one port cannot access a MAC or IP address on another port).
Understanding UFO mode is important to understand when UFO FLANs are used in a Spanning Tree configuration. Refer to
section 4.4.
SBx3100
Line Card Slot 8
Line Card Slot 8
Port 0
Port 4
MAC=34567*
VID=4
VLAN=Train
MAC=45678*
VID=4
* MAC addresses are not actual values
CREATE VLAN=Train VID=4 TYPE=VLAN FORWARDINGMODE=UPSTREAMONLY
ADD VLAN=4 INTERFACE=ETH:8.0, 9.4
UFO_Mode_VLAN_Cnfg
ADD VLAN=4 INTERFACE=ETH:0.0 FRAME=TAGGED
FIGURE 4-17
UFO Mode VLAN Configuration
4.6.1.1 Isolated UFO VLAN Notification
When a UFO VLAN is no longer associated with a functional network facing interface, a management log is produced. This
log contains a list of all isolated UFO VLANs. When a UFO VLAN is no longer isolated, the log is produced again with the list
of the remaining isolated UFO VLANs. This process continues until there are no more isolated UFO VLANs. Once all UFO
VLANs have at least one operational interface, the shelf alarm is cleared.
Following is an example of the log:
SHLF010 2008-02-11 14:20:40 3541 INFO
Description: No active/standby or dynamic interface in UFO VLAN
VLANs: 5,10-12
Software Reference for SwitchBlade x3100 Series Switches
464
Layer Two Switching
4.6.2 Forwarding Mode and Determining Upstream Nodes and Interfaces
In setting up the UFO VLANs on interfaces, there is the FORWARDING parameter that controls how the interface for the
UFO VLAN determines whether it is the upstream interface. This is used in the various protection schemes where a configuration will reconverge and the UFO interface may need to change its status as upstream or downstream.
The values for FORWARDING can be divided into two groups:
• Static - The interface for this UFO is always either upstream or downstream.
• Dynamic - The interface uses one of the spanning tree protocols to dynamically determine whether it is upstream or
downstream.
The following table describes these modes.
TABLE 4-22
Forwarding Modes for UFO VLANs
Forwarding Mode
Description
Notes
PRIMARYUPSTREAM
All frames that are received on the other
interfaces will be sent out this interface.
Static (can also be used with UCP)
SECONDARYUPSTREAM
All frames that are received on the other
interfaces will be sent out this interface if
there is a fault with the PRIMARYUPSTREAM.
Refer to Upstream Control Protocol
(UCP).
DOWNSTREAM
Only frames that are received over the
UPSTREAM interface may be switched to
the DOWNSTREAM interface.
Static
RESTRICTED
The VLAN cannot be used by all interfaces
at the same time.
This is not used on the SBx3112.
STP
The Spanning Tree Protocol will dynamically
determine the upstream interface.
Upstream is towards Root Bridge (refer
to Overview of Spanning Trees).
EPSR
The VLAN(s) are part of an EPSR configuration and the EPSR protocol determines the
UPSTREAM interface.
Upstream is towards EPSR Master (refer
to Ethernet Protection Switched Ring
(EPSR) and SuperLoop Prevention)
UCP
The UCP protocol will determine the
UPSTREAM interface dynamically regardless
of the type of configuration.
Upstream is determined by UCP protocol
(refer to Upstream Control Protocol
(UCP)).
4.6.3 UFO Example Configuration (Static)
In a simple configuration, a UFO can be used to provide a permanent (static) Forwarding Mode, since these will never have to
change. Refer to the following figure.
Software Reference for SwitchBlade x3100 Series Switches
465
Layer Two Switching
SBx900
FORWARDING =
PRIMARYUPSTREAM
Port 0
SBx3100
V_60
Line Card Slot 8
Line Card Slot 8
Port 0
Port 4
FORWARDING =
DOWNSTREAM
V_60
FORWARDING =
DOWNSTREAM
= VLAN in UFO Mode
UFO_Mode_VLAN_Cnfg
UFO Model - Static Configuration
FIGURE 4-18
4.6.4 STP Configuration with UFO VLAN
Figure 4-19. and Figure 4-20 show an example ring configuration that uses (R)STP with UFO VLANs
To / From Network
= Physical Link
= VLAN 60 (V_60)
0.3
0.2
(Root Bridge)
0.1
If Device A is the root, UFO VLAN is set at interfaces:
0.1 = DOWNSTREAM
0.2 = DOWNSTREAM
0.3 = PRIMARYUPSTREAM
A
For other devices, UFO VLAN on the interface
set to STP for dynamic state change
(Upstream to Downstream,
1
Downstream to Upstream)
= STP Blocking of Physical Link
V_60
4
Upstream
Upstream
0.2
0.1
V_60
B
A
D = Devices
1
4
0.1
V_60
= Links
D
Downstream
0.2
Downstream
Downstream
Upstream
3
V_60
C
0.1
0.2
2
Ring_Topology_STP_60
FIGURE 4-19
Ring Topology Using STP and UFO VLAN
Software Reference for SwitchBlade x3100 Series Switches
466
Layer Two Switching
(Root Bridge)
E
= Physical Link
= VLAN 60 (V_60)
0.2
0.3
0.1
If Device A is not the root, UFO VLAN is set at interfaces:
0.1 = STP
0.2 = STP
0.3 = PRIMARYUPSTREAM
A
For other devices, UFO VLAN on the interface
set to STP for dynamic state change
(Upstream to Downstream,
1
Downstream to Upstream)
= STP Blocking of Physical Link
V_60
4
Upstream
Upstream
0.2
0.1
V_60
B
A
D = Devices
1
4
0.1
V_60
= Links
D
Downstream
0.2
Downstream
Upstream
3
V_60
C
0.1
0.2
2
Downstream
Ring_Topology_STP_up
FIGURE 4-20
Ring Topology Using STP and UFO VLAN - Root Bridge is above Ring
Once the topology stabilizes, in each system one of the ports will become the root port (the one closest to the root bridge
as determined by STP) and the other port(s) become the designated port. The port which is the root port is considered to be
the upstream port and the port which is not the root port (designated port) is considered to be the downstream port.
The user can provision the ports in each shelf with FORWARDING=STP indicating that the topology is a ring and allowing the
STP protocol to determine the exact upstream.
To prevent one of the systems from becoming the Spanning Tree root bridge, the network design must ensure that the
appropriate STP parameters are set such that the root bridge is always located above the ring configuration made up of the
systems.
When a ring topology is implemented in the user’s network, the user may not be aware of which ring ports are designated
primaryupstream and which are designated downstream. Therefore, if the user wants to configure classifiers on these ring
ports, they should apply them to both ring ports. This ensures that the traffic classification required by the user is actually
applied.
This restriction strictly applies only to the switches which actually make up the ring. The aggregating layer 2 switch or any
switch above it could be the root bridge for a ring network. These are configured as follows:
• If the aggregating layer 2 switch is an iMAP (Device A in Figure 4-19 ) and does become the root bridge then the FORWARDING parameter for the ports cannot be set to STP. The upstream port from the aggregating layer 2 switch, which
is the real network uplink for such a configuration, should be set to PRIMARYUPSTREAM and the other two links
which make up the ring must be set to DOWNSTREAM.
• If the aggregating layer 2 switch is an iMAP but is not the root bridge but one of the switches above it is (Device E in
Figure 4-21), then the FORWARDING parameter can be set to STP and the status of the ports will be determined with
STP’s assistance similar to the other switches in the ring.
Software Reference for SwitchBlade x3100 Series Switches
467
Layer Two Switching
4.6.5 MSTP Configuration with UFO VLAN
Figure 4-21 shows an example configuration that uses MSTP with UFO VLANs.
Parameters can be set so that each MSTI has a Regional Root Bridge on separate systems. On each of these systems, the
VLANs on the upstream port are set to PRIMARYUPSTREAM and the other ports are set to DOWNSTREAM. All other
ports are other systems are set to STP.
Note:
In this example, each MST Instance has only one VLAN and its upstream interface is configured as
PRIMARYUPSTREAM. If there are multiple VLANs for an MST Instance, each VLAN should be set as
PRIMARYUPSTREAM over the same upstream port.
To / From Network
For Root Bridge A,
UFO VLANS set as
0.1 = DOWNSTREAM
0.2 = DOWNSTREAM
0.3 = PRIMARYUPSTREAM
= Physical Link
0.3
For other devices, UFO VLAN
on the interface set to STP
for dynamic state change
= Blocking of VLAN traffic
0.2
0.1
V_80
A
V_60
1
4
Regional Root Bridge MST2
MST1 Instance
MST2 Instance
0.2
Regional
Root Bridge
MST1
V_60 = UFO VLAN 60
V_60
V_80
V_60
V_80 = UFO VLAN 80
B
0.1
A
D = Devices
1
4
D
= Links
3
V_60
0.1
0.2
To / From
Network
0.2
2
C
V_80
FIGURE 4-21
0.3
V_80
0.1
For Root Bridge D,
UFO VLANS set as
0.1 = DOWNSTREAM
0.2 = DOWNSTREAM
0.3 = PRIMARYUPSTREAM
For other devices, UFO VLAN
on the interface set to STP
for dynamic state change
Ring Topology Using MSTP and UFO VLAN
Software Reference for SwitchBlade x3100 Series Switches
468
Layer Two Switching
4.6.6 EPSR Configuration with UFO VLAN
To / From Network
For other devices, data VLAN has
FORWARDING set to EPSR for
dynamic state change
(Upstream to Downstream,
Downstream to Upstream)
SP
PP
= Data VLAN on Physical
Link 1 is blocked
A
Master
Node
1.1
V_80
0.1
With Device A as the root, data VLAN
FORWARDING could be set at interfaces:
0.1 = DOWNSTREAM
1.1 = DOWNSTREAM
2.1 = PRIMARYUPSTREAM
= Physical Link
= Control VLAN (V_60)
= Data VLAN (V_80)
2.1
V_60
4
1
0.2
V_80
0.1
V_60
B
A
D = Devices
1
4
V_80
V_60
= Links
D
1.1
1.2
2
1.1
0.2
3
V_60
C
Data VLAN is
unblocked
V_80
EPSR_Topology_UFO
FIGURE 4-22
Initial forwarding configuration of ring ports in an EPSR network
Figure 4-22 shows a configuration where the master node, Allied Telesis System A, has its port pointing towards the network configured as upstream with the two ring ports configured as downstream. This is provisioned using the SET VLAN
command with the FORWARDING parameter. This is similar to the current implementation of configuring the layer 2 aggregating switch the same way when it is the root bridge according to the STP protocol. In the EPSR ring using the EPSR protocol, the master node configuration is conceptually the equivalent of it being a root bridge for this network
In each of the transit nodes, both the ring ports are configured using the SET VLAN INTERFACE command with the FORWARDING parameter set to EPSR. For EPSR, unlike an STP implementation where a port change event is used to configure
ports the receipt of the EPSR protocol message is used. The ring port uses a Health message with the a state of Complete
received by the transit switch to configured the upstream port with the other ring port configured to be the downstream
port
Note:
To use EPSR functionality for the determination of the upstream and downstream port in the nodes that make up
the ring, the node which has the link to the network must be the master node.
Software Reference for SwitchBlade x3100 Series Switches
469
Layer Two Switching
4.6.7 Configuring UFO VLANs
4.6.8 Default Configuration
• As a default, there is one VLAN (vid 1), which cannot be created or destroyed.
• The default VLAN is associated with all Line Card interfaces.
• The default VLAN is in standard (non-UFO) mode.
4.6.9 Configuration Guidelines
• The UFO mode is controlled on a VLAN basis.
• For the SBx3112, up to 16 VLANs can be configured in UFO mode, and they can use any VID in the 2-4094 range. Moreover, the features VLAN Translations (4.9) and VLAN-based HVLANs (4.8) do no affect this number.
• When all VLANs on a port are deleted, the port would revert to the default VLAN (vid 1), which would be in either UFO
or Standard mode.
• An interface may be set as the upstream interface (either statically or dynamically) for a UFO VLAN regardless of its
DIRECTION setting.
• UFO VLANs are supported for the LAG uplinks in release 17.0. Refer to 4.2.7.3.
Once the ADD VLAN command for UFO has been invoked, the system may generate a warning message at the user’s CLI
session stating that classifier capacity or capabilities have been exceeded on the slot(s) impacted by the provisioning change.
The user should investigate classifier-related provisioning, such as IGMP, DHCPRELAY, VLAN (for per-VLAN UFO and
HVLAN), EPSR, INTERFACE (TAGALL option for HVLAN), ACCESSLIST, and CLASSIFIER to determine the reason for the
message.
Software Reference for SwitchBlade x3100 Series Switches
470
Layer Two Switching
4.7 Upstream Control Protocol (UCP)
4.7.1 Overview of UCP
UCP is a proprietary protocol used by Allied Telesis Network Access product devices so that it can inform other devices in
the network that it is the “upstream node” for a UFO VLAN. A UCP node creates Port Notification messages that
announces it is the “upstream node.” The non-upstream nodes receive these UCP protocol messages for the UFO VLAN so
that they can dynamically determine their upstream interfaces. This occurs independently of the topology feature being used.
4.7.2 UCP Protocol Configuration Overview
To understand UCP operation, the user should first consider UCP enabled on a set of connected devices that does not use a
Spanning Tree or EPSR feature; a set of interfaces are configured with a UFO VLAN, and one of the interfaces is on the
upstream device and faces into the larger network.
When the user sets the FORWARDING parameter to PRIMARYUPSTREAM, then for this UFO VLAN on this interface, this
device is the upstream device and this interface is the upstream interface.
Moreover, the user can have a second device that also is an upstream device with an upstream interface. The user can therefore set this second interface as SECONDARYUPSTREAM, which will act as a backup if there is a failure of the primary interface device. This will be explained in detail later.
As the other interfaces are associated with the UFO VLAN, they are by default set to UCP, meaning they dynamically determine their direction during topology changes.
Once all of the interfaces are configured, they can exchange the two UCP messages:
• The Upstream Port Notification Message sent by the upstream node
• The Upstream Port Topology Change Message sent by the devices spanning a failed link (or adjacent to a failed device)
when the failure occurs and when it subsequently recovers.
4.7.2.1 Upstream Port Notification Message
The upstream node periodically formats this message for each of the UFO VLANs that qualifies and sends them over the
UCP-enabled interfaces. This message is received by the other devices that make up this UFO VLAN configuration
Table 4-23 shows the logic of how this message is processed:.
TABLE 4-23
Processing of Upstream Port Notification Message Sent by Upstream Device
Process
If Check Condition, Outcome
A classifier rule intercepts this message based upon the
layer 2 destination address value and sends it to the cpu
only.
The UCP protocol task upon receiving this message will
check to see if the tagged vlan in the message is configured
to be a ufo vlan.
If not, the message is discarded.
Check is made to see if the port on which it was received
is a tagged member of the ufo vlan
If not, the message is discarded
Check if message is received on UCP enabled interface
If interface not configured to be UCP enabled, message
discarded.
If the received tagged vlan in the message is configured
to be a ufo vlan, continue
If tagged member, continue.
If interface UCP enabled, continue.
Software Reference for SwitchBlade x3100 Series Switches
471
Layer Two Switching
TABLE 4-23
Processing of Upstream Port Notification Message Sent by Upstream Device
Process
If Check Condition, Outcome
The layer 2 source address value of the active upstream
node which originally sent the message is stored against
the received ufo vlan vid value.
This is done so that this non-upstream node knows which
node is the upstream node for this ufo vlan in the network
topology in case it has to send the upstream port topology
change message during a network link fail or link recovery
condition.
Check if other UCP enabled ports for this ufo vlan are
configured
If no other UCP-enabled interfaces for this UFO VLAN
configure, message is discarded.
If other UCP-enabled ports for this UFO VLAN are configured, continue.
Received message sent over all other UCP-enabled network module interfaces that have been configured for this
UFO VLAN.
If no other UCP enabled ports for this ufo vlan are configured or if any are configured to be UCP enabled but
are not tagged members of the ufo vlan then the message is just discarded.
4.7.2.2 Topology Change Message
This message is used for fault and recovery scenarios:
• Link Fault - When a link fault occurs, each of the nodes spanning the faulty link send the upstream port topology change
message for each of the ufo vlans towards its upstream node. This topology change message will indicate to the upstream
node that this message is being sent as a result of a link failure in the network.
• Link Recovery - When a link fault gets corrected and the recovery is detected then each of the nodes spanning this recovered link send the upstream port topology change message for each of the ufo vlans towards its upstream node. This
topology change message will indicate to the upstream node that this message is being sent as a result of a link recovery
in the network.
The non-upstream nodes that originate this topology change message for each of the ufo vlans send the message over all the
applicable UFO-enabled network ports and the ufo vlan may or may not have an upstream port (based upon where the fault
is) until the node hears from the upstream node again when it receives this topology change message.
Each of the other nodes between the originating node and the upstream node receive the Topology Change Message and
take the actions listed in the following table.
TABLE 4-24
Processing of Topology Change Message by Nodes Between Originating and
Upstream Node
Process
If Check Condition, Outcome
A classifier rule intercepts this message based upon the
layer 2 destination address value and sends it to the cpu.
The UCP protocol task upon receiving this message will
check to see if the tagged vlan in the message is configured
to be a ufo vlan.
If not, the message is discarded.
Check is made to see if the port on which it was received
is a tagged member of the ufo vlan
If not, the message is discarded
Software Reference for SwitchBlade x3100 Series Switches
If the received tagged vlan in the message is configured
to be a ufo vlan, continue
If tagged member, continue.
472
Layer Two Switching
TABLE 4-24 Processing of Topology Change Message by Nodes Between Originating and
Upstream Node (Continued)
Process
If Check Condition, Outcome
Check if message is received on UCP enabled interface
If interface not configured to be UCP enabled, message
discarded.
If interface UCP enabled, continue.
The message is sent as is over all the other applicable UCP
enabled network ports. The ufo vlan may or may not have
an upstream port (based upon where the fault is) until the
node hears from the upstream node again when it receives
this topology change message
Topology Change Message received by upstream node
A classifier rule intercepts this message based upon the
layer 2 destination address value and sends it to the cpu.
The UCP protocol task upon receiving this message will
check to see if the tagged vlan in the message is configured
to be a ufo vlan
If not, the message is discarded.
Check is made to see if the port on which it was received
is a tagged member of the ufo vlan
If not, the message is discarded
Check if port on which message received is configured as
UFO-enabled port
If not UFO-enabled, message is discarded.
Check if this node is an upstream node for the UFO
VLAN.
If this is not an upstream node, message is discarded
If the received tagged vlan in the message is configured
to be a ufo vlan, continue
If tagged member, continue
If UFO-enabled, continue.
If this is an upstream node, continue
The upstream node does not wait for its periodic timer
expiry to send the upstream port notification messages
over its allowed ring ports. It sends the upstream port
notification message over all the allowed ring ports in rapid
succession a few times after which it settles down to sending the notification message using its periodic timer
The non-upstream nodes receive the upstream port notification message and process them as described in Table 423.
4.7.2.3 UCP Redundancy (Different Nodes)
With UCP redundancy, a standby upstream interface can be configured. In most cases these interfaces for the UFO VLAN
will be on separate nodes, so redundancy is provided at the node level.
1.
The active node does not actively source hello type messages. It is responsible for responding to messages received from
standby nodes. This is done to reduce chatter and would be redundant for networks which do not have a standby node.
2.
The active node response contains the state of the upstream port - Up or Down.
3.
The active node response is to flood out all UCP enabled network ports. This is to provide information to all nodes in the
network so that each can maintain an active and secondary “topology”.
4.
The active node must source an unsolicited response if its configured upstream port changes state. This allows the active
node to “monitor” its upstream port and to provide rapid failover and recovery characteristics.
5.
The standby node is responsible for sourcing hello messages on a rapid periodic basis. These hello messages must be sent
for each VLAN for which it is a standby for. These hello messages are flooded out each UCP enabled network port.
6.
The standby node must assume that the active node is no longer in service if it fails to receive 2 or more hello responses.
Software Reference for SwitchBlade x3100 Series Switches
473
Layer Two Switching
4.7.2.4 UCP Redundancy (Same Node)
If the active and standby interfaces are on the same node, all messages are still flooded over the UCP-enabled network ports.
However, since both active and standby are on the same node, the failover and message can be solely determined by port
state.
4.7.3 UCP with STP
Many of the concepts about the interaction of UCP with EPSR also apply to UCP with STP; the STP protocol ensures there
are no loops in the converged (reconverged) topology, while UCP ensures that the UFO VLAN interfaces are set correctly
for that topology. Since STP is a port based topology (as opposed to EPSR which is a VLAN based topology), the STP will
perform blocking on the port and therefore block all the VLANs on that port. The user should therefore ensure that no
VLANs are isolated when STP changes the topology for the relevant nodes. (Refer to 4.4.3.20 for details and an example.)
4.7.4 UCP with EPSR/RSTP
Although UCP can act as a standalone protocol when the topology control is further up in the network, it can interact with
the STP and EPSR features; for example, in a ring network, the EPSR feature ensures there is no loop created over the protected domain, while the UPC is used in the non-upstream nodes to determine the upstream interface for the (protected)
UFO VLANs.
Figure 4-23 shows the resulting topology. Switch A is the upstream node for the UFO VLAN (V_80) in the domain, and so
sends out the Upstream Port Notification message (see 4.7.2.1) for each of the UFO VLANs over its two ring ports. This
message is received by nodes B and C on one side of the ring and node D on the other. Note that switch C does not receive
this message from Node D because the messaging is over the protected VLAN and this is blocked by EPSR.
The message when received at each node is intercepted by the classifier and sent to the CPU. If all ingress checks pass (see
4.7.2.1), each node stores the VLAN ID (80) along with the MAC address of the upstream node (Node A). The message is
then forwarded over the other ring port towards the next node in the ring network. Finally, the message is discarded at node
C because the UFO VLAN is logically blocked.
Software Reference for SwitchBlade x3100 Series Switches
474
Layer Two Switching
Upstream Network
Primary
Upstream
Interface
= Physical Link
= Control VLAN (1200)
= Data VLAN (600)
10.0
A
DOWN
11.2
600
10.1
DOWN
SBx900
Secondary
Upstream
Interface
1200
1
4
UP
UP
10.1
1200
B
A
D = Devices
1
4 = Links
10.2
DOWN
Master
Node
PP
D
10.1
DOWN
SP
2
UP
10.1
10.2
3
1200
C
600
EPSR_UCP_Interop
FIGURE 4-23
600
1200
10.0
600
11.2
DOWN
= data VLAN is blocked
over Physical Link 3
UPC is part of VLAN
messaging and so it
is blocked
EPSR Topology with UCP
4.7.4.1 Fault Message and Recovery - Physical Link
Assume a fault occurs on link 2. The EPSR protocol reacts and takes steps to change the topology so that no node is isolated
and no new loops are formed. The UPC protocol makes sure that the direction of the ports (upstream, downstream) are set
correctly.
On node C, the UCP protocol sends the Upstream Port Topology Change (4.7.2.2) message for the UFO VLAN. This message is received and forwarded to the next node until the node that receives the message is the upstream node (A). Therefore, nodes D and A would receive the message.
On Node B, the UCP protocol would also send the Upstream Port Topology Change message for the UFO VLAN. This message is also received and forwarded to the next node until the node that receives the message is the upstream node (A).
Therefore, nodes B and A would receive the message.
Node A will then send an unsolicited (non-timer) “Upstream Port Notify” message for the UFO VLAN(s) over both its ring
ports a few times before settling back to its normal (timer) sending procedure.The other nodes receive this message, process
it as described earlier, and the result is a reconverged topology in which the upstream/downstream direction of the interfaces
are configured correctly.
Software Reference for SwitchBlade x3100 Series Switches
475
Layer Two Switching
Upstream Network
Primary
Upstream
Interface
= Physical Link
= Control VLAN (1200)
= Data VLAN (600)
10.0
A
DOWN
11.2
600
10.1
DOWN
SBx900
Secondary
Upstream
Interface
1200
1
4
UP
UP
10.1
1200
B
A
D = Devices
1
4
10.2
DOWN
Master
Node
PP
D
10.1
DOWN
SP
2
3
1200
C
600
DOWN
FIGURE 4-24
UCP Protocol changes
direction of interfaces
to match new topology
10.1
10.2
EPSR_UCP_Interop
600
1200
= Links
10.0
600
11.2
UP
UCP and EPSR - Fault Recovery
4.7.5 Configuring UCP with ESPR
Table 4-25 shows the steps involved in configuring the PRIMARYUPSTREAM node for Figure 4-23.
TABLE 4-25
Step
Configuration Procedure for UCP/EPSR/RSTP
Command
Description/Notes
Create the Control VLAN and add it to the appropriate interfaces
1
CREATE VLAN vid=1200 FORWARDINGMODE=STANDARD
ADD VLAN 1200 INTERFACE 10.1,11.2
FRAME=TAGGED
Software Reference for SwitchBlade x3100 Series Switches
The default for FORWARDINGMODE is
STANDARD, but this is shown here to contrast
this with the Data VLAN
476
Layer Two Switching
TABLE 4-25
Step
Configuration Procedure for UCP/EPSR/RSTP
Command
Description/Notes
Create the Data VLAN as a UFO VLAN and give it the attributes to use UCP and PRIMARYUPSTREAM
2
CREATE VLAN vid=600 FORWARDINGMODE=UPSTREAMONLY
ADD VLAN 600 INTERFACE 10.0,10.1,11.2 FRAME=TAGGED
SET VLAN 600 INTERFACE 10.1,11.2 FORWARDING=UCP
SET VLAN 600 INTERFACE 10.0 FORWARDING=PRIMARYUPSTREAM
Set the GE interfaces as having a direction of NETWORK
3
SET INTERFACE=10.0,10.1,11.2 GE DIRECTION=NETWORK
Configure the node for EPSR.
4
CREATE EPSR=ALLIED TRANSIT
ADD EPSR ALLIED VLAN=1200 TYPE=CONTROL
ADD EPSR ALLIED VLAN=600 TYPE=DATA
Configure the node for RSTP. The path cost for the primary node should be lower than the secondary node.
5
SET STP PROTOCOL=RSTP FORCE
SET STP INSTANCE=MAIN INTERFACE=10.0 PATHCOST=40000
SET STP INSTANCE=MAIN INTERFACE=10.1,11.2 PATHCOST=10
Enable STP
6
ENABLE STP
Using the SET command, you can turn on the Enhanced Recovery feature.
7
SET EPSR allied ENHANCEDRECOVERY=ON
Software Reference for SwitchBlade x3100 Series Switches
477
Layer Two Switching
4.7.6 Summary of Topology Configurations for UCP
The following table lists the various network configurations where Upstream forwarding can be applied with or without UCP
and the configuration rules that apply.
TABLE 4-26
Configurations with and without UCP and Associated Rules
Configuration
Rules
STP, without UCP
STP Root is the Upstream Node, with VLAN-port FORWARDING as
- PRIMARYUPSTREAM - Example when forwarding to a Router
- DOWNSTREAM - For vlan-ports attached to other STP bridges
Non-root STP nodes configure each VLAN-port
- FORWARDING value as STP: For ports running STP and not Edge Ports
- DOWNSTREAM: For remaining ports this VLAN
STP, with UCP
Root Bridge can be located anywhere in the topology
Primary Upstream port can be on any node in the topology, independent of the
Root Bridge.
Secondary Upstream port can be on any node in the topology, independent of
the Root Bridge.
EPSR, without UCP
EPSR Master Node is the Upstream Node
Configure the EPSR Master node with VLAN/port FORWARDING as
- Control VLAN is set to STANDARD VLAN
- Protected VLANs are UFO, and FORWARDING value is:
- PRIMARYUPSTREAM for non PP/SP ports
- DOWNSTREAM for PP/SP ports
EPSR Transit Node
Configure the EPSR Transit node with VLAN/port FORWARDING as
- Control VLAN is set to STANDARD VLAN
- Protected VLANs are UFO, and FORWARDING value is:
- EPSR for EPSR ring ports
- DOWNSTREAM for other ports
EPSR, with UCP
EPSR Master Node is any node in the ring
Primary Upstream port can be on any node in the ring, independent of the Master Node
Secondary Upstream port can be on any node in the ring, independent of the
Master Node
EPSR and RSTP, with UCP
Topology must be loop-free as described in EPSR and RSTP sections
Primary Upstream port can be located anywhere.
Secondary Upstream port can be located anywhere.
4.7.7 UCP Commands
To configure a UFO VLAN on an interface, the previously described ADD VLAN INTERFACE and SET VLAN INTERFACE commands are used, which include UCP as a FOWARDING parameter value.
Software Reference for SwitchBlade x3100 Series Switches
478
Layer Two Switching
Software Reference for SwitchBlade x3100 Series Switches
479
Layer Two Switching
4.8 HVLAN (Port Based and VLAN Based)
4.8.1 Port Based HVLAN
A VLAN allows broadcast traffic to flood only ports that are members of that VLAN. Moreover, ports can be tagged or
untagged, with a tagged Ethernet frame including the VID field that uniquely identifies the VLAN of the frame. The number of
VLANs that can be configured across the network operator network is restricted to the 12-bit VID field (1 to 4094).
To help overcome the VLAN addressing limitation, an additional or outer tag can be added on top of the 802.1q tagged. The
use of the additional tag creates a hierarchical VLAN (HVLAN).
At the port, incoming customer frames are wrapped with an outer tag that is used to switch the traffic across the network.
At the port for the outgoing traffic, the outer tag is removed and the frame is delivered to the customer’s VLAN.
By using this outer tag, Allied Telesis system users can expand service to customers in the following ways:
• Two VLAN tags are used to identify the customer VLAN, in theory expanding the number range of customer VLAN tags
to 4094 * 4094.
• Since the inner tag is used by each customer, the VLAN ID for different customers may be the same (overlap). Thus, the
customer VLAN ID is preserved and unchanged as it crosses the network.
By using this outer tag, network operators can tunnel the VLANs of each customer into a single VLAN (the VLAN ID of the
outer tag) and send them across the network, allowing businesses to interconnect devices from multiple locations in a network operator area.
To understand the HVLAN feature, the 802.1q tagged ethernet frame and the fields it contains must be fully understood.
These are listed in Table 4-27.
TABLE 4-27
VLAN Tag Fields
Field Name
Length
Description
Tag Protocol Identifier
(TPID)
2 octets
The TPID is used to identify the frame as a tagged frame.The value
of the TPID for an 802.1q ethernet tagged frame is 0x8100
User Priority
3 bits
The User Priority field can represent up to eight priority levels. (This
field is explained in greater detail when discussing traffic management, in Priority Queuing (Layer 2).
Canonical Format Indicator
(CFI)
1 bit
The CFI is a flag to indicate whether all MAC address information
that may be present in the MAC data carried by the frame is in
canonical format.
VLAN ID (VID)
12 bits
The VID identifies which VLAN the frame belongs to, with a range
of 1 to 4094.It consists of the Tag Protocol Identifier (TPID) and
the Tag Control Information (TCI).
The TPID, which is used to identify the frame as a tagged frame in 802.1q, has a value of 0x8100. The TPID value for the
HVLAN (the outer tag), is configurable, and should be set depending on the interconnecting vendor’s recommendation.
Note:
To obtain the TPID value that each vendor supports, consult the interconnecting vendor’s documentation.
4.8.2 Port Based HVLAN Configuration
Figure 4-25 shows a configuration where both 802.1q and HVLANs are created. The 802.1q VLAN (10), is used for multicasting for video. The HVLAN is provisioned for a business customer who has their own private network and wishes to connect this network to devices on SBx3112 systems. The port-based HVLANs are configured on System A (interfaces 2.0 and
2.1) and on System E (interface 3.0).
Software Reference for SwitchBlade x3100 Series Switches
480
Layer Two Switching
Video
Head
Upstream Network
6
= Physical Link
= 802.1q VLAN (10)
= HVLAN (H_100)
0.0
5
H_100
0.0
H_100
0.2
0.1
H_100
D
E
3.0
60
1
10
30
20
40
4
to Business
Network
10
0.2
0.1
= Business VLANs
40
60
H_100
A
E
= Devices
1
6
= Links
60
B
H_100
(Note 2)
C
0.1
0.2
2
3
= STP blocks
physical link
0.1
0.2
60
A
H_100
H_100
H_100
2.0
2.1
Note 2 - Business VLANs can be configured on
Devices B/C/D
2.2
10
FIGURE 4-25
20
40
30
30
HVLAN Configuration (Port Based)
4.8.3 Configuring Port Based HVLAN
4.8.3.1 Default Configuration
The default configuration for HVLANs is that there are no HVLANs configured, with TAGALL set to OFF and all TPID values
set to 0x8100.
Software Reference for SwitchBlade x3100 Series Switches
481
Layer Two Switching
4.8.3.2 Configuration Guidelines
The following rules are for setting the TAGALL and TPID values for a port-based HVLAN configuration:
• When adding a Network Interface to an HVLAN, the user should include FRAME=TAGGED
• When adding a Customer Interface to an HVLAN, the user should include FRAME=UNTAGGED
Note:
Untagged is the default.
• On Customer interfaces, the port-based HVLAN tunnel is not operational until the interface is set to tagall=on
• DHCP Relay/Snooping and IGMP Snooping must be disabled for the Customer Interface prior to setting the interface to
tagall=on. Examples of the IGMP and DHCP commands are:
• Disable igmp interface=5.2
• Disable dhcp all interface=5.2
• An interface with a TPID value set can be a member of more than one HVLAN.
• An HVLAN can consist of one or more interfaces with TPIDs set at different values.
• When an interface is removed from an HVLAN, it will become a member of the an 802.1q default VLAN, and the TPID
value should be set back to the default 0x8100 value.
Software Reference for SwitchBlade x3100 Series Switches
482
Layer Two Switching
4.8.3.3 Configuration Procedure
TABLE 4-28
Step
Configuration Procedure for Port Based HVLAN
Command
Description
Create the port-based HVLAN
1
CREATE HVLAN=H_100 VID=100 TYPE=PORTTUNNEL
Creates a port-based VLAN tunnel.
Set the Network interfaces to a TPID value
2
SET INTERFACE=0.1,0.2 TPID=0x9100
Set this only when sure that the Network interface is expecting this value.
Note: This step is only needed when connecting
to a non-Allied Telesis device.
Associate HVLAN with Network interfaces.
3
ADD HVLAN=H_100 INTERFACE=0.1,0.2
FRAME=TAGGED
Adds a tagged HVLAN to Network interfaces.
Associate HVLAN with line card ports.
4
ADD HVLAN=H_100 INTERFACE=2.0,2.1
FRAME=UNTAGGED
Adds an untagged HVLAN to Customer interfaces.
Disable IGMP and DHCP on the customer interfaces
5
DISABLE IGMP INTERFACE=2.0,2.1
DISABLE DHCP ALL INTERFACE=2.0,2.1
On Customer interfaces, ensure IGMP and DHCP
are correctly configured.
Set line card interface to TAGALL=ON
6
SET INTERFACE=2.0,2.1 TAGALL=ON
Observe the configuration
7
SHOW HVLAN FULL
--- HVLAN Information --------------------------Type..................................
Name..................................
Identifier............................
Status................................
Forwarding Mode.......................
IP module attached....................
Untagged interfaces...................
Tagged interfaces.....................
Tunneled VLANs........................
TABLE 4-29
Step
HVLAN - port tunnel
H_100
100
static
Standard
ETH:[2.0,2.1]
ETH:[0.1,0.2]
n/a
Configuration to Deprovision a Port Based HVLAN
Command
Description
Set the TAGALL parameter to OFF.
1
SET INTERFACE=2.0,2.1 TAGALL=OFF
Software Reference for SwitchBlade x3100 Series Switches
You must set TAGALL=OFF for the customer
interfaces before you can delete the interface
from the HVLAN.
483
Layer Two Switching
TABLE 4-29
Step
Configuration to Deprovision a Port Based HVLAN
Command
Description
Delete ALL the interfaces from the HVLANs
2
DELETE HVLAN=H_100
INTERFACE=0.1,0.2,2.0,2.1
Destroy the HVLANs
3
DESTROY HVLAN=H_100
Set the TPID values back to 0x8100
4
SET INTERFACE=0.1,0.2 TPID=0x8100
Enable IGMP and DHCP on the Customer interfaces (optional)
5
ENABLE IGMP INTERFACE=2.0,2.1
ENABLE DHCP ALL INTERFACE=2.0,2.1
Software Reference for SwitchBlade x3100 Series Switches
484
Layer Two Switching
4.8.4 VLAN Based HVLAN
This feature allows a customer VLAN that is configured on several interfaces to have an outer tag applied. The outer VLAN
can be configured so that it goes to a specific ISP, such as one that provides data or voice.
Note:
VLANs that are configured for multicast traffic, such as those for video service, are not part of this feature.
With the port-based HVLAN, once a customer interface is assigned to an HVLAN all ingress frames are internally tagged
with the HVLAN. In contrast, the VLAN-based HVLAN feature assigns an outer tag to a single-tagged egress frame (exiting the shelf).
4.8.4.1 VLAN-based HVLAN Configuration
Refer to Figure 4-26, which shows an example configuration with the following VLANs:
Note:
The outer tags that are applied to VLAN-based HVLANs are referred to as Service VLANs, or SVLANS.
• VLAN 10 is a multicast VLAN that is routed to a Video Head end.
• VLAN 20 is a VLAN for data service and connects to an ISP that handles data service.
• VLAN 30 is a VLAN for voice service and connects to an ISP that handles voice service.
VLAN 20 traffic is given an outer tag of SVLAN 200 and then passed through the systems to the ISP. Note that other customers on different customer interfaces (and different systems) can also be a member of VLAN 20 with an outer tag of
SVLAN200, and routed to the ISP. The same is true for VLAN 30.
Software Reference for SwitchBlade x3100 Series Switches
485
Layer Two Switching
Video
Head
Upstream Network
= Physical Link
= 802.1q VLAN (10)
= SVLAN (S_200)
5
Voice ISP
= SVLAN (S_300)
Data ISP
0.0
= 802.1q VLAN (20)
20
DATA
30
VOICE = 802.1q VLAN (30)
S_300
0.2
0.1
S_200
D
10
(Note 1)
1
(Note 2)
0.2
10
S_200
A
E
= Devices
1
5
= Links
0.1
(Note 1)
S_300
4
(Note 1)
(Note 2)
10
(Note 2)
B
Note 1 = Can provision Customer
VLAN 20 to S_200 and
VLAN 30 to S_300
0.1
S-200
S_300
C
0.2
Note 2 = Cannot provision Customer
VLAN 200 or 300 (overlap)
2
3
= Blocked by Topology
0.0
S_300
0.1
S_200
S_300
S_200
(Note 2)
30
10
20
2.2
20
FIGURE 4-26
10
A
2.3
30
20
10
30
VLAN-Based HVLAN Configuration
4.8.4.2 HVLAN Support for the SBx3112 Interfaces
The SBx3112 can support HVLAN on cards that can support network interfaces.
The SBx3112 does not allow Tagged-only frame acceptance on an interface that is a member of a customer VLAN (CVLAN)/
tunneled VLAN. This means that if an interface is an untagged member of a VLAN from which the interface is being deleted
and the interface is a member (tagged and untagged) of customer VLAN (CVLAN), the interface delete is not allowed and an
error message is generated.
For example, this shows the rejection of an attempt to delete the default untagged vlan on an interface that has been associated with a CVLAN:
officer SEC>> CREATE HVLAN VID 300 TYPE VLANTUNNEL
Software Reference for SwitchBlade x3100 Series Switches
486
Layer Two Switching
Info (040590): Successfully created HVLAN(s) 300
officer SEC>> CREATE VLAN VID 20
Info (040590): Successfully created VLAN(s) 20
officer SEC>> ADD HVLAN 300 INT 0.0 FR TAGGED
Processing.....
Info (040604): Successfully added HVLAN(s) 300 on interface(s) ETH:[0.0]
officer SEC>> ADD VLAN 20 INT 1.0 FRAME TAGGED
Processing.....
Info (040604): Successfully added VLAN(s) 20 on interface(s) ETH:[1.0]
officer SEC>> ADD VLANTUNNELMAP VLAN 20 HVLAN 300
Info (040556): 1 VLANs were added to the tunnel for HVLAN 300
officer SEC>> DEL VLAN 1 INT 1.0
Processing.....
Error (040617): Interface(s) ETH:[1.0] can not deleted from VLAN(s) 1
Because interface(s) acceptable frame type would become
VLAN-tagged only.
officer SEC>>
4.8.5 Configuring VLAN Based HVLAN
4.8.5.1 Default Configuration
When the SBx3112 is initially booted up (or from a “Purge database”), all interfaces will be configured to be the default
VLAN (VID 1), and no HVLAN is created by default.
4.8.5.2 Configuration Guidelines
• When adding a Network Interface to an HVLAN, it should be provisioned with FRAME=TAGGED (example “add hvlan
•
•
•
•
•
•
Btunnel interface=10.0 frame=tagged”)
The Customer Interfaces that are participating in the VLAN-based HVLAN tunnel should not be a member of the
HVLAN; only the Network direction interfaces are a member of the HVLAN.
You cannot have a CVLAN that is a member of its associated HVLAN on the same card. If you try to do so you will
receive the message ‘HVLAN and VLAN member interfaces can not coexist on card <card_number>’.
The Network Interfaces that are tunneling Customer VLANs via the VLAN-based HVLAN tunnel should not be a member of the Customer VLANs (the system will configure the Customer VLANs on the Network Interfaces).
Customer Interfaces that are participating in the VLAN-based HVLAN tunnel can be a member of many VLANs, tagged
or untagged (only one untagged VLAN).
Any single VLAN can map to only one VLAN-based HVLAN tunnel. The HVLAN tunnel is defined by the creation of the
HVLAN and the interfaces that are a member of the HVLAN. When a VLAN is associated with a tunnel, it will be associated with the tunnel on all of the interfaces that are a member of the tunnel (HVLAN).
To change the VID of an existing HVLAN, the HVLAN must be removed with the DESTROY HVLAN command and created again.
Do not use the “tagall=on” setting; this is only used for port-based HVLAN tunneling.
•
• IGMP packets are not tunneled; and therefore, if multicast is to be supported, then the Customer Interface should be
enabled for IGMP Snooping.
• DHCP packets can either be tunneled or Relayed/Snooped by the local Network Access product. If tunneling of DHCP
packets is desired, then DHCP Relay/Snooping can be disabled on the Customer Interface for the VLANs that are to be
tunneled, or DHCP Snooping could be used. If the desire is to have the Network Access product handle the DHCP pack-
Software Reference for SwitchBlade x3100 Series Switches
487
Layer Two Switching
ets outside of the tunnel, then DHCP Relay (not DHCP Snooping) can be configured on the Customer Interface for the
VLANs.
4.8.5.3 Feature Interactions (Port-based and VLAN-based HVLANs)
• An HVLAN can be either Port-based or VLAN-based, but not both.
• An HVLAN cannot be changed to/from Port-based from/to VLAN-based; the HVLAN must be destroyed and recreated
to be changed.
4.8.6 Configuration Procedure
The following procedure creates the VLAN-based HVLANs shown in Figure 4-26.
TABLE 4-30
Step
Configuration Procedure for VLAN Based HVLAN
Command
Description
Create HVLAN
1
CREATE HVLAN=S_200 VID=200 TYPE=VLANTUNNEL
CREATE HVLAN=S_300 VID=300 TYPE=VLANTUNNEL
Creates a VLAN-based HVLAN.
Create the standard 802.1q standard VLANs
2
CREATE VLAN=VIDEO VID=10
CREATE VLAN=DATA VID=20
CREATE VLAN=VOICE VID=30
Creates standard VLANs.
Associate the S_200 and S_300 to ports 0.0/0.1
3
ADD HVLAN=S_200 INTERFACE=0.0,0.1
FRAME=TAGGED
ADD HVLAN=S_300 INTERFACE=0.0,0.1
FRAME=TAGGED
Adds HVLANs to Network interfaces.
Associate the standard VLAN with the ports 2.2./2.3
4
ADD VLAN=VIDEO INTERFACE=2.2,2.3
Adds standard VLAN (VIDEO) to Customer
interfaces.
Set the NM ports 0.0 and 0.1 to a TPID value (optional)
5
SET INTERFACE=0.1,0.2 TPID=0x9100
Note: This step is needed only when connecting
to a non-Allied Telesis device.
Associate the DATA and VOICE VLANs to the VLAN-based HVLAN tunnels.
6
ADD VLANTUNNELMAP VLAN=DATA
HVLAN=S_200
ADD VLANTUNNELMAP VLAN=VOICE
HVLAN=S_300
Adds standard VLANs (DATA, VOICE) to HVLAN
tunnels.
Destroy the HVLANs
7
DELETE VLANTUNNELMAP DATA S_200
DELETE VLANTUNNELMAP VOICE S_300
Disassociates the DATA and VOICE VLANs from
the VLAN-based HVLAN tunnels.
DELETE HVLAN=S_200 INTERFACE=0.0,0.1
DELETE HVLAN=S_300 INTERFACE=0.0,0.1
Removes the Network interfaces 0.0 and 0.1 from
HVLANs S_200 and S_300.
DESTROY HVLAN=S_200,S_300
Destroys HVLANs S_200 and S_300.
Software Reference for SwitchBlade x3100 Series Switches
488
Layer Two Switching
Software Reference for SwitchBlade x3100 Series Switches
489
Layer Two Switching
4.8.7 HVLAN Commands
Table 4-31 lists the CLI commands for the HVLAN feature.
TABLE 4-31
HVLAN Commands
Commands
ADD HVLAN INTERFACE
ADD VLANTUNNELMAP VLAN HVLAN
CREATE HVLAN VID
DELETE HVLAN INTERFACE
DELETE VLANTUNNELMAP VLAN HVLAN
DESTROY HVLAN
SET HVLAN INTERFACE
SHOW HVLAN
SHOW VLANTUNNELMAP
Software Reference for SwitchBlade x3100 Series Switches
490
Layer Two Switching
ADD HVLAN INTERFACE
Syntax
ADD HVLAN={ hvlanname-list | vid-range } INTERFACE={ type:id-range | id-range
| ifname-list | ALL } [ FRAME={ UNTAGGED | TAGGED } ]
Description
Adds interfaces to the specified layer-2 virtual network. When adding interfaces to an HVLAN, some
restrictions must be considered. Refer to 4.8.3.2 and 4.8.5.2.
Mode
Manager
Options
Option
Description
Range
Default
Value
HVLAN
The list of provisioned HVLAN names, separated by a
comma, or the range of VLAN IDs.
NA
NA
INTERFACE
The interfaces that are to be added to the HVLAN.
NA
NA
FRAME
TAGGED - the frames are transmitted with a VLAN tag.
UNTAGGED - the frame is transmitted without a VLAN
tag.
NA
UNTAGGED
Release Note
NA
Example
ADD HVLAN=S_300 INTERFACE=0.0,0.1 FRAME=TAGGED
Software Reference for SwitchBlade x3100 Series Switches
491
Layer Two Switching
ADD VLANTUNNELMAP VLAN HVLAN
Syntax
ADD VLANTUNNELMAP VLAN={ vlanname-list | vid-range }
HVLAN={ hvlanname | vid }
Description
Makes the association of the VLAN to a VLAN-based HVLAN tunnel. The tunnel is defined by the
HVLAN and its interface membership.
Mode
Manager
Options
Option
Description
Range
Default
Value
VLAN
The list of provisioned VLAN names, separated by a
comma, or the range of provisioned VLAN IDs that are
to be mapped to the HVLAN tunnel
NA
NA
HVLAN
The HVLAN name or id that represents the tunnel.
NA
NA
Release Note
NA
Example
ADD VLANTUNNELMAP VLAN=VOICE HVLAN=S_300
Software Reference for SwitchBlade x3100 Series Switches
492
Layer Two Switching
CREATE HVLAN VID
Syntax
CREATE HVLAN=[ hvlanname ] VID={ 2..4094 | vid-range } [ TYPE={ PORTTUNNEL |
VLANTUNNEL } ]
Description
Creates a Hierarchical Virtual LAN (HVLAN) entry with a unique name and identifier (VID). Once created, the HVLAN’s VID cannot be changed. The HVLAN must first be removed with the DESTROY
HVLAN command and then created again. When an HVLAN entry is created, it is assigned to the
default STP. A maximum of 4093 HVLANS/VLANS can be created with any VID in the range 2 to 4094.
Mode
Manager
Options
Option
Description
Range
Default
Value
HVLAN
The name for this HVLAN.
NA
vlan{VID},
e.g., vlan3000
VID
The VLAN id or range of vids. A maximum of 4093
NA
NA
NA
PORTTUNNEL
HVLANs can be created with any VID in the range
2 to 4094.
TYPE
PORTTUNNEL - Port-based HVLAN
VLANTUNNEL - VLAN-based HVLAN
Release Note
NA
Example
CREATE HVLAN=S_300 VID=300 TYPE=VLANTUNNEL
Software Reference for SwitchBlade x3100 Series Switches
493
Layer Two Switching
DELETE HVLAN INTERFACE
Syntax
DELETE HVLAN={ hvlanname-list | vid-range } INTERFACE={ type:id-range | idrange | ifname-list | ALL }
Description
Removes the interface association from the specified Hierarchical VLAN (HVLAN).
Mode
Manager
Options
Option
Description
Range
Default
Value
HVLAN
The list of provisioned HVLAN names, separated by a
comma, or the range of HVLAN IDs.
NA
NA
INTERFACE
The interface where the HVLAN association is being
deleted.
NA
NA
Release Note
NA
Example
DELETE HVLAN=S_300 INTERFACE=0.0,0.1
Software Reference for SwitchBlade x3100 Series Switches
494
Layer Two Switching
DELETE VLANTUNNELMAP VLAN HVLAN
Syntax
DELETE VLANTUNNELMAP VLAN={ vlanname-list | vid-range | ALL } HVLAN={ hvlanname | vid }]
Description
Disassociates a VLAN from a VLAN-based HVLAN tunnel.
Mode
Manager
Options
Option
Description
Range
Default
Value
VLAN
The list of provisioned VLAN names, separated by a
comma, or the range of VLAN IDs.
NA
NA
NA
NA
ALL - All VLANs associated with this HVLAN
HVLAN
The name or ID of the VLAN-based HVLAN tunnel
Release Note
NA
Example
DELETE VLANTUNNELMAP VLAN=VOICE HVLAN=S_300
Software Reference for SwitchBlade x3100 Series Switches
495
Layer Two Switching
DESTROY HVLAN
Syntax
DESTROY HVLAN={ hvlanname-list | vid-range | ALL }
Description
Destroys the specified Hierarchical VLAN (HVLAN) or all HVLANs. An HVLAN cannot be destroyed
if interfaces are associated with it.
Mode
Manager
Options
Option
Description
Range
Default
Value
HVLAN
The list of provisioned HVLAN names, separated by a
comma, or the range of HVLAN IDs.
NA
NA
ALL - all HVLANs are destroyed.
Release Note
NA
Example
DESTROY HVLAN=S_200,S_300
Software Reference for SwitchBlade x3100 Series Switches
496
Layer Two Switching
SET HVLAN INTERFACE
Syntax
SET HVLAN={ hvlanname | vid } INTERFACE={ type:id-range | id-range | ifnamelist | ALL } [ FRAME={ UNTAGGED | TAGGED } ]
Description
Toggles the status of interfaces in a Hierarchical VLAN (HVLAN) between tagged and untagged.
Mode
Manager
Options
Option
Description
Range
Default
Value
HVLAN
The provisioned HVLAN name, or the HVLAN ID.
NA
NA
INTERFACE
The interface where the HVLAN FRAME setting is being
changed.
NA
NA
FRAME
TAGGED - the frames are transmitted with a VLAN tag.
UNTAGGED - the frame is transmitted without a VLAN
tag.
NA
UNTAGGED
Release Note
NA
Example
SET HVLAN=S_200 INTERFACE=0.23 FRAME=TAGGED
Software Reference for SwitchBlade x3100 Series Switches
497
Layer Two Switching
SHOW HVLAN
Syntax
SHOW HVLAN [ ={ hvlanname-list | vid-range | ALL } ] [ FULL ]
Description
Displays information about the specified Hierarchical VLAN (HVLAN).
Mode
Manager
Options
Option
Description
Range
Default Value
HVLAN
The list of provisioned HVLAN names, separated by a
comma, or the range of HVLAN IDs.
NA
ALL
NA
Summary information for all
HVLANs is displayed
If no HVLAN name or identifier is specified, then ALL is
assumed.
ALL - A summary of all HVLANs is presented.
FULL
Release Note
NA
Example
SHOW HVLAN
Displays detailed information for each HVLAN.
--- HVLAN Information --------------------------------------------------------Name
Tunnel Forwarding Tagged Interfaces
Type
Mode
--------------- ---- ------ ---------- -----------------vlan4000
VID
4000 PORT
Standard
ETH:[3,8-9.2]
Untagged Interfaces
----------------<none>
-------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
498
Layer Two Switching
SHOW VLANTUNNELMAP
Syntax
SHOW VLANTUNNELMAP [ VLAN={ vlanname-list | vid-range | ALL } ] [ HVLAN={
hvlanname-list | vid-range | ALL } ]
Description
Shows the VLAN to HVLAN associations for VLAN based HVLANs.
Mode
Manager
Options
Option
Description
Range
Default
Value
VLAN
The list of provisioned VLAN names, separated by a
comma, or the range of VLAN IDs.
NA
ALL
NA
ALL
ALL - All VLANs that are associated with HVLANs
HVLAN
The list of provisioned HVLAN names, separated by a
comma, or the range of HVLAN IDs.
ALL - All HVLANs that have association with VLANs.
Release Note
NA
Example
SHOW VLANTUNNELMAP
--- Vlan Tunnel Map Configuration --HVLAN
Tunneled VLANs
---------- -------------------------------------------------------------300
21-30
Software Reference for SwitchBlade x3100 Series Switches
499
Layer Two Switching
4.9 VLAN Translation
4.9.1 Introduction
When customer networks are connected through network operator networks, customers may want to keep their existing
VLAN assignments. It is not uncommon for the VLAN IDs to be same for different customers (overlap). To allow this overlap, a network operator needs to be able to change (translate) a customer VID into a unique VLAN ID for transport across
the network.
To do this, an 802.1q tagged VLAN can be configured with this translations option. The general flow of commands to perform this translation are:
• Create a VLAN (CREATE VLAN=VLAN100 VID=100)
• Add an interface to the VLAN as a tagged port (ADD VLAN=VLAN100 INTERFACE=1.0 FRAME=TAGGED)
• Turn the translation option on for the port for a customer VLAN ID (SET VLAN=VLAN100 INTERFACE=1.0 TRANSLATE=10)
This will result in the following:
• When a tagged frame with a VLAN ID of 10 enters the interface 1.0, the VLAN ID will be translated to VLAN ID 100.
• When the tagged frame with VLAN ID 100 leaves the interface 1.0, the VLAN ID will be translated (back) to VLAN ID
10.
This is shown in more detail in the configuration example in 4.9.5.
4.9.2 Example Configuration
Figure 4-27 shows a set of SBx3112s that are configured for two customers, A and B, where each in their network has a
VLAN 10 configured. Moreover, there is also a VLAN 10 configured against other interfaces.
Software Reference for SwitchBlade x3100 Series Switches
500
Layer Two Switching
Upstream Network
6
= Physical Link
= translate 10 - 100
Customer A)
0.0
5
E
= translate 10 - 200
(Custormer B)
100
200
10
100
200
10
3.0
3.1
3.2
0.0
= VLAN (10)
0.2
0.1
100
D
10
10
(Note 1)
1
200
0.2
Customer
B
0.1
(Note 1)
10
100
10
Customer
A
4
A
E
= Devices
1
6
= Links
10
200
B
100
200
C
0.1
(Note 1)
0.2
0.2
200
2
3
0.1
0.2
10
A
100
Note 1 - Can provision similar translations
for systems B, C, and D if providing same services
for Customer A and B
100
200
10
2.0
2.1
2.2
10
10
Customer
A
FIGURE 4-27
= STP blocks
physical link
Note 2 - Can provision VLAN 10 against other interfaces,
but not against interfaces that are set up to translate
packet with VLAN 10
(Note 2)
Customer
B
Translations Example Configuration
Software Reference for SwitchBlade x3100 Series Switches
501
Layer Two Switching
4.9.3 TPID Translations (Extreme VLAN Support)
This feature is required in order to support Extreme HVLANs.
The XE4 supports TPID configuration for each port. Thus XE4 ports configured for TPID=x9100 for example will send out
single or double tagged packets with x9100 in the outermost tag. On ingress, packets whose single or double tag is x9100 are
considered to indeed be a tag and the TPID will be translated to x8100.
The TPID translation feature is available on the GE8 SM and the XE1 NM.
On the GE and XE cards, tagged packets are identified by the FPGA based on the TPID that the interface has been configured
with. Tagged packets that arrive with a TPID other than the configured TPID will be considered to be untagged packets by the
FPGA.
The interactions of TPID translation and other features are as follows:
• VLAN translation and TPID translation can be configured on the same interface, so that a VLAN translation AND a TPID
translation can occur on the same packet.
• VLANTUNNEL HVLAN(s) and TPID translation can be configured on the same interface. When a tunnel tag is being
added on egress, the TPID translation will occur on the outer tag only. The TPID of the inner tag will remain unchanged.
4.9.4 HVLAN and Translation Feature Interactions
With the HVLAN and translation options, VLAN configurations interact with each other and other features as follows:
• The HVLAN (both port- and VLAN-based) and translation feature are not compatible on the same port. Once a port is
•
•
•
•
configured with the HVLAN option, it cannot use the translation feature, and vice-versa. This is enforced by the CLI.
For traffic management, classifiers are used to filter traffic according to certain criteria, and this may be affected with the
double tagging of frames.
Link Aggregation (LAG) can still be enabled for a port that has an HVLAN as long as all member ports of the LAG group
belong to the same VLANs, both tagged and untagged.
IGMP Snooping and Port-based HVLAN are mutually exclusive features. If IGMP snooping is enabled system
wide and a port has IGMP snooping enabled, that port cannot participate in the HVLAN; if a port is part of an HVLAN,
IGMP snooping cannot be enabled on that port.
Spanning Tree Protocol can be enabled on an HVLAN port, as long as the following applies:
When customer traffic at multiple sites is tunneled over the network operator network, every customer VLAN will need
to build a spanning tree that includes the multiple sites across the VLAN. To enable this, the Bridge Protocol Data Unit
(BPDU) will need to be tunnelled across the network. (Note that the Network Access product does not support tunneling BPDUs.)
Note:
The VLAN-based HVLAN and Translation features can be supported on one system, but in most network
engineering solutions, either one or the other is used.
Note:
As shown below, translated and non-translated VLANs on the same port are not supported in order to avoid the
mixing of a non-translated VLAN traffic onto translated VLAN traffic (which is undesirable); non-translated VLANs
are therefore dropped. Users should be careful in their network design to ensure this.
The following table shows the support for HVLAN and VLAN Translations for each SBx3112 card:
Software Reference for SwitchBlade x3100 Series Switches
502
Layer Two Switching
TABLE 4-32
HVLAN and VLAN Translation Support for the SBx3112
Feature
GE24POEa
GE24SFP
GE40CSFP
XE4
XE6SFP
Extreme HVLANsb
Y
Y
Y
Y
Y
Can act as an HVLAN network port (Can be tagged
HVLAN member)
Y
Y
Y
Y
Y
Can act as an HVLAN customer port (Can be untagged
HVLAN member)
Y
Y
Y
Y
Y
Can support both tagged and untagged HVLANs (Can
co-exist)
Y
Y
Y
Y
Y
VLANTUNNEL HVLANS
Y
Y
Y
Y
Y
VLAN Translation supportc
Y
Y
Y
Y
Y
VLAN Translation Limit per Port
8
8
8
128
128
a. Also includes the GE24RJ
b. Requires hardware support for replacing packet TPID on egress
c. Null translations are done automatically.
4.9.5 Configuring VLAN Translation
This section describes configuration information, procedures, and commands for the VLAN Translation.
4.9.5.1 Default Configuration
When an SBx3112 switch is initially booted up, VLAN Translation will be configured as follows:
• There is no VLAN translation on any interface.
4.9.5.2 Configuration Guidelines
To configure the VLAN translation option, the following rules apply:
• Refer to Table 4-32 for cards support which translation functions
• There is a one-to-one mapping between the customer VLAN ID and the VLAN ID used for crossing the network operator network. (Each customer VLAN ID can be translated into only one VLAN ID, and vice versa.)
• The customer VLANs to be translated must be tagged.
Software Reference for SwitchBlade x3100 Series Switches
503
Layer Two Switching
4.9.5.3 Configuration Procedure
The following procedure shows the commands used to provision and deprovision VLAN translations based on Figure 4-27.
TABLE 4-33
Step
Configuration procedure for VLAN Translation
Command
Description
Configure System A
1
CREATE VLAN=VLAN100 VID=100
CREATE VLAN=VLAN200 VID=200
Add interfaces to the VLANs
2
ADD VLAN=100 INTERFACE=0.1,0.2,2.0
FRAME=TAGGED
3
ADD VLAN=200 INTERFACE=0.1,0.2,2.1
FRAME=TAGGED
Set the translation option on interface 2.0
4
SET VLAN=100 INTERFACE=2.0 TRANSLATE=10
Translate the Customer A VLAN ID 10 to
100
Set the translation option on interface 2.1
5
SET VLAN=200 INTERFACE=2.1 TRANSLATE=10
Translate the Customer B VLAN ID 10 to 200.
Configure System E
Create the VLANs
6
CREATE VLAN=VLAN100 VID=100
CREATE VLAN=VLAN200 VID=200
Add interfaces to the VLANs
7
ADD VLAN=100 INTERFACE=0.0,3.0
FRAME=TAGGED
8
ADD VLAN=200 INTERFACE=0.0,3.1
FRAME=TAGGED
Set the translation option on interface 3.0
9
SET VLAN=100 INTERFACE=3.0 TRANSLATE=10
Translate the Customer A VLAN ID 10 to 100
Set the translation option on interface 3.1
10
Note:
SET VLAN=200 INTERFACE=3.1 TRANSLATE=10
Systems B, C, and D could also be provisioned for the translation configuration as long as the translated VLANs
(100 and 200) applied to customer A and B. Also, VLAN 10 could not be associated with the SM interfaces that use
translation.
TABLE 4-34
Step
Translate the Customer B VLAN ID 10 to 200.
Procedure to Deprovision VLAN Translation
Command
Description
On System A, set the translation option on SM port 2.0 to NONE
1
SET VLAN=100 INTERFACE=2.0
TRANSLATE=NONE
Software Reference for SwitchBlade x3100 Series Switches
504
Layer Two Switching
TABLE 4-34
Step
Procedure to Deprovision VLAN Translation
Command
Description
Set the translation option on SM port 2.1 to NONE
2
SET VLAN=200 INTERFACE=2.1
TRANSLATE=NONE
Destroy the associations between the translated VLANs and their interfaces
3
Set the translation option on interface 2.1
4
SET VLAN=200 INTERFACE=2.1 TRANSLATE=10
Translate the Customer B VLAN ID 10 to 200.
Destroy the two VLANs
5
4.9.6 VLAN Translation Commands
The command that includes the VLAN translation feature is described in ADD VLAN INTERFACE and SET VLAN INTERFACE.
Software Reference for SwitchBlade x3100 Series Switches
505
5. IGMP and MLD Snooping
5.1 Introduction
The Internet Group Management Protocol (IGMP) and Mulitcast Listener Delivery protocol (MLD) features allow the
SBx3100, positioned as a Layer 2 switch between a multicast router and host devices to snoop the two protocols, i.e. to
monitor the protocol packets sent between the routers and hosts. The SBx3100 can then direct mulitcast traffic from the
router only to hosts that have registered for the mulitcast groups. This allows the product to conserve network bandwidth
by limiting the layer 2 forwarding of IP multicast packets only to the LAN segments that have expressed interest in receiving
packets addressed to a multicast group.
The concept of IGMP and MLD snooping is similar, except that:
• IGMP uses IPv4 Mulitcast addresses.
• MLD uses IPv6 multicast addresses.
5.1.1 Mulitcast Overview - Bandwidth Efficiency
In applications such as video streaming, where the same packet stream is to be delivered to a (varying in number) set of
hosts, mulitcast is used because of its advantages over other messaging types:
• Unicast - This is where a host device sends data to a single other specific host device on the network using IPv4 or IPv6
network addresses specific to individual host devices. Those addresses are mapped to host-specific Ethernet MAC
addresses on a layer-2 network for delivery on an Ethernet-based LAN or VLAN. In this scenario, a stream source (such
as a video server) would need to replicate the stream for each host.
• Broadcast - This is where the stream source sends only one stream and broadcasts the stream to all downstream host
devices. In this scenario, there would be one source video stream, but it would be sent to hosts that may have no interest
in receiving this stream.
• Multicast - Only one stream is sent, but the stream is replicated only to devices that have indicated an interest in the
stream. The stream is therefore common (not sent redundantly) on common network segments, and is replicated only at
the points where the path to the recipients diverge.
5.1.2 IP Mulitcast Addressing
As opposed to unicast addressing, where each device on the network has its own unique IP address and Ethernet MAC
address, a multicast stream's destination address is shared by all the devices interested in that stream. This address is called
the multicast group. (That term may also refer to all the hosts who have subscribed to the stream, or to the data stream
itself.)
In IPv4, a multicast group address is of the form 224.0.0.0/4; i.e. all addresses between 224.0.0.0 and 239.255.255.255, inclusive.
In IPv6, a multicast group address is of the form FF00::/8; i.e. all addresses between FF00:: and FFFF:FFFF:FFFF:FFFF:FFFF:FFFF.
When a source device sends a stream to an IPv4 or IPv6 multicast address, multicast-aware network devices recognize the
addresses as multicast destinations, and send the stream to network segments corresponding to hosts that have subscribed
to the stream, using processes described in the sections below.
Software Reference for SwitchBlade x3100 Series Switches
506
IGMP and MLD Snooping
Introduction
In a layer-2 network, IP destination addresses must be translated to MAC addresses. Unlike unicast addressing where ARP
(IPv4) or Neighbor Discovery (IPv6) is used to determine a unique host MAC address (programmed into the host hardware)
for each IP address, a multicast address may correspond to multiple hosts, a single host may be subscribed to multiple groups,
and the correspondence between host and group may change dynamically. In other words, multicast MAC addresses may not
be "owned" by any one particular host device, but must be shared across all host devices.
Therefore, IP multicast addresses are mapped to MAC addresses in a well-known fixed scheme. In IPv4, the 23 low-order bits
of the IPv4 address are mapped to the 23 low-order bits of a MAC address that starts with 01:00:5E. For example, the IPv4
address 224.10.20.30 would map to the MAC address 01:00:5E:0A:14:1E. In IPv6, the four low-order bytes of the IPv6
address are mapped to the four low-order bytes of a MAC address that starts with 33:33. For example, the IPv6 address
FF0E::A030:216C would map to the MAC address 33:33:A0:30:21:6C.
Note that for both IPv4 and IPv6, the multicast MAC address range is not large enough to cover the entire IP multicast
address range; for example, the IPv4 address 224.1.1.1 and 225.1.1.1 would map to the same MAC address, and thus a host
that has registered for one of these groups may receive both. Network engineers must keep this in mind when assigning multicast IP addresses in a network.
Outside the 01:00:5E and 33:33 address ranges, certain other Ethernet addresses (used for specific Ethernet protocols) are
considered multicast addresses as well. These include some addresses in the range 01:80:C2:00:00:xx. Addresses within this
range are not treated in the same manner as IP multicast addresses; they may be blocked or flooded by a switch, depending
on the particular address and the switch's configuration.
5.1.3 IP Multicast Routing and Switching
Multicast streams may be routed at layer-3 or switched at layer-2. A multicast router can forward a multicast stream from
one IP subnet to another, based on the IP multicast address. A multicast-capable switch can forward a multicast stream within
an IP subnet to particular interfaces, based on either the IP multicast address or the Ethernet multicast MAC address. The
multicast routing and switching functions may be performed in the same device, or in different devices. Typically, a multicast
router also contains a multicast switching function, but the reverse is not always true.
5.1.4 IP Multicast Group Joining and Leaving
A host that wants to subscribe to a particular multicast stream uses the Internet Group Management Protocol (IGMP) in
IPv4, or the Multicast Listener Discovery (MLD) protocol in IPv6.
In both IGMP and MLD, a subscriber sends a "join" report message on its subnet, with the multicast group address of the
stream it wants to receive. When a multicast router on the subnet sees the "join", it notes the presence of the subscriber on
the subnet. If the multicast stream arrives at the router, the router knows to forward the stream to that subscriber's subnet.
Meanwhile, at layer-2, the multicast switch is snooping (monitoring) the IGMP and MLD protocols to determine on which
particular layer-2 interface the subscriber wants to receive the multicast stream. The multicast switch limits the transmission
to only the interfaces on which active subscribers have joined the group.
A host device that has subscribed to a multicast group is said to be a member of that group.
When a subscribing host is no longer interested in a multicast stream, it may simply allow the stream to expire (the router
"ages out" subscribers after a period of time), or it may send "leave" message to the multicast router. When a multicast
router detects that there are no more subscribers for a particular group on a subnet, it can cease sending the group to the
subnet. Similarly, when a multicast snooping switch detects that there are no more subscribers for a group on a particular
layer-2 interface, it can cease sending the group to that particular interface. This is covered in the overview of the protocol
versions in the next sub-section.
5.1.5 IGMP and MLD Protocols
Following are the versions of the protocols and SBx3100 support:
Software Reference for SwitchBlade x3100 Series Switches
507
IGMP and MLD Snooping
Introduction
5.1.5.1 IGMP Version 1
Defined in RFC 1112, this defines IGMP for IPv4 multicast, and defines Host Membership Report and Query.
• Host Membership Report: this is a message sent from a subscriber host to the multicast router, indicating that it
wants to subscribe to a multicast group. This message is multicast to the group address, so that any current subscribers to
the group also receive the message. This message may be sent spontaneously from a host, or in response to a query message, the next item.
• Host Membership Query: this is a message sent by the multicast querier process on a multicast router. It is sent to the
"all-hosts" multicast address (224.0.0.1) so that all hosts on the VLAN receive the message. The message prompts host
devices to respond back with an indication of which multicast groups they have joined, using report messages.
Note that when a host no longer wishes to subscribe to a group, it simply stops sending reports for that group. If a period of
time elapses and the querier no longer sees any reports for a multicast group on a VLAN, the multicast router ceases transmitting the group to the VLAN.
5.1.5.2 IGMP Version 2
IGMP version 2 is defined in IETF RFC 2236. IGMPv2 extends IGMPv1 with several changed and added protocol messages:
• Leave-Group: this is a message sent from the subscriber host to the multicast router indicating that it is no longer interested in receiving a multicast group. This is an improvement over IGMPv1, which simply allowed subscriptions to expire
after a period of time. An explicit leave-group ("leave") message prompts the multicast router to query the remaining
hosts on the VLAN to see if any other subscribers for the group are still present (see "Group-Specific Query", below),
and if not, to cease transmitting the group on the VLAN. This allows unsubscribed groups to be terminated much more
quickly as compared to IGMPv1.
• General Query: this is the same as the IGMPv1 host membership query, except that there is an additional maximum
response time field. This field defines the maximum amount of time hosts may delay before sending a membership report
in response to the query. A host (or another router) on the network may identify an IGMPv1 querier by the fact that it
will send a zero value in the maximum response time field of the message; that is an indication to the host to respond to
the query with an IGMPv1 host membership report.
• Group-Specific Query: unlike a general query, which is sent to the all-hosts multicast address, this query message is
sent to a particular multicast group address, to determine which hosts are subscribed to that particular multicast group.
One important use for this message is after a leave-group message arrives from a host; the querier uses a group-specific
query message as a last member query to determine whether any other hosts on the VLAN are still subscribed to the
group.
• Version 2 Membership Report: this is essentially the same as an IGMPv1 host membership report. However, using a
different message type allows the router (and other hosts) on the network to identify the subscriber host as an IGMPv2
host as opposed to an IGMPv1 host. If an IGMPv2 router sees an IGMPv1 report, this is an indication to the router to
ignore leave-group messages, and thus avoid sending last member query messages (which an IGMPv1 host would not recognize).
5.1.5.3 IGMP Version 3
IGMP version 3 is defined in IETF RFCs 3376 and 4604. IGMPv3 extends IGMPv2 by adding source-specific multicast, the ability to join a multicast group from a specific stream source. With IGMPv3, the Version 3 Membership Report message may
contain directives to include or exclude one or more groups from one or more sources. Note that an "exclude group from
no sources" report is effectively the same as an IGMPv1 or IGMPv2 "join group" message; and, an "include group from no
sources" report is effectively the same as an IGMPv2 "leave group" message. Therefore IGMPv3 does not define separate
"join" reports and "leave" messages. However, IGMPv3 routers and hosts must support IGMPv2 reports and leaves (and
IGMPv1 reports) for backwards compatibility.
IGMPv3 also adds a Group-And-Source-Specific Query message, which is sent by the router to determine which hosts are
subscribed to a particular multicast group from a particular stream source
Software Reference for SwitchBlade x3100 Series Switches
508
IGMP and MLD Snooping
IGMP and MLD Snooping
5.1.5.4 MLD Version 1
The Multicast Listener Discovery (MLD) protocol is the IPv6 equivalent of IGMP.
MLD version 1 is documented in IETF RFC 2710. It is essentially identical in operation to IGMPv2, except that it does not
carry the IGMPv1 backwards-compatibility requirements that IGMPv2 does.
The protocol specification has some terminology changes as compared to IGMP: a leave-group message is called a done message, and a group-specific query message is called a multicast-address-specific query (MASQ) message.
5.1.5.5 MLD Version 2
MLD version 2 is the IPv6 equivalent of IGMPv3, and is documented in IETF RFCs 3810 and 4604. It is essentially identical in
operation to IGMPv3, and it adds source-specific multicast functionality to MLDv1.
The protocol specification has some terminology changes as compared to IGMPv3: a group-and-source-specific query message is called a multicast-address-and-source-specific query (MASSQ) message.
5.2 IGMP and MLD Snooping
IGMP and MLD protocol messages are exchanged between the querier function in the multicast router and a subscriber host.
In many cases, there is a layer-2 (Ethernet) switch between the router and the host. Such a switch cannot, through the normal
unicast process of learning MAC addresses, determine to which specific layer-2 interfaces multicast groups are to be sent.
Thus, in order for multicast groups to traverse the switch from the router to the host, the switch would either have to
broadcast the groups to all the interfaces in the layer-2 subnetwork (VLAN), or it would have to dynamically learn which subscriber hosts were attached to which interfaces.
A switch can, in fact, learn the host-to-interface association by monitoring the IGMP or MLD protocol exchange between the
router and the host. If the switch sees a report message from a host indicating that it wants to subscribe to a multicast group,
the switch can remember the interface on which the report message was seen. This process is known as snooping. If the
switch is monitoring IGMP protocol messages, it is performing IGMP Snooping function; if it is monitoring MLD protocol
messages, it is performing an MLD Snooping function.
Snooping allows the switch to optimize network usage by avoiding broadcasting a multicast group to interfaces on which
there are no subscriber hosts. In some cases it can also help optimize the protocol exchange between the hosts and the
router by eliminating redundant messages; for example, a switch may track when there is more than one host subscribed to
a group, and only send a report or leave message to the router when the first host joins or the last host leaves. Refer to TBS.
5.2.1 Known versus Unknown Multicast
A known multicast group is a group to which a host has subscribed, as determined by the IGMP or MLD snooping process.
When the multicast group arrives at the switch from the multicast router, the switch knows to forward the group to interfaces on which subscriber hosts are connected.
An unknown multicast group is a group where the destination address is recognized as a multicast address, but for which
there are no matching subscriber hosts. The switch may be configured to flood unknown multicast groups to all interfaces in
the VLAN, to drop (block) the groups, or to forward them only to specific interfaces. (See "Known versus Unknown Multicast for information on how to configure unknown multicast group handling.
5.2.2 Multicast Router Ports (Dynamic versus Static)
A multicast router port is an interface on which a multicast router is reachable from the snooping switch. Multicast router
ports can be automatically detected when the snooping process detects an IGMP query or MLD query from a querier connected to the interface. When the snooping process receives a report (or done, or leave) message from a listener host, it will
forward the report to all multicast router ports.
Software Reference for SwitchBlade x3100 Series Switches
509
IGMP and MLD Snooping
IGMP and MLD Snooping
When the layer-2 network topology is controlled by a dynamic protocol such as RSTP or EPSR, and the network is configured as an Upstream Forwarding Only (UFO) VLAN, then a multicast router port that had previously been dynamically
detected will automatically be moved to the designated upstream router port for the VLAN in the event of an RSTP or EPSR
network topology change. This helps avoid a temporary loss of service that can occur until a new protocol packet is received
from the multicast router.
Multicast router ports may also be statically configured. This can be useful if the automatic protocol packet detection mechanism cannot properly detect the multicast router (e.g., if no such protocols are configured on the router). It can also help
avoid loss of service during a network topology change, regardless of whether or not the VLAN is a UFO VLAN. For example, in an EPSR ring, both ring interfaces may be manually configured as static multicast router ports.
5.2.3 Interface Snooping Modes
For each interface on which IGMP or MLD snooping is used, the treatment of multicast traffic on the interface may be set to
one of four modes: internal snooping, external snooping, multicast pass-through, or multicast send-all.
Note:
This pass-through mode is not supported on the SBx3100; it is included here because it shares many attributes with
send-all (which is supported on the SBx3100), and because pass-through mode was supported prior to Release 17.0
and must be changed on upgrade. Refer to SET SWITCH MULTICAST INTERFACE SNOOPINGMODE.
5.2.3.1 Internal Snooping
The internal snooping mode is the normal setting for interfaces that are connected to downstream listener hosts.
When an interface is set for internal snooping, the IGMP and MLD snooping processes track each listener host on each
VLAN and interface by monitoring for report messages, indicating that the host is joining a multicast group. A multicast
stream is only forwarded to the interface on a VLAN if one or more listener hosts on the VLAN/interface has joined the
group.
When a "leave" or "done" message for a group is seen on the interface, the snooping processes check to see if the client host
that sent the message had previously joined the group on the VLAN. If so, it removes that host from its known list of listeners for that group, VLAN, and interface. When the list of known hosts is empty for a given group, VLAN, and interface, the
switch ceases forwarding that multicast stream to the VLAN/interface.
5.2.3.2 External Snooping
The external snooping mode is used on interfaces where there is a downstream switch that is also performing IGMP or
MLDv1 snooping. In this case, it is assumed that the downstream switch may be performing duplicate report suppression and
last leave behavior (see Duplicate Report Suppression and Last Leave), or is functioning as an IGMP or MLD proxy device
(performing snooping, and then presenting the appearance of a single host device). This allows the system to optimize processing of "leave" and "done" messages by assuming the downstream switch will only forward that message if there are no
more listener hosts for the group on the downstream switch. By making this assumption, it is not necessary to track listener
hosts and validate the leave messages against a list; the system may simply stop forwarding a multicast group to a VLAN/interface upon receipt of any leave/done message for that group on that VLAN/interface, regardless of which host originated the
message.
For MLDv2, report and leave suppression are disallowed on downstream snooping switches. Therefore, external snooping
should generally not be used with MLDv2 unless there is only a single listener host on the interface, or if the downstream
switch is performing a proxy function and presenting the appearance of a single host on the interface. However, in this case,
the performance advantage of setting the interface to external snooping mode (as compared to internal snooping mode) is
minimal.
5.2.3.3 Mulitcast Passthrough
For an interface in multicast pass-through mode, incoming report and leave messages from the interface are passed to multicast router ports with minimal processing, and no attempt is made to detect or track listener hosts on the interface. Multi-
Software Reference for SwitchBlade x3100 Series Switches
510
IGMP and MLD Snooping
IGMP and MLD Snooping
cast groups arriving from any other pass-through interface are always forwarded to all other pass-through interfaces,
regardless of whether there are listener hosts on the interfaces or not. This can be used to help avoid a service impact that
could result from a topology change in the network, and can help improve performance when multiple snooping switches are
daisy chained.
Consider the case when multiple switches are configured in an EPSR ring. Without the ability to designate interfaces as multicast pass-through, two problems could arise. First, if the network topology changes, an interface that was previously considered "upstream" may now be "downstream", requiring the switch to snoop reports on that interface before multicast traffic is
sent to it. In this case, there could be a significant period of time before the newly-downstream switch receives any multicast
traffic, thus resulting in a service interruption to listener hosts on that switch. Second, an upstream switch may need to track
a large number of listener hosts on the downstream interface, resulting in performance degradation on the switch.
By configuring the EPSR ring interfaces as multicast pass-through, both of these issues can be avoided. Multicast traffic is
always forwarded in both directions around the EPSR ring, so topology changes do not cause a significant service interruption
to any nodes in the ring. Also, the switches do not have to track listener hosts on the ring interfaces; they only have to track
listener hosts on downstream customer-facing interfaces, potentially improving the overall performance of each switch.
Similarly, it may be beneficial to configure all network-facing interfaces in a spanning tree as multicast pass-through, as well as
any interface used to interconnect daisy-chained devices.
5.2.3.4 Multicast Send-All
A multicast send-all interface is a special type of multicast pass-through interface. It behaves in much the same manner as a
multicast pass-through interface, but multicast groups are sent to send-all interfaces even if the group did not arrive on a multicast pass-through interface. This can be used in the case where multicast sources may be present on non pass-through
interfaces that should be forwarded to upstream interfaces, but where it is undesirable to send multicast traffic back to those
ports.
Note:
This value is supported on the SBx3100 in Release 17.0.
5.2.4 Snooping Optimizations
5.2.4.1 Fast Leave
Ordinarily when an IGMP or MLD querier receives a "leave", "done", or "report" message indicating that a host machine is no
longer interested in a multicast group, it sends a group-specific query to see whether there are any other hosts still listening
to the group. On the device performing snooping, if no responses to the query are seen on an interface after a period of
time, the interface may be removed from the multicast group. During that period of time, the multicast group may continue
to be forwarded on that interface, even when there are no listeners for that group, causing unnecessary network utilization.
Fast leave is an optimization where the system immediately discontinues forwarding a multicast group to an interface as soon
as a host on the interface leaves a group, without waiting for responses to the group-specific query. This is possible when
there is only one host on an interface, or if the system tracks all the destination hosts for the multicast groups on each interface, so it can be determined when all hosts have left a group.
5.2.4.2 Duplicate Report Suppression and Last Leave
For IGMPv1, IGMPv2, and MLDv1, the protocol permits suppressing multiple reports for the same multicast group on a
VLAN. Hosts may suppress reports if they detect other hosts on the network already listening to the group, or (more commonly) snooping switches can determine whether there are multiple hosts listening to the same group, and collate multiple
reports into a single report to be sent upstream. This can help reduce the processing load on the multicast router and
upstream snooping devices, when many hosts are listening to the same multicast group.
Similarly, IGMPv2 "leave" or MLDv1 "done" messages may be suppressed by a snooping switch if the switch knows that there
are other hosts on the VLAN still listening to the group. This feature is also known as last leave, since the snooping switch
only sends a leave message to the multicast router when the last host leaves the multicast group.
Software Reference for SwitchBlade x3100 Series Switches
511
IGMP and MLD Snooping
IGMP and MLD Snooping
These features do not apply to a network that only uses MLDv2 or IGMPv3, as these protocols require that all reports be
sent to the multicast router.
Software Reference for SwitchBlade x3100 Series Switches
512
IGMP and MLD Snooping
IGMP and MLD Support on the SBx3100
5.3 IGMP and MLD Support on the SBx3100
5.3.1 Protocol Versions Supported
The SBx3100 system supports IGMPv1, IGMPv2, MLDv1, and MLDv2 snooping; they do not support IGMPv3. Support for
MLDv2 is limited: MLDv2 protocol packets are recognized but source-specific multicast is not supported
5.3.2 Hardware Support
IGMP Snooping is supported on all cards on all SBx3100 systems
MLD Snooping is supported on a SBx3100-series chassis with a CFC200 central fabric controller and any SBx3100-series
compatible service module (including the GE24RJ, GE24POE, GE24SFP, GE40RJ, GE40CSFP, XE4, and XE6SFP).
5.3.3 Configuration Support
5.3.3.1 VLAN Limits
On the SBx3100, IGMP and MLD snooping may only be enabled on up to 128 VLANs. When the system is upgraded from a
release prior to Release 17.0, the system may temporarily be in a state where more than 128 VLANs are enabled for IGMP
snooping. Certain operations will be disabled while the system in this state See Enabling IGMP and MLD Snooping (perVLAN/Interface).
5.3.3.2 Multicast Group Limits
On SBx3100 systems, IGMP and MLD snooping support up to 2048 multicast groups combined. (There is no per-card limit.)
If the total number of learned multicast groups exceeds this limit, then a management log will be generated; IGMP and
MLDv1 reports will be discarded, while MLDv2 reports will be forwarded to the multicast router but the multicast group will
not be learned by the snooping process.
On the SBx3100, IGMP snooping supports up to eight multicast groups per subscriber host. If a host attempts to join more
than eight multicast groups, the host's report message will be discarded, and the multicast group will not be learned by the
snooping process.
5.3.3.3 Host Tracking Limits
IGMP snooping tracks up to six active IPv4 hosts (listeners) per interface (unless there is a querier on the interface, in which
case the limit is five), and up to eight multicast groups per host. If there are too many hosts on an interface, or if a host
attempts to join too many groups, the Fast Leave feature will not function properly; this may cause some hosts to be disconnected from a multicast group unexpectedly.
MLD snooping supports up to 2400 active IPv6 hosts (listeners) system-wide. If the number of learned IPv6 multicast hosts
exceeds this limit, system performance may be adversely affected due to excessive CPU usage. Symptoms of an overload
condition may include: hosts' attempts to join and leave multicast groups being delayed or not processed at all; responses to
MLD queries from a multicast router being delayed or lost; poor command-line interface responsiveness on the management
interface; and, potential network-wide issues due to tasks for network topology protocols (such as RSTP and EPSR) being
starved.
For networks with more than 2400 hosts, MLD proxies should be used between the SBx3100 and the end hosts. An external
proxy device can reduce the processing load on the SBx3100 by presenting the appearance of a single proxy host in place of
multiple actual hosts. This reduces amount of MLD messaging that must be handled by SBx3100.
Software Reference for SwitchBlade x3100 Series Switches
513
IGMP and MLD Snooping
IGMP and MLD Support on the SBx3100
5.3.3.4 Multicast Router Port Limits
The SBx3100 supports up to a total of 512 static and dynamic multicast router ports, spread across up to 128 VLANs. MLD
and IGMP snooping may only be enabled on up to 128 VLANs (see VLAN Limits), and static multicast router ports should
only be configured on VLANs where IGMP or MLD snooping is enabled.
Software Reference for SwitchBlade x3100 Series Switches
514
IGMP and MLD Snooping
IGMP and MLD Support on the SBx3100
5.4 IGMP and MLD Snooping Configuration Guidelines
5.4.1 Enabling IGMP and MLD Snooping (per-VLAN/Interface)
To enable IGMP snooping, use the "ENABLE IGMPSNOOPING" command. IGMP snooping may be enabled per-VLAN and/
or per-interface. However, for IGMP to function on a particular VLAN and interface, it must be enabled on both the VLAN
and the interface. By default, IGMP snooping is disabled for all VLANs but enabled for each interface (meaning that the overall state is disabled by default).
To enable MLD snooping, use the "ENABLE MLDSNOOPING VLAN" command. MLD snooping may be enabled per-VLAN
(but not per-interface as with IGMP). By default, MLD snooping is disabled for all VLANs.
When IGMP/MLD snooping is disabled on a VLAN, IPv4/IPv6 multicast traffic may be blocked or flooded on the VLAN,
according to the unknown multicast flooding settings on the system and VLAN (see Unknown Multicast Flooding). When
snooping is enabled on a VLAN, known multicast groups will be sent to interfaces that have registered for those groups;
unknown multicast groups will be handled according to unknown multicast flooding settings.
On the SBx3100, only up to 128 VLANs may be administratively enabled for MLD or IGMP snooping (combined). When the
system is upgraded from a release prior to Release 17.0, the system may temporarily be in a state where more than 128
VLANs are administratively enabled for IGMP snooping. Certain operations will be disabled while the system in this state
(see IGMP Snooping Disabled). Additionally, IGMP snooping will only be operational on up to 128 VLANs, since that is the
SBx3100 limit for the number of VLANs on which multicast router ports may be configured or dynamically detected.
When IGMP snooping is disabled on an interface, the interface may still receive flooded multicast traffic, but IGMP protocol
messages (such as "join" reports) on the interface will be ignored (dropped).
5.4.2 Unknown Multicast Flooding
The handling of unknown multicast groups can be controlled globally using the "SET SWITCH MULTICAST FLOODUNKNOWNS" command. When the global "FLOODUNKNOWNS" parameter is set to "ALL", all unknown multicast traffic on
a VLAN is flooded to all interfaces in the VLAN. When it is set to "NONE", unknown multicast traffic is dropped by default
(however, note the exception in the next paragraph). When it is set to "CONTROLONLY", only certain well-known multicast address ranges are flooded on the VLAN; other unknown multicast traffic is dropped by default. The well-known multicast address ranges are:
• all IPv6 addresses in the range FF0n::m:0:0/98 or FF0n::m:FF00:0/104, where n is a value from 0-F and m is a value from 02; or,
• all IPv4 addresses in the range 224.0.0.0/24.
Note that certain interfaces may always receive both known and unknown multicast traffic regardless of the "FLOODUNKNOWNS" setting: these are any interfaces that have been designated as multicast pass-through or multicast send-all interfaces (see Interface Snooping Modes).
The "ADD IGMPSNOOPING FLOODING" command allows packets for particular IPv4 protocols (well-known IPv4 multicast addresses) to be flooded on particular VLANs, when the global "FLOODUNKNOWNS" parameter is set to "NONE". If
"FLOODUNKNOWNS" is set to "ALL" or "CONTROLONLY", all IPv4 protocol packets are flooded anyway, so this command would have no effect. Up to 64 IPv4 protocol addresses may be configured for flooding, on up to 10 VLANs; the total
number of address-VLAN combinations may not exceed 128.
The default setting for "FLOODUNKNOWNS" is "NONE"; and, by default, no addresses are configured for "IGMPSNOOPING FLOODING" on any VLAN.
On the SBx3100, the "SET SWITCH MULTICAST FLOODUNKNOWNS FLOODUNKNOWNS=CONTROLONLY" setting is supported on all central fabric controllers and service modules.
Software Reference for SwitchBlade x3100 Series Switches
515
IGMP and MLD Snooping
IGMP and MLD Support on the SBx3100
5.4.2.1 IPv6 Neighbor Discovery Interaction
When "FLOODUNKNOWNS" is set to "NONE" (the default), the IPv6 solicited node multicast address range
(FF02::1:FF00:0/104) will never be forwarded to any downstream ports, even though an IPv6 host will generally send a report
to join such an address as part of the IPv6 Neighbor Discovery Protocol. Despite the use of the MLD "join" report, solicited
node multicast groups are always treated as "unknown" multicast. Therefore, with "FLOODUNKNOWNS" set to "NONE",
IPv6 neighbor discovery will not function for hosts on downstream interfaces. It is recommended that "FLOODUNKNOWNS" be set to "CONTROLONLY" or "ALL" when IPv6 is in use.
5.4.2.2 Group Ageing Timers
A multicast group detected by the snooping process expires ("ages out") a period of time after a general query message has
been sent by the querier, unless a report is received from the host in response to the query. This time period may be configured for IGMP and MLD snooping using the "SET IGMPSNOOPING with the GENQUERYTIMER option or SET MLDSNOOPING with the GENQUERYTIMER option" command. The value should generally be related to parameters set on the
IGMP or MLD Querier according to this formula:
QUERYINTERVAL > GENQUERYTIMER >= QUERYRESPONSEINTERVAL
The default value for the "GENQUERYTIMER" is 20 seconds.
Under normal circumstances (excluding IGMPv1 hosts), group "done" messages (or "include none" reports) are expected on
an interface when hosts are no longer interested to a multicast group, before the group ageing timer expires. However, in the
event that a host disconnects unexpectedly, this ageing mechanism is used to clean up any groups to which the host was listening.
5.4.2.3 Fast Leave Behavior
Fast leave (see Fast Leave) is always enabled (for IGMP snooping on the iMAP, and for both IGMP and MLD snooping on the
SBx3100).
If the snooping mode of an interface is set to "internal" (see Interface Snooping Modes), the system determines that there are
no subscribers on the interface when "leave" or "done" messages have been received for all hosts that were known to be
members of the group. For IGMP snooping, the number of hosts that can be tracked on each interface is limited to six. (If any
of those hosts are using IGMPv1, however, the system reverts to timing-out the groups after a general query, since IGMPv1
hosts do not send "leave" messages.) For MLD snooping, the number of hosts that are tracked is subject to a system-wide
limit of 2400; there is no per-interface limit. Note that host devices must not perform duplicate report suppression in this
configuration, as that would prevent the switch from tracking the hosts properly. Duplicate report suppression may only be
performed by the SBx3100 switch.
If the snooping mode of an interface is set to "external", then it is assumed that there is only one listener host (or proxy
device) on the interface, so the switch will cease sending a multicast group to an interface upon receipt of any "leave" or
"done" message on the interface, without checking the identity of the host device.
If the snooping mode of an interface is set to "send-all", then multicast streams are always sent to the interface, so the fastleave behavior does not apply.
5.4.2.4 Duplicate Report Suppression and Last Leave
Duplicate report suppression may be configured separately for IGMP and MLD snooping, using the "SET IGMPSNOOPING
with the DUPREPORTTIMER" and "SET MLDSNOOPING with the DUPREPORTTIMER" commands. The value may be set
to "OFF" (indicating that the snooping process will not attempt to suppress duplicate reports) or a value in seconds (indicating that any duplicate reports within the given timeframe will not be sent to the multicast router). The setting does not apply
to MLDv2 reports. The default value is 10 seconds.
The last leave feature is always active for IGMPv1, IGMPv2, and MLDv1 snooping; it does not require configuration.
Software Reference for SwitchBlade x3100 Series Switches
516
IGMP and MLD Snooping
IGMP and MLD Support on the SBx3100
5.4.2.5 Interface Snooping Mode
For each interface on which IGMP or MLD snooping is used, the treatment of multicast traffic on the interface may be set to
one of four modes: internal snooping, external snooping, multicast pass-through, or multicast send-all. See Interface Snooping
Modes for a description of the different snooping modes.
To configure an interface's snooping mode, set the "SNOOPINGMODE" attribute in the "SET SWITCH MULTICAST
INTERFACE SNOOPINGMODE" command to "INTERNAL", "EXTERNAL", "PASSTHROUGH", or "SENDALL". The setting
applies to all VLANs for the interface, and for both IGMP and MLD.
The multicast pass-through mode and the multicast send-all mode are similar. The SBx3100 does not support multicast passthrough interfaces; interfaces should be configured as multicast send-all instead.
5.4.2.6 Multicast Router Ports (Static Router Ports Supported)
On the SBx3100, multicast router ports may also be statically configured using the ADD VLAN INTERFACE or SET VLAN
INTERFACE command with the MCASTSTATICROUTERPORT option. Up to 512 VLAN-interface pairs may be designated as
static multicast router ports, on up to 128 VLANs; for each VLAN-interface pair, the multicast router port designation may
apply to IGMP, MLD, or both. Note that the total number of static and dynamically-detected multicast router ports is limited
to 512, so any statically-configured multicast router ports will reduce the number of multicast router ports that can be
dynamically detected.
For multicast router ports that have been dynamically determined by examining protocol packets (as opposed to being statically configured), the multicast router port designation will expire after a period of time if protocol packets are no longer
observed on an interface for a VLAN. The amount of time before the multicast router port designation expires may be configured for IGMP and MLD separately, using the "SET IGMPSNOOPING or SET MLDSNOOPING with the ROUTERAGEINGTIMER option.
The timer value may be set from 10 to 1200 seconds. The value should be greater than the maximum interval between protocol packets, for whatever protocol is being used to detect the multicast router. For IGMP and MLD protocol packets, this
would be the router's query interval multiplied by the "robustness value". If OSPF is being used for dynamic multicast router
port detection, the router ageing timer should also be greater than the "router dead" interval (typically four times the "hello
interval").
The default value for the router ageing timer is 300 seconds (5 minutes).
On the SBx3100, any multicast groups that with subscribers on a VLAN are forwarded to any multicast router ports on the
VLAN (in addition to being forwarded to the interfaces with the subscribers and to multicast send-all interfaces). If the SET
SWITCH MULTICAST FLOODUNKNOWNS setting is set to "CONTROLONLY", unknown multicast groups are also forwarded to multicast router ports on the VLAN (and multicast send-all interfaces), as long as IGMP or MLD snooping is
enabled on the VLAN.
This behavior is primarily to allow the SBx3100 to operate on networks that use other multicast protocols that are currently
not snooped (e.g., Protocol Independent Multicast [PIM]). Therefore, if the SBx3100 is deployed as a layer-2 switch between
PIM routers, it is recommended to do one of the following:
• SET SWITCH MULTICAST FLOODUNKNOWNS be set with FLOODUNKNOWNS = "ALL";
• SET SWITCH MULTICAST FLOODUNKNOWNS be set with FLOODUNKNOWNS = "CONTROLONLY", and IGMP
or MLD snooping be enabled on the VLAN(s) on which PIM is operating, even if there are no IGMP or MLD clients on
the VLAN;
• Have all interfaces connecting the iMAP to the PIM routers be designated as multicast send-all interfaces (SET SWITCH
MULTICAST INTERFACE SNOOPINGMODE).
This behavior is not supported on the iMAP. If the iMAP is deployed as a layer-2 switch between PIM routers, it is recommended to either:
• SET SWITCH MULTICAST FLOODUNKNOWNS be set with FLOODUNKNOWNS = "ALL";
Software Reference for SwitchBlade x3100 Series Switches
517
IGMP and MLD Snooping
Feature Interactions
• All interfaces connecting the iMAP to the PIM routers be designated as multicast pass-through interfaces.
5.4.2.7 Set-Top Box Mobility Prevention
For IGMP snooping, MAC addresses may be statically configured against particular interfaces. When this is done, the IGMP
snooping process will only accept IGMP reports from hosts matching the statically configured addresses. This can "lock
down" the interface so that only approved devices may receive multicast streams on the interface. For example, when IGMP
is used for video service, this feature helps prevent set-top-box mobility (i.e., taking an existing set-top-box and using it to
receive service at an unauthorized location) and theft of service (i.e., connecting an unauthorized device to the network to
receive video streams).
Up to six full MAC addresses (e.g. "11:22:33:AA:BB:CC") or partial MAC addresses (e.g. "11:22:33") may be configured
against each interface. If a partial MAC address is configured, the subscriber host must have a MAC address starting with the
specified octets.
If static MAC addresses are configured against an interface while existing hosts on the interface are actively subscribed to
multicast groups, those hosts will not be removed from the groups immediately; however, if their MAC addresses do not
match one of the statically configured entries, new IGMP reports from them will not be processed, and they will eventually
expire from the group.
5.4.2.8 IGMP Snooping Per-Card Multicast Group Limits
On the SBx3100, the concept of a Multicast Group Limit per Card does not apply, and so there is no MCASTGROUPLIMIT
option. Refer to the iMAP Software Reference Manual for how this works on iMAP systems.
5.4.2.9 IGMP Snooping IMG Compatibility Mode
On SBx3100 systems, the global "IMGCOMPATIBILITYMODE" setting for IGMP snooping specifies whether IGMP protocol
packets should be exempt from filtering by user-defined access-lists and classifiers; this is required for operation with certain
Allied Telesis iMG devices that have an IGMP proxy function enabled. (There is no corresponding setting for MLD snooping;
MLD protocol packets are exempt from filtering on a VLAN as long as MLD snooping is enabled for the VLAN.) Refer to the
SET IGMPSNOOPING command.
5.5 Feature Interactions
5.5.1 Upstream Forwarding Only VLANs
On SBx3100 systems, if a VLAN is configured as UFO, and if a topology management protocol is in use on the VLAN, then a
topology change in the network will cause the newly designated upstream interface for the VLAN to be added as an additional dynamic multicast router port, so long as system-wide limits on the number of multicast router ports have not been
exceeded (see Multicast Router Port Limits).
5.5.2 IPv6 Neighbor Discovery
The IPv6 Neighbor Discovery Protocol uses MLD in its operation. Upon joining a network, an IPv6 host sends an MLD
report to join its solicited node multicast address so that it can receive neighbor discovery packets from other hosts on the
network. (The address is in the IPv6 link-local multicast address range FF02:0:0:0:0:1:FF00::/104). MLD snooping will not
intercept or process these specific MLD reports, but instead will simply forward them to multicast router ports.
If a data packet is received with a destination in the solicited node multicast address range, the system will flood them to all
interfaces if the "SWITCH MULTICAST FLOODUNKNOWNS" parameter is set to "CONTROLONLY" or "ALL". If the
parameter is set to "NONE", the packet will only be sent to multicast pass-through or send-all interfaces and therefore, IPv6
neighbor discovery will not operate correctly for downstream hosts.
Software Reference for SwitchBlade x3100 Series Switches
518
IGMP and MLD Snooping
Feature Interactions
5.5.3 Link Aggregation
IGMP and MLD snooping may be used with link aggregation groups (LAGs), without restrictions.
5.5.4 Hierarchical VLANs
Hierarchical VLANs (also called HVLANs, double-tagged VLANs, VLAN tunnels, or Q-in-Q VLANs) may not be used in conjunction with IGMP or MLD snooping. For a tunneled VLAN, customer VLAN (C-VLAN) traffic is designed to be passed
transparently through the tunnel in the HVLAN. This conflicts with the need to intercept and re-inject protocol packets by
the IGMP and MLD snooping processes.
IGMP snooping allows the SBx3112 to conserve the local area network bandwidth by not flooding (broadcasting) the multicast frames but rather forwarding the multicast frames only to those ports that have expressed an interest in receiving such
frames. The product must examine (or snoop) some layer 3 information (join and leave) in the IGMP host membership
report message and the IGMP host leave group messages sent by the host to a multicast router. The snooping of these messages is used to learn (or forget) which ports are interested (or not interested) in receiving multicast packets.
In simple terms, upon the receipt of an IGMP host membership report message for a particular multicast group, the IGMP
learning process adds the port to the MAC address table against the multicast MAC address if it is not already present. Upon
the receipt of an IGMP host leave group message for a multicast group, the IGMP learning process deletes the port from the
MAC address table if it is present.
The forwarding process then utilizes the MAC address table populated by the learning process above to do efficient forwarding of the received multicast frame.
5.5.5 IGMP Snooping Disabled
When IGMP snooping is disabled, the treatment of multicast frames by the SBx3112 is the same as any other layer 2 switch.
• Each time a frame is received, the learning process reads the source MAC address and updates the address tables if
required. The forward process then uses these address tables to do an address lookup on the destination MAC address
to determine where to forward the frame.
• Initially, the SBx3112 starts out by broadcasting/flooding (default forwarding) the received unicast frames on all its ports
other than the port it was received on. This continues until the learning process learns and populates the MAC address
table (consisting of MAC address - port entries) after which the received unicast frames are forwarded only to the
intended destination. The exact port of the intended destination is obtained by using the destination MAC address in the
received frame as a key to locate the address - port entry (inserted by the learning process earlier on) in the MAC
address table. This is called the address lookup phase as part of the forwarding process to exactly forward the unicast
frames. Note that there is one entry per unicast MAC address in the MAC address table since the unicast addresses are
unique.
• For any broadcast frames (with a destination MAC address of all 1's), the frame is forwarded on all the LAN switch ports
(flooding) by the forwarding process obviously not including the port the broadcast frame was received on.
• For any multicast frames the lookup fails to determine the ports to send this frame on, and so floods them to all ports in
the VLAN. There is no Source Address with the Multicast Address since it has not been learned.
Note:
Creating a VLAN of type VLAN is actually the same, except the frame may be flooded on only member ports of the
VLAN.
5.5.6 IGMP Snooping Enabled
As mentioned above, IGMP snooping allows the SBx3112 to conserve local area network bandwidth by not broadcasting a
received multicast frame but rather forwarding the multicast frame only to those ports that have expressed an interest in
receiving such frames. (The default forwarding behavior of a LAN switch for unicast and broadcast frames is not affected.)
The snooping will configure the hardware to allow multicast streams for that group to be forwarded only to ports that have
requested that stream.
Software Reference for SwitchBlade x3100 Series Switches
519
IGMP and MLD Snooping
Feature Interactions
The SBx3112 keeps track of Multicast Group membership by MAC address, so Leaves are processed immediately and the
interface is removed from the Multicast Group (no timers). This is called IGMP Fast Leave.
The parameter DUPREPORTTIMER (of the SET IGMPSNOOPING command) helps control the number of duplicate reports
sent to the multicast router(s). Also, the SBx3112 only sends up the last Leave to the router.
Once IGMP has been enabled, the system may generate a warning message at the user’s CLI session stating that classifier
capacity or capabilities have been exceeded on the slot(s) impacted by the provisioning change. The user should investigate
classifier-related provisioning, such as IGMP, DHCPRELAY, VLAN (for per-VLAN UFO and HVLAN), EPSR, INTERFACE
(TAGALL option for HVLAN), ACCESSLIST, and CLASSIFIER to determine the reason for the message.
5.5.7 IGMP Snooping at the System and Interface Level
Since the IGMP Snooping feature can be enabled and disabled at both the system and port level, the following interactions
apply:
• If IGMP Snooping is disabled system wide, all multicast packets will be flooded (within the VLAN) including IGMP control
packets (Reports, General Queries, Groups Specific Queries). In this case, no IGMP control messages are forwarded to
the CPU for processing; they are just switched (flooded).
• If IGMP Snooping is enabled system wide and the port level control is enabled, then the port is snooped; IGMP Snooping
software in the CFC will receive Reports and Leaves and process them as follows:
• Unrequested (no Report processed by IGMP Snooping) multicast packets are dropped at the CFC switch.
• Requested multicast packets are only sent to the ports where an IGMP Report is received.
• If IGMP Snooping is enabled system wide and the port level control is disabled, then any IGMP Control Packet (Reports
and Leaves) that are received from that port will be discarded (not processed and not flooded). This port will not be able
to participate in IGMP.
5.5.8 Summary of Feature Interaction
The following figure shows the flow of the IGMP and MLD features and how multicast groups are processed for the
SBX3100.
Software Reference for SwitchBlade x3100 Series Switches
520
IGMP and MLD Snooping
Feature Interactions
Note 1 = Controlled by SET SWITCH MULTICAST INTERFACE SNOOPINGMODE
Note 2 = Controlled by SET VLAN=X INTERFACE=Y MCASTSTATICROUTERPORT=YES
or Dynamically Learned
Note 3 = Packet matches item controlledby ADD IGMPSNOOPING FLOODING
Note 4 = Controlled by SET SWITCH MULTICAST FLOODUNKNOWNS
Note 5 = Controlled by ENABLE IGMPSNOOPING or ENABLE MLDSNOOPING
MULTICAST DATA
IS DESTINATION
MULTICAST
SENDALL
?
FORWARD TO
INTERFACE
YES
Note 1
NO
YES
IS GROUP
LEARNED BY
SNOOPING
YES
IS LISTENER
LEARNED ON
DESTINATION
YES
?
NO
?
NO
IS DESTINATION
MC ROUTER
PORT
Note 2
?
NO
YES
NO
IS SNOOPING
ENABLED ON VLAN?
IS IGMPSNOOPING
FLOODING PACKET
?
?
Note 3
Note 5
NO
NO
IS DESTINATION
YES
MC ROUTER
PORT
Note 2
?
NO
YES
FLOOD TO ALL
INTERFACES IN VLAN
YES
IPv4 / IPv6
CONTROL PACKET
ALL
CONTROL
ONLY
MULTICAST
FLOODUNKNOWNS
?
DROP
?
Note 4
OFF
FIGURE 5-1
Processing of Multicast Data for iMAP
Software Reference for SwitchBlade x3100 Series Switches
521
IGMP and MLD Snooping
Configuring IGMP
5.6 Channel Usage for IGMP
5.6.1 Reserved
For the SBx3100, there is a subset of the reserved multicast address range of 224.0.0.x (x = 0..255):
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
01:00:5e:00:00:01 (All-Hosts Group).)
01:00:5e:00:00:02 (All Routers Group)
01:00:5e:00:00:04 (DVMRP)
01:00:5e:00:00:05 (OSPFALL)
01:00:5e:00:00:06 (OSPFDESIGNATED)
01:00:5e:00:00:09 (RIP2)
01:00:5e:00:00:0a (IGRP)
01:00:5e:00:00:0c (DHCPRELAY)
01:00:5e:00:00:0d (PIM)
01:00:5e:00:00:0e (RSVP)
01:00:5e:00:00:0f (CBT)
01:00:5e:00:00:12 (VRRP)
01:00:5e:00:00:23 (DXCLUSTER)
01:00:5e:00:00:65 (CISCONHAP)
01:00:5e:00:00:66 (HSRP)
01:00:5e:00:00:fb (MDNS)
Note:
These reserved multicast entries do not take away from the 512 multicast groups supported by the system.
5.6.2 User provisioned MCAST addresses
The SBx3112 system user can provision specific MCAST addresses that are considered important and are not auto-populated. This allows the user to pass other application-specific protocols that are outside the reserved multicast addresses that
the SBx3112 system IGMP policy would otherwise block. With IGMP snooping enabled and the port set to INTERNAL,
reserved MCAST addresses (224.0.0.1->224.0.0.255) will be dropped unless joined. For this reason, the system provides the
user the ability to use CLI commands to statically configure MCAST addresses that are considered important but are not
auto-populated. Furthermore, this provides the ability to pass other application specific protocols that are outside the
reserved multicast addresses which the SBx3112 system IGMP policy would otherwise block.
The default behavior is that with IGMPSNOOPING disabled, the system will flood all MCAST. However, with IGMPSNOOPING enabled, the system will automatically enter 224.0.0.1 and 224.0.0.2 as entries. The user then has the option, using CLI
commands, to add and delete these protocol forwarding addresses.
Protocol forwarding addresses can be displayed using the SHOW IGMPSNOOPING FLOODING command.
5.7 Configuring IGMP
5.7.1 Default Configuration
As described in, when an SBx3112 switch is initially booted up, IGMP and MLD are configured as follows:
• IGMP snooping is disabled for all VLANs but enabled for each interface (meaning that the overall state is disabled by
default).
Software Reference for SwitchBlade x3100 Series Switches
522
IGMP and MLD Snooping
Configuring IGMP
• MLD snooping is disabled for all VLANs.
• Flooding of unknowns default setting for IGMP and MLD snooping is disabled (set to NONE)
5.7.2 Configuration Example - IGMP
The following figure shows a simple configuration in which multiple SBx3112s are used. Systems B and C have a switch that is
configured with host with a number of Set Top Boxes (STB).
SBx908
SBx3112 A
1
2.2
2.1
301
2
2.3
SBx3100
3
SBx3112 B
SBx3112 C
1.0
= Devices
1
6
= Links
2.2
301
0.3
6.0
5
SBx3100
2.3
C
4
0.2
301
A
2.1
0.2
SBx3100
3.3
6
Host
Host
STB STB
STB STB
FIGURE 5-2
Example Configuration for IGMP
5.7.3 Configuration Guidelines
In Figure 5-2, there are interfaces that are configured to support MC traffic. The options used depend on the place of the
interface in the network and how MC traffic is to be handled. The two options that work together are:
• DIRECTION • NETWORK - The SBx3112 interface is to another system and so traffic must be further processed before going to a
customer/subscriber.
• CUSTOMER - The interface is to a device that handles the incoming subscriber traffic.
• SNOOPINGMODE - How IMGP packets will be handled:
• MCPASSTHROUGH - IGMP Snooping will filter IGMP packets and will flood all mulitcast traffic that is received from the
mulitcast router to network interfaces that are set to MCPASSTHROUGH and are a member of the VLAN.
• INTERNAL (snooping) - The interface will reconfigure the hardware to limit forwarding of mulitcast packets only to the
ports that have expressed interest in the multicast group.
Software Reference for SwitchBlade x3100 Series Switches
523
IGMP and MLD Snooping
Configuring IGMP
• EXTERNAL (limited snooping) - Behind the interface towards the customer is a device that has a snooping function. The
SBx3112 interface will only snoop for the first IGMP Report and the last IGMP Leave message, when it knows that there
is no more interest for the specific multicast stream on the downstream device.
For Figure 5-2, the interfaces could be configured as follows:
• SBX3112-B and SBx3112 - C - The link (4) is part of a ring and connects the two SBx3112s. Interfaces 0.2 and 2.1 are
configured as:
• DIRECTION = NETWORK
• SNOOPINGMODE = MCPASSTHROUGH
• SBX3112-B - The link (5) is to a device that provides IGMP, and so interface 0.3 is configured as:
• DIRECTION = CUSTOMER
• SNOOPINGMODE = EXTERNAL
• SBX3112-C - The link (6) is to a device that does not provide IGMP, and so interface 6.0 is configured as:
• DIRECTION = CUSTOMER
• SNOOPINGMODE = INTERNAL
Refer to the SET IGMPSNOOPING command.
5.7.4 Restrictions and Limitations
The number of IGMP groups can be set from 1 up to 512, depending on bandwidth requirements (usually for the number of
video channels). Note that on the SBX3112, there is no feature (MCASTGRUPLIMIT) that when the number of IGMP groups
reaches 80% of the configured number, a management log is produced, and at 100% an alarm is produced.
MAC limiting restricts the ability to learn MAC addresses on a port. When the MAC learning limit is reached, all frames from
MAC sources that are not already in the FDB are dropped. This could be part of a subscriber’s Service Level Agreement.
5.7.5 Configuration Procedure
Figure 5-3 demonstrates an IGMP multicast group that is formed -- using a video VLAN -- and set up with two customer
hosts. The network includes an SBx3112 connected to a customer STB (on link 2), to another customer STB (on link 3) via
an iMG616 gateway (serving as an IGMP proxy modem), and to the network via a multicast router (on link 1).
Software Reference for SwitchBlade x3100 Series Switches
524
IGMP and MLD Snooping
Configuring IGMP
1
SBx3112 A
0.22
SBx3100
11.10
11.11
512
3
2
B
C
iMG616
A
C
= Devices
1
4
= Links
Set top box
512
= vlan_video
4
Set top box
FIGURE 5-3
Video Multicasting Using IGMP Snooping
The following procedure shows the commands used to create the IGMP video multicasting configuration shown in Figure 53.
TABLE 5-1
Step
Configuration Procedure for IGMP Snooping
Command
Description/Notes
Create the video VLAN
1
create vlan video vid 512
Creates a VLAN named “video” with an ID of
512.
Create the network interface for IGMP
2
set interface 0.22 ge direction network
Sets GE interface 0.22 to the Network direction.
Configure the network interface for MC Passthrough snooping
3
set igmpsnooping interface 0.22 snoopingmode mcpassthrough
Sets the network interface to
MCPASSTHROUGH snooping mode.
Add video VLAN to the network interface
4
add vlan 512 interface 0.22 frame tagged
Associates the network interface with VLAN
512
View IGMP snooping status/data for the network interface. If all is working correctly, the multicast router should be visible.
Software Reference for SwitchBlade x3100 Series Switches
525
IGMP and MLD Snooping
TABLE 5-1
Step
Command
5
show igmpsnooping
Configuring IGMP
Configuration Procedure for IGMP Snooping
Description/Notes
--- System-wide IGMP Snooping Status --Snooping Status.................................................
Duplicate Report Delay..........................................
General Query Timeout...........................................
Router Ageing Timeout...........................................
Reserved Subscribed Groups......................................
ENABLED
10 sec
20 sec
300 sec
0
Provisioning
Flood Unknown Multicast...................................... OFF
Actual
Flood Unknown Multicast...................................... DROPPED
--- System-wide IGMP VID Counts --Number of Groups Receiving
VID
Local
Pass Through
MC Stream
MC Stream
----- ------------------ ---------------512
2
2
--- System-wide IGMP Learned Router --Query
Aging
Source
VID Timeout
Timeout
Interface
MacAddress
---- -------- --------- -------------- ----------------512 11 sec
291 sec
ETH:0.22
00:0C:31:D4:60:00
Add the video VLAN to the customer interface on link 2
6
add vlan 512 interface 11.10 frame
untagged
Associates customer interface 11.10 with
VLAN 512 and configures it for untagged framing
Configure the customer interface (on link 2) for Internal snooping
7
set igmpsnooping interface 11.10 snoopingmode internal
Sets customer interface 11.10 to INTERNAL
snooping mode.
Add the video VLAN to the customer interface (link 3) to the IGMP proxy modem
8
add vlan 512 interface 11.11 frame
tagged
Associates customer interface 11.11 with
VLAN 512
Configure the customer interface (on link 3) for External snooping
9
set igmpsnooping interface 11.11 snoopingmode external
Sets the customer interface 11.11to EXTERNAL snooping mode.
View IGMP snooping status/data for the system and for the customer interfaces
Software Reference for SwitchBlade x3100 Series Switches
526
IGMP and MLD Snooping
TABLE 5-1
Step
Command
10
show igmpsnooping
Configuring IGMP
Configuration Procedure for IGMP Snooping
Description/Notes
--- System-wide IGMP Snooping Status --Snooping Status.................................................
Duplicate Report Delay..........................................
General Query Timeout...........................................
Router Ageing Timeout...........................................
Reserved Subscribed Groups......................................
ENABLED
10 sec
20 sec
300 sec
0
Provisioning
Flood Unknown Multicast...................................... OFF
Actual
Flood Unknown Multicast...................................... DROPPED
--- System-wide IGMP VID Counts --Number of Groups Receiving
Local
Pass Through
MC Stream
MC Stream
----- ------------------ ---------------512
4
4
VID
--- System-wide IGMP Learned Router --Query
Aging
Source
VID Timeout
Timeout
Interface
MacAddress
---- -------- --------- -------------- ----------------512 7 sec
287 sec ETH:0.22
00:0C:31:D4:60:00
11
show igmpsnooping card 11
Processing....
--- Card IGMP Snooping Status/Multicast (MC) Groups --Card: 11
MC Group Limit: 512
Local
Pass Through
VID
MC MAC Address
MC IP Address
MC Stream
MC Stream
---- ----------------- --------------- --------------------------------512 01:00:5E:01:01:07 225.1.1.7
ETH:11.10
ETH:11.0
01:00:5E:01:01:0B 225.1.1.11
ETH:[11.10-11]
ETH:11.0
01:00:5E:0A:0A:0A 225.10.10.10
ETH:[11.10-11]
ETH:11.0
01:00:5E:61:05:02 225.225.5.2
ETH:11.11
ETH:11.0
01:00:5E:61:05:03 225.225.5.3
ETH:[11.10-11]
ETH:11.0
5.7.6 Configuration Example - MLD
TBS
Software Reference for SwitchBlade x3100 Series Switches
527
IGMP and MLD Snooping
Configuring IGMP
5.7.7 IGMP Commands
The following tables list the commands available to configure and manage IGMP on the SBx3112 switch.
TABLE 5-2
IGMP Commands
Commands
ADD IGMPSNOOPING FLOODING
ADD IGMPSNOOPING INTERFACE MACADDRESS
ADD TRACE IGMPSNOOPING MESSAGETYPE
ADD TRACE MLDSNOOPING MESSAGETYPE
DELETE IGMPSNOOPING INTERFACE MACADDRESS
DELETE IGMPSNOOPING FLOODING
DELETE TRACE IGMPSNOOPING
DELETE TRACE MLDSNOOPING
DISABLE IGMPSNOOPING
DISABLE MLDSNOOPING VLAN
ENABLE IGMPSNOOPING
ENABLE MLDSNOOPING VLAN
RESET IGMPSNOOPING COUNTER
SET IGMPSNOOPING
SET MLDSNOOPING
SET SWITCH MULTICAST FLOODUNKNOWNS
SET SWITCH MULTICAST INTERFACE SNOOPINGMODE
SETDEFAULTS MLDSNOOPING
SETDEFAULTS SWITCH MULTICAST
SETDEFAULTS SWITCH MULTICAST INTERFACE
SHOW IGMPSNOOPING
SHOW IGMPSNOOPING COUNTER
SHOW IGMPSNOOPING FLOODING
SHOW MLDSNOOPING
SHOW SWITCH MULTICAST
SHOW TRACE IGMPSNOOPING
SHOW TRACE MLDSNOOPING
Software Reference for SwitchBlade x3100 Series Switches
528
IGMP and MLD Snooping
Configuring IGMP
ADD IGMPSNOOPING FLOODING
Syntax
ADD IGMPSNOOPING FLOODING
{ ALLSTANDARD | DVMRP | OSPFALL | OSPFDESIGNATED | RIP2 | IGRP | DHCPRELAY |
PIM | RSVP | CBT | VRRP | DXCLUSTER | CISCONHAP | HSRP | MDNS | CUSTOM=groupname GROUPADDRESS=ipaddress }
{ VLAN={ vlanname-list | vid-range
}
| VID=vid-list }
Description
This command enables flooding of particular types of IPv4 multicast traffic on particular VLANs that
already exist. By default, if the global "SWITCH MULTICAST FLOODING" setting is "NONE", IPv4
multicast control traffic is only sent to multicast pass-through or send-all interfaces. This command
overrides the global setting on the specified VLANs. (If the global "SWITCH MULTICAST FLOODING" setting is "CONTROLONLY" or "ALL", this command has no effect on system behavior, as all
IPv4 multicast control traffic will be flooded to all VLANs.)
The IPv4 multicast addresses to be flooded may be selected using one of the predefined names, or by
creating a custom name and specifying the multicast group address. Custom addresses must be within
the range 224.0.0.0/24.
Up to 64 addresses may be configured for flooding on up to 10 VLANs; the total number of addressVLAN combinations may not exceed 128. Note that "ALLSTANDARD" counts as 14 addresses.
Mode
Manager
Options
Option
Description
Range
Default
Value
FLOODING
Specify the IPv4 multicast address to flood. Select from
one of the 14 predefined addresses; or, select ALLSTANDARD to flood all of the 14 predefined addresses;
or, select CUSTOM to select a different address. If CUSTOM is specified, assign the address a name and specify
the GROUPADDRESS in standard IPv4 dotted notation
(e.g., “224.0.0.20”).
ALL
NA
VLAN
Specify the VLANs for which the IPv4 multicast
addresses are to be flooded. The VLANs may be specified as a comma-separated list of names, a list or range
of VIDs, or a combination of the two.
NA
NA
Release Note
Modified - In releases prior to Release 17.0, the VLAN parameter was named "VID”.
Note
For the SBx3100, IGMP and MLD snooping may only be enabled on up to 128 VLANs (combined).
Example
ADD IGMPSNOOPING FLOODING=ALLSTANDARD VID=401,402
Software Reference for SwitchBlade x3100 Series Switches
529
IGMP and MLD Snooping
Configuring IGMP
ADD IGMPSNOOPING INTERFACE MACADDRESS
Syntax
ADD IGMPSNOOPING INTERFACE={ type:id-range | id-range | ifname-list | ALL }
MACADDRESS={ macaddress-list | partial-macaddress-list }
Description
This command adds one or more static MAC addresses to a list of permitted host devices on a particular interface, for IGMP snooping. When one or more MAC addresses are statically configured on an
interface, IGMP snooping will only process membership reports originating from the devices matching
those addresses. This is primarily to prevent theft of service by disallowing unauthorized devices from
subscribing to multicast streams.
The MAC address may be specified as a full six-octet address (e.g., "11:22:33:AA:BB:CC"), or as a partial address of five or fewer octets (e.g., "11:22:33"). If a partial address is entered, then IGMP reports
will be accepted from hosts with MAC addresses starting with the given octets.
If this command is entered while existing hosts on the interface are actively subscribed to multicast
groups, those hosts will not be removed from the groups immediately; however, if their MAC
addresses do not match one of the statically configured entries, new IGMP reports from them will not
be processed, and they will eventually expire from the group.
Up to six MAC addresses or partial MAC addresses may be configured for each interface
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
Specify the interfaces for which the given MAC
addresses are to be statically assigned for IGMP snooping. Typically a specific MAC address will be assigned to a
single interface, but it is possible to configure addresses
on multiple interfaces by specifying a list, a range, or a
combination of the two. Specify “ALL” to add the MAC
address to all interfaces (this is not common).
NA
NA
MAC Address
Enter one or more MAC addresses or partial MAC
addresses, in a comma-separated list. Each MAC address
or partial MAC address should be entered as a series of
hexadecimal octets separated by colons
NA
NA
Release Note
NA
Note
The specified interfaces must already exist. No more than six full or partial MAC addresses may be
configured for each interface.
Example
ADD IGMPSNOOPING INTERFACE=ETH:3.1 MACADDRESS=11:22:33:AA:BB:CC
Software Reference for SwitchBlade x3100 Series Switches
530
IGMP and MLD Snooping
Configuring IGMP
ADD TRACE IGMPSNOOPING MESSAGETYPE
Syntax
ADD TRACE IGMPSNOOPING
MESSAGETYPE={ V1REPORT | V2REPORT | LEAVE | GENERALQUERY | LASTMEMBERQUERY |
ALL }
[ VLAN={ vlanname | vid | ALL } ]
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
[ MACADDRESS={ macaddress | ALL } ]
[ GROUPADDRESS={ ipaddress | ALL } ]
Description
This command adds IGMP message types to the event tracing subsystem. When IGMP message types
are added and event tracing is globally enabled (using the "ENABLE TRACE" command), the system
will capture IGMP protocol packets that are processed by the IGMP snooping software. This can be
used to help debug network or protocol problems relating to IGMP snooping.
•
When the "REPORTV1" message type is added, the system will capture IGMPv1 report messages
from a listener host.
•
When the "REPORTV2" message type is added, the system will capture IGMPv2 report messages
from a listener host.
•
When the "LEAVE" message type is added, the system will capture IGMPv2 "leave" messages
from a listener host.
•
When the "GENERALQUERY" message type is added, the system will capture IGMP general
query messages from an IGMP querier.
•
When the "LASTMEMBERQUERY" message type is added, the system will capture last-member
query (i.e., IGMPv2 group-specific query) messages from an IGMP querier.
If the "INTERFACE", MACADDRESS", and/or "GROUPADDRESS" parameters are used, tracing will be
limited to specific physical or aggregate interfaces, source MAC addresses, and/or IPv4 multicast group
addresses, respectively. Multiple invocations of the command may be used to generate multiple inclusive filters.
It is recommended that the trace buffer size be increased (using the "SET TRACE BUFFERSIZE" command) when capturing IGMP snooping events.
The parameters, when specified together in a single command, are taken to be AND'ed together. Multiple invocations of this command are OR'ed. If parameters are not specified, ALL is assumed.
Mode
Manager
Options
Option
Description
Range
Default
Value
MESSAGETYPE
Specify the type of IGMP messages to capture in the
event trace system. Specify ALL to capture all types of
messages
NA
ALL
VLAN
SpeSpecify the VLAN for which the IGMP messages are
to be traced. The VLAN may be specified by name or
VID. Specify ALL if tracing is not to be filtered by VLAN
NA
ALL
INTERFACE
Specify a filter list of physical or aggregate interfaces for
which the IGMP messages are to be traced. Specify ALL
if tracing is not to be filtered by interface.
NA
ALL
Software Reference for SwitchBlade x3100 Series Switches
531
IGMP and MLD Snooping
Configuring IGMP
Option
Description
Range
Default
Value
MACADDRESS
Specify one or more MAC addresses for which IGMP
messages are to be traced. (This is the MAC address of
the source of the multicast packet.) Specify ALL if tracing is not to be filtered by MAC address.
NA
ALL
GROUPADDRESS
Specify an IPv4 multicast group address for which IGMP
messages are to be traced. Specify ALL if tracing is not
to be filtered by group address.
NA
ALL
Release Note
Modified - In Release 17.0 the VLAN parameter is added.
Note
Traces will only be captured if event tracing is globally enabled using the "ENABLE TRACE" command.
No traces will be captured for a VLAN if IGMP snooping is not enabled for the VLAN.
Example
ADD TRACE IGMPSNOOPING MESSAGETYPE=REPORTV2
ADD TRACE IGMPSNOOPING MESSAGETYPE=GENERALQUERY
INTERFACE=ETH:1.* MACADDRESS=A4:BA:DB:E7:B3:34
ADD TRACE IGMPSNOOPING MESSAGETYPE=REPORTV1 GROUPADDRESS=224.1.10.10
Software Reference for SwitchBlade x3100 Series Switches
532
IGMP and MLD Snooping
Configuring IGMP
ADD TRACE MLDSNOOPING MESSAGETYPE
Syntax
ADD TRACE MLDSNOOPING MESSAGETYPE={ GENERALQUERY | LASTLISTENERQUERY |
V2REPORT | V1REPORT | V1DONE | ALL }
[ VLAN={ vlanname | vid | ALL } ]
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
[ IPSOURCE={ ipv6address | ALL } ]
[ GROUPADDRESS={ ipv6address
| ALL } ]
Description
This command adds MLD message types to the event tracing subsystem. When MLD message types
are added and event tracing is globally enabled (using the "ENABLE TRACE" command), the system
will capture MLD protocol packets that are processed by the MLD snooping software. This can be
used to help debug network or protocol problems relating to MLD snooping.
•
When the "GENERALQUERY" message type is added, the system will capture MLD general
query messages from an MLD querier.
•
When the "LASTLISTENERQUERY" message type is added, the system will capture last-listener
query messages from an MLD querier. This includes group-specific queries (Multicast Address
Specific Queries [MASQ]) and source-specific queries (Multicast Address Source Specific Queries
[MASSQ]).
•
When the "V2REPORT" message type is added, the system will capture MLDv2 report messages
from a listener host.
•
When the "V1REPORT" message type is added, the system will capture MLDv1 report messages
from a listener host.
•
When the "V1DONE" message type is added, the system will capture MLDv1 "done" messages
from a listener host.
If the "VLAN", "INTERFACE", IPSOURCE", and/or "GROUPADDRESS" parameters are used, tracing
will be limited to specific VLANs, physical or aggregate interfaces, source IPv6 addresses, and/or IPv6
multicast group addresses, respectively. Multiple invocations of the command may be used to generate
multiple inclusive filters.
This command is only available on the SBx3100. It is recommended that the trace buffer size be
increased (using the "SET TRACE BUFFERSIZE" command) when capturing MLD snooping events.
The parameters, when specified together in a single command, are taken to be AND'ed together. Multiple invocations of this command are OR'ed. If parameters are not specified, ALL is assumed.
Mode
Manager
Options
Option
Description
Range
Default
Value
MESSAGETYPE
Specify the type of MLD messages to capture in the
event trace system. Specify ALL to capture all types of
messages
NA
ALL
VLAN
Specify the VLAN for which the MLD messages are to
be traced. The VLAN may be specified by name or VID.
Specify ALL if tracing is not to be filtered by VLAN
NA
ALL
INTERFACE
Specify a filter list of physical or aggregate interfaces for
which the MLD messages are to be traced. Specify ALL
if tracing is not to be filtered by interface.
NA
ALL
Software Reference for SwitchBlade x3100 Series Switches
533
IGMP and MLD Snooping
Note
Configuring IGMP
Option
Description
Range
Default
Value
GROUPADDRESS
Specify an IPv6 multicast group address for which MLD
messages are to be traced. Specify ALL if tracing is not
to be filtered by group address.
NA
ALL
Traces will only be captured if event tracing is globally enabled using the "ENABLE TRACE" command.
No traces will be captured for a VLAN if MLD snooping is not enabled for the VLAN.
Example
ADD TRACE MLDSNOOPING MESSAGETYPE=V2REPORT
ADD TRACE MLDSNOOPING MESSAGETYPE=GENERALQUERY
VLAN=100-199 INTERFACE=ETH:1.* IPSOURCE=fe80::202:ffff:f100:0102
ADD TRACE MLDSNOOPING MESSAGETYPE=V1REPORT GROUPADDRESS=FF1E::101:101
Software Reference for SwitchBlade x3100 Series Switches
534
IGMP and MLD Snooping
Configuring IGMP
DELETE IGMPSNOOPING INTERFACE MACADDRESS
Syntax
DELETE IGMPSNOOPING INTERFACE={ type:id-range | id-range | ifname-list | ALL}
MACADDRESS={ macaddress-list | partial-macaddress-list | ALL }
[ FORCE ]
Description
This command deletes one or more static MAC addresses from the list of "known" host devices on a
particular interface, for IGMP snooping. If no more static MAC addresses are configured for an interface, the system will no longer limit IGMP reports to particular host MAC addresses.
The MAC address may be specified as a full six-octet address (e.g., "11:22:33:AA:BB:CC"), or as a partial address of five or fewer octets (e.g., "11:22:33"). The specification must match the one used in the
"ADD IGMPSNOOPING INTERFACE MACADDRESS" command
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
Specify the interfaces for which the given MAC
addresses are to be no longer statically assigned for
IGMP snooping. Multiple interfaces may be selected by
specifying a list, a range, or a combination thereof.
Specify “ALL” to remove the specified MAC address
from all interfaces on which they have been configured
NA
NA
MAC Address
Enter one or more MAC addresses or partial MAC
addresses, in a comma-separated list. Each MAC address
or partial MAC address should be entered as a series of
hexadecimal octets separated by colons.
NA
NA
Release Note
NA
Example
DELETE IGMPSNOOPING INTERFACE=1.23 MACADDRESS= 00:0C:25:00:13:8C
Software Reference for SwitchBlade x3100 Series Switches
535
IGMP and MLD Snooping
Configuring IGMP
DELETE IGMPSNOOPING FLOODING
Syntax
DELETE IGMPSNOOPING FLOODING
{ ALL | ALLSTANDARD | DVMRP | OSPFALL | OSPFDESIGNATED | RIP2 | IGRP |
DHCPRELAY | PIM | RSVP | CBT | VRRP | DXCLUSTER | CISCONHAP | HSRP | MDNS |
CUSTOM=groupname }
[ { VLAN={ vlanname-list | vid-range | ALL } | VID={ vid-list | ALL } } ]
[ FORCE ]
Description
This command disables flooding of particular types of IPv4 multicast traffic on particular VLANs. If the
specified type of traffic had previously been enabled for flooding, and the global "SWITCH MULTICAST FLOODING" setting is "NONE", then this command will cause flooding to cease for that particular type of traffic. (If the global "SWITCH MULTICAST FLOODING" setting is "CONTROLONLY"
or "ALL", this command has no effect on system behavior, as all IPv4 multicast control traffic will be
flooded to all VLANs.)
Mode
Manager
Options
Option
Description
Range
Default
Value
FLOODING
Specify the IPv4 multicast address for which flooding is
to cease. Select from one of the 14 predefined
addresses; or, select “ALLSTANDARD” to cease flooding for the 14 predefined addresses; or, select “CUSTOM” to cease flooding for a custom-defined group; or,
select “ALL” to cease flooding for all groups
NA
ALL
VLAN
Specify the VLANs for which the IPv4 multicast
addresses are to be flooded. The VLANs may be specified as a comma-separated list of names, a list or range
of VIDs, or a combination thereof. Specify “ALL” to
cease flooding for all VLANs.
NA
NA
FORCE
Bypasses the confirmation message
NA
NA
Release Note
Modified - In release 17.0 the parameter VLAN has been added.
Note
The specified groups must have been previously enabled for flooding on the specified VLANs.
Example
DELETE IGMPSNOOPING FLOODING ALLSTANDARD VID=401
Delete IGMPSNOOPING FLOODING ALLSTANDARD settings (Y/N)?Y
Operation Successful
Software Reference for SwitchBlade x3100 Series Switches
536
IGMP and MLD Snooping
Configuring IGMP
DELETE TRACE IGMPSNOOPING
Syntax
DELETE TRACE IGMPSNOOPING
[ MESSAGETYPE={ V1REPORT | V2REPORT | LEAVE | GENERALQUERY | LASTMEMBERQUERY
| ALL } ]
[ VLAN={ vlanname | vid | ALL } ]
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
[ MACADDRESS={ macaddress | ALL } ]
[ GROUPADDRESS={ ipaddress | ALL } ]
Description
This command deletes IGMP message types from the event trace subsystem that were previously
added using "ADD TRACE IGMPSNOOPING". When message types are deleted, message of that type
will no longer be captured in the event trace buffer.
The "INTERFACE", "MACADDRESS", and "GROUPADDRESS" filter specification must match the
specification provided in the "ADD TRACE IGMPSNOOPING" command
Mode
Manager
Options
Option
Description
Range
Default
Value
MESSAGETYPE
Specify the type of IGMP messages for which capture in
the event trace system is to be stopped. Specify ALL to
stop capturing all types of messages
NA
ALL
VLAN
Specify the VLAN that was used in the “ADD TRACE
IGMPSNOOPING” command, if any
NA
ALL
INTERFACE
Specify the interface filter list that was used in the
“ADD TRACE IGMPSNOOPING” command.
NA
ALL
MACADDRESS
Specify the MAC address filter list that was used in the
“ADD TRACE IGMPSNOOPING” command
NA
ALL
GROUPADDRESS
Specify the IPv4 multicast group filter that was used in
the “ADD TRACE IGMPSNOOPING” command.
NA
ALL
Release Note
Modified - In Release 17.0 the parameter VLAN is added.
Note
The specified trace types must have previously been added using "ADD TRACE IGMPSNOOPING".
Example
DELETE TRACE IGMPSNOOPING MESSAGETYPE=REPORTV2
DELETE TRACE IGMPSNOOPING MESSAGETYPE=GENERALQUERY
INTERFACE=ETH:1.* MACADDRESS=A4:BA:DB:E7:B3:34
DELETE TRACE IGMPSNOOPING MESSAGETYPE=REPORTV1 GROUPADDRESS=224.1.10.10
Software Reference for SwitchBlade x3100 Series Switches
537
IGMP and MLD Snooping
Configuring IGMP
DELETE TRACE MLDSNOOPING
Syntax
DELETE TRACE MLDSNOOPING
Syntax
[ MESSAGETYPE={ GENERALQUERY | LASTLISTENERQUERY | V2REPORT | V1REPORT |
V1DONE | ALL } ]
[ VLAN={ vlanname | vid | ALL } ]
[ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
[ IPSOURCE={ ipv6address | ALL } ]
[ GROUPADDRESS={ ipv6address | ALL } ]
Description
This command deletes MLD message types from the event trace subsystem that were previously added
using "ADD TRACE MLDSNOOPING". When message types are deleted, message of that type will no
longer be captured in the event trace buffer.
The "VLAN", "INTERFACE", "MACADDRESS", and "GROUPADDRESS" filter specification must match
the specification provided in the "ADD TRACE MLDSNOOPING" command
Mode
Manager
Options
Option
Description
Range
Default
Value
MESSAGETYPE
Specify the type of MLD messages for which capture in
the event trace system is to be stopped. Specify ALL to
stop capturing all types of messages
NA
ALL
VLAN
Specify the VLAN that was used in the “ADD TRACE
MLDSNOOPING” command, if any
NA
ALL
INTERFACE
Specify the interface filter list that was used in the
“ADD TRACE MLDSNOOPING” command.
NA
ALL
IPSOURCE
Specify the IPv6 source address filter list that was used
in the “ADD TRACE MLDSNOOPING” command.
NA
ALL
GROUPADDRESS
Specify the IPv6 multicast group filter that was used in
the “ADD TRACE MLDSNOOPING” command.
NA
ALL
Note
The specified trace types must have previously been added using "ADD TRACE MLDSNOOPING".
Example
DELETE TRACE MLDSNOOPING
DELETE TRACE MLDSNOOPING
INTERFACE=ETH:1.*
DELETE TRACE MLDSNOOPING
MESSAGETYPE=V2REPORT
MESSAGETYPE=GENERALQUERY VLAN=100-199
IPSOURCE=fe80::202:ffff:f100:0102
MESSAGETYPE=V1REPORT GROUPADDRESS=FF1E::101:101
Software Reference for SwitchBlade x3100 Series Switches
538
IGMP and MLD Snooping
Configuring IGMP
DISABLE IGMPSNOOPING
Syntax
DISABLE IGMPSNOOPING
{ INTERFACE={ type:id-range | id-range | ifname-list | ALL } ]
| VLAN={ vlanname-list | vid-range | ALL } }
[ FORCE ]
Description
This command disables IGMP snooping on the specified interfaces or VLANs. By default, IGMP snooping is disabled on all VLANs but enabled on all interfaces. For IGMP snooping to be operational on a
VLAN-interface pair, it must be enabled for both the VLAN and the interface.
When IGMP snooping is disabled on a VLAN, the system will cease intercepting or examining IGMP
protocol packets on that VLAN. All learned groups will be cleared from the IGMP snooping system for
the VLAN; therefore, all subsequent IPv4 multicast groups received on the VLAN will be treated as
unknown multicast, subject to the flooding rules specified by the "SWITCH MULTICAST FLOODUNKNOWNS" system setting (see "SET SWITCH MULTICAST". If an active querier has been detected
on any of the specified VLANs, a warning message will appear.
When IGMP snooping is disabled on an interface, the system will not intercept or examine IGMP protocol packets from that interface. All learned groups will be cleared from the IGMP snooping for that
interface
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
When this option is selected, IGMP snooping will be disabled for one or more interfaces. Specify the interfaces
for which IGMP snooping is to be disabled. Interfaces
may be specified as a list, a range, or a combination
thereof. Specify “ALL” to disable IGMP snooping for all
interfaces.
NA
NA
VLAN
When this option is selected, IGMP snooping will be disabled for one or more VLANs. Specify the VLANs for
which IGMP snooping is to be disabled. The VLANs may
be specified as a comma-separated list of names, a list or
range of VIDs, or a combination thereof. Specify ALL to
disable IGMP snooping on all existing VLANs.
NA
NA
FORCE
This command will display a warning and prompt for
confirmation if an active querier has been detected on
any specified VLANs. Use the “FORCE” option to
bypass the confirmation prompt.
NA
NA
Release Note
Modified - In Release 17.0 the options VLAN and FORCE are added.
Note
Any explicitly specified VLANs or interfaces must already exist.
Example
DISABLE IGMPSNOOPING INTERFACE=ETH:3.4
DISABLE IGMPSNOOPING VLAN=301-305,310-390
Software Reference for SwitchBlade x3100 Series Switches
539
IGMP and MLD Snooping
Configuring IGMP
DISABLE MLDSNOOPING VLAN
Syntax
DISABLE MLDSNOOPING VLAN={ vlanname-list | vid-range | ALL }
[ FORCE ]
Description
This command disables MLD snooping on the specified VLANs.
When MLD snooping is disabled on a VLAN, the system will cease intercepting or examing MLD protocol packets on that VLAN. All learned groups will be cleared from the MLD snooping system for the
VLAN; therefore, all subsequent IPv6 multicast groups received on the VLAN will be treated as
unknown multicast, subject to the flooding rules specified by the SWITCH MULTICAST FLOODUNKNOWNS system setting (see SET SWITCH MULTICAST FLOODUNKNOWNS). If an active querier has been detected on any of the specified VLANs, a warning message will appear.
Mode
Manager
Options
Option
Description
Range
Default
Value
VLAN
Specify the VLANs for which MLD snooping is to be disabled. The VLANs may be specified as a comma-separated list of names, a list or range of VIDs, or a
combination thereof. Specify ALL to disable MLD
snooping on all existing VLANs.
NA
NA
FORCE
This command will display a warning and prompt for
confirmation if an active querier has been detected on
any specified VLANs. Use the “FORCE” option to
bypass the confirmation prompt.
NA
NA
Example
officer SEC>> DISABLE MLDSNOOPING VLAN=301-305,310-390
Software Reference for SwitchBlade x3100 Series Switches
540
IGMP and MLD Snooping
Configuring IGMP
ENABLE IGMPSNOOPING
Syntax
ENABLE IGMPSNOOPING
{ INTERFACE={ type:id-range | id-range | ifname-list | ALL }
| VLAN={ vlanname-list | vid-range | ALL } }
Description
This command enables IGMP snooping on the specified interfaces or VLANs.
When IGMP snooping is enabled on a VLAN and interface, the system will look for IGMP reports to
determine if a host on the VLAN and interface has subscribed to a multicast group, so that the group
can be forwarded to the VLAN and interface appropriately. The system will also look for IGMP queries
and other protocol packets to dynamically determine the interface on which the multicast router is
connected, so that it can determine to which interfaces the reports are to be sent.
By default, IGMP snooping is enabled on all interfaces but disabled on all VLANs. IGMP is not functional on a VLAN-interface pair unless it is enabled on both the VLAN and interface. Therefore, by
default, all IPv4 multicast groups are treated as unknown. If "ENABLE IGMPSNOOPING VLAN=ALL"
is entered, all existing VLANs will be enabled for IGMP snooping; however, new VLANs that are created later will have IGMP snooping disabled by default.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
When this option is selected, IGMP snooping will be
enabled for one or more interfaces. Specify the interfaces for which IGMP snooping is to be enabled. Interfaces may be specified as a list, a range, or a combination
thereof. Specify “ALL” to enable IGMP snooping for all
interfaces
NA
NA
VLAN
When this option is selected, IGMP snooping will be
enabled for one or more VLANs. Specify the VLANs for
which IGMP snooping is to be enabled. The VLANs may
be specified as a comma-separated list of names, a list or
range of VIDs, or a combination thereof. Specify ALL to
enable IGMP snooping on all existing VLANs
NA
NA
Release Note
In release 17.0 the option VLAN is added.
Note
On the SBx3100, only up to 128 VLANs may be enabled for MLD or IGMP snooping (combined).
When the system is upgraded from a release prior to Release 17.0, the system may temporarily be in a
state where more than 128 VLANs are enabled for IGMP snooping. Certain operations will be disabled
while the system in this state. See Enabling IGMP and MLD Snooping (per-VLAN/Interface).
Example
CREATE VLAN VID=301-400
ENABLE IGMPSNOOPING VLAN=301-400
ENABLE IGMPSNOOPING INTERFACE=ETH:3.4
Software Reference for SwitchBlade x3100 Series Switches
541
IGMP and MLD Snooping
Configuring IGMP
ENABLE MLDSNOOPING VLAN
Syntax
ENABLE MLDSNOOPING VLAN={ vlanname-list | vid-range | ALL }
Description
This command enables MLD snooping on the specified VLANs, which must already exist. When MLD
snooping is enabled, the system will look for MLD reports to determine which interfaces are listening
to which multicast groups, so that those groups can be forwarded to those interfaces appropriately.
The system will also look for MLD queries and other protocol packets to dynamically determine the
interface on which the multicast router is connected, so that it can determine to which interfaces the
reports are to be sent.
By default, MLD snooping is disabled on all VLANs, so all IPv6 multicast groups are treated as
unknown. If "ENABLE MLDSNOOPING VLAN=ALL" is entered, all existing VLANs will be enabled for
MLD snooping; however, new VLANs that are created later will have MLD snooping disabled by
default.
This command is only available on the SBx3100. Only up to 128 VLANs may be enabled for MLD or
IGMP snooping (combined). When the system is upgraded from a release prior to Release 17.0, the
system may temporarily be in a state where more than 128 VLANs are enabled for IGMP snooping.
Certain operations will be disabled while the system in this. See Enabling IGMP and MLD Snooping
(per-VLAN/Interface).
Mode
Manager
Options
Option
Description
Range
Default
Value
VLAN
Specify the VLANs for which MLD snooping is to be
enabled. The VLANs may be specified as a comma-separated list of names, a list or range of VIDs, or a combination thereof. Specify ALL to enable MLD snooping on
all existing VLANs.
NA
NA
Example
CREATE VLAN VID=301-400
officer SEC>> ENABLE MLDSNOOPING VLAN=301-400
Software Reference for SwitchBlade x3100 Series Switches
542
IGMP and MLD Snooping
Configuring IGMP
RESET IGMPSNOOPING COUNTER
Syntax
RESET IGMPSNOOPING COUNTER
[ { STANDARD | MESSAGERESPONSE
| INTERFACE={ type:id-range | id-range | ifname-list | ALL }
| CARD={ slot-list | ALL } } ]
Description
This command resets statistical counters related to IGMP snooping back to zero. Message counts are
maintained for each interface. They may be reset on specific interfaces, for all interfaces on a card, or
system-wide. Message response time counters are global.
Mode
Manager
Options
Option
Description
Range
Default
Value
COUNTER
STANDARD - This parameter is optional. When specified, the command will reset message counts for all
interfaces system-wide.
NA
ALL
MESSAGERESPONSE - This parameter is optional.
When specified, the command will only reset the message response time counters
INTERFACE
This parameter is optional. When specified, the command will reset message counters for the specified
interfaces. Interfaces may be specified as a list, a range,
or a combination thereof. Specify “INTERFACE=ALL” to
reset IGMP message counts for all interfaces; this is
equivalent to specifying “STANDARD”, since the system-wide count is a sum of all the per-interface counts
NA
ALL
CARD
This parameter is optional. When specified, the command will reset message counters for interfaces on the
specified cards. Card slot numbers may be specified as a
list, a range, or a combination thereof. Specify
“CARD=ALL” to reset IGMP message counts for interfaces on all cards; this is equivalent to specifying “STANDARD”, since the system-wide count is a sum of all the
per-interface counts
NA
ALL
Release Note
NA
Example
RESET igmpsnooping COUNTER INTERFACE=ETH:3.*
Software Reference for SwitchBlade x3100 Series Switches
543
IGMP and MLD Snooping
Configuring IGMP
SET IGMPSNOOPING
Syntax
SET IGMPSNOOPING
{ INTERFACE={ type:id-range | id-range | ifname-list | ALL }
SNOOPINGMODE={ INTERNAL | EXTERNAL | MCPASSTHROUGH } |
[ FLOODUNKNOWNS={ ON | OFF } ]
[ ROUTERAGEINGTIMER=10..1200 ]
[ GENQUERYTIMER=5..120 ]
[ DUPREPORTTIMER={ OFF | 1..120 } ]
[ IMGCOMPATIBILITYMODE={ ON | OFF } ] }
Description
The SET IGMPSNOOPING command is used to set various configurable IGMP settings in the switch.
These being setting the multicast stream count per slot, the flooding of unknown multicast packets,
and various timers are options you can set.
Mode
Manager
Options
Option
Description
Range
Default
Value
INTERFACE
The interface(s) for setting the MCASTGROUPLIMIT
NA
NA
SNOOPINGMODE
This option is used when defining IGMPSNOOPING
for an interface or set of interfaces.
NA
NA
NA
No
INTERNAL - The system will reconfigure HW to
limit the forwarding of multicast packets only to the
interface(s) that have expressed interest in the multicast group. IGMP Snooping will perform it's normal processing actions, such as source MAC
validation of IGMP Leaves AND set-top-box mobility.
EXTERNAL - The system will reconfigure HW to
limit the forwarding of multicast packets only to the
interface(s) that have expressed interest in the multicast group. IGMP Snooping will perform modified
processing actions, such as skipping source MAC
validation of IGMP Leaves AND set-top-box mobility. This mode will allow an IGMP Snooper behind
these interface(s).
MCPASSTHROUGH - The system will NOT reconfigure HW to limit the forwarding of multicast packets only to the interface(s) that have expressed
interest in the multicast group. Instead, the system
will FLOOD all multicast traffic, that is received
from a MC router, to all interface(s) in the same
VLAN AND that are in MCPASSTHROUGH mode.
*NOTE: This mode is ONLY supported on NETWORK direction interface(s).
FLOODUNKNOWNS
Indicates whether the unknown multicast packets
will be flooded or dropped.
Software Reference for SwitchBlade x3100 Series Switches
544
IGMP and MLD Snooping
Configuring IGMP
Default
Value
Option
Description
Range
ROUTERAGEINGTIMER
Specifies how long to wait before cleaning up ALL
IGMP related information associated with a learned
multicast router. If no multicast related packets have
been received, on the port we learned the router
on, (IGMP general query packets, OSPF multicast
hello, PIMv1/PIMv2, or DVMRP), all associated
IGMP information will be cleaned up.
NA
300 seconds (5
minutes)
GENQUERYTIMER
Allows you to specify how long after an IGMP general query is received, before the switch cleans up
any non-IGMP reporting subscriber devices.
NA
20 seconds
DUPREPORTTIMER
Time delay before sending duplicate IGMP reports
to multicast router(s)
NA
10 seconds
NA
OFF
Multiple subscriber devices may send up duplicate
multicast group information in an IGMP report (i.e.,
EPG) after a general query is received. Usually, ALL
of these reports would be sent to the multicast
router(s). This option controls the time delay, which
is used to determine when another duplicate report
would be sent to the multicast router(s).
IMGCOMPATIBILITYMODE
Used to support IGMP and iMGs in proxy mode
when IP ACLs and/or IP Classifiers are also used.
The two available modes are:
- ON - IGMP packets are NOT applied against filters.
- OFF - IGMP packets are applied against filters.
Note that If iMGs (in proxy mode) are used with
the mode set to OFF, received IGMP packets are
applied against filters and MAY get dropped unexpectedly.
Release Note
Modified - In release 17.0, the CARD and MCASTGROUPLIMIT options are removed.
Example
SET IGMPSNOOPING ROUTERAGEINGTIMER=250 GENQUERYTIMER=30
SET IGMPSNOOPING DUPREPORTTIMER=OFF
Software Reference for SwitchBlade x3100 Series Switches
545
IGMP and MLD Snooping
Configuring IGMP
SET MLDSNOOPING
Syntax
SET MLDSNOOPING
[ ROUTERAGEINGTIMER=10..1200 ]
[ GENQUERYTIMER=5..120 ]
[ DUPREPORTTIMER={ OFF | 1..120 } ]
Description
This command sets global parameters for MLD snooping. The "ROUTERAGEINGTIMER" parameter
sets the number of seconds after which a dynamically detected multicast router will be removed from
the system (i.e., the interface on which the router was detected will no longer be designated as a
dynamic multicast router port). The "GENQUERYTIMER" parameter sets the expiration time for a
host in a multicast group; after this amount of time passes since a query message was seen from the
querier, the host will be removed from the group. The "DUPREPORTTIMER" specifies the amount of
time during which duplicate MLDv1 report messages for the same group will be suppressed (prevented
from being forwarded to MLD queriers).
Mode
Manager
Options
Default
Value
Option
Description
Range
ROUTERAGEINGTIMER
This parameter is optional. Specifies the number of seconds after which a dynamically detected multicast
router will be removed from the system due to inactivity.
10-1200
300 seconds (5
minutes)
GENQUERYTIMER
This parameter is optional. Specifies the number of seconds after a general query message that a host will be
removed from a multicast group, if the host has not
responded to the query with a report for the group.
5-120
20 seconds
DUPREPORTTIMER
This parameter is optional. For MLDv1 reports only,
specifies the number of seconds during which duplicate
report messages for the same group will be suppressed
(prevented from being forwarded to MLD queriers).
This setting does not affect MLDv2 reports.
1-120
10 seconds
Example
SET MLDSNOOPING ROUTERAGEINGTIMER=250 GENQUERYTIMER=30
SET MLDSNOOPING DUPREPORTTIMER=OFF
Software Reference for SwitchBlade x3100 Series Switches
546
IGMP and MLD Snooping
Configuring IGMP
SET SWITCH MULTICAST FLOODUNKNOWNS
Syntax
SET SWITCH MULTICAST FLOODUNKNOWNS={ ALL | NONE | CONTROLONLY }
Description
This command controls the handling of layer-2 multicast traffic in the switch.The "FLOODUNKNOWNS" parameter specifies how the system should globally handle multicast data that is not associated with a group learned by IGMP or MLD snooping.
Mode
•
If the parameter is set to "ALL", all unknown multicast data traffic is flooded to all interfaces on the
originating VLAN (i.e., the VLAN on which the packet arrived).
•
If it is set to "NONE", unknown multicast traffic data traffic is only sent to multicast pass-through
or send-all interfaces , or to multicast router port interfaces on an SBx3100, by default. However,
flooding can be enabled for particular addresses or protocols on particular VLANs using the “ADD
IGMPSNOOPING FLOODING" command.
•
If it is set to "CONTROLONLY", IPv4 and IPv6 protocol control packets are flooded to interfaces
on the originating VLAN; other unknown multicast data traffic is only sent to multicast send-all
interfaces by default. Protocol control packets are defined as packets where the destination is recognized as well-known multicast address (IPv6 addresses in the range FF0n::m:0:0/98 or
FF0n::m:FF00:0/104, where n is a value from 0-F and m is a value from 0-2; or, IPv4 addresses in
the range 224.0.0.0/24).
Manager
Options
Option
Description
Range
Default
Value
FLOODUNKNOWNS
Specify how unknown multicast packets are to be handled globally by the system. Refer to the Description.
NA
NONE
Release Note
New - In release 17.0, this is a new command. The "FLOODUNKNOWNS" parameter was an IGMPspecific parameter on the "SET IGMPSNOOPING" command in releases prior to Release 17.0. For
more information on the change to the SET IGMPSNOOPING command.)
Note
On the SBx3100, this command may not be used if IGMP or MLD snooping is enabled for more than
128 VLANs. This should only occur if the system has been upgraded from a release prior to Release
17.0 (see Enabling IGMP and MLD Snooping (per-VLAN/Interface).
Example
SET SWITCH MULTICAST FLOODUNKNOWNS=CONTROLONLY
Software Reference for SwitchBlade x3100 Series Switches
547
IGMP and MLD Snooping
Configuring IGMP
SET SWITCH MULTICAST INTERFACE SNOOPINGMODE
Syntax
SET SWITCH MULTICAST
INTERFACE={ type:id-range | id-range | ifname-list | ALL }
SNOOPINGMODE={ INTERNAL | EXTERNAL | PASSTHROUGH | SENDALL }
Description
This command controls the handling of layer-2 multicast traffic in the switch for an interface.
The "SNOOPINGMODE" parameter controls how the system should handle multicast data traffic on
a per-interface basis.
If the mode is set to "INTERNAL", the IGMP and MLD snooping processes look for report messages
on the interface, and the system only forwards a known multicast group to the interface if a report has
been seen for the group. "Leave" or "done" messages for a multicast group are only processed if the listener host originating the message is known to be subscribed to the group. When the list of known listener hosts for a group-VLAN-interface triplet is empty, the group is no longer forwarded to the
VLAN-interface pair. Since "INTERNAL" snooping causes the system to track each listener host on a
VLAN-interface, this also enables duplicate report suppression and last leave processing to occur on
the interface.
If the mode is set "EXTERNAL", the behavior is the same as "INTERNAL" except that system does not
track individual listener hosts on an interface, and thus no attempt is made to validate the "leave" message against a list of known hosts. Instead, the system stops forwarding the multicast group to the
VLAN-interface pair upon receipt of any "leave" or "done" message for that group, regardless of which
listener host sent the message. Duplicate report suppression and last leave processing will not be performed on an interface set to "EXTERNAL" snooping. This setting is typically used when there is a
downstream IGMP or MLDv1 snooping device that is already performing last-leave processing or is
behaving as a snooping proxy device, or if there is only one listener host connected to the interface.
(This setting should not be used with a downstream MLDv2 snooping device, unless the device is acting as a layer-2 MLD proxy.)
If the mode is set to "PASSTHROUGH", the interface is designated as a multicast pass-through interface; all multicast traffic on any VLANs associated with the interface will always be forwarded to it as
long as the traffic arrived on another pass-through interface . IGMP snooping and MLD snooping processes do not attempt to detect listeners on the interface. There is no hard limit to the number of
interfaces designated as multicast pass-through interfaces. However, note that excessive numbers of
multicast pass-through interfaces may cause increased network usage, since more multicast traffic may
be flooded.
If the mode is set to "SENDALL", the interface is designated as a multicast send-all interface. It behaves
like a multicast pass-through interface, except that multicast traffic is always sent to the interface
regardless of whether or not it arrived on a pass-through or send-all interface.
The multicast pass-through and send-all designations are generally used for interfaces involved in
redundant network topologies such as EPSR or STP, when the direction of multicast traffic flow
between switching nodes may need to change as a result of a topology change; or, for interfaces that
interconnect daisy-chained switches.
The default snooping mode for an interface depends on the type of card on which the interface
resides. For interfaces on the SBx3100 XE4 and XE6SFP cards, the default mode is "SENDALL". For all
other interface types, the default mode is "INTERNAL".
Mode
Manager
Software Reference for SwitchBlade x3100 Series Switches
548
IGMP and MLD Snooping
Configuring IGMP
Options
Note
Option
Description
Range
Default
Value
INTERFACE
Specify one or more physical or aggregate interfaces for
which to change the multicast settings. Interfaces may be
specified as a list, a range, or a combination thereof.
Specify “ALL” to change the multicast settings for all
interfaces.
NA
NA
SNOOPINGMODE
Controls how the system should handle multicast
data traffic on a per-interface basis. Refer to the
description.
NA
determined by
cardtype
In Release 17.0 the SBx3100 does not support "PASSTHROUGH" and the iMAP does not support
"SENDALL". (In releases prior to Release 17.0, the SBx3100 incorrectly designated send-all interfaces
as "PASSTHROUGH". Interfaces marked "PASSTHROUGH" in earlier releases are corrected to "SENDALL" during the software upgrade process. See "Multicast Pass-Through changed to Multicast SendAll" TBS.) Since they are similar in function, interfaces on the SBx3100 should be configured for "SENDALL" in situations that would otherwise call for "PASSTHROUGH"; conversely, interfaces on the
iMAP should be configured for "PASSTHROUGH" in situations that would otherwise call for "SENDALL".
Example
SET SWITCH MULTICAST INTERFACE=ETH:[1.1-2] SNOOPINGMODE=SENDALL
Software Reference for SwitchBlade x3100 Series Switches
549
IGMP and MLD Snooping
Configuring IGMP
SETDEFAULTS MLDSNOOPING
Syntax
SETDEFAULTS MLDSNOOPING [ ROUTERAGEINGTIMER ] [ GENQUERYTIMER ]
[ DUPREPORTTIMER ]
Description
This command sets global parameters for MLD snooping to their default values. If one or more parameters are specified, those parameters will be set back to their default values. If no parameters are specified, then all parameters are set to their default values.
Mode
Manager
Options
Default
Value
Option
Description
Range
ROUTERAGEINGTIMER
Specifies how long to wait before cleaning up ALL IGMP
related information associated with a learned multicast
router. If no multicast related packets have been
received, on the port we learned the router on, (IGMP
general query packets, OSPF multicast hello, PIMv1/
PIMv2, or DVMRP), all associated IGMP information will
be cleaned up.
NA
300 seconds (5
minutes)
GENQUERYTIMER
Allows you to specify how long after an IGMP general
query is received, before the switch cleans up any nonIGMP reporting subscriber devices.
NA
20 seconds
DUPREPORTTIMER
Time delay before sending duplicate IGMP reports to
multicast router(s)
NA
10 seconds
Multiple subscriber devices may send up duplicate multicast group information in an IGMP report (i.e., EPG)
after a general query is received. Usually, ALL of these
reports would be sent to the multicast router(s). This
option controls the time delay, which is used to determine when another duplicate report would be sent to
the multicast router(s).
Note
The specified interfaces must already exist.
Example
SETDEFAULTS MLDSNOOPING ROUTERAGEINGTIMER
Software Reference for SwitchBlade x3100 Series Switches
550
IGMP and MLD Snooping
Configuring IGMP
SETDEFAULTS SWITCH MULTICAST
Syntax
SETDEFAULTS SWITCH MULTICAST [ FLOODUNKNOWNS ]
Description
This command sets the unknown multicast data traffic handling behavior to the system default,
"NONE". Multicast groups that have not been learned by IGMP snooping or MLD snooping will not be
flooded unless the destination address category has been designated for flooding on a VLAN using the
"ADD SWITCH MULTICAST FLOODING" command or ADD IGMPSNOOPING FLOODING command.
Mode
Manager
Options
Option
Description
Range
Default
Value
FLOODUNKNOWNS
This parameter is optional. It indicates that the FLOODUNKNOWNS parameter is to be set to its default
value, “NONE”. (Since there are no other global
SWITCH MULTICAST attributes, the command
behaves the same way whether this parameter is specified or not.)
NA
NONE
Example
officer SEC>> SETDEFAULTS SWITCH MULTICAST
Software Reference for SwitchBlade x3100 Series Switches
551
IGMP and MLD Snooping
Configuring IGMP
SETDEFAULTS SWITCH MULTICAST INTERFACE
Syntax
SETDEFAULTS SWITCH MULTICAST
INTERFACE={ type:id-range | id-range | ifname-list | ALL }
[ SNOOPINGMODE ]
Description
This command changes the multicast snooping mode for the specified interfaces to the default value
for each interface. The default setting for an interface depends on the type of card on which the interface resides.
Mode
Manager
Options
Note
Option
Description
Range
Default
Value
INTERFACE
Specify one or more physical or aggregate interfaces for
which to change the multicast snooping mode, for both
IGMP and MLD snooping. Interfaces may be specified as
a list, a range, or a combination thereof. This designation applies across all VLANs on the interfaces.
NA
NA
SNOOPINGMODE
This parameter is optional. It indicates that the
“SNOOPINGMODE” parameter is to be set to its
default value. (Since there are no other SWITCH MULTICAST attributes for interfaces, the command behaves
the same way whether this parameter is specified or
not.)
NA
Set by
interface
card type
For interfaces on the SBx3100 XE4 and XE6SFP cards, the default mode is "SENDALL". For all other
interface types, the default mode is "INTERNAL.
Example
officer SEC>> SETDEFAULTS SWITCH MULTICAST INTERFACE=ETH:[1.1-2]
Software Reference for SwitchBlade x3100 Series Switches
552
IGMP and MLD Snooping
Configuring IGMP
SHOW IGMPSNOOPING
Syntax
Description
SHOW IGMPSNOOPING
[ { VLAN={ vlanname-list | vid-range |
| INTERFACE={ type:id-range | id-range
| MCASTGROUPS
[ { VLAN={ vlanname-list | vid-range |
| CARD={ slot-list | ALL }
| INTERFACE={ type:id-range | id-range
} ]
[ FULL ] } ]
ALL }
| ifname-list | ALL }[ FULL ]
ALL }
| ifname-list | ALL }
This command displays information about IGMP snooping. If the "MCASTGROUPS" option is specified,
the command displays information about multicast groups currently known by the IGMP snooping processes; otherwise, it displays IGMP snooping configuration data.
The command may show information by VLAN, interface, or card. More detail is available with some
parameter combinations if the FULL option is specified. If the command is issued with no parameters,
system-wide configuration data will be shown
Mode
Manager
Options
Option
Description
Range
Default Value
VLAN
This parameter is optional. When specified, the command will display the IGMP snooping state for each
specified VLAN and a list of static or dynamic multicast
router ports. VLANs may be specified as a comma-separated list, a range of VIDs, or a combination thereof.
Specify “VLAN=ALL” to display the IGMP snooping
state for all VLANs
NA
system-wide settings (not perVLAN information)
INTERFACE
Specify one or more physical or aggregate interfaces for
which to display IGMP snooping configuration data.
Interfaces may be specified as a list, a range, or a combination thereof. When this parameter is used, the command will display the IGMP snooping state for each
specified interface, along with the interface’s multicast
snooping mode and the number of static multicast MAC
addresses associated with the interface. When used in
conjunction with the FULL option, a list of full or partial
static MAC addresses associated with the interface will
be shown
NA
system-wide settings (not perinterface information)
MACASTGROUP
Specify the command will display multicast groups that
have been learned by IGMP snooping rather than IGMP
snooping configuration data. The groups shown may be
filtered using the optional parameters below.
NA
NA
- VLAN
This parameter is optional when the “MCASTGROUPS”
parameter is used. Show a count of learned multicast
groups for each VLAN. When used in conjunction with
the “FULL” option, the command will display the multicast MAC and IP address of each group, and the slot
numbers of the cards that are receiving the groups.
Specify “VLAN=ALL” to show multicast group information about all VLANs
NA
ALL
Software Reference for SwitchBlade x3100 Series Switches
553
IGMP and MLD Snooping
Release Note
Configuring IGMP
Option
Description
Range
Default Value
- CARD
This parameter is optional when the “MCASTGROUPS”
parameter is used. Specify one or more card slot numbers for which to display IGMP multicast groups. Cards
may be specfied as a comma-separated list, a range, or a
combination thereof. When this parameter is used, the
command will display the number of multicast groups
being received by each card and VLAN. When used in
conjunction with the “FULL” option, the command will
display the multicast MAC and IP address of each group.
Specify “CARD=ALL” to show multicast group information about all cards
NA
Display by
VLAN not filtered by card
- INTERFACE
This parameter is optional when the “MCASTGROUPS”
parameter is used. Specify the physical or aggregate
interfaces for which to display IGMP multicast group
information. Interfaces may be specified as a list, a range,
or a combination thereof. When this parameter is used,
the command will display the number of active subscriber host MAC addresses detected by IGMP snooping on the interface, and the number of multicast groups
currently being sent to the interface. When used in conjunction with the “FULL” option, the command will display each host’s MAC address and the multicast IP
address of each group. Specify “INTERFACE=ALL” to
show multicast group information about all interfaces
NA
Display by
VLAN not filtered by interface
FULL
This parameter is optional. When specified with certain
parameters (see parameter descriptions above), information will be shown in detail rather than in tabular
summary format. This will allow for more information
to be shown, but will greatly increase the length of the
output
NA
Display summary
information only
Modified - The command is updated in Release 17.0 to include the VLAN options.
Example
officer SEC>> SHOW IGMPSNOOPING INTERFACE=ETH:8.11,ETH:8.13
--- Interface IGMP Snooping Configuration --Static MAC
Interface
State
Snooping Mode
Addresses
-------------- -------- -------------- ----------ETH:[8.11]
Enabled Internal
0
ETH:[8.13]
Enabled Internal
0
officer SEC>> SHOW IGMPSNOOPING INTERFACE=ETH:8.11 FULL
--- Interface IGMP Snooping Configuration --Interface....................... ETH:[8.11]
Interface IGMP State............ Enabled
IGMP Snooping Mode.............. Internal
Software Reference for SwitchBlade x3100 Series Switches
554
IGMP and MLD Snooping
Configuring IGMP
SHOW IGMPSNOOPING COUNTER
Syntax
SHOW IGMPSNOOPING COUNTER
[ { STANDARD
| MESSAGERESPONSE
| INTERFACE={ type:id-range | id-range | ifname-list | ALL }
| CARD={ slot-list | ALL }
} ]
Description
This command displays a count of IGMP messages that have been observed by the IGMP snooping process. If the "MESSAGERESPONSE" parameter is selected, it displays the number of responses to an
IGMP query within specific time ranges. This command may be useful in diagnosing the operation of
the IGMP protocol.
Packet counts are divided into "good" packets and "error" packets. An "error" packet is one that could
not be parsed by the IGMP snooping process; this may be due to an incompatibility with third-party
host devices or routers.
Mode
Manager
Options
Release Note
Option
Description
Range
Default Value
STANDARD
This parameter is optional. When specified, the command will only display the “standard” counters, which is
a system-wide count of IGMP messages by message
type.
NA
Display both
STANDARD
(global) and
MESSAGERESPONSE counters
MESSAGERESPONSE
This parameter is optional. When specified, the command will only display message response counters,
which indicates the number of responses to an IGMP
query within specific time ranges
NA
Display both
STANDARD
(global) and
MESSAGERESPONSE counters
INTERFACE
This parameter is optional. When specified, the command will display a count of IGMP messages per interface, by message type. Interfaces may be specified as a
list, a range, or a combination thereof. Specify “INTERFACE=ALL” to show IGMP message counts for all interfaces.
NA
Display both
STANDARD
(global) and
MESSAGERESPONSE counters
CARD
This parameter is optional. When specified, the command will display a count of IGMP messages per card, by
message type. Interfaces may be specified as a list, a
range, or a combination thereof. Specify “INTERFACE=ALL” to show IGMP message counts for all interfaces
NA
Display both
STANDARD
(global) and
MESSAGERESPONSE counters
New - In Release 17.0 this command is added.
Example
SHOW IGMPSNOOPING COUNTER STANDARD
--- IGMP Message Counters ---
Software Reference for SwitchBlade x3100 Series Switches
555
IGMP and MLD Snooping
Configuring IGMP
Message Type
Good Count
Error Count
-------------- -------------- -------------Report ver 1
0
0
Report ver 2
415
0
Leave
390
0
General Query
205
0
Grp Spec Query
315
0
officer SEC>> SHOW IGMPSNOOPING COUNTER MESSAGERESPONSE
--- IGMP System-level Message Response Counters --Response Range
--------------0-249
(msec)
250-499 (msec)
500-749 (msec)
750-1000 (msec)
1-2 (sec)
2-3 (sec)
3-4 (sec)
4+ (sec)
Last Updated
Message Count
---------------------- -------------2012-04-01 13:00:17
250
2012-04-01 13:00:00
10
2012-04-01 13:00:00
0
2012-04-01 13:00:00
0
2012-04-01 13:00:00
125
2012-04-01 13:00:00
30
2012-04-01 13:00:00
0
2012-04-01 13:00:00
0
Software Reference for SwitchBlade x3100 Series Switches
556
IGMP and MLD Snooping
Configuring IGMP
SHOW IGMPSNOOPING FLOODING
Syntax
SHOW IGMPSNOOPING FLOODING
Description
This command displays the IPv4 protocols that have been enabled for flooding on one or more VLANs,
using the "ADD IGMPSNOOPING FLOODING" command.
Mode
Manager
Options
NA
Release Note
NA
Example
SHOW IGMPSNOOPING FLOODING
--- IGMP Snooping Static Flooding Groups --Multicast Group Name
-------------------MDNS
OSPFDESIGNATED
PIM
RIP2
RSVP
VRRP
Multicast MAC
----------------01:00:5E:00:00:FB
01:00:5E:00:00:06
01:00:5E:00:00:0D
01:00:5E:00:00:09
01:00:5E:00:00:0E
01:00:5E:00:00:12
Multicast IP
--------------224.0.0.251
224.0.0.6
224.0.0.13
224.0.0.9
224.0.0.14
224.0.0.18
Software Reference for SwitchBlade x3100 Series Switches
VLAN(s)
----------520-529
520-529
520-529
520-529
512
512
557
IGMP and MLD Snooping
Configuring IGMP
SHOW MLDSNOOPING
Syntax
SHOW MLDSNOOPING
[ { VLAN={ vlanname-list | vid-range | ALL }
[ FULL ]
| MCASTGROUPS
[ { GROUP={ groupaddress-list | ALL }
| VLAN={ vlanname-list | vid-range | ALL }
| INTERFACE={ type:id-range | id-range | ifname-list | ALL }
} ]
[ FULL ]
} ]
Description
This command displays information about the MLD snooping process. The "SHOW MLDSNOOPING"
command with no parameters shows global settings related to MLD snooping.
If the "VLAN" parameter is used, the command will display the MLD snooping state for the specified
VLANs (enabled or disabled), as well as any multicast router ports that have been configured or
dynamically detected for the VLAN.
If the "MCASTGROUPS" parameter is used, the command shows known IPv6 multicast groups that
have been discovered by MLD snooping. The list of groups shown may be filtered by multicast group
address, by VLAN, or by interface.
Mode
Manager
Options
Option
Description
Range
Default Value
VLAN
This parameter is optional. When specified, the command will display the MLD snooping state for each specified VLAN and a list of static or dynamic multicast
router ports. VLANs may be specified as a comma-separated list, a range of VIDs, or a combination thereof.
Specify “VLAN=ALL” to display the MLD snooping state
for all VLANs
NA
Display only system-wide settings, not perVLAN information
- FULL
This parameter is optional. When specified, MLD information will be shown in detail rather than in tabular
summary format. This will allow for more information
to be shown, but will greatly increase the length of the
output.
NA
Summary display is shown
MCASTGROUPS
This parameter is optional. When specified, the command will display multicast groups that have been
learned by MLD snooping rather than system-wide MLD
snooping settings. The groups shown may be filtered
using the optional parameters below.
NA
Display only system-wide settings, not a list of
multicast groups
- GROUP
This parameter is optional. Filter the list of multicast
groups shown by the specified list of multicast groups,
entered in standard IPv6 notation. Multiple groups may
be specified as a comma-separated list. If “ALL” is specified, the output will not be filtered by group address
NA
ALL
Software Reference for SwitchBlade x3100 Series Switches
558
IGMP and MLD Snooping
Configuring IGMP
Option
Description
Range
Default Value
- VLAN
This parameter is optional. Filter the list of multicast
groups shown by the specified VLANs. The VLANs may
be specified as a comma-separated list of names, a list or
range of VIDs, or a combination thereof. If “ALL” is
specified, the output will not be filtered by VLAN.
NA
ALL
- INTERFACE
This parameter is optional. Filter the list of multicast
groups shown by the specified physical or aggregate
interfaces. Interfaces may be specified as a list, a range,
or a combination thereof. If “ALL” is specified, the output will not be filtered by interface.
NA
ALL
- FULL
This parameter is optional. When specified, multicast
groups information will be shown in detail rather than in
tabular summary format. This will allow for more information to be shown, but will greatly increase the length
of the output.
NA
Summary display shown
Example
officer SEC>> SHOW MLDSNOOPING
--- MLD Snooping Configuration --Duplicate Report Delay (MLDv1).......
General Query Timeout................
Router Ageing Timeout................
Multicast Send-All Interfaces .......
MLD Snooping VLANS...................
10 seconds
20 seconds
300 seconds
ETH:[7.1-2]
306-310,391-400
officer SEC>> SHOW MLDSNOOPING VLAN=300,309-310
VLAN
---300
309
State
-------Disabled
Enabled
310 Enabled
-- Multicast Router Ports -- GenQuery
Type
Interface
Expires ExpTimer
-------- ----------- ------- -------Dynamic ETH:7.1
215s
22s
Dynamic ETH:7.2
213s
22s
Dynamic ETH:7.1
141s
17s
Dynamic ETH:7.2
144s
17s
Software Reference for SwitchBlade x3100 Series Switches
559
IGMP and MLD Snooping
Configuring IGMP
SHOW SWITCH MULTICAST
Syntax
SHOW SWITCH MULTICAST
[ { INTERFACE [ ={ type:id-range | id-range | ifname-list | ALL } ]
} ]
Description
This command displays data on multicast switching settings. If no optional parameters are specified, the
command will show the global setting for the "FLOODUNKNOWNS" parameter and a list of multicast pass-through and/or send-all interfaces. For convenience, the command also displays a list of
VLANs for which IGMP or MLD snooping is enabled. (This information is also available under "SHOW
IGMPSNOOPING" or "SHOW MLDSNOOPING".)
If the "INTERFACE" parameter is used, the command will display the snooping mode for each of the
specified interfaces, as well as the IGMP snooping state of the interfaces. (Note that there is no MLD
snooping state for an individual interface.)
Mode
User
Options
Option
Description
Range
Default
Value
INTERFACE
This parameter is optional. If included, the command
will display the snooping mode for a set of interfaces,
rather than just a global summary multicast settings
NA
ALL
- If a range of interfaces is specified, the command will
display the snooping mode for each specified physical or
aggregate interface. Interfaces may be specified as a list,
a range, or a combination thereof. Specify ALL to show
multicast data for all interfaces.
Note
The SBx3100 series displays multicast send-all interfaces since multicast pass-through interfaces are
not supported on the SBx3100.
Example
SHOW SWITCH MULTICAST
--- Multicast Switching Settings --Flood Unknown Multicast..............
Multicast Send-All Interfaces........
IGMP Snooping VLANs..................
MLD Snooping VLANS...................
Control Packets Only
ETH[1.1-2]
306-310,391-400
306-310,391-400
officer SEC>> SHOW SWITCH MULTICAST INTERFACE=ETH:[1.1-3]
--- Multicast Switching Interface Settings --Interface
--------ETH:1.1
ETH:1.2
ETH:1.3
Snooping Mode
------------SendAll
SendAll
Internal
IGMP Snooping
------------Enabled
Enabled
Enabled
Software Reference for SwitchBlade x3100 Series Switches
560
IGMP and MLD Snooping
Configuring IGMP
SHOW TRACE IGMPSNOOPING
Syntax
SHOW TRACE IGMPSNOOPING
Description
This command displays the IGMP message types that have been enabled for event tracing using the
"ADD TRACE IGMPSNOOPING" command. Note that this command does not display captured trace
data; use the "SHOW TRACE BUFFER" command for that purpose.
Mode
User
Options
NA
Release Note
Modified - In Release 17.0 all options have been removed and can be found in the SHOW TRACE BUFFER command.
Example
ADD TRACE IGMPSNOOPING MESSAGETYPE=REPORTV2
ADD TRACE IGMPSNOOPING MESSAGETYPE=GENERALQUERY
INTERFACE=ETH:1.* MACADDRESS=A4:BA:DB:E7:B3:34
ADD TRACE IGMPSNOOPING MESSAGETYPE=REPORTV1
GROUPADDRESS=224.1.10.10
SHOW TRACE IGMPSNOOPING
--- IGMP Packet Traces -------------------------------------------------------Message Type
MC Group
Address
----------------- --------------ReportV2
ALL
General Query
ALL
ReportV1
224.1.1.10
Source MAC
Address
----------------ALL
A4:BA:DB:E7:B3:34
ALL
Interface(s)
-------------------------ALL
ETH:[1.0-3]
ALL
-------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
561
IGMP and MLD Snooping
Configuring IGMP
SHOW TRACE MLDSNOOPING
Syntax
SHOW TRACE MLDSNOOPING
Description
This command displays the MLD message types that have been enabled for event tracing using the
ADD TRACE MLDSNOOPING MESSAGETYPE command. Note that this command does not display
captured trace data; use the SHOW TRACE command for that purpose.
Mode
User
Options
NA
Example
officer SEC>> ADD TRACE MLDSNOOPING MESSAGETYPE=V2REPORT
officer SEC>> ADD TRACE MLDSNOOPING MESSAGETYPE=GENERALQUERY
VLAN=100-199 INTERFACE=ETH:1.* IPSOURCE=fe80::202:ffff:f100:0102
officer SEC>> ADD TRACE MLDSNOOPING MESSAGETYPE=V1REPORT
GROUPADDRESS=ff1e::101:101
officer SEC>> SHOW TRACE MLDSNOOPING
--- MLD Packet Traces ------------------------------------------------------Message Type............
VLANs...................
Interfaces..............
Source MAC Addresses....
Group IP Addresses......
V2Report
ALL
ALL
ALL
ALL
Message Type............
VLANs...................
Interfaces..............
Source IP Address.......
Group IP Addresses......
GeneralQuery
100-199
[ETH:1.0-3]
fe80::202:ffff:f100:0102
ALL
Message Type............
VLANs...................
Interfaces..............
Source MAC Addresses....
Group IP Addresses......
V1Report
ALL
ALL
ALL
ff1e::101:101
Software Reference for SwitchBlade x3100 Series Switches
562
6. Access and Security
6.1 Introduction
This chapter introduces those features that control the types of packets and packet flow through the switch:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Quality of Service Model
Classifiers
Classifier Commands
Access Control List
Access Commands
Ingress Metering (Policing)
Ingress Metering Commands
Egress Port Rate Limiting
Egress Port Rate Limiting Commands
Priority Queuing (Layer 2)
Queue-Based Egress Rate Limiting (QOSPOLICY)
Layer 3 QoS Support (DSCP)
Ingress Metering Commands
RADIUS / TACACS Authentication
RADIUS and TACACS+ Commands
Port Authentication
Port Authentication Commands - 802.1X
MAC Authentication Commands
Common Authentication Commands
SSH
SSH Commands
Address Resolution Protocol (ARP) Filtering
ARP Filter Commands
Local ARP Discard
Local ARP Discard Commands
Software Reference for SwitchBlade x3100 Series Switches
563
Access and Security
Introduction
6.2 Quality of Service Model
Packet-based networks provide primarily three types of services:
• Data
• Voice
• Video
Providers must deliver these services at a level of quality acceptable to the customer. Service quality or service level can be
defined by controlling:
•
•
•
•
Availability
Delay
Delay variation (jitter)
Lost packet ratio (bandwidth)
Additionally, various applications (e-mail, file transfer, teleconferencing, video conferences) can be considered as real-time
verses non real-time applications.
• Real-time applications (such as voice) have a lower tolerance to delay or delay variation, but can handle some packet loss.
• Non-real-time applications are not as adversely affected by delay or delay variation, but are highly affected by packet loss.
A Service Level Agreement (SLA) details the level of service the service provider and customer negotiate. Providers use Quality of Service (QoS) functions to segregate traffic and then manage the service quality through the network to meet the customer’s needs.
Figure 6-1 shows the general flow for QoS; refer to this figure while reading the rest of this subsection.
Note:
The rest of this subsection describes in general what traffic management provides. For the capabilities of the
SBx3100 refer to the rest of this section. Refer to the next two sections for details (capabilities, restrictions) on a
specific product.
Software Reference for SwitchBlade x3100 Series Switches
564
Access and Security
Introduction
drop
Rule A
Rule B
mark
Rule C
mark
drop
drop
Rule D
Rule E
mark
Egress
Traffic
Shaper
count
Scheduler
Ingress
Traffic
PriorityToCOSMapper
meter
Rule F
meter
drop
Classification Filtering/Remarking/Policing Mapping
FIGURE 6-1
Queuing
Scheduling Shaping
Model of Traffic Flow for a QoS-capable Device
6.2.1 Ingress Traffic Concepts
The main strategy in providing QoS is to first classify and segregate traffic into separate flows. These flows can then be
managed separately through the provider’s network with each flow getting a specified level of service. Traffic classification and
segregation are performed when traffic from a customer enters the network through the network edge device. Traffic is classified and segregated according to set of criteria or rules. Once the traffic is classified, the packets will have certain actions
performed upon them as configured by the provider. These actions are mark, meter, count, and drop.
To mark a packet in the traffic flow means that once a packet has been allowed to ingress the port, it will be associated with
a certain flow. Marking the packet means to identify the packet with a Class of Service (COS) that will be applied to the
packet as it moves through the device and into the network.
• For ethernet frames, these are defined as the 802.1p user priority bits or class of service bits.
• For IP packets there are the DSCP field and the TOS field. The COS identifier can specify both a service level priority
and the precedence for dropping packets, but this is not done at the ethernet level.
Once a packet is marked, it may go immediately to a COS queue, but in many cases the traffic is metered. To meter the
packet flow is to monitor or police the rate of traffic flow and to see if incoming traffic exceeds the bandwidth specified in
the SLA. When packet flow exceeds the bandwidth allocated, they are labeled as Out Of Profile (OOP). This policing function is done using the leaky bucket algorithm. The bucket has a capacity and an output rate as packets enter and leave the
bucket.
If packets arrive at a rate faster than contracted for in the SLA for a continuous period of time, the bucket will overflow.
These overflow packets are classified as out of profile and another action can be applied to them, such as drop (throw away),
or remark them in such a way that these OOP packets have a higher probability of being thrown away when congestion
Software Reference for SwitchBlade x3100 Series Switches
565
Access and Security
Introduction
points are encountered through the device or further on in the network. Packets that exceed this bandwidth are labeled as
out of profile with the SLA.
By metering the rate at which packets arrive, the provider can control bandwidth, since the SLA may include a minimum
bandwidth availability and as well as a maximum (for short periods). These are defined as follows:
• Committed Information Rate (CIR) is the minimum guaranteed rate the provider network will provide under normal
conditions, and is measured in bits per second.
Note:
Any service that provides a non-zero bandwidth guarantee must have a CIR. A CIR of zero indicates the service will
provide no minimum guarantee for frame delivery.
• Committed Burst Size (CBS) is the maximum number of bytes that can be sent at the CIR and is measured in kilobytes
(KB) or megabytes (MB)
• Peak Information Rate (PIR) is the maximum rate at which frames/packets are allowed to burst above the CIR and is
measured in bytes per second.
• Peak Burst Size (PBS) is the maximum number of bytes that can be sent at the PIR and is measured in kilobytes (KB) or
megabytes (MB).
For a service that requires only a CIR and CBS, a single meter is used; the capacity of a single bucket is equal to the CBS and
the leak rate is the CIR. For services that require all four parameters, two meters are required.
6.2.2 Egress Traffic Concepts
Once the traffic flows have passed through the policing function and are allowed to continue, the COS identifier (obtained
when the traffic was marked) is used to map the traffic with a set of queues and to assign a priority. Each queue is associated
with a level of service of low versus high. If a QoS network provides four levels of service, there will typically be four queues.
Traffic flows will be associated with a priority (using the COS identifier bit) and therefore a queue.
As the packets are placed in the queues, there may still be conditions where packets may need to be dropped. One method
of handling overflow is tail-drop; when a queue is in an overflow state, all newly arriving packets are dropped. If the potential
for queue overflow was too high, the queue size(s) were increased. However, dynamic managing of queue depth can result in
better network performance, and one method is Random Early Discard (RED), which improves network throughput and
lowers the probability of packet discard.
Note:
Random Early Discard (RED) is not supported.
As the traffic passes through the queues, they are then scheduled for output. The common type of scheduler is the Strict
Priority (SP) scheduler, which selects a packet at the head of the highest priority queue (usually allows no delay) and continues to select packets in that queue until it is empty; only then are packets chosen from other queues. When a network has
little or no congestion, all queues are scheduled equally. However, in a heavily congested network, the highest priority queue
may always have packets, and so the lower priority queues are never scheduled and are therefore blocked.
The Weighted Round Robin (WRR) scheduler associates an additional weight to each queue, so that the scheduler
spends at least some time (although limited because of its lower weighting) with the other queues.
All of these functions together help ensure that traffic is classified/filtered and then metered to ensure that its bandwidth
does not exceed the SLA. However, this does not guarantee that all network resources are available so that the bandwidth
agreed to can be propagated through the network. Call Admission Control (CAC) is an accounting algorithm that qualifies the available network resources against the SLA. Within a network device, the CFC function balances downstream congestion and full utilization of available bandwidth. CAC takes into account all factors and calculates an equivalent maximum
bandwidth.
Finally, the provider should use the performance monitoring tools provided by the system to verify the levels of service that
have been negotiated. These tools measure packet loss, delay, jitter, availability, and failure recovery time.
Note:
Weighted round robin (WRR) scheduling is not supported.
Software Reference for SwitchBlade x3100 Series Switches
566
Access and Security
Introduction
6.2.3 Traffic Management Throughout the Network
Since the traffic flows occur throughout the network, each device must give these flows the same treatment as they pass
through the device. For Rapier devices, there are QoS features that can be configured so that traffic prioritization is similar to
what is configured for the SBx3100. For relevant documentation, go to http://www.alliedTelesis.co.nz/documentation.
Software Reference for SwitchBlade x3100 Series Switches
567
Access and Security
Introduction
6.3 Classifiers
6.3.1 Classifier Support on the SBx3100
The following table summarizes components and their traffic management feature availability. (“X” means supports, with
qualifiers having footnotes, blank means not supported.)
TABLE 6-1
Traffic Management Summary Table - Cards on the SBx3100
GE24P
OE
GE24
RJ
GE24S
FP
GE40C
SFP
GE40RJ
XE4
XE6
X
X
X
X
X
X
X
IPDESTa
X
X
X
X
X
X
X
IPDSCP
X
X
X
X
X
X
X
IPPROTOCOL
X
X
X
X
X
X
X
IPSOURCEa
X
X
X
X
X
X
X
LSAP
X
X
X
X
X
X
X
MACDEST
X
X
X
X
X
X
X
MACSOURCE
X
X
X
X
X
X
X
PROTOCOL
X
X
X
X
X
X
X
TCPPORTDEST
X
X
X
X
X
X
X
TCPPORTSOURCE
X
X
X
X
X
X
X
UDPPORTDEST
X
X
X
X
X
X
X
UDPPORTSOURCE
X
X
X
X
X
X
X
VID
X
X
X
X
X
X
X
VPRIORITY
X
X
X
X
X
X
X
DROP
X
X
X
X
X
X
X
FORWARD
X
X
X
X
X
X
X
COUNT
X
X
X
X
X
X
X
Classifier Match Fields
ETHFORMAT
ICMPV6TYPE
INNERVID
INNERVPRIORITY
IPTOS
TCPFLAGS
Classifier Actions
Software Reference for SwitchBlade x3100 Series Switches
568
Access and Security
Introduction
TABLE 6-1
Traffic Management Summary Table - Cards on the SBx3100 (Continued)
Classifier Match Fields
GE24P
OE
GE24
RJ
GE24S
FP
GE40C
SFP
GE40RJ
XE4
XE6
SETVPRIORITY
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Number of Egress Queues
8
8
8
8
8
8
8
Number of Classifiersb
128
128
128
120
120
128
128
Number of Ingress Traffic Meters
192
192
192
59
59
32
32
Number of Ingress Traffic Counters
1200c
(1176)
1200d
(1176)
512(b)
(508)
118e
118f
1920(b)
(1896)
1920(b)
(1896)
Number of Out-of-profile Packet Meter Counters
192
192
192
118
118
32
32
SETIPTOS
SETIPDSCP
MOVEPRIOTOTOS
MOVETOSTOPRIO
a. Includes IPv6 values. Refer to Table 6-2.
b. Classifier capacity is an approximation. The features enabled on a port or interface, such as such as IGMP, DHCPRELAY, VLAN
(for per-VLAN UFO and HVLAN), EPSR, INTERFACE (TAGALL option for HVLAN), ACCESSLIST, and CLASSIFIER,
classifiers on surrounding ports, content of the user classifiers, and many other factors influence the number of classifiers available on a given port or interface.
c. The number of ingress traffic counters is limited by the current total number of available classifiers. The maximum possible classifiers is shown in the above table. BFD always consumes 1 classifier per external port (24 for the GE24POE and GE24SFP, and
4 for the XE4), so the maximum attainable by customer is contained in parentheses.
d. The number of ingress traffic counters is limited by the current total number of available classifiers. The maximum possible classifiers is shown in the above table. BFD always consumes 1 classifier per external port (24 for the GE24POE and GE24SFP, and
4 for the XE4), so the maximum attainable by customer is contained in parentheses.
e. The counters are twice the number of traffic meters (minus two reserved for BFD).
f. The counters are twice the number of traffic meters (minus two reserved for BFD).
Following are notes related to this table:
• Classifiers on LAGs only support filtering and remarking; not metering.
• LAGs do not support egress port rate limiting.
• Ingress Meters (TRAFFIC DESCRIPTORs) are limited to 1 per classifier. Their actions on out-of-profile packets are
NCFORWARD (the default), NCDROP, and NCCOUNT.
• All interfaces support p-bit mapping to queues.
• All interfaces support only Strict Priority, Tail-drop queuing discipline.
The following classifier match fields are not supported on the SBx3100, which affects the CREATE/SET CLASSIFIER commands:
•
•
•
•
INNERVPRIORITY
INNERVID
TCPFLAGS
IPTOS
Software Reference for SwitchBlade x3100 Series Switches
569
Access and Security
Introduction
• ETHFORMAT
The following classifier actions are not supported on the SBx3100, which affects the ADD ACTION command:
• MOVEPRIOTOTOS
• MOVETOSTOPRIO
• SETIPTOS
The following rules apply to IPv6 packet classifiers:
• A classifier with a match rule for IPv6 source and/or destination addresses cannot also have match rules for:
• MACDEST
• MACSOURCE
• LSAP
• IPv6 match rules will not operate correctly when a packet contains IPv6 extension headers, except when a single hop-byhop extension header is used.
• A classifier with MACDEST and/or MACSOURCE match rules will not operate correctly with IPv6 packets.
6.3.2 Classifier Management
Classifiers provide the remarking, metering, counting, etc., actions for interfaces. Classifiers define packet matching rules that
classify packets into data flows so that they may be processed in a similar manner. For example, all packets with the same destination TCP/IP port may be defined to form a flow (such as Telnet or HTTP traffic).
Once packets are defined by the use of classifiers, the QoS functions associate the classifier rule and subsequent actions on
the packets.
Classifiers perform the following key functions:
• Traffic filtering - Filters traffic so that only required traffic goes on to the VLAN. Sample filters would be by protocol, IP
address and applications such as HTTP or SMTP.
• Traffic quality of service - Prioritizes frames based on their classification. For instance, voice over IP traffic could be given
a higher priority than web traffic.
6.3.2.1 Classifier Match Rules
A set of packet matching rules can be created by the user. The classifiers can identify any single packet based upon the following criteria:
• Layer 2 protocols - Ethernet encapsulation type - Packets are classified depending on the specific protocol type of each
frame. Different values indicate how the packet is formatted. For more details on values see the ETHFORMAT parameter
in the CREATE CLASSIFIER command in Table 6-2.
• Layer 3 protocols - Frames are classified based on any value for Layer 3 protocols. The system can match based on any
Layer 3 field regardless of the Layer 2 frame type (as long as it is supported).
• Source/destination IP address - Frames are classified based on an IP mask so that frames can be allowed on a partial
match.
• Layer 4 protocol (TCP/UDP, etc.) - Frames are classified based on specific Layer 4 TCP or UDP destination and source
port numbers contained within the header of an IP frame.
Software Reference for SwitchBlade x3100 Series Switches
570
Access and Security
Introduction
Table 6-2 lists the available classifiers match rules.
TABLE 6-2
Classifiers Match Rules
Parameter
Description
ICMPV6TYPE
The ICMPV6TYPE match rule field matches any ICMPv6 protocol packet
with the specified type. Certain common types values may be specified by
name (e.g., REDIRECT).
- ROUTERADVERTISEMENT - Matches ICMPv6 type for Router Advertisement, 134 (0x86).
- MLDQUERY - Matches ICMPv6 type for Multicast Listener Query, 130
(0x82).
- MLDV1DONE - Matches ICMPv6 type for Version 1 Multicast Listener
Done, 132 (0x84).
- MLDV1REPORT - Matches ICMPv6 type for Version 1 Multicast Listener
Report, 131 (0x83).
- MLDV2REPORT - Matches ICMPv6 type for Version 2 Multicast Listener
Report, 143 (0x8f).
- REDIRECT - Matches ICMPv6 type for Redirect Message, 137 (0x89).
- icmpv6type - Matches the specified ICMPv6 type value, a decimal or hexadecimal value that is less than 256.
IPDEST={ ipaddress/length | ipv6address/
length | MULTICAST | IPV6MULTICAST |
IPV6PERMANENTMULTICAST |
IPV6TRANSIENTMULTICAST | ANY }
The destination IP address (either host or subnet) of the IP packet.
IP address ranges are specified using a valid IP address or valid subnet and
mask. A range is specified using a ‘/’ character (such as 1.0.0.0/8).
ipaddress/length - The value is specified as a subnet prefix with a mask. For
example, 192.168.1.0/24 matches 192.168.1.0 to 192.168.1.255). If no mask
is provided then /32 is assumed, which is equivalent to specifying a host
address (e.g. 192.168.1.1).
ipv6address/length - The value is specified as a prefix with a mask. For
example, 1234:5678:9012:3456::/64 matches
1234:5678:9012:3456:0000:0000:0000:0000 (1234:5678:9012:3456::) to
1234:5678:9012:3456:ffff:ffff:ffff:ffff. If no mask is provided then /128 is
assumed, which is equivalent to specifying a host address (e.g.
1234:5678:9012:3456:0000:0000:0000:0001).
MULTICAST - Matches any IPv4 multicast address, 224.0.0.0 to
239.255.255.255 inclusive.
IPV6MULTICAST - Matches any IPv6 multicast address, i.e., any IPv6
address with the prefix FF00::/8.
IPV6PERMANENTMULTICAST - Matches any IPv6 multicast address, i.e.,
any IPv6 address with the prefix ff00::/8, that has the transient flag set to 0.
This matches permanently-assigned, or “well-known,” multicast addresses.
IPV6TRANSIENTMULTICAST - Matches any IPv6 multicast address, i.e.,
any IPv6 address with the prefix ff00::/8, that has the transient flag set to 1.
This matches dynamically-assigned, or transient, multicast addresses.
ANY - The value ANY matches any IP packet.
A classifier may only have one IPDEST match rule, for an IPv4 or an IPv6
address or a multicast address variant
Software Reference for SwitchBlade x3100 Series Switches
571
Access and Security
Introduction
TABLE 6-2
Classifiers (Continued)Match Rules
Parameter
Description
IPDSCP={0..63|ANY}
The code point field with the DiffServ byte of an IP packet. This parameter
cannot be specified with the IPTOS parameter.
ANY - match all IP packets with any IPDSCP value.
IPPROTOCOL={TCP|UDP|ICMP|IGMP|
ipprotocol-number|ANY}
The IPPROTOCOL match rule field matches on any IPv4 packet with the
specified value in the protocol field of an IPv4 packet, and any IPv6 packet
with the specified value in the next header field of an IPv6 packet. PROTOCOL=IPV4 | IPV6 can be used to limit the classifier to only IPv4 or to only
IPv6 packets, respectively. Otherwise, both IPv4 and IPv6 packets will be
matched.
ANY value may be specified by number. Certain common protocol values
may be specified by name (e.g., TCP).
TCP - Matches TCP, 0x06.
UDP - Matches UDP, 0x11.
ICMP - Matches ICMP, 0x01.
ICMPV6 - Matches ICMPv6, 0x3A.
IGMP - Matches IGMP, 0x02.
ipprotocol-number | ipv6nextheader-number - Matches the specified IP
Protocol value, a decimal or hexadecimal value that is less than 256. In an
IPv6 header, the IP Protocol value is found in the IPv6 next header field. A
single value can be specified which will be checked against the IP protocol
value of IPv4 packets and the IPv6 Next Header value of IPv6 packets.
IPSOURCE={ipaddress-mask|ANY}
The source IP address (either host or subnet) of the IP packet.
ipaddress/length - The value is specified as a subnet prefix with a mask. For
example, 192.168.1.0/24 matches 192.168.1.0 to 192.168.1.255). If no mask
is provided then /32 is assumed, which is equivalent to specifying a host
address (e.g. 192.168.1.1).
ipv6address/length - The value is specified as a prefix with a mask. For
example, 1234:5678:9012:3456::/64 matches
1234:5678:9012:3456:0000:0000:0000:0000 (1234:5678:9012:3456::) to
1234:5678:9012:3456:ffff:ffff:ffff:ffff. If no mask is provided then /128 is
assumed, which is equivalent to specifying a host address (e.g.
1234:5678:9012:3456:0000:0000:0000:0001). Refer to RF4291 [15] for IPv6
addressing syntax.
ANY - The value ANY matches any IP packet.
A classifier may only have one IPSOURCE match rule, for either an IPv4 or
an IPv6 address
LSAP={NETBIOS|lsap-value|ANY}
The LSAP match rule field matches on any packet with the specified LSAP
value.
LSAP refers to the combination of the DSAP (Destination Service Access
Point) and SSAP (Source Service Access Point) octets in an 802.3 Ethernet
frame. The value may be entered in decimal or in hex but must be less than
or equal to 4095.
The value "NETBIOS" can be used to specify the LSAP value for that protocol (0xF0F0). The value "ANY" matches any LSAP value.
Software Reference for SwitchBlade x3100 Series Switches
572
Access and Security
Introduction
TABLE 6-2
Classifiers (Continued)Match Rules
Parameter
Description
MACDEST={macaddress|MULTICAST|ANY}
The destination MAC address for the packet. MULTICAST is for multicast
packets.
macaddress - The MAC address to match. The value must be entered as a
sequence of 6 bytes (2 hex digits each) separated by colons (e.g.,
00:0C:25:00:13:8C).
MULTICAST - Match only multicast MAC addresses.
ANY - The value ANY matches any MAC destination address.
MACSOURCE={macaddress|ANY}
The source MAC address.
macaddress - The MAC address to match. The value must be entered as a
sequence of 6 bytes (2 hex digits each) separated by colons (e.g.,
00:0C:25:00:13:8C).
ANY - The value ANY matches any MAC source address.
PROTOCOL={IPV4|IPV6|protocoltype|ANY}
The PROTOCOL match rule field matches on any packet with the specified
layer 2 "protocol" field value. The value of this field indicates which layer 3
protocol is being carried. Any value may be specified as a number (e.g.,
PROTOCOL=0x806). However, certain common protocols (e.g., IPV4,
IPV6) may be entered by name.
IPV4 - Matches IPv4 protocol, 0x0800.
IPV6 - Matches IPv6 protocol, 0x86DD.
protocol-type - Matches protocol specified by EtherType value. The value
can be in decimal or hexadecimal and must be less than 65536.
ANY - The value ANY matches any valid Ethernet frame.
TCPFLAGS =
{{URG|ACK|RST|SYN|FIN|PSH }
[ ,... ]|ANY }
This parameter is optional. The TCPFLAGS match rule field matches on
any TCP packet where the specified TCP flags are set, and any TCP flags
not specified are not set. Values are entered as a comma-separated list of
flag names.
The value ANY matches any TCP packet regardless of flag values.
URG - Urgent pointer field is significant.
ACK - Acknowledgement field is significant.
RST - Reset the connection.
SYN - Synchronize sequence numbers.
FIN - No more data from sender.
PSH - Push function.
TCPPORTDEST={tcp-port|ANY}
The TCPPORTDEST match rule field matches on any TCP packet with the
specified value in the destination port field. The value may be entered in
decimal (10) or hexadecimal (0xa) format. Multiple values (separated by
commas) can be entered. The value ANY matches any TCP packet.
TCPPORTSOURCE={tcp-port|ANY}
The TCPPORTSOURCE match rule field matches on any TCP packet with
the specified value in the source port field. The value may be entered in
decimal (10) or hexadecimal (0xa) format. The value ANY matches any
TCP packet.
Software Reference for SwitchBlade x3100 Series Switches
573
Access and Security
Introduction
TABLE 6-2
Classifiers (Continued)Match Rules
Parameter
Description
UDPPORTDEST={udp-port-list|ANY}
The UDPPORTDEST match rule field matches on any UDP packet with the
specified value in the destination port field. The value may be entered in
decimal (10) or hexadecimal (0xa) format. Multiple values (separated by
commas) can be entered.
ANY - match all IP packets with any UDPPORTDEST value.
Note: In order to filter (block) a subscriber’s port and prevent it from acting as a DHCP client, add a filter of UDPPORTDEST=67, dropping any
packets destined for a DHCP server. To filter packets from an upstream
DHCP server to the subscriber port, add a filter of UDPPORTDEST=68.
UDPPORTSOURCE={udp-port|ANY}
The UDPPORTSOURCE match rule field matches on any UDP packet with
the specified value in the source port field. The value may be entered in
decimal (10) or hexadecimal (0xa) format.
ANY - match all IP packets with any UDPPORTSOURCE value.
VID={1..4095|ANY}
The source VLAN the packet is associated with when received by the
switch.
- ANY - match all packets with any VLANID value.
The VID match rule field matches on any packet with the specified value in
the outer VLAN identifier field. If the port's service configuration adds tags
to the packet, or translates VLAN IDs, then this comparison is to the newly
added VLAN tag, after translation.
VPRIORITY={0..7|ANY}
This matches the VLAN ID specified with the User Priority frame
- ANY - match all packets with any VPRIORITY value.
The VPRIORITY match rule field matches on any packet with the specified
value in the outer VLAN priority field. If the port's service configuration
adds tags to the packet, this comparison is to the priority field of the newly
added VLAN tag, which is always 0.
This match rule is used to set up the class of service queues. Refer to 6.7.
6.3.2.2 Classifier Actions and COUNTs
A classifier or set of classifiers then can have actions associated with them:
• DROP - discard the packet at the card. This action excludes the packet.
• FORWARD - allow traffic to be forwarded. This action includes the packet.
• COUNT - count the number of packets that have been forwarded or dropped. These are displayed with the SHOW
CLASSFIER COUNTER command.
Note:
The outputs associated with the COUNT setting are as follows: If the COUNT is combined with a DROP action,
then the Filter Count is incremented in the output. If combined with a TRAFFICDESCRIPTOR (for policing), then
the Policed Count is incremented in the output. If neither is associated, then the Match Count is incremented in
the output. To view these outputs, use the command SHOW CLASSFIER COUNTER <interface>.
• Remark the 802.1q priority field - The priority bits can be set (remarked) on ingress, and that priority is used
throughout the network devices at each egress queue. This is set using the SETVPRIORITY action.
Note:
To correlate the p-bit value with a queue, the SET QOS command is used.
Software Reference for SwitchBlade x3100 Series Switches
574
Access and Security
Introduction
6.3.2.3 Classifier Association with an Interface (Precedence)
When a classifier is associated with an interface, it is given a precedence, with the lowest number receiving the highest precedence. Classifiers on the same port cannot share the same precedence number.
If the user wishes to further qualify a traffic flow, metering can be applied to the ingress interface before the classifier is associated with that interface.
Note:
The precedence setting for classifiers should be 51 to 68 for classifiers that perform a filtering action, with 69 used
for dropping packets that do not match any of the filtering criteria.
Note:
The precedence setting for classifiers that remark packets for the QoS function should be 146 to 199.
6.3.2.4 Example of configuring a Video Classifier
When there is no remarking of p-bits (default settings), the network is being configured so that the p-bits settings are set by
the upstream device. The user can, however, set the p-bit to a different value and place it in a different queue. For example,
multicast video traffic could be placed in a high priority by remarking the p-bit to 6 which places it in queue 7 on interfaces
supporting 8 queues and on queue 3 on interfaces supporting 4 queues. The example will show it being placed in queue 4.
The user can create the classifier as follows:
• The ports 11.0-11.3 are all upstream
• The precedence setting is 146 (within the remarking range)
• The name of the classifier is remark_mulitcast
officer SEC>> create class remark_multicast IPDEST=MULTICAST
officer SEC>> add action class remark_multicast SETVPRIORITY=4
officer SEC>> add class remark_multicast interface 11.0-11.3 precedence 146
officer SEC>> show class all
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------------- -------------------------------------- ------------------remark_multicast
IPDEST= MULTICAST
SETVPRIORITY=4
------------------------------------------------------------------------------officer SEC>> show class all int all full
--- Classifier Configuration Data --------------------------------------------Interface Rank Name
Field Match(es)
Action(s)
--------- ---- --------------- ------------------------------ ---------------ETH:11.0 146 remark_multicast
PROTOCOL= IPV4
(D) SETVPRIORITY=4
IPVERSION= 4
(D)
IPDEST= MULTICAST
ETH:11.1 146 remark_multicast
PROTOCOL= IPV4
(D) SETVPRIORITY=4
IPVERSION= 4
(D)
IPDEST= MULTICAST
ETH:11.2 146 remark_multicast
PROTOCOL= IPV4
(D) SETVPRIORITY=4
IPVERSION= 4
(D)
IPDEST= MULTICAST
-------------------------------------------------------------------------------
Note that when configuring classifiers, the FULL display for the classifiers for an interface will also include information that
has been derived from the classifiers. This will be shown with a (D) next to the classifier attribute. Refer to the next subsection.
6.3.2.5 Derived Classifiers (D)
Note that when configuring classifiers, the FULL display for the classifiers for an interface will also include information that
has been derived from the classifiers. For example, a user has configured a classifier set as shown below.
officer SEC> SHOW CLASSIFIER=ALL INTERFACE=2.0
--- Classifier Configuration Data ------------------------------------Interface Rank Name
Field Match(es)
Action(s)
--------- ---- ---------------- --------------------------------- ----------ETH:2.0
51
ip1
IPSOURCE=1.1.1.1/32
52
ip2
IPSOURCE=1.1.1.2/32
53
ip3
IPSOURCE=1.1.1.3/32
54
ip4
IPSOURCE=1.1.1.4/32
55
ip5
IPSOURCE=1.1.1.5/32
56
ip6
IPSOURCE=1.1.1.6/32
57
ip7
IPSOURCE=1.1.1.7/32
Software Reference for SwitchBlade x3100 Series Switches
575
Access and Security
69
ipde
Introduction
IPSOURCE=ANY
DROP
The following shows that classifiers are added by the system when they can be derived. For the IPSOURCE classifiers, the
PROTOCOL (IPV4) and IPVERSION (4) are derived from the IPSOURCE and are added with the (D) added, telling the user
these were added by the system.
officer SEC>> show class all interface=2.0 full
--- Classifier Configuration Data --------------------------------------------Interface Rank Name
Field Match(es)
Action(s)
--------- ---- ------------ ---------------------------------------- --------ETH:2.0
51
ip1
PROTOCOL=IPV4
(D)
IPVERSION=4
(D)
IPSOURCE=1.1.1.1/32
52
ip2
PROTOCOL=IPV4
(D)
IPVERSION=4
(D)
IPSOURCE=1.1.1.2/32
53
ip3
PROTOCOL=IPV4
(D)
IPVERSION=4
(D)
IPSOURCE=1.1.1.3/32
54
ip4
PROTOCOL=IPV4
(D)
IPVERSION=4
(D)
IPSOURCE=1.1.1.4/32
55
ip5
PROTOCOL=IPV4
(D)
IPVERSION=4
(D)
IPSOURCE=1.1.1.5/32
56
ip6
PROTOCOL=IPV4
(D)
IPVERSION=4
(D)
IPSOURCE=1.1.1.6/32
57
ip7
PROTOCOL=IPV4
(D)
IPVERSION=4
(D)
IPSOURCE=1.1.1.7/32
69
ipde
PROTOCOL=IPV4
(D)
DROP
IPVERSION=4
(D)
IPSOURCE=ANY
-------------------------------------------------------------------------------
6.3.2.6 Set Match Rule Defaults (SETDEFAULTS)
Classifier match rule defaults can be reset using the SETDEFAULTS command. This command is useful if the user wishes to
change a match rule setting without having to delete the classifier. An example follows.
1.
Create a classifier ipfilt1, with an IPSOURCE filter.
officer SEC>> CREATE CLASSIFIER=ipfilt1 IPSOURCE=172.16.5.0/28
Info (010017): Operation Successful
officer SEC>> SHOW CLASSIFIER=IPFILT1
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------------- -------------------------------------- ------------------ipfilt1
IPSOURCE= 172.16.5.0/28
------------------------------------------------------------------------------2.
Add an action to the classifier to drop the IPSOURCE ipaddress.
officer SEC>> ADD ACTION CLASSIFIER=ipfilt1 DROP
Info (010017): Operation Successful
officer SEC>> SHOW CLASSIFIER=IPFILT1
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------------- -------------------------------------- ------------------ipfilt1
IPSOURCE= 172.16.5.0/
DROP
28
------------------------------------------------------------------------------3.
Add a PROTOCOL filter on the classifier.
officer SEC>> SET CLASSIFIER=ipfilt1 PROTOCOL=IPV4
Software Reference for SwitchBlade x3100 Series Switches
576
Access and Security
Introduction
Info (010017): Operation Successful
officer SEC>> SHOW CLASSIFIER=IPFILT1
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------------- -------------------------------------- ------------------ipfilt1
PROTOCOL= IPV4
DROP
IPSOURCE= 172.16.5.0/
28
------------------------------------------------------------------------------4.
Set a IPDEST filter.
officer SEC>> SET CLASSIFIER=ipfilt1 IPDEST=10.0.0.0/8
Info (010017): Operation Successful
officer SEC>> SHOW CLASSIFIER=IPFILT1
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------------- -------------------------------------- ------------------ipfilt1
PROTOCOL= IPV4
DROP
IPSOURCE= 172.16.5.0/
28
IPDEST= 10.0.0.0/8
------------------------------------------------------------------------------
Using the SETDEFAULTS command, set the IPDEST back to it’s default value.
officer SEC>> SETDEFAULTS CLASSIFIER=IPFILT1 IPDEST
Info (010017): Operation Successful
officer SEC>> SHOW CLASSIFIER=IPFILT1
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------------- -------------------------------------- ------------------ipfilt1
PROTOCOL= IPV4
DROP
IPSOURCE= 172.16.5.0/2
5.
Software Reference for SwitchBlade x3100 Series Switches
577
Access and Security
Introduction
6.3.2.7 System Monitoring for Errors (NORES, ERR, NOSPT)
When creating classifiers, the user should consider all configuration guidelines, restrictions and limitations, some of which are
described in previous sections. The CLI provides outputs that help the user understand a classifier configuration and why a
certain command was accepted or rejected. These are explained below.
6.3.2.8 Classifier Resources Exceeded (NORES)
The system will generate a warning message informing the user if or when classifier resource capacity or capabilities have
been exceeded on the interface(s) impacted by the provisioning change. The user should investigate classifier-related provisioning, such as IGMP, DHCPRELAY, VLAN (for per-VLAN UFO and HVLAN), EPSR, INTERFACE (TAGALL option for
HVLAN), ACCESSLIST, and CLASSIFIER to determine the reason for the message.
Note:
When resources are exceeded on the interface(s), all user-created classifiers are set on the interface(s) to NORES.
(Internal-created classifiers persist.)
Exceeding classifier resources raises a NORES alarm (Classifier Resource Failed). An example of setting the NORES
alarm is illustrated below.
officer SEC>> CREATE CLASSIFIER IPDROP protocol=ipv4
Info (010017): Operation Successful
officer SEC>> ADD ACTION CLASSIFIER IPDROP DROP
Info (010017): Operation Successful
officer SEC>> ADD ACTION CLASSIFIER IPDROP COUNT
Info (010017): Operation Successful
officer SEC>> CREATE CLASSIFIER IPS1 IPSOURCE=10.10.10.1
Info (010017): Operation Successful
// Classifiers IPS2 through IPS13 are also created with IPSOURCE as 10.10.10.2, 10.10.10.3,
etc.
// User now adds classifiers to an interface
officer SEC>> ADD CLASS IPS1 INTERFACE 3.4 PRECEDENCE 51
Info (010017): Operation Successful
officer SEC>> ADD CLASS IPS2 INTERFACE 3.4 PRECEDENCE 52
Info (010017): Operation Successful
// etc.
// After adding classifiers IPS1 through IPS12 to interface 3.4, user now adds Classifier
IPS13, and receives // the message that classifier resources are exceeded
officer SEC>> ADD CLASS IPS13 INTERFACE 3.4 PRECEDENCE 63
Info (010017): Operation Successful
Software Reference for SwitchBlade x3100 Series Switches
578
Access and Security
Introduction
officer SEC>>
Classifier resources exceeded on the following interfaces:
ETH:[3.4]
officer SEC>> show class all int 3.4 full
--- Classifier Configuration Data --------------------------------------------Interface Rank Name
Field Match(es)
--------- ---- ------------ ---------------------------------------ETH:3.4
51
ips1 (NORES)
IPSOURCE=10.10.10.1/32
52
ips2 (NORES)
IPSOURCE=10.10.10.2/32
53
ips3 (NORES)
IPSOURCE=10.10.10.3/32
54
ips4 (NORES)
IPSOURCE=10.10.10.4/32
55
ips5 (NORES)
IPSOURCE=10.10.10.5/32
56
ips6 (NORES)
IPSOURCE=10.10.10.6/32
57
ips7 (NORES)
IPSOURCE=10.10.10.7/32
58
ips8 (NORES)
IPSOURCE=10.10.10.8/32
59
ips9 (NORES)
IPSOURCE=10.10.10.9/32
60
ips10
IPSOURCE=10.10.10.10/32
(NORES)
61
ips11
IPSOURCE=10.10.10.11/32
(NORES)
62
ips12
IPSOURCE=10.10.10.12/32
(NORES)
63
ips13
IPSOURCE=10.10.10.13/32
(NORES)
68
ipdrop
PROTOCOL=IPV4
(NORES)
Action(s)
---------
DROP
COUNT
------------------------------------------------------------------------------officer SEC>> show alarm card 3
--- Interface(Port) Alarms --Interface
Fault
Severity
------------ -------------------------------- -------3.4
Classifier Resource Failed
Minor
Time Stamp
-------------03:17:56 08/04
6.3.2.9 Error (ERR)
This error would occur in the instance of a software error. This would be different from a NOSPT or NORES.
In the example below, the user has added three classifiers to a port and attempts to add a fourth. An error appears saying the
card cannot accept the fourth classifier because the number of masks supported by the card has been exceeded. As a result,
when the user displays the classifiers for the port a No Resources error appears next to the classifier. The user can delete
the fourth classifier and the (ERR) is removed from the display.
Software Reference for SwitchBlade x3100 Series Switches
579
Access and Security
Introduction
officer SEC> ADD CLASSIFIER=ip1 PORT=11.0 PRECEDENCE=51
Info (010017): Operation Successful
P
officer SEC> ADD CLASSIFIER=ip2 PORT=11.0 PRECEDENCE= 52
Info (010017): Operation Successful
officer SEC> ADD CLASSIFIER=ip3 PORT=11.0 PRECEDENCE= 53
Info (010017): Operation Successful
officer SEC> ADD CLASSIFIER=ip4 PORT=11.0 PRECEDENCE= 54
Info (010017): Operation Successful
officer SEC> SHOW CLASSIFIER=ALL PORT=11.0
--- Classifier Configuration Data --------------------------------------------Port Rank Name
Field Match(es)
Action(s)
---- ---- ---------------- --------------------------------- ----------------11.0 51
ip1 (ERR)
IPSOURCE=1.1.1.1/1
52
ip2 (ERR)
IPSOURCE=1.1.1.1/2
53
ip3 (ERR)
IPSOURCE=1.1.1.1/3
54
ip4 (ERR)
IPSOURCE=1.1.1.1/4
145 telesyn_default_ IPDEST=MULTICAST
SETVPRIORITY=1
video (ERR)
------------------------------------------------------------------------------officer SEC> DELETE CLASSIFIER=ip4 PORT=11.0
Delete classifier(s) from port(s) (Y/N)? y
Info (010017): Operation Successful
officer SEC> SHOW CLASSIFIER=ALL PORT=11.0
--- Classifier Configuration Data --------------------------------------------Port Rank Name
Field Match(es)
Action(s)
---- ---- ---------------- --------------------------------- ----------------11.0 51
ip1
IPSOURCE=1.1.1.1/1
52
ip2
IPSOURCE=1.1.1.1/2
53
ip3
IPSOURCE=1.1.1.1/3
145 telesyn_default_ IPDEST=MULTICAST
SETVPRIORITY=1
video
6.3.2.10 No Support (NOSPT)
An example of when this error will be raised is when classifiers are configured on a port and the software for the card where
the port resides is downgraded to a release that doesn’t support classifiers. The system will generate a NOSPT error.
In the example below, the user has created a classifier with an IP source and has associated this with a VPRIORITY. The system allows this, but when the user tries to associate the classifier with a port, a message is output stating that p-bit marking
is only supported for IP multicast in a certain range. The command is accepted, but when the user lists the classifiers for that
port, No Support (NOSPT) is displayed next to the classifier, meaning the classifier will not be used.
officer SEC> SHOW CLASSIFIER=ALL PORT=11.0
--- Classifier Configuration Data --------------------------------------------Port Rank Name
Field Match(es)
Action(s)
---- ---- ---------------- --------------------------------- ----------------11.0 51
ip1
IPSOURCE=1.1.1.1/1
52
ip2
IPSOURCE=1.1.1.1/2
Software Reference for SwitchBlade x3100 Series Switches
580
Access and Security
53
145
ip3
IPSOURCE=1.1.1.1/3
telesyn_default_ IPDEST=MULTICAST
video
Introduction
SETVPRIORITY=1
officer SEC> CREATE CLASS=badclass ips=3.3.3.3
Info (010017): Operation Successful
officer SEC> ADD ACTION CLASSIFIER=badclass SETVPRIORITY=2
Info (010017): Operation Successful
officer SEC> ADD CLASSIFIER=badclass PORT=11.0 PRECEDENCE=146
Info (010017): Operation Successful
officer SEC> SHOW CLASSIFIER=ALL PORT=11.0
--- Classifier Configuration Data --------------------------------------------Port Rank Name
Field Match(es)
Action(s)
---- ---- ---------------- --------------------------------- ----------------11.0 51
ip1
IPSOURCE=1.1.1.1/1
52
ip2
IPSOURCE=1.1.1.1/2
53
ip3
IPSOURCE=1.1.1.1/3
145 telesyn_default_ IPDEST=MULTICAST
SETVPRIORITY=1
video
146 badclass (NOSPT) IPSOURCE=3.3.3.3/32
SETVPRIORITY=2
Another scenario is when a combination of classifiers and specific values for match fields is not allowed. For example, if the
user installs a classifier that tries to match the LSAP field to a value other than NETBIOS and SNAP (refer to Table 6-2), then
the NOSPT error code appears.
6.3.3 Configuring Classifiers
6.3.3.1 Default Configuration
When the SBx3100 is first installed and in service, there are no user-defined classifiers configured.
6.3.3.2 Configuration Guidelines
For the XE4, filtering on the DHCP packets can occur if the filter has only layer 2 fields in the match rules. So, for example,
if the user creates a classifier to block all traffic on VID=1, then DHCP requests on VID 1 are blocked. However, if rules are
created to allow certain IP addresses through, and all other IP addresses are blocked, the DHCP packets can still get through
because those layer 3 filters are not applied. This is done so that the customer can get a valid IP address via DHCP.
6.3.3.3 Configuration Procedure
The general sequence to configure classifiers is to:
• Create the classifiers with a descriptive name and match rule.
• Associate actions to the classifiers, using COUNT as well when appropriate.
• Associate the classifiers to interfaces, including a PRECEDENCE, with the lower number receiving the higher precedence.
The general sequence to deprovision a classifier is to:
Software Reference for SwitchBlade x3100 Series Switches
581
Access and Security
Introduction
• DELETE the classifier from the associated interfaces.
• DESTROY the classifier
In the following procedure, the user wishes to only allow traffic originated from a range of IP addresses, and to drop any
other packets.
TABLE 6-3
Step
Configuration procedure for Classifiers
Command
Description (Optional)
Create the classifiers and the allowed IP source (/ is for the mask)
1
CREATE CLASSIFIER=ipfilt1 IPSOURCE=192.168.1.0/24
CREATE CLASSIFIER=ipfilt2 IPSOURCE=10.0.0.0/24
CREATE CLASSIFIER=ipdrop IPSOURCE=ANY
Associate the classifiers with actions, with a COUNT for dropped packets
2
ADD ACTION CLASSIFIER=ipfilt1 FORWARD
ADD ACTION CLASSIFIER=ipfilt2 FORWARD
ADD ACTION CLASSIFIER=ipdrop DROP
ADD ACTION CLASSIFIER=ipdrop COUNT
SHOW CLASSIFIER=ALL
--- Classifier Configuration Data ------------------------------Name
Field Match(es)
Action(s)
------------ ---------------------------------------- ---------ipdrop
IPSOURCE=ANY
DROP
COUNT
ipfilt1
IPSOURCE=192.168.1.0/24
FORWARD
ipfilt2
IPSOURCE=10.0.0.0/24
FORWARD
Associate the classifiers to interfaces
3
ADD CLASSIFIER=ipfilt1 INTERFACE=3.0 PRECEDENCE=51
ADD CLASSIFIER=ipfilt2 INTERFACE=3.0 PRECEDENCE=52
ADD CLASSIFIER=ipdrop INTERFACE=3.0 PRECEDENCE=69
SHOW CLASSIFIER INTERFACE=3.0
--- Classifier Configuration Data ---------------------------------Interface
Rank
Name
Field Match(es)
----------- ------ ------------ -----------------------ETH:3.0.0
51
ipfilt1
IPSOURCE=192.168.1.0/24
52
ipfilt2
IPSOURCE=10.0.0.0/24
69
ipdrop
IPSOURCE=ANY
Action(s)
---------FORWARD
FORWARD
DROP
COUNT
Deprovision the CLASSIFIER
DELETE the INTERFACE(s) from the classifier from interface or set of interfaces, then DESTROY the classifier.
4
DELETE CLASSIFIER=ipfilt1,ipfilt2,ipdrop INTERFACE=3.0
Delete classifier(s) from interface(s) (Y/N)? y
Info (010017): Operation Successful$
5
Destroy CLASSIFIER=ipfilt1,ipfilt2,ipdrop
Destroy classifier(s) (Y/N)? y
Info (010017): Operation Successful
Software Reference for SwitchBlade x3100 Series Switches
582
Access and Security
Introduction
6.3.4 Classifier Commands
Table 6-4 lists the commands that are used for Classifiers.
TABLE 6-4
Classifier Commands
Commands
ADD ACTION CLASSIFIER
ADD CLASSIFIER INTERFACE PRECEDENCE
CREATE CLASSIFIER
DELETE ACTION CLASSIFIER
DELETE CLASSIFIER INTERFACE
DESTROY CLASSIFIER
RESET CLASSIFIER
RESET CLASSIFIER COUNTER INTERFACE
SET CLASSFIER
SETDEFAULTS CLASSIFIER
SHOW CLASSFIER COUNTER
SHOW CLASSIFIER
Software Reference for SwitchBlade x3100 Series Switches
583
Access and Security
Introduction
ADD ACTION CLASSIFIER
Syntax
ADD ACTION CLASSIFIER=classifiername-list
{ DROP | FORWARD | COUNT | SETVPRIORITY=0..7 | SETIPTOS=0..7 |
SETIPDSCP=0..63 |
SETQUEUE=0..7 |
SETBANDWIDTHCLASS={ GREEN | YELLOW | RED } |
MOVEPRIOTOTOS | MOVETOSTOPRIO }
Description
Adds an ACTION to one or more CLASSIFIERs. As a result, when the CLASSIFIER is added to a port,
the specified ACTION is performed on an incoming packet if the packet conforms to the CLASSIFIER's match rules, unless the ACTION conflicts with an ACTION on a matching CLASSIFIER with
higher precedence. This command cannot add an ACTION that conflicts with an ACTION already on
the CLASSIFIER.
To use SETIPDSCP, either SETVPRIORITY or SETQUEUE must be specified. In either case SETBANDWIDTHCLASS will also be used, using either the configured value or the default setting (GREEN). If
both are used, SETVPRIORITY remarks the 802.1p class of services bits in the outgoing packet and
SETQUEUE determines the egress queue to be used. If only SETVPRIORITY is specified, then the
802.1p remarking is determined by SETVPRIORITY and the egress queue is determined by SETVPRIORITY in conjunction with the VLANQUEUEMAP (system-wide).
Note that these actions for settting DSCP over-ride that settings in the IPDSCP table.
Note that if any classifier already has metering (TRAFFICDESCRIPTOR), the command is blocked.
Refer to 6.5.
Mode
Manager
Options
Option
Description
Range
Default
Value
CLASSIFIER
Associate an action with a classifier or set of classifiers.
Each classifier is separated with a comma.
NA
NA
DROP
DROP - Discard the packet. The DROP ACTION conflicts with all ACTIONs except COUNT
NA
NA
COUNT
On a CLASSIFIER match, increment a per-port counter.
The rules for which counter to increment vary slightly
depending on hardware platform.
NA
NA
If combined with a DROP action, this action increments
the "Filter Count". If combined with actions that do not
include DROP, this action increments the "Match
Count" counter.
Note that on the 9x00 series platform both the "Match
Count" and the "Filter Count" can be incremented by a
single packet that matches both the FORWARD and
DROP classifier. On other platforms only the count
with the higher precedence is incremented.
Current COUNTs are displayed via SHOW CLASSIFIER PORT port-list COUNTER
Software Reference for SwitchBlade x3100 Series Switches
584
Access and Security
Introduction
Option
Description
Range
Default
Value
SETVPRIORITY
Sets the 802.1p bits to the specified value. This value will
impact selection of the egress CoS queue. This action
conflicts with the MOVETOSTOPRIO ACTION,
because it modifies the same location in the packet.
Refer to the Description for how this works for DSCP
processing.
NA
NA
SETIPTOS
Sets the IP TOS field. On a CLASSIFIER match, set the
IP TOS field to a specified value. This action conflicts
with the SETIPDSCP and MOVEPRIOTOTOS
ACTIONs, because they both modify the same location
in the IP packet. This action requires that one or more
of the match rules on the classifier qualifies the packet
as an IP packet.
NA
NA
NA
NA
NA
NA
NA
NA
NA
NA
Also implies a FORWARD ACTION, and so it conflicts
with the DROP ACTION.
SETIPDSCP=0..63
On a CLASSIFIER match, set the IP DSCP field to a
specified value. This action conflicts with the SETIPTOS
and MOVEPRIOTOTOS ACTIONs, because they both
modify the same location in the IP packet. This action
requires that one or more of the match rules on the
classifier qualifies the packet as an IP packet.
Also implies a FORWARD ACTION, and so it conflicts
with the DROP ACTION.
SETQUEUE=0..7
This parameter is optional. On a CLASSIFIER match,
determine the egress queue from the specified value.
This action overrides the egress queue that would be
used otherwise based on the 802.1p priority bits.
Also implies a FORWARD ACTION and so it conflicts
with the DROP ACTION.
SETBANDWIDTHCLASS={
GREEN | YELLOW | RED }
This parameter is optional. On a CLASSIFIER match, set
the bandwidth class (drop precedence) to specified
value.
MOVEPRIOTOTOS
On a CLASSIFIER match, copy the IP TOS field to the
outer VLAN priority field. This action conflicts with the
SETVLANPRIORITY ACTION, because they both modify the same field in the packet. Also implies a FORWARD ACTION, and so it conflicts with the DROP
ACTION. - TBS - Supported?
Also implies a FORWARD ACTION, and so it conflicts
with the DROP ACTION.
This action requires that one or more of the match
rules on the classifier qualifies the packet as an IP
packet.
Software Reference for SwitchBlade x3100 Series Switches
585
Access and Security
Introduction
Option
Description
Range
Default
Value
MOVETOSTOPRIO
This parameter is optional. On a CLASSIFIER match,
copy the outer VLAN priority field to the IP TOS field.
NA
NA
This action conflicts with the SETIPTOS and SETIPDSCP
ACTIONs, because they both modify the same location
in the IP packet. This action also implies a FORWARD
ACTION, and so it conflicts with the DROP ACTION.
This action requires that one or more of the match
rules on the classifier qualifies the packet as an IP
packet.
Example
ADD ACTION CLASSIFIER=ipfilt1 DROP
Software Reference for SwitchBlade x3100 Series Switches
586
Access and Security
Introduction
ADD CLASSIFIER INTERFACE PRECEDENCE
Syntax
ADD CLASSIFIER=classifiername INTERFACE={ type:id-range | id-range | ifnamelist | ALL } PRECEDENCE=1..255
Description
Adds a CLASSIFIER to one or more Interfaces. As a result, the CLASSIFIER is applied to every packet
received on the Interface. This command attempts to add every specified combination of CLASSIFIER
and INTERFACE, and returns an error message for any combinations that cannot be added (e.g. due to
conflicting PRECEDENCE, duplicate CLASSIFIERs, INTERFACEs that do not exist).
Because classifiers are a limited resource, there are constraints on the number of classifiers, and combinations of classifiers, that can be supported on a given interface. If these limits are exceeded, then an
alarm is raised on the interface and operational classifier behavior may differ from the classifier configuration. The SHOW CLASSIFIER command shows details about errors loading the classifier configuration to a given port.
Mode
Manager
Options
Option
Description
Range
Default
Value
CLASSIFIER
The name of the classifier.
NA
NA
INTERFACE
The interface where the classifier is being added.
NA
NA
PRECEDENCE=1..2
55
The value of the PRECEDENCE parameter indicates
whether actions from this CLASSIFIER are performed
when other matching CLASSIFIERS have actions that
conflict with the actions on this CLASSIFIER. In this
case, actions from the CLASSIFIER with the higher PRECEDENCE (smaller numeric value) are performed,
along with any actions from other matching CLASSIFIERs that do not conflict with those actions.
1.255
CLASSIFIERS for filtering should use PRECEDENCE values between 51 and 69. CLASSIFIERS for setting fields in
the packets should use PRECEDENCE values between
146 and 199.
Some PRECEDENCE values are reserved for internal
use (e.g., for IGMP snooping): 1, 2, 3, 4, 11, 12, 13, 14,
20, 25, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131,
132, 133, 134, 135, 140, 230, 231, 232, 233, 234, 235
Example
ADD CLASSIFIER=ipdrop INTERFACE=3.0 PRECEDENCE=69
Software Reference for SwitchBlade x3100 Series Switches
587
Access and Security
Introduction
CREATE CLASSIFIER
Syntax
CREATE CLASSIFIER=classifiername
[ VID={ 1..4095 | ANY } ]
[ VPRIORITY={ 0..7 | ANY } ]
[ INNERVID={ 1..4095 | ANY } ]
[ INNERVPRIORITY={ 0..7 | ANY } ]
[ ETHFORMAT={ 802.3 | 802.3TAGGED | 802.3UNTAGGED | ETHII | ETHIITAGGED |
ETHIIUNTAGGED | ANY } ]
[ LSAP={ NETBIOS | lsap-value | ANY } ]
[ ICMPV6TYPE={ ROUTERADVERTISEMENT | MLDQUERY | MLDV1DONE | MLDV1REPORT |
MLDV2REPORT | REDIRECT | icmpv6type } ]
[ IPDEST={ ipaddress/length | ipv6address/length | MULTICAST | IPV6MULTICAST
| IPV6PERMANENTMULTICAST | IPV6TRANSIENTMULTICAST | ANY } ]
[ IPSOURCE={ ipaddress/length | ipv6address/length | ANY } ]
[ IPDSCP={ 0..63 | ANY } ]
[ IPPROTOCOL={ TCP | UDP | ICMP | ICMPV6 | IGMP | ipprotocol-number |
ipv6nextheader-number | ANY } ]
[ IPTOS={ 0..7 | ANY } ]
[ MACDEST={ macaddress | MULTICAST | ANY }] MACSOURCE={ macaddress | ANY } ]
[ PROTOCOL={ IPV4 | IPV6 | protocol-type | ANY } ]
[ TCPPORTDEST={ tcp-port-list | ANY } ] [ TCPPORTSOURCE={ tcp-port | ANY } ]
[ TCPFLAGS={ { URG | ACK | RST | SYN | FIN | PSH } [ ,... ] | ANY } ]
[ UDPPORTDEST={ udp-port-list | ANY } ] [ UDPPORTSOURCE={ udp-port | ANY } ]
Syntax
Creates a CLASSIFIER. A CLASSIFIER supports performing certain actions to
certain received packets. A CLASSIFIER has a match rule, which is A CLASSIFIER
may be associated with many ports. CLASSIFIERs are associated to ports using
the ADD CLASSIFIER command.
A default CLASSIFIER (i.e., one created by CREATE CLASSIFIER with no match fields) always matches
all packets. If a CLASSIFIER has no match actions, then the default action is to FORWARD.
Mode
Manager
Options
Option
Description
Range
Default
Value
CLASSIFIER
The unique name for the classifier.
NA
NA
Match_rules
A set of fieldname/fieldvalue pairs that discriminate
among packets. A packet matches this rule only if all of
the specified fields have the values specified. The match
rule is specified by CREATE CLASSIFIER and SET CLASSIFIER commands. Refer to Table 6-2
NA
Classifier
matches all
packets,
default
action is to
FORWARD
Classifiers are associated with:
- Zero or more match actions, which are performed if
the incoming packet matches the CLASSIFIER's match
rule. A CLASSIFIER's actions are managed via ADD
ACTION and DELETE ACTION commands.
- Zero or one traffic descriptors, which specify a profile
(traffic rate and burst size) for packets that match the
CLASSIFIER's match rule. A CLASSIFIER's association to
a traffic descriptor is managed via the ADD TRAFFICDESCRIPTOR and DELETE TRAFFICDESCRIPTOR
commands.
Software Reference for SwitchBlade x3100 Series Switches
588
Access and Security
Example
Introduction
CREATE CLASSIFIER=ipfilt2 IPSOURCE=10.0.0.0/24
Software Reference for SwitchBlade x3100 Series Switches
589
Access and Security
Introduction
DELETE ACTION CLASSIFIER
Syntax
Description
DELETE ACTION CLASSIFIER=classifiername-list
{ DROP | FORWARD | COUNT | SETVPRIORITY | SETIPTOS | SETIPDSCP |
SETBANDWIDTHCLASS | MOVEPRIOTOTOS | MOVETOSTOPRIO }
SETQUEUE |
Deletes one ACTION or ALL ACTIONs from one or more CLASSIFIERs. This is the opposite of
ADD ACTION CLASSIFIER. If choosing an action over multiple classifiers, all classifiers must have that
same action.
To delete SETIPDSCP, either SETVPRIORITY or SETQUEUE (or both) must have been specified when
the action was added, and so these must be deleted as well.
Mode
Manager
Product
Options
Option
Description
Range
Default
Value
CLASSIFIER
Associate an action with a classifier or set of classifiers.
Each classifier is separated with a comma.
NA
NA
ACTION
Refer to ADD ACTION CLASSIFIER.
NA
NA
Note
For the SBx3100, The DELETE ACTION CLASSIFIER command may fail with the error, “Reason:
Hardware marking resources exceeded.” This occurs when the removal of the remarking action leaves
a unique combination of remarking actions that requires the allocation of a hardware marking resource
when none are available. Refer to Hardware Resources.
Example
DELETE ACTION CLASSIFIER=ipfilt1 DROP
Software Reference for SwitchBlade x3100 Series Switches
590
Access and Security
Introduction
DELETE CLASSIFIER INTERFACE
Syntax
DELETE CLASSIFIER=classifiername-list INTERFACE={ type:id-range | id-range |
ifname-list | ALL } [ FORCE ]
Description
Deletes one or more CLASSIFIERs from one or more INTERFACE(s). This command causes the specified CLASSIFIER(s), and their actions, to no longer affect traffic on the specified INTERFACE(s). This
command deletes every combination of specified CLASSIFIER(s) and INTERFACE(s) that actually
exists. Note that the classifier is not deleted, only the interface associations.
Mode
Manager
Options
Option
Description
Range
Default
Value
CLASSIFIER
The name of the classifier(s), separated by a comma
NA
NA
INTERFACE
ALL - Deletes all the specified interface(s) and classifier(s) association.
NA
NA
FORCE
Executes the command without a confirmation.
NA
NA
Release Note
NA
Example
DELETE CLASSIFIER=ipfilt1,ipfilt2,ipdrop INTERFACE=3.0
Software Reference for SwitchBlade x3100 Series Switches
591
Access and Security
Introduction
DESTROY CLASSIFIER
Syntax
DESTROY CLASSIFIER={classifiername-list|ALL} [ FORCE ]
Description
Attempts to remove every specified CLASSIFIER from the system, and returns an error message for
any that cannot be destroyed. This command is allowed only if no interfaces are currently associated
with the CLASSIFIER(s). Use "DELETE CLASSIFIER=classifiername-list INTERFACE=ALL" to delete all
interface associations for the classifiers in one command.
Mode
Manager
Options
Option
Description
Range
Default
Value
CLASSIFIER
The name of the classifier(s), separated by a comma
NA
NA
NA
NA
ALL - delete all interface associations for the classi-
fiers in one command.
FORCE
Release Note
Executes the command without a confirmation.
NA
Example
DESTROY CLASSIFIER class1
Destroy classifier(s) (Y/N)? Y
DESTROY CLASSIFIER class2 FORCE
Software Reference for SwitchBlade x3100 Series Switches
592
Access and Security
Introduction
RESET CLASSIFIER
Syntax
RESET CLASSIFIER=classifiername [FORCE]
Description
The RESET CLASSIFIER command clears all of the match rules from the CLASSIFIER, resulting in a
classifier that always matches all packets. This command does not remove association of the CLASSIFIER to ACTION(s) or PORT(s). Use DELETE ACTION CLASSIFIER or DELETE CLASSIFIER PORT
for those types of changes.
Mode
Manager
Options
Release Note
Option
Description
CLASSIFIER
The classifier where all match rules are being cleared.
FORCE
Resets the classifier without confirmation
Default Value
NA
RESET CLASSIFIER=ip_32
Software Reference for SwitchBlade x3100 Series Switches
593
Access and Security
Introduction
RESET CLASSIFIER COUNTER INTERFACE
Syntax
RESET CLASSIFIER COUNTER
INTERFACE={type:id-range|id-range|ifname-list|ALL} [FORCE]
Description
Resets (sets to 0) all CLASSIFIER counters associated with the specified INTERFACE(s). There are
three pre-defined CLASSIFIER counters for each INTERFACE, as described in SHOW CLASSFIER
COUNTER.
You may not specify a CLASSIFIER name. There is no means to clear counters associated with a subset
of CLASSIFIERS on an interface.
Mode
Manager
Options
Example
Option
Description
Range
Default
Value
INTERFACE
The interface where the counters are reset. Specify
“ALL” to add the classifier to all interfaces
NA
NA
FORCE
Resets the classifier without confirmation
NA
NA
RESET CLASSIFIER COUNTER INTERFACE=1.23 FORCE
Software Reference for SwitchBlade x3100 Series Switches
594
Access and Security
Introduction
SET CLASSFIER
Syntax
SET CLASSIFIER=classifiername-list
[ VID={ 1..4095 | ANY } ]
[ VPRIORITY={ 0..7 | ANY } ]
[ INNERVID={ 1..4095 | ANY } ]
[ INNERVPRIORITY={ 0..7 | ANY } ]
[ ETHFORMAT={ 802.3 | 802.3TAGGED | 802.3UNTAGGED | ETHII | ETHIITAGGED |
ETHIIUNTAGGED | ANY } ]
[ LSAP={ NETBIOS | lsap-value | ANY } ]
[ ICMPV6TYPE={ ROUTERADVERTISEMENT | MLDQUERY | MLDV1DONE | MLDV1REPORT |
MLDV2REPORT | REDIRECT | icmpv6type } ]
[ IPDEST={ ipaddress/length | ipv6address/length | MULTICAST | IPV6MULTICAST
| IPV6PERMANENTMULTICAST | IPV6TRANSIENTMULTICAST | ANY } ]
[ IPSOURCE={ ipaddress/length | ipv6address/length | ANY } ]
[ IPDSCP={ 0..63 | ANY } ]
[ IPPROTOCOL={ TCP | UDP | ICMP | ICMPV6 | IGMP | ipprotocol-number |
ipv6nextheader-number | ANY } ]
[ IPTOS={ 0..7 | ANY } ]
[ MACDEST={ macaddress | MULTICAST | ANY }] MACSOURCE={ macaddress | ANY } ]
[ PROTOCOL={ IPV4 | IPV6 | protocol-type | ANY } ]
[ TCPPORTDEST={ tcp-port-list | ANY } ] [ TCPPORTSOURCE={ tcp-port | ANY } ]
[ TCPFLAGS={ { URG | ACK | RST | SYN | FIN | PSH } [ ,... ] | ANY } ]
[ UDPPORTDEST={ udp-port-list | ANY } ] [ UDPPORTSOURCE={ udp-port | ANY } ]
Syntax
Sets the match rule for the specified CLASSIFIER(s). The match rule specified
in this command replaces any existing match rule on the CLASSIFIER(s). Refer
to the options table (Table 6-2).
Mode
Manager
Options
Example
Option
Description
Range
Default
Value
CLASSFIER
The already created CLASSFIER(s), separated by a
comma.
NA
NA
SET CLASSIFIER=ipfilt2 IPSOURCE=ANY
Software Reference for SwitchBlade x3100 Series Switches
595
Access and Security
Introduction
SETDEFAULTS CLASSIFIER
Syntax
SETDEFAULTS CLASSIFIER=classifiername [ VID ] [ VPRIORITY ] [ INNERVID ]
[ INNERVPRIORITY ] [ ETHFORMAT ] [ LSAP ] [ ICMPV6TYPE ]
[ IPDEST ] [ IPSOURCE ] [ IPDSCP ] [ IPPROTOCOL ] [ IPTOS ] [ MACDEST ]
[ MACSOURCE ] [ PROTOCOL ] [ TCPPORTDEST ] [ TCPPORTSOURCE ] [ TCPFLAGS ]
[ UDPPORTDEST ] [ UDPPORTSOURCE ]
Description
Clears the specified user defined match rule (or rules) from the CLASSIFIER. The previous user
defined match rule match rule may still exist on the CLASSIFIER as a derived rule if it is required by
any of the remaining match rules. For example, if the match rules TCPPORTDEST=45 and IPPROTOCOL= TCP exist on a classifier then clearing IPPROTOCOL will result in that rule being removed as a
user defined rule and added back as a derived rule. This command does not remove association of the
CLASSIFIER to ACTION(s) or INTERFACE(s).
Mode
Manager
Options
Option
Description
Range
Default
Value
TRAFFICDESCRIPTOR
The name(s) of the already created TRAFFICDESCRIPTOR(s), separated by a comma.
NA
NA
Release Note
Changed - In Release 17.0, the option ICMPV6TYPE is added.
Note
This command does not remove association of the CLASSIFIER to ACTION(s) or INTERFACE(s). Use
DELETE ACTION CLASSIFIER or DELETE CLASSIFIER INTERFACE for those types of changes.
Example
SETDEFAULTS CLASSIFIER=ipfilter3
Software Reference for SwitchBlade x3100 Series Switches
596
Access and Security
Introduction
SHOW CLASSFIER COUNTER
Syntax
SHOW CLASSIFIER COUNTER [ { INTERFACE={ type:id-range | id-range | ifnamelist | ALL } } ]
Description
Shows the classification counters for the specified interface(s). Each interface has three classification
counters:
Mode
•
Filter Count" - counts packets dropped because of classifiers with both the DROP and COUNT
actions.
•
Match Count" - counts packets that match a classifier with the COUNT action but no DROP
action.
•
Policed Count" - counts packets dropped because they exceed a TRAFFICDESCRIPTOR when
the NCCOUNT action is ON.
Manager
Options
Example
Option
Description
Range
Default
Value
INTERFACE
Interfaces included for showing the classification counters.
NA
NA
SHOW CLASSIFIER count_ip
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------ ---------------------------------------- -----------------------count_ip
IPPROTOCOL=ANY
COUNT
------------------------------------------------------------------------------officer SEC>> SHOW CLASSIFIER count_ip INTERFACE ALL
--- Classifier Configuration Data --------------------------------------------Interface Rank Name
Field Match(es)
Action(s)
--------- ---- ------------ ---------------------------------------- --------ETH:0.1
100 count_ip
IPPROTOCOL=ANY
COUNT
------------------------------------------------------------------------------officer SEC>> SHOW CLASSIFIER COUNTER
--- Classifier Port
Port/Interface
-----------------ETH:0.1
Counters -------------------------------------------------Match Count
Filter Count
Policed Count
------------------- -------------------- -----------------17
0
0
Software Reference for SwitchBlade x3100 Series Switches
597
Access and Security
Introduction
SHOW CLASSIFIER
Syntax
SHOW CLASSIFIER={ classifiername-list | ALL }
[ { INTERFACE={ type:id-range | id-range | ifname-list | ALL } } ]
[ { SUMMARY | FULL } ]
Description
There are two minor variations of this command: one that shows only CLASSIFIER data (independent
of associations to INTERFACEs), and one that shows CLASSIFIERs in the context of their associations
to INTERFACEs. The command displays the CLASSIFIER name, match rules, and actions. The second
case shows only CLASSIFIERs associated with the specified INTERFACE(s). It shows the relative precedence of each CLASSSIFIER on that INTERFACE. It also identifies any classifiers that were not able
to be applied to the INTERFACE's hardware, resulting in classifier configuration alarms.
The SUMMARY option shows only CLASSIFIERs that can be managed by the user. The SUMMARY display option is the default.
The FULL option shows two additional types of information not shown by the SUMMARY option:
Mode
•
"internal" classifiers, which are added by the system to enable other features (e.g. IGMP snooping),
and
•
"derived" match rules, which match fields implied but not explicitly specified by higher protocol
match rules (e.g., rules added to match only IPv4 packets if IPDSCP match rule is specified).
User
Options
Option
Description
Range
Default
Value
CLASSFIERCLASSFIER
The already created CLASSFIER(s), separated by a
comma
NA
NA
INTERFACE
The interface
NA
NA
SUMMARY
Shows only CLASSIFIERs that can be managed by the
user.
NA
SUMMARY
FULL
Shows two additional types of information not shown
by the SUMMARY option:
NA
NA
- "internal" classifiers, which are added by the system to
enable other features (e.g. IGMP snooping)
- "derived" match rules, which match fields implied but
not explicitly specified by higher protocol match rules
(e.g. rules added to match only IPv4 packets if IPDSCP
match rule is specified).
Example
SHOW CLASSIFIER
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------ ---------------------------------------- -----------------------drop_vid10
VID=10
DROP
-------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
598
Access and Security
Introduction
officer SEC>> SHOW CLASSIFIER FULL
--- Classifier Configuration Data --------------------------------------------Name
Field Match(es)
Action(s)
------------ ---------------------------------------- -----------------------_dhcpRelay_a
UDPPORTDEST=67
LIMIT_FWD_CPU
gent
UDPPORTSOURCE=67
IPPROTOCOL=UDP
(D)
_dhcpRelay_s
UDPPORTDEST=67
LIMIT_FWD_CPU
ub
UDPPORTSOURCE=68
IPPROTOCOL=UDP
(D)
drop_vid10
VID=10
DROP
------------------------------------------------------------------------------officer SEC>> SHOW CLASSIFIER INTERFACE 0.0
--- Classifier Configuration Data --------------------------------------------Interface Rank Name
Field Match(es)
Action(s)
--------- ---- ------------ ---------------------------------------- --------ETH:0.0
150 drop_vid10
VID=10
DROP
-------------------------------------------------------------------------------
Software Reference for SwitchBlade x3100 Series Switches
599
Access and Security
Introduction
6.4 Access Control List
Access Control Lists (ACLs) provide traffic filtering functionality. They are shortcuts for creating classifiers. Unlike classifiers,
ACLs are a more easily understood syntax and a more common method for applying filters.
Note:
The CLASSIFIER commands support additional match fields and actions. Refer to Section 6.3.
ACLs give the user the ability to define traffic types by protocol (in English words) without the need to know the exact IP/
TCP/UDP characteristics of the protocol specified.
An ACL is composed of a set of rules, each rule specifies a traffic stream to be permitted (PERMIT) or denied (DENY) to
transit the switch port. By default, the system adds a DENY rule as the last one in the set of rules. (This default can be
changed to PERMIT.)
6.4.1 Provisioning Overview
Provisioning allows one access list per port or interface. It can be applied to the ingress traffic on the specified interface.
In addition to the line card physical interfaces, the user can apply an access list to control traffic associated with the management interface (MGMT and inband) destined to the CFC’s CPU. The management interface refers to either the physical
Ethernet port on the control module faceplate (MGMT) or the virtual management port accessed through in-band traffic
paths.
Following are the general provisioning rules:
• An access list can be created and provisioned by the user as a standalone configuration.
• The access list is managed by name.
• Rules may be added, modified or deleted at any time. The order of rules in an access list convey an evaluation priority.
Earlier rules (those that have lower Rule numbers) that may overlap with rules that occur later in the list (that have higher
numbers) will be given priority if the actions on the two rules conflict.
• The user can apply the access list to an interface or a set of interfaces. The system will reject a user’s request if an attribute of the access list is not compatible with interface’s capabilities.
The following lists the packet attributes and protocols that can be provisioned in an ACL. These attributes may be combined
to form an expression to compare against the attributes of a packet as it enters an interface.
•
•
•
•
•
•
•
Note:
Ethernet MAC source and/or destination address.
Layer 2 protocol type field.
IP source and/or destination address with a subnet mask.
IP protocol type field.
UDP source and/or destination port numbers.
TCP source and/or destination port numbers.
APPLICATION abstract rule types that provide a predefined set of rules such as a rule to permit or deny NETBIOS,
DHCP and subscriber multicast traffic (FUM). These rule attributes are expanded by the internal traffic management
system into one or more classifiers.
Application ACLs (for example NETBIOS ACL) do not cover protocols running over IPX.
6.4.2 ACL for the SBx3100
ACLs will also be qualified by the SBx3100 as follows:
• Conflicting match fields on a single rule will be rejected.
Software Reference for SwitchBlade x3100 Series Switches
600
Access and Security
Introduction
• Internally, there are some automatic match qualifications that are derived. For example, if the user configures an
access list with a TCP source port rule, the system will automatically add match qualifiers for the layer 2 protocol field
to be IPv4, and the IP protocol field to be TCP.
The SB x3112 supports up to 96 rules per ACL (+ 1 default deny rule), while the iMAP supports up to 35 rules per ACL.
On a card basis:
• XE4 - can hold a full access list of 96 rules on all 4 ports
• GE24POE - up to 44 rules of the same type per port
• GE24SFP - up to 44 rules of the same type per port.
6.4.3 Configuring ACL
6.4.3.1 Default Configuration
When the SBx3100 is first installed and in service, there are no ACCESSLIST names.
6.4.3.2 Configuration Guidelines
• If enabled for filtering of dynamically learned DHCP IP addresses, dynamic DHCP IP filters are preserved.
• The user can set the default DENY or PERMIT rule for accesslists using the CREATE or SET ACCESSLIST command. See
•
•
•
•
•
•
•
the example that follows for details.
Filtering can be applied to the MGMT and inband interfaces. This allows the user to block certain packets at thc CFC
CPU preventing them from being processed.
Hardware classification resources on ingress ports are limited. In the event the system experiences contention for
resources, an alarm will be raised on the port.
The user is not allowed to add an access list to a port that currently has classifiers in the precedence range reserved for
access lists. The user must remove those classifiers on the port before being allowed to add the access list.
Mapping of a classifier configuration port alarm will not be direct. If an accesslist configuration error occurs, a system
alarm or error indication will be generated. The user can observe, using the SHOW ALARMS command, an error against
an ACL. From there, the user can use the SHOW ALARMS command on the port in combination with SHOW ACCESSLIST
<acl-name> INTERFACE <interface-name> and SHOW CLASSIFIER ALL on the interface command to understand the
root cause of the alarm. The cause of the error will be revealed in the SHOW ACCESSLIST <acl-name> INTERFACE
<interface-name> output. Users can normally diagnose the error from that output. To see exactly which classifier caused
the problem use SHOW CLASSIFIER ALL INTERFACE <interface-name> FULL (note that this is usually not required).
The user must be careful when applying the FUM (From User Multicast) application rule. If applied to the wrong upstream
port, for example an XE port, multicast video could be disabled for the whole system. Refer to 6.3.2 on using classifiers.
Because accesslists use classifiers, the user may observe classifier configuration failure logs/alarms when configuring ACLs.
Refer to the Allied Telesis Log Manual for information about classifier configuration failure.
The user also cannot apply a classifier or access list to an empty LAG (i.e. one with no port members).
Note:
The system will generate a warning message informing the user if or when resources have been exceeded. The user
should investigate classifier-related provisioning, such as IGMP, DHCPRELAY, VLAN (for per-VLAN UFO and
HVLAN), EPSR, INTERFACE (TAGALL option for HVLAN), ACCESSLIST, and CLASSIFIER to determine the reason
for the message.
• For the access list name of Application a match rule of DHCPCLIENT or DHCPSERVER (in Table 6-7) filters on the destination DHCP traffic. In other words a match rule of DHCPCLIENT will filter on the interface's ingress traffic that has a
destination to the dhcp client and the match rule of DHCPSERVER will filter on the interface's ingress traffic that has a
destination to the dhcp server.
Software Reference for SwitchBlade x3100 Series Switches
601
Access and Security
Introduction
6.4.3.3 Configuration Procedure for ACL
The general sequence to configure an ACL is to:
• Create the ACCESSLIST; if this is for one rule, and interfaces are associated, the ACL is provisioned.
• Add rules to the ACCESSLIST; a rule can also be placed BEFORE an existing rule so that it takes higher precedence over
the existing rule, or AFTER an existing rule so that it takes a lower precedence over the existing rule.
• Add the ACCESSLIST to an interface or set of interfaces.
The general sequence to deprovision an ACCESSLIST is to:
• DELETE the ACCESSLIST from the associated interfaces.
• DESTROY the ACCESSLIST
In the following procedure, the user wishes to only allow traffic originated from a range of IP addresses assigned to customers using the user’s set-top boxes (172.16.5.0 – 172.16.5.15).
TABLE 6-5
Step
Configuration Procedure for ACL
Command
Description (Optional)
Create the ACCESSLIST stb_range to PERMIT the IP address range.
1
CREATE ACCESSLIST stb_range RULE=PERMIT IPSOURCE=172.16.5.0
SOURCEMASK=255.255.255.240
SHOW ACCESSLIST stb_range
--- Access Lists -------------------------------------------------------------Name
Interfaces
Rule Action Fields
---------------- ---------------- ---- ------- ------------------------------stb_range
1
PERMIT IPSOURCE=172.16.5.0
SOURCEMASK=255.255.255.240
-DENY // all other packets dropped
Since all other packets are dropped, add rule to the stb_range to allow ARP packets through.a
2
ADD ACCESSLIST stb_range RULE=PERMIT PROTOCOL=0x806
// 0x806 is the protocol-type for ARP
SHOW ACCESSLIST stb_range
--- Access Lists ---------------------------------------------------------Name
Interfaces
Rule Action Fields
--------- -------------- ---- ------- ------------------------------- ---stb_range
1
PERMIT IPSOURCE=172.16.5.0
SOURCEMASK=255.255.255.240
2
PERMIT PROTOCOL=2054
-DENY
If needed, deny a type of packet from the approved range by placing a new rule at a higher precedence. than the Ip
address rule.
3
ADD ACCESSLIST stb_range RULE=DENY APPLICATION=NETBIOS BEFORE=1//ipaddress
rule
SHOW ACCESSLIST stb_range
--- Access Lists ---------------------------------------------------------Name
Interfaces
Rule Action Fields
--------- -------------- ---- ------- ------------------------------- ---stb_range
1
DENY
APPLICATION=NETBIOS
2
PERMIT IPSOURCE=172.16.5.0
SOURCEMASK=255.255.255.240
3
PERMIT PROTOCOL=2054
-DENY
Add the ACCESSLIST stb_range to an interface or set of interfaces.
Software Reference for SwitchBlade x3100 Series Switches
602
Access and Security
Introduction
TABLE 6-5
Configuration Procedure for ACL (Continued)
Step
Command
Description (Optional)
4
ADD ACCESSLIST stb_range INTERFACE=eth:10.0
SHOW ACCESSLIST stb_range
--- Access Lists --------------------------------------------------------Name
Interfaces
Rule Action Fields
--------- -------------- ---- ------- ------------------------------- --stb_range ETH:[10.0]
1
DENY
APPLICATION=NETBIOS
2
PERMIT IPSOURCE=172.16.5.0
SOURCEMASK=255.255.255.240
3
PERMIT PROTOCOL=2054
-DENY
Deprovision the ACCESSLIST
DELETE the ACCESSLIST from interface or set of interfaces
5
DELETE ACCESSLIST stb_range
INTERFACE=eth:10.$
DESTROY the ACCESSLIST
6
DESTROY ACCESSLIST=stb_range
Destroy Access List(s) (Y/N)? Y
SHOW ACCESSLIST=stb_range
Error (041154): Access List(s) "stb_range" do not exist.
a. To ensure that only ARP packets from the permitted IP addresses were allowed to pass, the ARP Filtering feature
would be used, as described in 6.13.1.
Software Reference for SwitchBlade x3100 Series Switches
603
Access and Security
Introduction
6.4.4 Access Commands
Table 6-6 lists the commands that are used for ACL.
TABLE 6-6
Access List Commands
Commands
ADD ACCESSLIST INTERFACE
ADD ACCESSLIST RULE
CREATE ACCESSLIST
DELETE ACCESSLIST RULE
DELETE ACCESSLIST INTERFACE
DESTROY ACCESSLIST
RESET ACCESSLIST RULE
SET ACCESSLIST
SHOW ACCESSLIST
Table 6-7 lists the parameters that are available for ACCESSLIST commands.
TABLE 6-7
Access List Command Parameters
Parameter
Description
ACCESSLIST
The name of the access list. The name may contain a maximum of 22 characters.
Software Reference for SwitchBlade x3100 Series Switches
604
Access and Security
Introduction
TABLE 6-7
Access List Command Parameters (Continued)
Parameter
Description
APPLICATION
The name of the APPLICATION to match on. APPLICATION is one of
several predefined match rules. Allowed values are:
DHCPSERVER - matches packets with UDPPORTDEST=67
DHCPV6SERVER - matches packets with UDPPORTDEST=547
DHCPCLIENT - matches packets with UDPPORTDEST=68
DHCPV6CLIENT - matches packets with UDPPORTDEST=546
NETBIOS - matches packets with LSAP=NETBIOS; TCPPORTDEST=137,
138, 139, or 445; or UDPPORTDEST=137, 138, 139, or 445
FUM - matches IPv4 multicast packets, i.e., in the IPv4 ad